cover
Contact Name
Tole Sutikno
Contact Email
ijece@iaesjournal.com
Phone
-
Journal Mail Official
ijece@iaesjournal.com
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
International Journal of Electrical and Computer Engineering
ISSN : 20888708     EISSN : 27222578     DOI : -
International Journal of Electrical and Computer Engineering (IJECE, ISSN: 2088-8708, a SCOPUS indexed Journal, SNIP: 1.001; SJR: 0.296; CiteScore: 0.99; SJR & CiteScore Q2 on both of the Electrical & Electronics Engineering, and Computer Science) is the official publication of the Institute of Advanced Engineering and Science (IAES). The journal is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication and computer engineering from the global world.
Articles 115 Documents
Search results for , issue "Vol 10, No 3: June 2020" : 115 Documents clear
Comparison of coherent optical transmission systems performance by DP-QAM levels Abdul Gafur; M.S. Islam; Syed Zahidur Rashid
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 3: June 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1352.155 KB) | DOI: 10.11591/ijece.v10i3.pp2513-2522

Abstract

In this paper, we investigated the Coherent Optical Transmission System (COTS) performance for multiple types of DP-QAM levels considering various CW laser input power. We compared the performance of COTS for 100 Gb/s with DP-32QAM, DP-64QAM and DP-128QAM respectively. We also inspected the relationship among Optical Signal to Noise Ratio (OSNR), Error Vector Magnitude (EVM) and Bit Error Rate (BER) which are found in accordance for both simulation curves and constellation diagrams. Results are obtained by experiments with DP-32QAM, DP-64QAM and DP-128QAM modulations techniques at symbol rate of 10 Gsymbol/s, 8.33 Gsymbol/s and 7.142 Gsymbol/s respectively. This work is completely based on simulation in Optisystem simulation setup.
A technical review and comparative analysis of machine learning techniques for intrusion detection systems in MANET Safaa laqtib; Khalid El Yassini; Moulay Lahcen Hasnaoui
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 3: June 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (805.076 KB) | DOI: 10.11591/ijece.v10i3.pp2701-2709

Abstract

Machine learning techniques are being widely used to develop an intrusion detection system (IDS) for detecting and classifying cyber attacks at the network-level and the host-level in a timely and automatic manner. However, Traditional Intrusion Detection Systems (IDS), based on traditional machine learning methods, lacks reliability and accuracy. Instead of the traditional machine learning used in previous researches, we think deep learning has the potential to perform better in extracting features of massive data considering the massive cyber traffic in real life. Generally Mobile Ad Hoc Networks have given the low physical security for mobile devices, because of the properties such as node mobility, lack of centralized management and limited bandwidth. To tackle these security issues, traditional cryptography schemes can-not completely safeguard MANETs in terms of novel threats and vulnerabilities, thus by applying Deep learning methods techniques in IDS are capable of adapting the dynamic environments of MANETs and enables the system to make decisions on intrusion while continuing to learn about their mobile environment. An IDS in MANET is a sensoring mechanism that monitors nodes and network activities in order to detect malicious actions and malicious attempt performed by Intruders. Recently, multiple deep learning approaches have been proposed to enhance the performance of intrusion detection system. In this paper, we made a systematic comparison of three models, Inceprtion architecture convolutional neural network Inception-CNN, Bidirectional long short-term memory (BLSTM) and deep belief network (DBN) on the deep learning-based intrusion detection systems, using the NSL-KDD dataset containing information about intrusion and regular network connections, the goal is to provide basic guidance on the choice of deep learning methods in MANET.
A study of code change patterns for adaptive maintenance with AST analysis Omar Meqdadi; Shadi Aljawarneh
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 3: June 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (611.942 KB) | DOI: 10.11591/ijece.v10i3.pp2719-2733

Abstract

Example-based transformational approaches to automate adaptive maintenance changes plays an important role in software research. One primary concern of those approaches is that a set of good qualified real examples of adaptive changes previously made in the history must be identified, or otherwise the adoption of such approaches will be put in question. Unfortunately, there is rarely enough detail to clearly direct transformation rule developers to overcome the barrier of finding qualified examples for adaptive changes. This work explores the histories of several open source systems to study the repetitiveness of adaptive changes in software evolution, and hence recognizing the source code change patterns that are strongly related with the adaptive maintenance. We collected the adaptive commits from the history of numerous open source systems, then we obtained the repetitiveness frequencies of source code changes based on the analysis of Abstract Syntax Tree (AST) edit actions within an adaptive commit. Using the prevalence of the most common adaptive changes, we suggested a set of change patterns that seem correlated with adaptive maintenance. It is observed that 76.93% of the undertaken adaptive changes were represented by 12 AST code differences. Moreover, only 9 change patterns covered 64.69% to 76.58% of the total adaptive change hunks in the examined projects. The most common individual patterns are related to initializing objects and method calls changes. A correlation analysis on examined projects shows that they have very similar frequencies of the patterns correlated with adaptive changes. The observed repeated adaptive changes could be useful examples for the construction of transformation approaches
Design and implement a new mechanism for audio, video and screen recording based on WebRTC technology Naktal Edan; Sanabil A Mahmood
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 3: June 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (636.537 KB) | DOI: 10.11591/ijece.v10i3.pp2773-2778

Abstract

Many years ago, Flash was essential in browsers to interact with the user media devices, such as a microphone and camera. Today, Web Real-Time Communication (WebRTC) technology has come to substitute the flash, so browsers do not need the flash to access media devices or establish their communication. However, WebRTC standards do not express precisely how browsers can record audios, videos or screen instead of describing getUserMedia API that enables a browser to access microphone and camera. The prime objective of this research is to create a new WebRTC recording mechanism to record audios, videos, and screen using Google Chrome, Firefox, and Opera. This experiment applied through Ethernet and Wireless of the Internet and 4G networks. Also, the recording mechanism of this research was obtained based on JavaScript Library for audio, video, screen (2D and 3D animation) recording. Besides, different audio and video codecs in Chrome, Firefox and Opera were utilised, such as VP8, VP9, and H264 for video, and Opus codec for audio. Not only but also, various bitrates (100 bytes bps, 1 Kbps, 100 Kbps, 1 MB bps, and 1 GB bps), different resolutions (1080p, 720p, 480p, and HD (3840* 2160)), and various frame-rates (fps) 5, 15, 24, 30 and 60 were considered and tested. Besides, an evaluation of recording mechanism, Quality of Experience (QoE) through actual users, resources, such as CPU performance was also done. In this paper, a novel implementation was accomplished over different networks, different browsers, various audio and video codecs, many peers, opening one or multi browsers at the same time, keep the streaming active as much as the user needs, save the record, using only audio and/or video recording as conferencing with full screen, etc.
Design and implement WSN/IoT smart parking management system using microcontroller A. E. Hamza; H. H. Qasim; S. A. Alwash; M. M. Fadhel; L. Audah; H. H. Ibrahim; O. S. Hamed; M. I. Hamza; H. A. Saeed
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 3: June 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (973.332 KB) | DOI: 10.11591/ijece.v10i3.pp3108-3115

Abstract

With the dramatic expansion of new networks such as Wireless Sensor Network (WSN) and Internet-of-Things (IoT), tremendous opportunities have been emerged to incorporate such technologies for valuable tasks. One of these tasks is the smart car parking where there is an imperative demand to manage the parkings in various facilities which may help drivers to save their time. Several research studies have addressed this task using wide range of approaches. However, the energy consumption is still a serious concern. This paper proposes a smart car parking based on cloud-based approach along with variety of sensors. Passive Infrared Sensors (PIRs) have been used to sense the object motion. While Light Dependent Resistor (LDR) sensors have been utilized to sense the light of the parking alarm and display inmformation regarding the occupied and non-occupied parking lots. Finally, multi-micro controller of Arduino have been exploited in order to transmit the information collected to the server. Finally, a prototype Android application has been developed in order to recieve the infromation from the server. Results of simulation showed the efficacy of the proposed method.
Simulation of LTE-TDD in the HAPS channel Aws Majeed Al-awadi; Mohammed Jawad Al-dujaili
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 3: June 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (353.681 KB) | DOI: 10.11591/ijece.v10i3.pp3152-3157

Abstract

LTE stands for Long Term Evolution. This technology enhances the data rate and capacity using a new radio interface and an optimized core network. This progress was done to satisfy standards defined for the fourth generation of cellular communications in ITU. LTE has two types of transmission: Frequency Division Duplex (FDD) and Time Division Duplex (TDD). Nowadays, LTE-TDD rapidly Grows and takes place of old fixed cellular communications, like WiMAX. Another upcoming technology in the communication industry is High Amplitude Platform Stations (HAPS). Studying the capability of HAPS as a base station for LTE-TDD is the main purpose of this paper. Simulations have done using HAPS channel and compared to Stanford University Interim (SUI) standard channels for different scenarios. Results were compared to achieve a conclusion on HAPS implementation for LTE-TDD based on BER and data throughput.
Trajectory reconstruction for robot programming by demonstration Reda Hanifi Elhachemi Amar; Laredj Benchikh; Hakima Dermeche; Ouamri Bachir; Zoubir Ahmed-Foitih
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 3: June 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (598.787 KB) | DOI: 10.11591/ijece.v10i3.pp3066-3073

Abstract

The reproduction of hand movements by a robot remains difficult and conventional learning methods do not allow us to faithfully recreate these movements because it is very difficult when the number of crossing points is very large. Programming by Demonstration gives a better opportunity for solving this problem by tracking the user’s movements with a motion capture system and creating a robotic program to reproduce the performed tasks. This paper presents a Programming by Demonstration system in a trajectory level for the reproduction of hand/tool movement by a manipulator robot; this was realized by tracking the user’s movement with the ArToolkit and reconstructing the trajectories by using the constrained cubic spline. The results obtained with the constrained cubic spline were compared with cubic spline interpolation. Finally the obtained trajectories have been simulated in a virtual environment on the Puma 600 robot.
Towards optimize-ESA for text semantic similarity: A case study of biomedical text Khaoula Mrhar; Mounia Abik
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 3: June 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (845.296 KB) | DOI: 10.11591/ijece.v10i3.pp2934-2943

Abstract

Explicit Semantic Analysis (ESA) is an approach to measure the semantic relatedness between terms or documents based on similarities to documents of a references corpus usually Wikipedia. ESA usage has received tremendous attention in the field of natural language processing NLP and information retrieval. However, ESA utilizes a huge Wikipedia index matrix in its interpretation by multiplying a large matrix by a term vector to produce a high-dimensional vector. Consequently, the ESA process is too expensive in interpretation and similarity steps. Therefore, the efficiency of ESA will slow down because we lose a lot of time in unnecessary operations. This paper propose enhancements to ESA called optimize-ESA that reduce the dimension at the interpretation stage by computing the semantic similarity in a specific domain. The experimental results show clearly that our method correlates much better with human judgement than the full version ESA approach.
Active and reactive power sharing in micro grid using droop control Omar Feddaoui; Riad Toufouti; Labed Djamel; Salima Meziane
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 3: June 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1201 KB) | DOI: 10.11591/ijece.v10i3.pp2235-2244

Abstract

The development of renewable energy contributes to the global objectives of reducing our greenhouse gas emissions, obtaining and increasing our energy efficiency. In the face of these changes, the electric-network must adapt, while maintaining a high level of reliability and a quality of energy production. To meet this objective, it is recommended to use highly developed electrical network by integrating renewable energy sources in order to adapt the energy consumption to their production, using electro-technical software information and telecommunications technologies. We are talking about intelligent grids (Smart Grid). The main objective of the work presented in this paper is the contribution to the study of intelligent network for efficient management of energy produced by several sources linked to the AC bus via the voltage inverters. Numerical simulations have been presented to validate the performance of the proposed active and reactive power controller (Droop Control).
Approach to minimizing consumption of energy in wireless sensor networks Seddiki Noureddine; Benahmed Khelifa; Belgachi Mohammed
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 3: June 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (991.063 KB) | DOI: 10.11591/ijece.v10i3.pp2551-2561

Abstract

The Wireless Sensor Networks (WSN) technology has benefited from a central position in the research space of future emerging networks by its diversity of applications fields and also by its optimization techniques of its various constraints, more essentially, the minimization of nodal energy consumption to increase the global network lifetime. To answer this saving energy problem, several solutions have been proposed at the protocol stack level of the WSN. In this paper, after presenting a state of the art of this technology and its conservation energy techniques at the protocol stack level, we were interested in the network layer to propose a routing solution based on a localization aspect that allows the creation of a virtual grid on the coverage area and introduces it to the two most well-known energy efficiency hierarchical routing protocols, LEACH and PEGASIS. This allowed us to minimize the energy consumption and to select the clusters heads in a deterministic way unlike LEACH which is done in a probabilistic way and also to minimize the latency in PEGASIS, by decomposing its chain into several independent chains. The simulation results, under "MATLABR2015b", have shown the efficiency of our approach in terms of overall residual energy and network lifetime.

Page 4 of 12 | Total Record : 115


Filter by Year

2020 2020


Filter By Issues
All Issue Vol 16, No 1: February 2026 Vol 15, No 6: December 2025 Vol 15, No 5: October 2025 Vol 15, No 4: August 2025 Vol 15, No 3: June 2025 Vol 15, No 2: April 2025 Vol 15, No 1: February 2025 Vol 14, No 6: December 2024 Vol 14, No 5: October 2024 Vol 14, No 4: August 2024 Vol 14, No 3: June 2024 Vol 14, No 2: April 2024 Vol 14, No 1: February 2024 Vol 13, No 6: December 2023 Vol 13, No 5: October 2023 Vol 13, No 4: August 2023 Vol 13, No 3: June 2023 Vol 13, No 2: April 2023 Vol 13, No 1: February 2023 Vol 12, No 6: December 2022 Vol 12, No 5: October 2022 Vol 12, No 4: August 2022 Vol 12, No 3: June 2022 Vol 12, No 2: April 2022 Vol 12, No 1: February 2022 Vol 11, No 6: December 2021 Vol 11, No 5: October 2021 Vol 11, No 4: August 2021 Vol 11, No 3: June 2021 Vol 11, No 2: April 2021 Vol 11, No 1: February 2021 Vol 10, No 6: December 2020 Vol 10, No 5: October 2020 Vol 10, No 4: August 2020 Vol 10, No 3: June 2020 Vol 10, No 2: April 2020 Vol 10, No 1: February 2020 Vol 9, No 6: December 2019 Vol 9, No 5: October 2019 Vol 9, No 4: August 2019 Vol 9, No 3: June 2019 Vol 9, No 2: April 2019 Vol 9, No 1: February 2019 Vol 8, No 6: December 2018 Vol 8, No 5: October 2018 Vol 8, No 4: August 2018 Vol 8, No 3: June 2018 Vol 8, No 2: April 2018 Vol 8, No 1: February 2018 Vol 7, No 6: December 2017 Vol 7, No 5: October 2017 Vol 7, No 4: August 2017 Vol 7, No 3: June 2017 Vol 7, No 2: April 2017 Vol 7, No 1: February 2017 Vol 6, No 6: December 2016 Vol 6, No 5: October 2016 Vol 6, No 4: August 2016 Vol 6, No 3: June 2016 Vol 6, No 2: April 2016 Vol 6, No 1: February 2016 Vol 5, No 6: December 2015 Vol 5, No 5: October 2015 Vol 5, No 4: August 2015 Vol 5, No 3: June 2015 Vol 5, No 2: April 2015 Vol 5, No 1: February 2015 Vol 4, No 6: December 2014 Vol 4, No 5: October 2014 Vol 4, No 4: August 2014 Vol 4, No 3: June 2014 Vol 4, No 2: April 2014 Vol 4, No 1: February 2014 Vol 3, No 6: December 2013 Vol 3, No 5: October 2013 Vol 3, No 4: August 2013 Vol 3, No 3: June 2013 Vol 3, No 2: April 2013 Vol 3, No 1: February 2013 Vol 2, No 6: December 2012 Vol 2, No 5: October 2012 Vol 2, No 4: August 2012 Vol 2, No 3: June 2012 Vol 2, No 2: April 2012 Vol 2, No 1: February 2012 Vol 1, No 2: December 2011 Vol 1, No 1: September 2011 More Issue