cover
Contact Name
Tole Sutikno
Contact Email
ijece@iaesjournal.com
Phone
-
Journal Mail Official
ijece@iaesjournal.com
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
International Journal of Electrical and Computer Engineering
ISSN : 20888708     EISSN : 27222578     DOI : -
International Journal of Electrical and Computer Engineering (IJECE, ISSN: 2088-8708, a SCOPUS indexed Journal, SNIP: 1.001; SJR: 0.296; CiteScore: 0.99; SJR & CiteScore Q2 on both of the Electrical & Electronics Engineering, and Computer Science) is the official publication of the Institute of Advanced Engineering and Science (IAES). The journal is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication and computer engineering from the global world.
Articles 98 Documents
Search results for , issue "Vol 11, No 6: December 2021" : 98 Documents clear
Resource aware wind farm and D-STATCOM optimal sizing and placement in a distribution power system Anzum Ansari; Shankarlingappa C. Byalihal
International Journal of Electrical and Computer Engineering (IJECE) Vol 11, No 6: December 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v11i6.pp4641-4648

Abstract

Doubly fed induction generators (DFIG) based wind farms are capable of providing reactive power compensation. Compensation capability enhancement using reactors such as distributed static synchronous compensator (D-STATCOM) while connecting distribution generation (DG) systems to grid is imperative. This paper presents an optimal placement and sizing of offshore wind farms in a coastal distribution system that is emulated on an IEEE 33 bus system. A multi-objective formulation for optimal placement and sizing of the offshore wind farms with both the location and size constraints is developed. Teaching learning algorithm is used to optimize the multi-objective function constraining on the capacity and location of the offshore wind farms. The proposed formulation is a multi-objective problem for placement of the wind generator in the power system with dynamic wind supply to the power system. The random wind speed is generated as the input and the wind farm output generated to perform the optimal sizing and placement in the distributed system. MATLAB based simulation developed is found to be efficient and robust.
Evaluation of exponential moving average application to smooth the power output of wind turbine with different control modes Dinh Chung Phan; Ngọc An Luu
International Journal of Electrical and Computer Engineering (IJECE) Vol 11, No 6: December 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v11i6.pp4708-4717

Abstract

This paper focused on evaluating the application of exponential moving average method into wind turbine to smooth its power output without an energy storage system or an anemometer. Wind turbine control modes including active power control mode and rotor speed control mode are considered. For each control mode, two positions of the Exponential Moving Average method in controller were compared to choose the best position. Additionally, the impact of smoothing factor on wind turbine performance was also considered to determine a reasonable value of the smoothing factor for each control mode. Simulation results in MATLAB/Simulink indicated that, for wind turbine using rotor speed control mode, the Exponential Moving Average method should be applied to reduce the variation of actual rotor speed signal while for wind turbine with the power control mode, it should be used to smooth reference power signal. From the performance of wind turbine with different smoothing factor values, we can suggest that the smoothing factor value should be set at 0.5 and 0.4 for the power control mode and the rotor speed control mode, respectively.
Development of cost-effective phasor measurement unit for wide area monitoring system applications V. Vijaya Rama Raju; K. H. Phani Shree; S. V. Jayarama Kumar
International Journal of Electrical and Computer Engineering (IJECE) Vol 11, No 6: December 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v11i6.pp4731-4739

Abstract

Sustained growth in the demand with unprecedented investments in the transmission infrastructure resulted in narrow operational margins for power system operators across the globe. As a result, power networks are operating near to stability limits. This has demanded the electrical utilities to explore new avenues for control and protection of wide area systems. Present supervisory control and data acquisition/energy management systems (SCADA/EMS) can only facilitate steady state model of the network, whereas synchrophasor measurements with GPS time stamp from wide area can provide dynamic view of power grid that enables supervision, and protection of power network and allow the operator to take necessary control/remedial measures in the new regime of grid operations. Construction of phasor measurement unit (PMU) that provide synchrophasors for the assessment of system state is widely accepted as an essential component for the successful execution of wide area monitoring system (WAMS) applications. Commercial PMUs comes with many constraints such as cost, proprietary hardware designs and software. All these constraints have limited the deployment of PMUs at high voltage transmission systems alone. This paper addresses the issues by developing a cost-effective PMU with open-source hardware, which can be easily modified as per the requirements of the applications. The proposed device is tested with IEEE standards.
An insight into internet sector in Iraq Ruaa Alsabah; Mustafa Aljshamee; Ammar M. Abduljabbar; Ali Al-Sabbagh
International Journal of Electrical and Computer Engineering (IJECE) Vol 11, No 6: December 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v11i6.pp5137-5143

Abstract

The internet is considered to be the most advanced technology today and a gateway to modern communication and the sharing of information, products, services, and technology. Nowadays, users want to be able to access anywhere and anytime several services and applications, which is increasing data traffic and triggering a mobile data explosion. Iraq has major problems in increasing the growth and use of the internet and changing the standard method of communication. This is a big challenge, however, since there are several variables that characterize this phase of transformation. In this paper, the problems, vision, and solutions are presented in details. This study aims to clarify the factors of internet use in Iraq by the use of an acceptable approach and by suggesting new solutions for all the presented problems. This work also, clarify the expected traffic and the mechanism to transform the traffic between local ISP’s networks (AS) internet exchange points.
A new method for watermarking color images using virtual hiding and El-Gamal ciphering Noor Kadhim Ayoob; Asraa Abdullah Hussein; Rusul Mohammed Neamah
International Journal of Electrical and Computer Engineering (IJECE) Vol 11, No 6: December 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v11i6.pp5251-5258

Abstract

One of the important issues in the era of computer networks and multimedia technology development is to find ways to maintain the reliability, credibility, copyright and non-duplication of digital content transmitted over the internet. For the purpose of protecting images from illegal usage, a watermark is used. A hidden digital watermark is the process of concealing information on a host to prove that this image is owned by a specific person or organization. In this paper, a new method has been proposed to use an RGB logo to protect color images from unlicensed trading. The method depends on retrieving logo data from specific locations in the host to form a logo when the owner claims the rights to those images. These positions are chosen because their pixels match the logo data. The locations of matching pixels are stored in a table that goes through two stages of treatment to ensure confidentiality: First, table compression, second, encoding positions in the compressed table through El-Gamal algorithm. Because the method depends on the idea of keeping host pixels without change, PSNR will always be infinity. After subjecting the host to five types of attack, the results demonstrate that the method can effectively protect the image and hidden logo is retrieved clearly even after the attacks.
Natural language processing based advanced method of unnecessary video detection Nazmun Nessa Moon; Imrus Salehin; Masuma Parvin; Md. Mehedi Hasan; Iftakhar Mohammad Talha; Susanta Chandra Debnath; Fernaz Narin Nur; Mohd. Saifuzzaman
International Journal of Electrical and Computer Engineering (IJECE) Vol 11, No 6: December 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v11i6.pp5411-5419

Abstract

In this study we have described the process of identifying unnecessary video using an advanced combined method of natural language processing and machine learning. The system also includes a framework that contains analytics databases and which helps to find statistical accuracy and can detect, accept or reject unnecessary and unethical video content. In our video detection system, we extract text data from video content in two steps, first from video to MPEG-1 audio layer 3 (MP3) and then from MP3 to WAV format. We have used the text part of natural language processing to analyze and prepare the data set. We use both Naive Bayes and logistic regression classification algorithms in this detection system to determine the best accuracy for our system. In our research, our video MP4 data has converted to plain text data using the python advance library function. This brief study discusses the identification of unauthorized, unsocial, unnecessary, unfinished, and malicious videos when using oral video record data. By analyzing our data sets through this advanced model, we can decide which videos should be accepted or rejected for the further actions.
Mesenteric cyst detection and segmentation by multiple K-means clustering and iterative Gaussian filtering Mohamed Nasor; Walid Obaid
International Journal of Electrical and Computer Engineering (IJECE) Vol 11, No 6: December 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v11i6.pp4932-4941

Abstract

In this article a fully automated machine-vision technique for the detection and segmentation of mesenteric cysts in computed tomography (CT) images of the abdominal space is presented. The proposed technique involves clustering, filtering, morphological operations and evaluation processes to detect and segment mesenteric cysts in the abdomen regardless of their texture variation and location with respect to other surrounding abdominal organs. The technique is comprised of various processing phases, which include K-means clustering, iterative Gaussian filtering, and an evaluation of the segmented regions using area-normalized histograms and Euclidean distances. The technique was tested using 65 different abdominal CT scan images. The results showed that the technique was able to detect and segment mesenteric cysts and achieved 99.31%, 98.44%, 99.84%, 98.86% and 99.63% for precision, recall, specificity, dice score coefficient and accuracy respectively as quantitative performance measures which indicate very high segmentation accuracy.
A one decade survey of autonomous mobile robot systems Noor Abdul Khaleq Zghair; Ahmed S. Al-Araji
International Journal of Electrical and Computer Engineering (IJECE) Vol 11, No 6: December 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v11i6.pp4891-4906

Abstract

Recently, autonomous mobile robots have gained popularity in the modern world due to their relevance technology and application in real world situations. The global market for mobile robots will grow significantly over the next 20 years. Autonomous mobile robots are found in many fields including institutions, industry, business, hospitals, agriculture as well as private households for the purpose of improving day-to-day activities and services. The development of technology has increased in the requirements for mobile robots because of the services and tasks provided by them, like rescue and research operations, surveillance, carry heavy objects and so on. Researchers have conducted many works on the importance of robots, their uses, and problems. This article aims to analyze the control system of mobile robots and the way robots have the ability of moving in real-world to achieve their goals. It should be noted that there are several technological directions in a mobile robot industry. It must be observed and integrated so that the robot functions properly: Navigation systems, localization systems, detection systems (sensors) along with motion and kinematics and dynamics systems. All such systems should be united through a control unit; thus, the mission or work of mobile robots are conducted with reliability.
Developed security and privacy algorithms for cyber physical system Dhuha Dheyaa Khudhur; Muayad Sadik Croock
International Journal of Electrical and Computer Engineering (IJECE) Vol 11, No 6: December 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v11i6.pp5379-5389

Abstract

Cyber-physical system (CPS) is a modern technology in the cyber world, and it integrates with wireless sensor network (WSN). This system is widely used in many applications such as a smart city, greenhouse, healthcare, and power grid. Therefore, the data security and integrity are necessary to ensure the highest level of protection and performance for such systems. In this paper, two sides security system for cyber-physical level is proposed to obtain security, privacy, and integrity. The first side is applied the secure sockets layer (SSL)/transport layer security (TLS) encryption protocol with the internet of things (IoT) based message queuing telemetry transport (MQTT) protocol to secure the connection and encrypt the data exchange between the system's parties. The second side proposes an algorithm to detect and prevent a denial of service (DoS) attack (hypertext transfer protocol (HTTP) post request) on a Web server. The experiment results show the superior performance of the proposed method to secure the CPS by detecting and preventing the cyber-attacks, which infect the Web servers. They also prove the implementation of security, privacy and integrity aspects on the CPS.
From IT service management to IT service governance: An ontological approach for integrated use of ITIL and COBIT frameworks Lamia Moudoubah; Abir El Yamami; Khalifa Mansouri; Mohammed Qbadou
International Journal of Electrical and Computer Engineering (IJECE) Vol 11, No 6: December 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v11i6.pp5292-5300

Abstract

Some companies have achieved better performance as a result of their IT investments, while others have not, as organizations are interested in calculating the value added by their IT. There is a wide range of literature that agrees that the best practices used by organizations promote continuous improvement in service delivery. Nevertheless, overuse of these practices can have undesirable effects and unquantified investments. This paper proposed a practical tool formally developed according to the DSR design science approach, it addresses a domain relevant to both practitioners and academics by providing IT service governance (ITSG) domain model ontology, concerned with maximizing the clarity and veracity of the concepts within it. The results revealed that the proposed ontology resolved key barriers to ITSG process adoption in organizations, and that combining COBIT and ITIL practices would help organizations better manage their IT services and achieve better business-IT alignment.

Page 3 of 10 | Total Record : 98


Filter by Year

2021 2021


Filter By Issues
All Issue Vol 16, No 1: February 2026 Vol 15, No 6: December 2025 Vol 15, No 5: October 2025 Vol 15, No 4: August 2025 Vol 15, No 3: June 2025 Vol 15, No 2: April 2025 Vol 15, No 1: February 2025 Vol 14, No 6: December 2024 Vol 14, No 5: October 2024 Vol 14, No 4: August 2024 Vol 14, No 3: June 2024 Vol 14, No 2: April 2024 Vol 14, No 1: February 2024 Vol 13, No 6: December 2023 Vol 13, No 5: October 2023 Vol 13, No 4: August 2023 Vol 13, No 3: June 2023 Vol 13, No 2: April 2023 Vol 13, No 1: February 2023 Vol 12, No 6: December 2022 Vol 12, No 5: October 2022 Vol 12, No 4: August 2022 Vol 12, No 3: June 2022 Vol 12, No 2: April 2022 Vol 12, No 1: February 2022 Vol 11, No 6: December 2021 Vol 11, No 5: October 2021 Vol 11, No 4: August 2021 Vol 11, No 3: June 2021 Vol 11, No 2: April 2021 Vol 11, No 1: February 2021 Vol 10, No 6: December 2020 Vol 10, No 5: October 2020 Vol 10, No 4: August 2020 Vol 10, No 3: June 2020 Vol 10, No 2: April 2020 Vol 10, No 1: February 2020 Vol 9, No 6: December 2019 Vol 9, No 5: October 2019 Vol 9, No 4: August 2019 Vol 9, No 3: June 2019 Vol 9, No 2: April 2019 Vol 9, No 1: February 2019 Vol 8, No 6: December 2018 Vol 8, No 5: October 2018 Vol 8, No 4: August 2018 Vol 8, No 3: June 2018 Vol 8, No 2: April 2018 Vol 8, No 1: February 2018 Vol 7, No 6: December 2017 Vol 7, No 5: October 2017 Vol 7, No 4: August 2017 Vol 7, No 3: June 2017 Vol 7, No 2: April 2017 Vol 7, No 1: February 2017 Vol 6, No 6: December 2016 Vol 6, No 5: October 2016 Vol 6, No 4: August 2016 Vol 6, No 3: June 2016 Vol 6, No 2: April 2016 Vol 6, No 1: February 2016 Vol 5, No 6: December 2015 Vol 5, No 5: October 2015 Vol 5, No 4: August 2015 Vol 5, No 3: June 2015 Vol 5, No 2: April 2015 Vol 5, No 1: February 2015 Vol 4, No 6: December 2014 Vol 4, No 5: October 2014 Vol 4, No 4: August 2014 Vol 4, No 3: June 2014 Vol 4, No 2: April 2014 Vol 4, No 1: February 2014 Vol 3, No 6: December 2013 Vol 3, No 5: October 2013 Vol 3, No 4: August 2013 Vol 3, No 3: June 2013 Vol 3, No 2: April 2013 Vol 3, No 1: February 2013 Vol 2, No 6: December 2012 Vol 2, No 5: October 2012 Vol 2, No 4: August 2012 Vol 2, No 3: June 2012 Vol 2, No 2: April 2012 Vol 2, No 1: February 2012 Vol 1, No 2: December 2011 Vol 1, No 1: September 2011 More Issue