cover
Contact Name
Tole Sutikno
Contact Email
ijece@iaesjournal.com
Phone
-
Journal Mail Official
ijece@iaesjournal.com
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
International Journal of Electrical and Computer Engineering
ISSN : 20888708     EISSN : 27222578     DOI : -
International Journal of Electrical and Computer Engineering (IJECE, ISSN: 2088-8708, a SCOPUS indexed Journal, SNIP: 1.001; SJR: 0.296; CiteScore: 0.99; SJR & CiteScore Q2 on both of the Electrical & Electronics Engineering, and Computer Science) is the official publication of the Institute of Advanced Engineering and Science (IAES). The journal is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication and computer engineering from the global world.
Articles 115 Documents
Search results for , issue "Vol 10, No 3: June 2020" : 115 Documents clear
DFIG use with combined strategy in case of failure of wind farm Azeddine Loulijat; Najib Ababssi; Mohammed Makhad
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 3: June 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1229.641 KB) | DOI: 10.11591/ijece.v10i3.pp2221-2234

Abstract

In the wind power area, Doubly Fed Induction Generator (DFIG) has many advantages due to its ability to provide power to voltage and constant frequency during rotor speed changes, which provides better wind capture as compared to fixed speed wind turbines (WTs). The high sensitivity of the DFIG towards electrical faults brings up many challenges in terms of compliance with requirements imposed by the operators of electrical networks. Indeed, in case of a fault in the network, wind power stations are switched off automatically to avoid damage in wind turbines, but now the network connection requirements impose stricter regulations on wind farms in particular in terms of Low Voltage Ride through (LVRT), and network support capabilities. In order to comply with these codes, it is crucial for wind turbines to redesign advanced control, for which wind turbines must, when detecting an abnormal voltage, stay connected to provide reactive power ensuring a safe and reliable operation of the network during and after the fault. The objective of this work is to offer solutions that enable wind turbines remain connected generators, after such a significant voltage drop. We managed to make an improvement of classical control, whose effectiveness has been verified for low voltage dips. For voltage descents, we proposed protection devices as the Stator Damping Resistance (SDR) and the CROWBAR. Finally, we developed a strategy of combining the solutions, and depending on the depth of the sag, the choice of the optimal solution is performed.
Botnet detection using ensemble classifiers of network flow Zahraa M. Algelal; Eman Abdulaziz Ghani Aldhaher; Dalia N. Abdul-Wadood; Radhwan Hussein Abdulzhraa Al-Sagheer
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 3: June 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (532.334 KB) | DOI: 10.11591/ijece.v10i3.pp2543-2550

Abstract

Recently, Botnets have become a common tool for implementing and transferring various malicious codes over the Internet. These codes can be used to execute many malicious activities including DDOS attack, send spam, click fraud, and steal data. Therefore, it is necessary to use Modern technologies to reduce this phenomenon and avoid them in advance in order to differentiate the Botnets traffic from normal network traffic. In this work, ensemble classifier algorithms to identify such damaging botnet traffic. We experimented with different ensemble algorithms to compare and analyze their ability to classify the botnet traffic from the normal traffic by selecting distinguishing features of the network traffic. Botnet Detection offers a reliable and cheap style for ensuring transferring integrity and warning the risks before its occurrence.
Security-aware fair transmission scheme for 802.11 based cognitive IoT Hayoung Oh
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 3: June 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (92.279 KB) | DOI: 10.11591/ijece.v10i3.pp2589-2599

Abstract

Cognitive IoT is exponentially increased because of various real time and robust applications with sensor networks and big data analysis. Each IoT protocol of network layer can be RPL, COAP and so on based on IETF standards. But still collision problems and security-aware fair transmission on top of scalable IoT devices were not solved enough. In the open wireless LAN system based cognitive IoTs, IoT node that is continuously being stripped of its transmission opportunity will continue to accumulate packets to be sent in the butter and spoofing attacks will not allow the data transfer opportunities to be fair. Therefore, in this paper, we propose a method to reduce the average wait time of all packets in the system by dynamically controlling the contention window (CW) in a wireless LAN based cognitive IoT environment where there are nodes that do not have fair transmission opportunities due to spoofing attacks. Through the performance evaluation, we have proved that the proposed technique improves up to 80% in terms of various performance evaluation than the basic WLAN 802.11 based IoT.
Discrete wavelet transform-based RI adaptive algorithm for system identification Mohammad Shukri Salman; Alaa Eleyan; Bahaa Al-Sheikh
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 3: June 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (11.729 KB) | DOI: 10.11591/ijece.v10i3.pp2383-2391

Abstract

In this paper, we propose a new adaptive filtering algorithm for system identification. The algorithm is based on the recursive inverse (RI) adaptive algorithm which suffers from low convergence rates in some applications; i.e., the eigenvalue spread of the autocorrelation matrix is relatively high. The proposed algorithm applies discrete-wavelet transform (DWT) to the input signal which, in turn, helps to overcome the low convergence rate of the RI algorithm with relatively small step-size(s). Different scenarios has been investigated in different noise environments in system identification setting. Experiments demonstrate the advantages of the proposed DWT recursive inverse (DWT-RI) filter in terms of convergence rate and mean-square-error (MSE) compared to the RI, discrete cosine transform LMS (DCTLMS), discrete-wavelet transform LMS (DWT-LMS) and recursive-least-squares (RLS) algorithms under same conditions.
New modification on feistel DES algorithm based on multi-level keys Suhad M. Kareem; Abdul Monem S. Rahma
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 3: June 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1271.191 KB) | DOI: 10.11591/ijece.v10i3.pp3125-3135

Abstract

The data encryption standard (DES) is one of the most common symmetric encryption algorithms, but it experiences many problems. For example, it uses only one function (XOR) in the encryption process, and the combination of data is finite because it occurs only twice and operates on bits. This paper presents a new modification of the DES to overcome these problems. This could be done through adding a new level of security by increasing the key space (using three keys) during the 16 rounds of the standard encryption algorithm and by replacing the predefined XOR operation with a new # operation. Our proposed algorithm uses three keys instead of one. The first key is the input key used for encrypting and decrypting operations. The second key is used for determining the number of bits, while the third key is used for determining the table numbers, which are from 0 to 255. Having evaluated the complexity of our proposed algorithm, the results show that it is the most complex compared with the well-known DES and other modified algorithms. Consequently, in our proposed algorithm, the attacker try a number of attempts 21173 at minimum to decrypt the message. This means that the proposed DES algorithm will increase the security level of the well-known DES.
Application of resistance energy model to optimising electric power consumption of a belt conveyor system Awingot Richard Akparibo; Erwin Normanyo
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 3: June 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1564.689 KB) | DOI: 10.11591/ijece.v10i3.pp2861-2873

Abstract

Driven by constantly increasing energy demands, prices, environmental impact caused by carbon dioxide emissions and global warming, efficient use of energy is gaining grounds in both public and private enterprises. The energy consumption of belt conveyors can be lowered using energy modelling techniques. In this research, a resistance-based mathematical energy model was utilised in the electrical energy efficiency optimisation of the troughed, inclined belt conveyor system taking into account indentation rolling resistance, bulk solid flexure resistance and secondary resistance as they together contribute 89% resistance to motion. An optimisation problem was formulated to optimise the electrical energy efficiency of the belt conveyor system and subsequently solved using the “fmincon” solver and interior point algorithm of the MATLAB optimisation toolbox. Analysis of simulation results showed that for the same given operating capacities, an average energy saving of about 7.42% and an annual total cost savings of Gh¢ 5, 852, 669.00 (USD 1, 083, 827.59) for a 2592-hour operation can be achieved when the used model and optimisation technique are employed over the constant speed operation.
Analysis on techniques used to recognize and identifying the Human emotions Praveen Kulkarni; Rajesh T. M.
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 3: June 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (273.803 KB) | DOI: 10.11591/ijece.v10i3.pp3307-3314

Abstract

Facial expression is a major area for non-verbal language in day to day life communication. As the statistical analysis shows only 7 percent of the message in communication was covered in verbal communication while 55 percent transmitted by facial expression. Emotional expression has been a research subject of physiology since Darwin’s work on emotional expression in the 19th century. According to Psychological theory the classification of human emotion is classified majorly into six emotions: happiness, fear, anger, surprise, disgust, and sadness. Facial expressions which involve the emotions and the nature of speech play a foremost role in expressing these emotions. Thereafter, researchers developed a system based on Anatomic of face named Facial Action Coding System (FACS) in 1970. Ever since the development of FACS there is a rapid progress of research in the domain of emotion recognition. This work is intended to give a thorough comparative analysis of the various techniques and methods that were applied to recognize and identify human emotions. This analysis results will help to identify the proper and suitable techniques, algorithms and the methodologies for future research directions. In this paper extensive analysis on the various recognition techniques used to identify the complexity in recognizing the facial expression is presented. This work will also help researchers and scholars to ease out the problem in choosing the techniques used in the identification of the facial expression domain.
Effect of fuzzy PID controller on feedback control systems based on wireless sensor network Anas A. Hussien; Mehdi J Marie; Khalaf S. Gaeid
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 3: June 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (823.592 KB) | DOI: 10.11591/ijece.v10i3.pp2416-2425

Abstract

Wireless Networked control system (WNCS) has an important in all aspects of the life and in the research fields of Engineering. In this article, a real-time implementation of the wireless feedback control system (WFCS) is performed. The stability issue in the closed-loop control system still suffer from noise, disturbances, and need careful considerations to handle it. Three cases to discover the ability of a Fuzzy PID controller to maintain better angular position control system (PCS) is addressed and controlled by a personal computer through a wireless sensor network(WSN) constructed by ZigBee platforms. The practical issues related with the design and implementation of the wireless computerized control system (WCCS) is discussed and analyzed. The simulation results carried out with Matlab/Simulink 2018b. Different parameters effect such as maximum overshoot, sampling frequency, distance and delay time have been studied. These effects on overall system performance would be discussed. Improving the efficient use of ZigBee platform for WFCS. The simulation and experimental results prove the proposed algorithm in the field of wireless control system.
Convolutional recurrent neural network with template based representation for complex question answering A. Chandra Obula Reddy; K. Madhavi
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 3: June 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (828.382 KB) | DOI: 10.11591/ijece.v10i3.pp2710-2718

Abstract

Complex Question answering system is developed to answer different types of questions accurately. Initially the question from the natural language is transformed to an internal representation which captures the semantics and intent of the question. In the proposed work, internal representation is provided with templates instead of using synonyms or keywords. Then for each internal representation, it is mapped to relevant query against the knowledge base. In present work, the Template representation based Convolutional Recurrent Neural Network (T-CRNN) is proposed for selecting answer in Complex Question Answering (CQA) framework. Recurrent neural network is used to obtain the exact correlation between answers and questions and the semantic matching among the collection of answers. Initially, the process of learning is accomplished through Convolutional Neural Network (CNN) which represents the questions and answers separately. Then the representation with fixed length is produced for each question with the help of fully connected neural network. In order to design the semantic matching between the answers, the representation of Question Answer (QA) pair is given into the Recurrent Neural Network (RNN). Finally, for the given question, the correctly correlated answers are identified with the softmax classifier.
Effect of fiber and solenoid variation parameters on the elements of a corrector PID for electromagnetic fiber squeezer based polarization controller Abdallah Zahidi; Amrane said; Nawfel Azami; Naoual Nasser
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 3: June 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1035.524 KB) | DOI: 10.11591/ijece.v10i3.pp2441-2451

Abstract

Controlling the polarization of the light output from single-mode fiber systems is very important for connecting it to polarization-dependent integrated optical circuits, while applications using a heterodyne detection system. Polarization controller using fiber squeezer is attractive for a low-loss, low-penalty coherent optical fiber trunk system. However, for polarization controllers using electromagnetic fiber squeezer, the stability problem due to the saturation of their magnetic circuit must be studied. In fact, in their conventional configuration, open-loop stability affects performance and limits applications. First at all, this effect has been analyzed and a feedback circuit with correctors has been proposed to improve stability performance. Then a simulation study is proposed to examine the influence of the system parameters on the corrector constants. The results of the simulation show that if the system parameters change the constants Kp, Ki and Kd of the PID corrector must be adjusted to keep an optimized dynamic response.

Page 10 of 12 | Total Record : 115


Filter by Year

2020 2020


Filter By Issues
All Issue Vol 16, No 1: February 2026 Vol 15, No 6: December 2025 Vol 15, No 5: October 2025 Vol 15, No 4: August 2025 Vol 15, No 3: June 2025 Vol 15, No 2: April 2025 Vol 15, No 1: February 2025 Vol 14, No 6: December 2024 Vol 14, No 5: October 2024 Vol 14, No 4: August 2024 Vol 14, No 3: June 2024 Vol 14, No 2: April 2024 Vol 14, No 1: February 2024 Vol 13, No 6: December 2023 Vol 13, No 5: October 2023 Vol 13, No 4: August 2023 Vol 13, No 3: June 2023 Vol 13, No 2: April 2023 Vol 13, No 1: February 2023 Vol 12, No 6: December 2022 Vol 12, No 5: October 2022 Vol 12, No 4: August 2022 Vol 12, No 3: June 2022 Vol 12, No 2: April 2022 Vol 12, No 1: February 2022 Vol 11, No 6: December 2021 Vol 11, No 5: October 2021 Vol 11, No 4: August 2021 Vol 11, No 3: June 2021 Vol 11, No 2: April 2021 Vol 11, No 1: February 2021 Vol 10, No 6: December 2020 Vol 10, No 5: October 2020 Vol 10, No 4: August 2020 Vol 10, No 3: June 2020 Vol 10, No 2: April 2020 Vol 10, No 1: February 2020 Vol 9, No 6: December 2019 Vol 9, No 5: October 2019 Vol 9, No 4: August 2019 Vol 9, No 3: June 2019 Vol 9, No 2: April 2019 Vol 9, No 1: February 2019 Vol 8, No 6: December 2018 Vol 8, No 5: October 2018 Vol 8, No 4: August 2018 Vol 8, No 3: June 2018 Vol 8, No 2: April 2018 Vol 8, No 1: February 2018 Vol 7, No 6: December 2017 Vol 7, No 5: October 2017 Vol 7, No 4: August 2017 Vol 7, No 3: June 2017 Vol 7, No 2: April 2017 Vol 7, No 1: February 2017 Vol 6, No 6: December 2016 Vol 6, No 5: October 2016 Vol 6, No 4: August 2016 Vol 6, No 3: June 2016 Vol 6, No 2: April 2016 Vol 6, No 1: February 2016 Vol 5, No 6: December 2015 Vol 5, No 5: October 2015 Vol 5, No 4: August 2015 Vol 5, No 3: June 2015 Vol 5, No 2: April 2015 Vol 5, No 1: February 2015 Vol 4, No 6: December 2014 Vol 4, No 5: October 2014 Vol 4, No 4: August 2014 Vol 4, No 3: June 2014 Vol 4, No 2: April 2014 Vol 4, No 1: February 2014 Vol 3, No 6: December 2013 Vol 3, No 5: October 2013 Vol 3, No 4: August 2013 Vol 3, No 3: June 2013 Vol 3, No 2: April 2013 Vol 3, No 1: February 2013 Vol 2, No 6: December 2012 Vol 2, No 5: October 2012 Vol 2, No 4: August 2012 Vol 2, No 3: June 2012 Vol 2, No 2: April 2012 Vol 2, No 1: February 2012 Vol 1, No 2: December 2011 Vol 1, No 1: September 2011 More Issue