cover
Contact Name
Tole Sutikno
Contact Email
ijece@iaesjournal.com
Phone
-
Journal Mail Official
ijece@iaesjournal.com
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
International Journal of Electrical and Computer Engineering
ISSN : 20888708     EISSN : 27222578     DOI : -
International Journal of Electrical and Computer Engineering (IJECE, ISSN: 2088-8708, a SCOPUS indexed Journal, SNIP: 1.001; SJR: 0.296; CiteScore: 0.99; SJR & CiteScore Q2 on both of the Electrical & Electronics Engineering, and Computer Science) is the official publication of the Institute of Advanced Engineering and Science (IAES). The journal is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication and computer engineering from the global world.
Articles 96 Documents
Search results for , issue "Vol 11, No 5: October 2021" : 96 Documents clear
AHP validated literature review of forgery type dependent passive image forgery detection with explainable AI Kalyani Kadam; Swati Ahirrao; Ketan Kotecha
International Journal of Electrical and Computer Engineering (IJECE) Vol 11, No 5: October 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v11i5.pp4489-4501

Abstract

Nowadays, a lot of significance is given to what we read today: newspapers, magazines, news channels, and internet media, such as leading social networking sites like Facebook, Instagram, and Twitter. These are the primary wellsprings of phony news and are frequently utilized in malignant manners, for example, for horde incitement. In the recent decade, a tremendous increase in image information generation is happening due to the massive use of social networking services. Various image editing software like Skylum Luminar, Corel PaintShop Pro, Adobe Photoshop, and many others are used to create, modify the images and videos, are significant concerns. A lot of earlier work of forgery detection was focused on traditional methods to solve the forgery detection. Recently, Deep learning algorithms have accomplished high-performance accuracies in the image processing domain, such as image classification and face recognition. Experts have applied deep learning techniques to detect a forgery in the image too. However, there is a real need to explain why the image is categorized under forged to understand the algorithm’s validity; this explanation helps in mission-critical applications like forensic. Explainable AI (XAI) algorithms have been used to interpret a black box’s decision in various cases. This paper contributes a survey on image forgery detection with deep learning approaches. It also focuses on the survey of explainable AI for images.
Design and implement of robotic arm and control of moving via IoT with Arduino ESP32 Anwer Sabah Ahmed; Heyam A. Marzog; Laith Ali Abdul-Rahaim
International Journal of Electrical and Computer Engineering (IJECE) Vol 11, No 5: October 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v11i5.pp3924-3933

Abstract

Every day, the technologies are expanding and developed with extra things to them. A cloud computing (CC) and Internet of things (IoT) became deeply associated with technologies of the internet of future with one supply the other a way helping it for the successful. Arduino microcontroller is used to design robotic arm to pick and place the objects by the web page commands that can be used in many industrials. It can pick and place an object from source to destination and drive the screws in into its position safely. The robot arm is controlled using web page designed by (html) language which contain the dashboard that give the commands to move the servos in the desired angle to get the aimed direction accordingly. At the receiver end there are four servo motors which are made to be interfaced with the micro controller (Arduino) which is connected to the wireless network router. One of these is for the arm horizontally movement and two for arm knee, while the fourth is for catch tings or tight movement. Two ultra-sonic sensors are used for limiting the operation area of the robotic arm. Finally, Proteus program is used for the simulation the controlling of robot before the hardware installation
Improving power theft detection using efficient clustering and ensemble classification Hassan Ghaedi; Seyed Reza Kamel Tabbakh Farizani; Reza Ghaemi
International Journal of Electrical and Computer Engineering (IJECE) Vol 11, No 5: October 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v11i5.pp3704-3717

Abstract

One of the main concerns of power generation systems around the world is power theft. This research proposes a framework that merges clustering and classification together in order to power theft detection. Due to the fact that most datasets do not have abnormal samples or are few, we have added abnormal samples to the original datasets using artificial attacks to create balance in the datasets and increase the correct detection rate. We improved the crow search algorithm (CSA) and used the weight feature of Crows to improve performance of clustering phase. Also, to create balance between diversification and intensification, we calculated the awareness probability parameter (AP) dynamically at iterations of the algorithm. To evaluate the performance, we used the cross validation technique have used the stacking technique in its training phase. The results of extensive experiments on three reference datasets showed high performance to detect power theft. The evaluation results showed that if the data is collected correctly and sufficiently, this framework can effectively detect power theft in any actual power grid. Also, for new attacks, if their patterns can be detected from the data, it is easily possible to implement these types of attacks.
Automation conditions of mobile base station shelter via cloud and IoT computing applications Ahmed Hussein Shatti; Haider Ali Hasson; Laith Ali Abdul-Rahaim
International Journal of Electrical and Computer Engineering (IJECE) Vol 11, No 5: October 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v11i5.pp4550-4557

Abstract

In this paper, a monitoring and controlling process of the mobile base station shelter has been implemented. We have proposed a model that is based on a firebase cloud service and the principle of the internet of things (IoT) to carry out the process of automation. In this model, we have used Raspberry Pi 4 as the main microcontroller of our system that has interacted with a DHT11 Humidity-Temperature sensor and a PIR motion sensor. It's found that the Pi4 module provides efficient analysis, low consumption of power, and effective control of the operation. It turns ON/OFF the electrical appliances automatically inside the shelter. The main advantage of our proposed model is to maintain the temperature and humidity degrees inside the shelter within the required range of operation. Another important advantage is to diminish the tall human exertion level behind the monitoring process throughout the day. The model has been tested through a localhost server via an HTML page. The last one was created with the assistance of HTML and CSS languages to be used as a local user interface. Moreover, the Raspberry Pi 4 was programmed by Python Language to catch up on the reading of the sensors, processes the data, and sends it to the cloud service. Finally, those data will be shown in real-time to the authenticated user on the database of the firebase cloud service.
High-performance AES-128 algorithm implementation by FPGA-based SoC for 5G communications Paolo Visconti; Ramiro Velazquez; Stefano Capoccia; Roberto de Fazio
International Journal of Electrical and Computer Engineering (IJECE) Vol 11, No 5: October 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v11i5.pp4221-4232

Abstract

In this research work, a fast and lightweight AES-128 cypher based on the Xilinx ZCU102 FPGA board is presented, suitable for 5G communications. In particular, both encryption and decryption algorithms have been developed using a pipelined approach, so enabling the simultaneous processing of the rounds on multiple data packets at each clock cycle. Both the encryption and decryption systems support an operative frequency up to 220 MHz, reaching 28.16 Gbit/s maximum data throughput; besides, the encryption and decryption phases last both only ten clock periods. To guarantee the interoperability of the developed encryption/decryption system with the other sections of the 5G communication apparatus, synchronization and control signals have been integrated. The encryption system uses only 1631 CLBs, whereas the decryption one only 3464 CLBs, ascribable, mainly, to the Inverse Mix Columns step. The developed cypher shows higher efficiency (8.63 Mbps/slice) than similar solutions present in literature.
Substrate integrated waveguide bandpass filter for short range device application using rectangular open loop resonator Dian Widi Astuti; Rizki Ramadhan Putra; Muslim Muslim; Mudrik Alaydrus
International Journal of Electrical and Computer Engineering (IJECE) Vol 11, No 5: October 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v11i5.pp3747-3756

Abstract

The substrate integrated waveguide (SIW) structure is the candidate for many application in microwave, terahertz and millimeter wave application. It because of SIW structure can integrate with any component in one substrate than others structure. A kind components using SIW structure is a filter component, especialy bandpass filter. This research recommended SIW bandpass filter using rectangular open loop resonator for giving more selectivity of filter. It can be implemented for short range device (SRD) application in frequency region 2.4 - 2.483 GHz. Two types of SIW bandpass filter are proposed. First, SIW bandpass filter is proposed using six rectangular open loop resonators while the second SIW bandpass filter used eight rectangular open loop resonators. The simulation results for two kinds of the recommended rectangular open loop resonators have insertion loss (S21 parameter) below 2 dB and return loss (S11 parameter) more than 10 dB. Fabrication of the recommended two kind filters was validated by Vector Network Analyzer. The measurement results for six rectangular open loop resonators have 1.32 dB for S21 parameter at 2.29 GHz while the S11 parameter more than 18 dB at 2.26 GHz – 2.32 GHz. While the measurement results has good agreement for eight rectangular open loop resonators. Its have S21 below 2.2 dB at 2.41 – 2.47 GHz and S11 16.27 dB at 2.38 GHz and 11.5 dB at 2.47 GHz.
BER performance study for optical OFDM of optical camera communication Noor J. Jihad; Sinan M. Abdul Satar
International Journal of Electrical and Computer Engineering (IJECE) Vol 11, No 5: October 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v11i5.pp4263-4271

Abstract

In this article, different forms of optical orthogonal frequency division multiplexing (OFDM) were observed which were suitable for optical camera communication (OCC) systems. This research aims to establish the bit error rate (BER) versus signal-to-noise ratio (SNR) of the OCC system. This research will focus on OCC systems and the design that produces the noise of the clipping but will gain SNR as a whole if an optimum clipping factor is chosen. The BER versus SNR analysis was investigated for the different clipping factors 0.7, 1.4, and 2.6. The BER performance of the asymmetrically clipped optical OFDM (ACO-OFDM) was also compared with the direct current optical OFDM (DCO-OFDM) to show the suitable effectiveness of the proposed approach. ACO-OFDM was considered to be better due to lower bit loading, but DCO-OFDM was efficient for higher SNR values. This was because the DC bias used was inefficient in terms of optical capacity, while ACO-OFDM used only half of the subcarriers to transmit the information. Moreover, ACO-OFDM two-dimensional half-subcarriers of mapping rule would introduce the clipping noise to its unused 2D subcarriers, although further data can be provided by the 2D DCO-OFDM mapping rule.
Performance assessment of VoIP service over different handover mechanisms in UMTS networks Qusay Jalil Kadhim; Ali M. Alsahlany; Ahmed Hassan Hadi
International Journal of Electrical and Computer Engineering (IJECE) Vol 11, No 5: October 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v11i5.pp4214-4220

Abstract

Many researchers have discussed various topics in universal mobile telecommunication system (UMTS) networks: the process of switching from one cell to another for the subscriber and the impact of the quality of the connection during the transition process, quality of services (QoS), the quality of the uplink and downlink carrier line, the various types of code for the voice transmitted through the Internet, especially the research that discussed voice over internet protocol (VoIP) technology as voice travels from cell to cell in mobile networks, depending on the type of delivery. In this paper, a proposed scenario of a UMTS network was implemented to evaluate the multicellular VoIP movement; the proposed UMTS network was simulated using the OPNET 14.5 simulator. The calculation and analysis of the different parameters of the user while moving from one cell to another with different movement speeds considered, the best mean opinion score (MOS) value (3.19) registered for the scenario (soft handover) comparing with another type of handover (3.00).
Artificial neural network technique for improving prediction of credit card default: A stacked sparse autoencoder approach Sarah A. Ebiaredoh-Mienye; E. Esenogho; Theo G. Swart
International Journal of Electrical and Computer Engineering (IJECE) Vol 11, No 5: October 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v11i5.pp4392-4402

Abstract

Presently, the use of a credit card has become an integral part of contemporary banking and financial system. Predicting potential credit card defaulters or debtors is a crucial business opportunity for financial institutions. For now, some machine learning methods have been applied to achieve this task. However, with the dynamic and imbalanced nature of credit card default data, it is challenging for classical machine learning algorithms to proffer robust models with optimal performance. Research has shown that the performance of machine learning algorithms can be significantly improved when provided with optimal features. In this paper, we propose an unsupervised feature learning method to improve the performance of various classifiers using a stacked sparse autoencoder (SSAE). The SSAE was optimized to achieve improved performance. The proposed SSAE learned excellent feature representations that were used to train the classifiers. The performance of the proposed approach is compared with an instance where the classifiers were trained using the raw data. Also, a comparison is made with previous scholarly works, and the proposed approach showed superior performance over other methods.
Blockchain based voting system for Jordan parliament elections Mohammad Malkawi; Muneer Bani Yassein; Asmaa Bataineh
International Journal of Electrical and Computer Engineering (IJECE) Vol 11, No 5: October 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v11i5.pp4325-4335

Abstract

Covid-19 pandemic has stressed more than any-time before the necessity for conducting election processes in an electronic manner, where voters can cast their votes remotely with complete security, privacy, and trust. The different voting schema in different countries makes it very difficult to utilize a one fits all system. This paper presents a blockchain based voting system (BBVS) applied to the Parliamentary elections system in the country of Jordan. The proposed system is a private and centralized blockchain implemented in a simulated environment. The proposed BBVS system implements a hierarchical voting process, where a voter casts votes at two levels, one for a group, and the second for distinct members within the group. This paper provides a novel blockchain based e-Voting system, which proves to be transparent and yet secure. This paper utilizes synthetic voter benchmarks to measure the performance, accuracy and integrity of the election process. This research introduced and implemented new algorithms and methods to maintain acceptable performance both at the time of creating the blockchain(s) for voters and candidates as well as at the time of casting votes by voters.

Page 3 of 10 | Total Record : 96


Filter by Year

2021 2021


Filter By Issues
All Issue Vol 16, No 1: February 2026 Vol 15, No 6: December 2025 Vol 15, No 5: October 2025 Vol 15, No 4: August 2025 Vol 15, No 3: June 2025 Vol 15, No 2: April 2025 Vol 15, No 1: February 2025 Vol 14, No 6: December 2024 Vol 14, No 5: October 2024 Vol 14, No 4: August 2024 Vol 14, No 3: June 2024 Vol 14, No 2: April 2024 Vol 14, No 1: February 2024 Vol 13, No 6: December 2023 Vol 13, No 5: October 2023 Vol 13, No 4: August 2023 Vol 13, No 3: June 2023 Vol 13, No 2: April 2023 Vol 13, No 1: February 2023 Vol 12, No 6: December 2022 Vol 12, No 5: October 2022 Vol 12, No 4: August 2022 Vol 12, No 3: June 2022 Vol 12, No 2: April 2022 Vol 12, No 1: February 2022 Vol 11, No 6: December 2021 Vol 11, No 5: October 2021 Vol 11, No 4: August 2021 Vol 11, No 3: June 2021 Vol 11, No 2: April 2021 Vol 11, No 1: February 2021 Vol 10, No 6: December 2020 Vol 10, No 5: October 2020 Vol 10, No 4: August 2020 Vol 10, No 3: June 2020 Vol 10, No 2: April 2020 Vol 10, No 1: February 2020 Vol 9, No 6: December 2019 Vol 9, No 5: October 2019 Vol 9, No 4: August 2019 Vol 9, No 3: June 2019 Vol 9, No 2: April 2019 Vol 9, No 1: February 2019 Vol 8, No 6: December 2018 Vol 8, No 5: October 2018 Vol 8, No 4: August 2018 Vol 8, No 3: June 2018 Vol 8, No 2: April 2018 Vol 8, No 1: February 2018 Vol 7, No 6: December 2017 Vol 7, No 5: October 2017 Vol 7, No 4: August 2017 Vol 7, No 3: June 2017 Vol 7, No 2: April 2017 Vol 7, No 1: February 2017 Vol 6, No 6: December 2016 Vol 6, No 5: October 2016 Vol 6, No 4: August 2016 Vol 6, No 3: June 2016 Vol 6, No 2: April 2016 Vol 6, No 1: February 2016 Vol 5, No 6: December 2015 Vol 5, No 5: October 2015 Vol 5, No 4: August 2015 Vol 5, No 3: June 2015 Vol 5, No 2: April 2015 Vol 5, No 1: February 2015 Vol 4, No 6: December 2014 Vol 4, No 5: October 2014 Vol 4, No 4: August 2014 Vol 4, No 3: June 2014 Vol 4, No 2: April 2014 Vol 4, No 1: February 2014 Vol 3, No 6: December 2013 Vol 3, No 5: October 2013 Vol 3, No 4: August 2013 Vol 3, No 3: June 2013 Vol 3, No 2: April 2013 Vol 3, No 1: February 2013 Vol 2, No 6: December 2012 Vol 2, No 5: October 2012 Vol 2, No 4: August 2012 Vol 2, No 3: June 2012 Vol 2, No 2: April 2012 Vol 2, No 1: February 2012 Vol 1, No 2: December 2011 Vol 1, No 1: September 2011 More Issue