cover
Contact Name
Tole Sutikno
Contact Email
ijece@iaesjournal.com
Phone
-
Journal Mail Official
ijece@iaesjournal.com
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
International Journal of Electrical and Computer Engineering
ISSN : 20888708     EISSN : 27222578     DOI : -
International Journal of Electrical and Computer Engineering (IJECE, ISSN: 2088-8708, a SCOPUS indexed Journal, SNIP: 1.001; SJR: 0.296; CiteScore: 0.99; SJR & CiteScore Q2 on both of the Electrical & Electronics Engineering, and Computer Science) is the official publication of the Institute of Advanced Engineering and Science (IAES). The journal is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication and computer engineering from the global world.
Articles 116 Documents
Search results for , issue "Vol 10, No 6: December 2020" : 116 Documents clear
Speech encryption by multiple chaotic map with fast fourier transform Yahia Alemami; Mohamad Afendee Mohamed; Saleh Atiewi; Mustafa Mamat
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 6: December 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (743.64 KB) | DOI: 10.11591/ijece.v10i6.pp5658-5664

Abstract

There are various ways of social communication including writing (WhatsApp, Messenger, Facebook, Twitter, Skype, etc), calling (mobile phone) and voice recording (record your voice and then send it to the other party), but there are ways to eavesdropping the calls and voice messages, One way to solve this problem is via cryptographic approach. Chaos cryptography build on top of nonlinear dynamics chaotic system has gained some footstep in data security. It provides an alternative to conventional cryptography built on top of mathematical structures. This research focuses on the protection of speech recording by encrypting it with multiple encryption algorithms, including chaotic maps (Logistic Map and Sine Maps).
A decentralized consensus application using blockchain ecosystem Chetana Pujari; Balachandra Muniyal; Chandrakala C. B.
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 6: December 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v10i6.pp6399-6411

Abstract

The consensus is a critical operation of any decision-making process. It involves a set of eligible members; whose decision need to be honored by taking their acknowledgment before making any decision. The traditional consensus process follows centralized architecture, the members need to rely on and trust this architecture. The proposed system aims to develop a secure decentralized consensus application in the untrusted environment by making use of blockchain technology along with smart contract and interplanetary file system (IPFS).
Functional magnetic resonance imaging-based brain decoding with visual semantic model Piyawat Saengpetch; Luepol Pipanmemekaporn; Suwatchai Kamolsantiroj
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 6: December 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v10i6.pp6682-6690

Abstract

The activity pattern of the brain has been activated to identify a person in mind. Using the function magnetic resonance imaging (fMRI) to decipher brain decoding is the most accepted method. However, the accuracy of fMRI-based brain decoder is still restricted due to limited training samples. The limitations of the brain decoder using fMRI are passed through the design features proposed for many label coding and model training to predict these characteristics for a particular label. Moreover, what kind of semantic features for deciphering the neurological activity patterns are unclear. In current work, a new calculation model for learning decoding labels that is consistent with fMRI activity responses. The approach demonstrates the proposed corresponding label's success in terms of accuracy, which is decoded from brain activity patterns and compared with conventional text-derived feature technique. Besides, experimental studies present a training model based on multi-tasking to reduce the problems of limited training data sets. Therefore, the multi-task learning model is more efficient than modern methods of calculation, and decoding features may be easily obtained.
A new hybrid text encryption approach over mobile ad hoc network Mohammed Amin Almaiah; Ziad Dawahdeh; Omar Almomani; Adeeb Alsaaidah; Ahmad Al-Khasawneh; Saleh Khawatreh
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 6: December 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v10i6.pp6461-6471

Abstract

Data exchange has been rapidly increased recently by increasing the use of mobile networks. Sharing information (text, image, audio and video) over unsecured mobile network channels is liable for attacking and stealing. Encryption techniques are the most suitable methods to protect information from hackers. Hill cipher algorithm is one of symmetric techniques, it has a simple structure and fast computations, but weak security because sender and receiver need to use and share the same private key within a non-secure channel. Therefore, a novel hybrid encryption approach between elliptic curve cryptosystem and hill cipher (ECCHC) is proposed in this paper to convert Hill Cipher from symmetric technique (private key) to asymmetric one (public key) and increase its security and efficiency and resist the hackers. Thus, no need to share the secret key between sender and receiver and both can generate it from the private and public keys. Therefore, the proposed approach presents a new contribution by its ability to encrypt every character in the 128 ASCII table by using its ASCII value direct without needing to assign a numerical value for each character. The main advantages of the proposed method are represented in the computation simplicity, security efficiency and faster computation.
Radiation performance enhancement of an ultra wide band antenna using metamaterial band-pass filter Marwa Daghari; Hedi Sakli
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 6: December 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (752.5 KB) | DOI: 10.11591/ijece.v10i6.pp5861-5870

Abstract

In this paper, a metamaterial structure based on Frequency Selective Surface (FSS) cell is proposed to achieve an isotropic band-pass filtering response. This filter consists of a planar layer formed by a 3×3 metamaterials cell array with transmittive filtering behavior at 3.5 GHz. This design with 45 mm × 45 mm dimension is then integrated in close proximity at distance of 10 mm with an Ultra Wide Band (UWB) antenna to enhance it’ s performances around a 3.5 GHz operating frequency. Simulation results ensure that filter geometry provides the advantage of polarization independency and also exhibits the angular stability up to 45◦ for both Transverse Electric (TE) and Transverse magnetic (TM) modes. More importantly, enhancement in antenna radiation pattern characteristics is illustrated when the planar FSS layer is integrated at a small distance from the radiator. Moreover, antenna gain was improved to 3.22 dBi, adaptation of antenna port (S11) was increased to -53.26 dB and antenna bandwidth reduction to 1.7 GHz is also detected. All these performances make the proposed design as a good choice used to shield signals in UWB wireless applications especially for connected object in 5G.
A risk and security assessment of VANET availability using attack tree concept Meriem Houmer; Moulay Lahcen Hasnaoui
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 6: December 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (654.654 KB) | DOI: 10.11591/ijece.v10i6.pp6039-6044

Abstract

The challenging nature of insecure wireless channels and the open-access environment make the protection of vehicular ad hoc network (VANET) a particularly critical issue. Researchers and interested authorities have therefore paid more attention to this issue. Therefore, robust approaches to protect this network's security and privacy against adversaries and attacks need to be improved, trying to achieve an adequate level, to secure the confidential information of drivers and passengers. Accordingly, to improve the security of VANET, it is necessary to carry out a risk assessment, in order to evaluate the risk that faces this network. This paper focuses on the security threats in vehicular network especially on the availability of this network. We propose a novel risk assessment approach to evaluate the risk of the attack that the attacker can lead against the availability of VANET. We adopt a tree structure called attack tree to model the attacker's potential attack strategies. Based on this attack tree model, we can estimate the degree that a certain threat can lead to the VANET and identify possible attack sequences that an attacker may launch against the availability of this network. Then we utilize the multi-attribute utility theory to calculate the system’s total risk value also the probabilities of each attack sequence. The analysis results can provide support for decision-makers to make corresponding protection measures against the attack on the availability of this network.
Development of a photovoltaic characteristics generator based on mathematical models for four PV panel technologies Samia Jenkal; Mustapha Kourchi; Driss Yousfi; Ahmed Benlarabi; Mohamed Larbi Elhafyani; Mohamed Ajaamoum; Mhand Oubella
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 6: December 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v10i6.pp6101-6110

Abstract

A good study of photovoltaic system requests to have very precise current-voltage characteristic curves of photovoltaic modules for different technologies. The photovoltaic emulator provides an efficient solution to maintain the same current-voltage output of photovoltaic module. It includes three parts: the PV model, the control strategy, and the power converter. This paper provides three classes of modeling and simulation of photovoltaic arrays and presents the synthesis results of the current-voltage characteristic performances obtained by the modeling approaches. The models of the first class are based on electrical circuit model, those of the second class are based on multiple straight lines model, and for the third class, it is based on the look up table. The mathematical model is built using MATLAB/ Simulink, and an experimental bench was carried out to acquire an up-to-date and representative experimental database of four PV panels. This database is used for the validation of these models for the different PV panel technologies under Moroccan meteorological conditions. Following this comparative study, we came to a high agreement between the experimental and simulated current-voltage characteristics for the emulator under study.
Demand robust counterpart open capacitated vehicle routing problem time windows and deadline model of garbage transportation with LINGO 13.0 Fitri Maya Puspita; Ani Sahara Br. Simanjuntak; Rima Melati; Sisca Octarina
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 6: December 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v10i6.pp6380-6388

Abstract

Demand robust counterpart-open capacitated vehicle routing problem with time windows and deadline (DRC-OCVRPtw,d) model formed and explained in this paper, is the model used to find the minimum distance and the time needed for vehicles to transport garbage in Sukarami Sub-District, Palembang that consists of the time it takes for the vehicle to pass through the route. Time needed to transport garbage to the vehicle is called time windows. Combination of the thoses times is called deadline. The farther the distance passed by vehicle and the more garbage transported, the longer the deadline is needed. This DRC-OCVRPtw,d model is completed by LINGO 13.0 to obtain the optimal route and time deadline for Sukarami Sub-District. The model shows that the improved model of open vehicle routing problem involving the robustness, time windows and deadline can achieve the optimal routes that enable driver to save operational time in picking up the garbage compared to similar problem not involving no-time windows and deadline stated in previous research.
Application of swarm intelligence algorithms to energy management of prosumers with wind power plants P. V. Matrenin; V. Z. Manusov; N. Khasanzoda; D. V. Antonenkov
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 6: December 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v10i6.pp6172-6179

Abstract

The paper considers the problem of optimal control of a prosumer with a wind power plant in smart grid. It is shown that control can be performed in non-deterministic conditions due to the impossibility of accurate forecasting of the generation from renewable plants. A control model based on a priority queue of logical rules with structural-parametric optimization is applied. The optimization problem is considered from a separate prosumer, not from the entire distributed system. The solution of the optimization problem is performed by three swarm intelligence algorithms. Computational experiments were carried out for models of wind energy systems on Russky Island and Popov Island (Far East). The results obtained showed the high effectiveness of the swarm intelligence algorithms that demonstrated reliable and fast convergence to the global extreme of the optimization problem under different scenarios and parameters of prosumers. Also, we analyzed the influence of accumulator capacity on the variability of prosumers. The variability, in turn, affects the increase of the prosumer benefits from the interaction with the external global power system and neighboring prosumers.
Feasibility and optimal design of a hybrid power system for rural electrification for a small village Bankole Adebanji; Gafari Abiola Adepoju; Paul Olulope; Taiwo Fasina; Oluwumi Adetan
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 6: December 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (484.017 KB) | DOI: 10.11591/ijece.v10i6.pp6214-6224

Abstract

A hybrid renewable energy system is at present accepted globally, as the best option for rural electrification particularly in areas where grid extension is infeasible. However, the need for hybrid design to be optimal in terms of operation and component selection serves as a challenge in obtaining reliable electricity at a minimum cost. In this work, the feasibility of installing a small hydropower into an existing water supply dam and the development of an optimal sizing optimization model for a small village-Itapaji, Nigeria were carried out. The developed hybrid power system (HPS) model consists of solar photovoltaic, small hydropower, battery and diesel generator. The optimal sizing of the system’s components for optimum configuration was carried out using Genetic Algorithm. The hybrid model’s results were compared with hybrid optimization model for electric renewable (HOMER) using correlation coefficient (r) and root mean square error (RMSE) to verify its validity. The results of the simulation obtained from the developed model showed better correlation coefficient (r) of 0.88 and root mean square error (RMSE) of 0.001 when compared to that of HOMER. This will serve as a guide for the power system engineers in the feasibility assessment and optimal design of HPS for rural electrification.

Page 8 of 12 | Total Record : 116


Filter by Year

2020 2020


Filter By Issues
All Issue Vol 16, No 1: February 2026 Vol 15, No 6: December 2025 Vol 15, No 5: October 2025 Vol 15, No 4: August 2025 Vol 15, No 3: June 2025 Vol 15, No 2: April 2025 Vol 15, No 1: February 2025 Vol 14, No 6: December 2024 Vol 14, No 5: October 2024 Vol 14, No 4: August 2024 Vol 14, No 3: June 2024 Vol 14, No 2: April 2024 Vol 14, No 1: February 2024 Vol 13, No 6: December 2023 Vol 13, No 5: October 2023 Vol 13, No 4: August 2023 Vol 13, No 3: June 2023 Vol 13, No 2: April 2023 Vol 13, No 1: February 2023 Vol 12, No 6: December 2022 Vol 12, No 5: October 2022 Vol 12, No 4: August 2022 Vol 12, No 3: June 2022 Vol 12, No 2: April 2022 Vol 12, No 1: February 2022 Vol 11, No 6: December 2021 Vol 11, No 5: October 2021 Vol 11, No 4: August 2021 Vol 11, No 3: June 2021 Vol 11, No 2: April 2021 Vol 11, No 1: February 2021 Vol 10, No 6: December 2020 Vol 10, No 5: October 2020 Vol 10, No 4: August 2020 Vol 10, No 3: June 2020 Vol 10, No 2: April 2020 Vol 10, No 1: February 2020 Vol 9, No 6: December 2019 Vol 9, No 5: October 2019 Vol 9, No 4: August 2019 Vol 9, No 3: June 2019 Vol 9, No 2: April 2019 Vol 9, No 1: February 2019 Vol 8, No 6: December 2018 Vol 8, No 5: October 2018 Vol 8, No 4: August 2018 Vol 8, No 3: June 2018 Vol 8, No 2: April 2018 Vol 8, No 1: February 2018 Vol 7, No 6: December 2017 Vol 7, No 5: October 2017 Vol 7, No 4: August 2017 Vol 7, No 3: June 2017 Vol 7, No 2: April 2017 Vol 7, No 1: February 2017 Vol 6, No 6: December 2016 Vol 6, No 5: October 2016 Vol 6, No 4: August 2016 Vol 6, No 3: June 2016 Vol 6, No 2: April 2016 Vol 6, No 1: February 2016 Vol 5, No 6: December 2015 Vol 5, No 5: October 2015 Vol 5, No 4: August 2015 Vol 5, No 3: June 2015 Vol 5, No 2: April 2015 Vol 5, No 1: February 2015 Vol 4, No 6: December 2014 Vol 4, No 5: October 2014 Vol 4, No 4: August 2014 Vol 4, No 3: June 2014 Vol 4, No 2: April 2014 Vol 4, No 1: February 2014 Vol 3, No 6: December 2013 Vol 3, No 5: October 2013 Vol 3, No 4: August 2013 Vol 3, No 3: June 2013 Vol 3, No 2: April 2013 Vol 3, No 1: February 2013 Vol 2, No 6: December 2012 Vol 2, No 5: October 2012 Vol 2, No 4: August 2012 Vol 2, No 3: June 2012 Vol 2, No 2: April 2012 Vol 2, No 1: February 2012 Vol 1, No 2: December 2011 Vol 1, No 1: September 2011 More Issue