cover
Contact Name
Tole Sutikno
Contact Email
ijece@iaesjournal.com
Phone
-
Journal Mail Official
ijece@iaesjournal.com
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
International Journal of Electrical and Computer Engineering
ISSN : 20888708     EISSN : 27222578     DOI : -
International Journal of Electrical and Computer Engineering (IJECE, ISSN: 2088-8708, a SCOPUS indexed Journal, SNIP: 1.001; SJR: 0.296; CiteScore: 0.99; SJR & CiteScore Q2 on both of the Electrical & Electronics Engineering, and Computer Science) is the official publication of the Institute of Advanced Engineering and Science (IAES). The journal is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication and computer engineering from the global world.
Articles 116 Documents
Search results for , issue "Vol 10, No 5: October 2020" : 116 Documents clear
Object tracking using motion flow projection for pan-tilt configuration Luma Issa Abdul-Kreem; Hussam K. Abdul-Ameer
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 5: October 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1615.062 KB) | DOI: 10.11591/ijece.v10i5.pp4687-4694

Abstract

We propose a new object tracking model for two degrees of freedom mechanism. Our model uses a reverse projection from a camera plane to a world plane. Here, the model takes advantage of optic flow technique by re-projecting the flow vectors from the image space into world space. A pan-tilt (PT) mounting system is used to verify the performance of our model and maintain the tracked object within a region of interest (ROI). This system contains two servo motors to enable a webcam rotating along PT axes. The PT rotation angles are estimated based on a rigid transformation of the the optic flow vectors in which an idealized translation matrix followed by two rotational matrices around PT axes are used. Our model was tested and evaluated using different objects with different motions. The results reveal that our model can keep the target object within a certain region in the camera view.
A new dynamic speech encryption algorithm based on lorenz chaotic map over internet protocol Obaida M. Al-hazaimeh
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 5: October 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1283.608 KB) | DOI: 10.11591/ijece.v10i5.pp4824-4834

Abstract

This paper introduces a dynamic speech encryption algorithm based on Lorenz chaotic map over internet protocol to enhance the services of the real-time applications such as increases the security level and reduces latency. The proposed algorithm was divided into two processes: dynamic key generation process using 128-bit hash value to dynamically alter the initial secret keys, and encryption and decryption process using Lorenz system. In the proposed algorithm, the performance evaluation is carried out through efficient simulations and implementations and statistical analysis. In addition, the average time delay in the proposed algorithm and some of the existing algorithms such as AES is compared. The obtained results concluded that, the proposed dynamic speech encryption algorithm is effectually secured against various cryptanalysis attacks and has useful cryptographic properties such as confusion and diffusion for better voice communication in the voice applications field in the Internet.
Tracking times in temporal patterns embodied in intra-cortical data for controling neural prosthesis an animal simulation study Abdessalam Kifouche; Abderrezak Guessoum
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 5: October 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1249.43 KB) | DOI: 10.11591/ijece.v10i5.pp4721-4737

Abstract

Brain-machines capture brain signals in order to restore communication and movement to disabled people who suffer from brain palsy or motor disorders. In brain regions, the ensemble firing of populations of neurons represents spatio-temporal patterns that are transformed into outgoing spatio-temporal patterns which encode complex cognitive task. This transformation is dynamic, non-stationary (time-varying) and highly nonlinear. Hence, modeling such complex biological patterns requires specific model structures to uncover the underlying physiological mechanisms and their influences on system behavior. In this study, a recent multi-electrode technology allows the record of the simultaneous neuron activities in behaving animals. Intra-cortical data are processed according to these steps: spike detection and sorting, than desired action extraction from the rate of the obtained signal. We focus on the following important questions about (i) the possibility of linking the brain signal time events with some time-delayed mapping tools; (ii) the use of some suitable inputs than others for the decoder; (iii) a consideration of separated data or a special representation founded on multi-dimensional statistics. This paper concentrates mostly on the analysis of parallel spike train when certain critical hypotheses are ignored by the data for the working method. We have made efforts to define explicitly whether the underlying hypotheses are actually achieved. In this paper, we propose an algorithm to define the embedded memory order of NARX recurrent neural networks to the hand trajectory tracking process. We also demonstrate that this algorithm can improve performance on inference tasks.
Determining damages in ceramic plates by using discrete wavelet packet transform and support vector machine Mehmet Yumurtaci; Gokhan Gokmen; Tahir Cetin Akinci
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 5: October 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1053.1 KB) | DOI: 10.11591/ijece.v10i5.pp4759-4769

Abstract

In this study, an analysis was conducted by using discrete wavelet packet transform (DWPT) and support vector machine (SVM) methods to determine undamaged and cracked plates. The pendulum was used to land equal impacts on plates in this experimental study. Sounds, which emerge from plates as a result of the impacts applied to undamaged and cracked plates, are sound signals used in the analysis and DWPT of these sound signals were obtained with 128 decompositions for feature extraction. The first four components, reflecting the characteristics of undamaged and cracked plates within these 128 components, were selected for enhancing the performance of the classifier and energy values were used as feature vectors. In the study, the SVM model was created by selecting appropriate C and γ parameters for the classifier. Undamaged and cracked plates were seen to be successfully identified by an analysis of the training and testing phases. Undamaged and cracked statuses of the plates that are undamaged and have the analysis had identified different cracks. The biggest advantage of this analysis method used is that it is high-precision, is relatively low in cost regarding experimental equipment and requires hardware.
Non-convex constrained economic power dispatch with prohibited operating zones and piecewise quadratic cost functions Shaimaa R. Spea
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 5: October 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (21.827 KB) | DOI: 10.11591/ijece.v10i5.pp4469-4477

Abstract

This paper is focused on the solution of the non-convex economic power dispatch problem with piecewise quadratic cost functions and practical operation constraints of generation units. The constraints of the economic dispatch problem are power balance constraint, generation limits constraint, prohibited operating zones and transmission power losses. To solve this problem, a meta-heuristic optimization algorithm named crow search algorithm is proposed. A constraint handling technique is also implemented to satisfy the constraints effectively. For the verification of the effectiveness and the superiority of the proposed algorithm, it is tested on 6-unit, 10-unit and 15-unit test systems. The simulation results and statistical analysis show the efficiency of the proposed algorithm. Also, the results confirm the superiority and the high-quality solutions of the proposed algorithm when compared to the other reported algorithms.
Sliding mode control design for autonomous surface vehicle motion under the influence of environmental factor Hendro Nurhadi; Erna Apriliani; Teguh Herlambang; Dieky Adzkiya
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 5: October 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (341.862 KB) | DOI: 10.11591/ijece.v10i5.pp4789-4797

Abstract

Autonomous Surface Vehicle (ASV) is a vehicle that is operated in the water surface without any person in the vehicle. Since there is no person in the ASV, a motion controller is essentially needed. The control system is used to make sure that the water vehicle is moving at the desired speed. In this paper, we use a Touristant ASV with the following specifications: the length is 4 meters, the diameter is 1.625 meters, and the height is 1.027 meters. The main contribution of this paper is applying the Sliding Mode Control system to the Touristant ASV model under the influence of environmental factors. The environmental factors considered in this work are wind speed and wave height. The Touristant ASV model is nonlinear and uses three degree of freedom (DOF), namely surge, sway and yaw. The simulation results show that the performance of the closed-loop system by using the SMC method depends on the environmental factors. If environmental factors are higher, then the resulting error is also higher. The average error difference between those resulted from the simulation without environmental factors and those with the influence of environmental factors is 0.05% for surge, sway and yaw motions.
Glioblastomas brain tumour segmentation based on convolutional neural networks Moh'd Rasoul Al-Hadidi; Bayan AlSaaidah; Mohammed Al-Gawagzeh
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 5: October 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (728.723 KB) | DOI: 10.11591/ijece.v10i5.pp4738-4744

Abstract

Brain tumour segmentation can improve diagnostics efficiency, rise the prediction rate and treatment planning. This will help the doctors and experts in their work. Where many types of brain tumour may be classified easily, the gliomas tumour is challenging to be segmented because of the diffusion between the tumour and the surrounding edema. Another important challenge with this type of brain tumour is that the tumour may grow anywhere in the brain with different shape and size. Brain cancer presents one of the most famous diseases over the world, which encourage the researchers to find a high-throughput system for tumour detection and classification. Several approaches have been proposed to design automatic detection and classification systems. This paper presents an integrated framework to segment the gliomas brain tumour automatically using pixel clustering for the MRI images foreground and background and classify its type based on deep learning mechanism, which is the convolutional neural network. In this work, a novel segmentation and classification system is proposed to detect the tumour cells and classify the brain image if it is healthy or not. After collecting data for healthy and non-healthy brain images, satisfactory results are found and registered using computer vision approaches. This approach can be used as a part of a bigger diagnosis system for breast tumour detection and manipulation.
Modelling turn away intention of information technology professionals in Bangladesh: a partial least squares approach Md. Shohel Arman; Rozina Akter; Imran Mahmud; T. Ramayah
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 5: October 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (406.67 KB) | DOI: 10.11591/ijece.v10i5.pp4973-4981

Abstract

Despite, Bangladesh produces many IT graduates each year but only one tenth of total graduates contribute in IT development sector. In order to keep the contribution to economy through IT development, it is crucial for IT industry to know the factors that influence turn away of IT graduates. In this paper, building upon role stress theory, we develop a research model to explore the influence of workplace exhaustion and threat of professional obsolescence (TPO). Data were gathered from 185 IT professionals from 15 different IT companies through survey questionnaire. The structural equation modelling technique was used to test the paths. The results suggests that strong influence of TPO on turn-away intentions. Result also suggests significant roles of work overload, family-career conflict and control over career and workplace exhaustion on turn away intention. This paper contributes to the body of work dedicated to helping us better understand the turn away behaviour from the workplace exhaustion and TPO perspectives. From the viewpoint of practice, this research sheds light on some of the challenges that the IT industry might face when making strategy and policy to control turn away from IT profession in Bangladesh
The resistance of routing protocols against DDOS attack in MANET Maha Abdelhaq; Raed Alsaqour; Mada Alaskar; Fayza Alotaibi; Rawan Almutlaq; Bushra Alghamdi; Bayan Alhammad; Malak Sehaibani; Donia Moyna
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 5: October 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1218.704 KB) | DOI: 10.11591/ijece.v10i5.pp4844-4852

Abstract

A Mobil Ad hoc Network (MANET) is a wireless multi-hop network with various mobile, self-organized and wireless infrastructure nodes. MANET characteristics such as openness restricted resources and decentralization impact node efficiency and made them easy to be affected by various security attacks, especially Distributed Denial of Service (DDoS) attacks. The goal of this research is to implement a simulation model called DDoS Attack Simulation Model (DDoSM) in Network Simulator 2(NS-2) and to examine the effect of DDoS Attack on various routing protocol types in MANET namely: Zone Routing Protocol (ZRP), Ad hoc On-Demand Distance Vector (AODV) protocol and Location-Aided Routing (LAR) protocol. The introduced model uses the NS-2 simulator to apply DDoS on the three chosen routing protocols. In terms of throughput and end-to-end latency under the consequences of the attack, the performance of three routings protocols was analyzed.
A new approach to image classification based on a deep multiclass AdaBoosting ensemble Hasan Asil; Jamshid Bagherzadeh
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 5: October 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (952.728 KB) | DOI: 10.11591/ijece.v10i5.pp4872-4880

Abstract

In recent years, deep learning methods have been developed in order to solve the problems. These methods were effective in solving complex problems. Convolution is one of the learning methods. This method is applied in classifying and processing of images as well. Hybrid methods are another multi-component machine learning method. These methods are categorized into independent and dependent types. Ada-Boosting algorithm is one of these methods. Today, the classification of images has many applications. So far, several algorithms have been presented for binary and multi-class classification. Most of the above-mentioned methods have a high dependence on the data. The present study intends to use a combination of deep learning methods and associated hybrid methods to classify the images. It is presumed that this method is able to reduce the error rate in images classification. The proposed algorithm consists of the Ada-Boosting hybrid method and bi-layer convolutional learning method. The proposed method was analyzed after it was implemented on a multi-class Mnist data set and displayed the result of the error rate reduction. The results of this study indicate that the error rate of the proposed method is less than Ada-Boosting and convolution methods. Also, the network has more stability compared to the other methods.

Page 1 of 12 | Total Record : 116


Filter by Year

2020 2020


Filter By Issues
All Issue Vol 15, No 6: December 2025 Vol 15, No 5: October 2025 Vol 15, No 4: August 2025 Vol 15, No 3: June 2025 Vol 15, No 2: April 2025 Vol 15, No 1: February 2025 Vol 14, No 6: December 2024 Vol 14, No 5: October 2024 Vol 14, No 4: August 2024 Vol 14, No 3: June 2024 Vol 14, No 2: April 2024 Vol 14, No 1: February 2024 Vol 13, No 6: December 2023 Vol 13, No 5: October 2023 Vol 13, No 4: August 2023 Vol 13, No 3: June 2023 Vol 13, No 2: April 2023 Vol 13, No 1: February 2023 Vol 12, No 6: December 2022 Vol 12, No 5: October 2022 Vol 12, No 4: August 2022 Vol 12, No 3: June 2022 Vol 12, No 2: April 2022 Vol 12, No 1: February 2022 Vol 11, No 6: December 2021 Vol 11, No 5: October 2021 Vol 11, No 4: August 2021 Vol 11, No 3: June 2021 Vol 11, No 2: April 2021 Vol 11, No 1: February 2021 Vol 10, No 6: December 2020 Vol 10, No 5: October 2020 Vol 10, No 4: August 2020 Vol 10, No 3: June 2020 Vol 10, No 2: April 2020 Vol 10, No 1: February 2020 Vol 9, No 6: December 2019 Vol 9, No 5: October 2019 Vol 9, No 4: August 2019 Vol 9, No 3: June 2019 Vol 9, No 2: April 2019 Vol 9, No 1: February 2019 Vol 8, No 6: December 2018 Vol 8, No 5: October 2018 Vol 8, No 4: August 2018 Vol 8, No 3: June 2018 Vol 8, No 2: April 2018 Vol 8, No 1: February 2018 Vol 7, No 6: December 2017 Vol 7, No 5: October 2017 Vol 7, No 4: August 2017 Vol 7, No 3: June 2017 Vol 7, No 2: April 2017 Vol 7, No 1: February 2017 Vol 6, No 6: December 2016 Vol 6, No 5: October 2016 Vol 6, No 4: August 2016 Vol 6, No 3: June 2016 Vol 6, No 2: April 2016 Vol 6, No 1: February 2016 Vol 5, No 6: December 2015 Vol 5, No 5: October 2015 Vol 5, No 4: August 2015 Vol 5, No 3: June 2015 Vol 5, No 2: April 2015 Vol 5, No 1: February 2015 Vol 4, No 6: December 2014 Vol 4, No 5: October 2014 Vol 4, No 4: August 2014 Vol 4, No 3: June 2014 Vol 4, No 2: April 2014 Vol 4, No 1: February 2014 Vol 3, No 6: December 2013 Vol 3, No 5: October 2013 Vol 3, No 4: August 2013 Vol 3, No 3: June 2013 Vol 3, No 2: April 2013 Vol 3, No 1: February 2013 Vol 2, No 6: December 2012 Vol 2, No 5: October 2012 Vol 2, No 4: August 2012 Vol 2, No 3: June 2012 Vol 2, No 2: April 2012 Vol 2, No 1: February 2012 Vol 1, No 2: December 2011 Vol 1, No 1: September 2011 More Issue