cover
Contact Name
Tole Sutikno
Contact Email
ijece@iaesjournal.com
Phone
-
Journal Mail Official
ijece@iaesjournal.com
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
International Journal of Electrical and Computer Engineering
ISSN : 20888708     EISSN : 27222578     DOI : -
International Journal of Electrical and Computer Engineering (IJECE, ISSN: 2088-8708, a SCOPUS indexed Journal, SNIP: 1.001; SJR: 0.296; CiteScore: 0.99; SJR & CiteScore Q2 on both of the Electrical & Electronics Engineering, and Computer Science) is the official publication of the Institute of Advanced Engineering and Science (IAES). The journal is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication and computer engineering from the global world.
Articles 110 Documents
Search results for , issue "Vol 12, No 1: February 2022" : 110 Documents clear
Effect of optimal filtering parameters for autoregressive model AR(p) on motor unit action potential signal Ayad Asaad lbrahim; Mohammed Ehsan Safi; Eyad Ibrahim Abbas
International Journal of Electrical and Computer Engineering (IJECE) Vol 12, No 1: February 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v12i1.pp229-238

Abstract

Error is one element of the autoregressive (AR) model, which is supposed to be white noise. Correspondingly assumption that white noise error is a normal distribution in electromyography (EMG) estimation is one of the common causes for error maximization. This paper presents the effect of a suitable choice of filtering function based on the non-invasive analysis properties of motor unit action potential signal, extracted from a non-invasive method-the high spatial resolution (HSR) electromyography (EMG), recorded during low-level isometric muscle contractions. The final prediction error procedure is used to find the number of parameters in the model. The error signal parameter, the simulated deviation from the actual signals, is suitably filtered to obtain optimally appropriate estimates of the parameters of the automatic regression model. It is filtered to acquire optimally appropriate estimates of the parameters of the automatic regression model. Then appropriate estimates of spectral power shapes are obtained with a high degree of efficiency compared with the robust method under investigation. Extensive experiment results for the proposed technique have shown that it provides a robust and reliable calculation of model parameters. Moreover, estimates of power spectral profiles were evaluated efficiently.
Behavioral biometric based personal authentication in feature phones Amitabh Thapliyal; Om Prakash Verma; Amioy Kumar
International Journal of Electrical and Computer Engineering (IJECE) Vol 12, No 1: February 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v12i1.pp802-815

Abstract

The usage of mobile phones has increased multifold in the recent decades mostly because of its utility in most of the aspects of daily life, such as communications, entertainment, and financial transactions. Feature phones are generally the keyboard based or lower version of touch based mobile phones, mostly targeted for efficient calling and messaging. In comparison to smart phones, feature phones have no provision of a biometrics system for the user access. The literature, have shown very less attempts in designing a biometrics system which could be most suitable to the low-cost feature phones. A biometric system utilizes the features and attributes based on the physiological or behavioral properties of the individual. In this research, we explore the usefulness of keystroke dynamics for feature phones which offers an efficient and versatile biometric framework. In our research, we have suggested an approach to incorporate the user’s typing patterns to enhance the security in the feature phone. We have applied k-nearest neighbors (k-NN) with fuzzy logic and achieved the equal error rate (EER) 1.88% to get the better accuracy. The experiments are performed with 25 users on Samsung On7 Pro C3590. On comparison, our proposed technique is competitive with almost all the other techniques available in the literature.
Arabic open information extraction system using dependency parsing Sally Mohamed Ali El-Morsy; Mahmoud Hussein; Hamdy M. Mousa
International Journal of Electrical and Computer Engineering (IJECE) Vol 12, No 1: February 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v12i1.pp541-551

Abstract

Arabic is a Semitic language and one of the most natural languages distinguished by the richness in morphological enunciation and derivation. This special and complex nature makes extracting information from the Arabic language difficult and always needs improvement. Open information extraction systems (OIE) have been emerged and used in different languages, especially in English. However, it has almost not been used for the Arabic language. Accordingly, this paper aims to introduce an OIE system that extracts the relation tuple from Arabic web text, exploiting Arabic dependency parsing and thinking carefully about all possible text relations. Based on clause types' propositions as extractable relations and constituents' grammatical functions, the identities of corresponding clause types are established. The proposed system named Arabic open information extraction(AOIE) can extract highly scalable Arabic text relations while being domain independent. Implementing the proposed system handles the problem using supervised strategies while the system relies on unsupervised extraction strategies. Also, the system has been implemented in several domains to avoid information extraction in a specific field. The results prove that the system achieves high efficiency in extracting clauses from large amounts of text.
Biometric iris templates security based on secret image sharing and chaotic maps Marwa Fadhel Jassim; Wafaa mohammed Saeed Hamzah; Abeer Fadhil Shimal
International Journal of Electrical and Computer Engineering (IJECE) Vol 12, No 1: February 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v12i1.pp339-348

Abstract

Biometric technique includes of uniquely identifying person based on their physical or behavioural characteristics. It is mainly used for authentication. Storing the template in the database is not a safe approach, because it can be stolen or be tampered with. Due to its importance the template needs to be protected. To treat this safety issue, the suggested system employed a method for securely storing the iris template in the database which is a merging approach for secret image sharing and hiding to enhance security and protect the privacy by decomposing the template into two independent host (public) iris images. The original template can be reconstructed only when both host images are available. Either host image does not expose the identity of the original biometric image. The security and privacy in biometrics-based authentication system is augmented by storing the data in the form of shadows at separated places instead of whole data at one. The proposed biometric recognition system includes iris segmentation algorithms, feature extraction algorithms, a (2, 2) secret sharing and hiding. The experimental results are conducted on standard colour UBIRIS v1 data set. The results indicate that the biometric template protection methods are capable of offering a solution for vulnerability that threatens the biometric template.
Reconfigurable of current-mode differentiator and integrator based-on current conveyor transconductance amplifiers Soontorn Srisoontorn; Angkana Charoenmee; Suphaphorn Panikhom; Thitiporn Janda; Suttipong Fungdetch; Khunpan Patimaprakorn; Adirek Jantakun
International Journal of Electrical and Computer Engineering (IJECE) Vol 12, No 1: February 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v12i1.pp208-218

Abstract

The reconfigurable of the differentiator and integrator based on current conveyor transconductance amplifiers (CCTAs) have been presented in this paper. The proposed configurations are provided with two CCTAs and grounded elements. The configurations can be operated in the differentiator and integrator by selecting external passive elements. The input and output currents have low and high impedances, respectively; therefore, the configurations can be cascaded without additional current buffer. The proposed configurations can be electronically tuned by external direct current (DC) bias currents, and it also has slight fluctuation with temperature. An application of universal filter is demonstrated to confirm the ability of the proposed configurations. The results of simulation with Pspice program are accordance with the theoretical analysis.
Optimizing of the installed capacity of hybrid renewable energy with a modified MPPT model Sukarno Budi Utomo; Iwan Setiawan; Berkah Fajar; Sonny Hady Winoto; Arief Marwanto
International Journal of Electrical and Computer Engineering (IJECE) Vol 12, No 1: February 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v12i1.pp73-81

Abstract

The lack of wind speed capacity and the emission of photons from sunlight are the problem in a hybrid system of photovoltaic (PV) panels and wind turbines. To overcome this shortcoming, the incremental conductance (IC) algorithm is applied that could control the converter work cycle and the switching of the buck boost therefore maximum efficiency of maximum power point tracking (MPPT) is reached. The operation of the PV-wind hybrid system, consisting of a 100 W PV array device and a 400 W wind subsystem, 12 V/100 Ah battery energy storage and LED, the PV-wind system requires a hybrid controller for battery charging and usage and load lamp and it’s conducted in experimental setup. The experimental has shown that an average increase in power generated was 38.8% compared to a single system of PV panels or a single wind turbine sub-system. Therefore, the potential opportunities for increasing power production in the tropics wheather could be carried out and applied with this model.
Audio steganography based on least significant bits algorithm with 4D grid multi-wing hyper-chaotic system Hussein Abdulameer Abdulkadhim; Jinan Nsaif Shehab
International Journal of Electrical and Computer Engineering (IJECE) Vol 12, No 1: February 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v12i1.pp320-330

Abstract

Although variety in hiding methods used to protect data and information transmitted via channels but still need more robustness and difficulty to improve protection level of the secret messages from hacking or attacking. Moreover, hiding several medias in one media to reduce the transmission time and band of channel is the important task and define as a gain channel. This calls to find other ways to be more complexity in detecting the secret message. Therefore, this paper proposes cryptography/steganography method to hide an audio/voice message (secret message) in two different cover medias: audio and video. This method is use least significant bits (LSB) algorithm combined with 4D grid multi-wing hyper-chaotic (GMWH) system. Shuffling of an audio using key generated by GMWH system and then hiding message using LSB algorithm will provide more difficulty of extracting the original audio by hackers or attackers. According to analyses of obtained results in the receiver using peak signal-to-noise ratio (PSNR)/mean square error (MSE) and sensitivity of encryption key, the proposed method has more security level and robustness. Finally, this work will provide extra security to the mixture base of crypto-steganographic methods.
Comparative analysis of Dimensions and Scopus bibliographic data sources: an approach to university research productivity Pachisa Kulkanjanapiban; Tipawan Silwattananusarn
International Journal of Electrical and Computer Engineering (IJECE) Vol 12, No 1: February 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v12i1.pp706-720

Abstract

This paper shows a significant comparison of two primary bibliographic data sources at the document level of Scopus and Dimensions. The emphasis is on the differences in their document coverage by institution level of aggregation. The main objective is to assess whether Dimensions offers at the institutional level good new possibilities for bibliometric analysis as at the global level. The results of a comparative study of the citation count profiles of articles published by faculty members of Prince of Songkla University (PSU) in Dimensions and Scopus from the year the databases first included PSU-authored papers (1970 and 1978, respectively) through the end of June 2020. Descriptive statistics and correlation analysis of 19,846 articles indexed in Dimensions and 13,577 indexed in Scopus. The main finding was that the number of citations received by Dimensions was highly correlated with citation counts in Scopus. Spearman’s correlation between citation counts in Dimensions and Scopus was a high and mighty relationship. The findings mainly affect Dimensions’ possibilities as instruments for carrying out bibliometric analysis of university members’ research productivity. University researchers can use Dimensions to retrieve information, and the design policies can be used to evaluate research using scientific databases.
Hybrid power control and contention window adaptation for channel congestion problem in internet of vehicles network Hayder M. Amer; Ethar Abduljabbar Hadi; Lamyaa Ghaleb Shihab; Hawraa H. Al Mohammed; Mohammed J. Khami
International Journal of Electrical and Computer Engineering (IJECE) Vol 12, No 1: February 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v12i1.pp497-505

Abstract

Technology such as vehicular ad hoc networks can be used to enhance the convenience and safety of passenger and drivers. The vehicular ad hoc networks safety applications suffer from performance degradation due to channel congestion in high-density situations. In order to improve vehicular ad hoc networks reliability, performance, and safety, wireless channel congestion should be examined. Features of vehicular networks such as high transmission frequency, fast topology change, high mobility, high disconnection make the congestion control is a challenging task. In this paper, a new congestion control approach is proposed based on the concept of hybrid power control and contention window to ensure a reliable and safe communications architecture within the internet of vehicles network. The proposed approach performance is investigated using an urban scenario. Simulation results show that the network performance has been enhanced by using the hybrid developed strategy in terms of received messages, delay time, messages loss, data collision and congestion ratio.
Comparative study to realize an automatic speaker recognition system Fadwa Abakarim; Abdenbi Abenaou
International Journal of Electrical and Computer Engineering (IJECE) Vol 12, No 1: February 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v12i1.pp376-382

Abstract

In this research, we present an automatic speaker recognition system based on adaptive orthogonal transformations. To obtain the informative features with a minimum dimension from the input signals, we created an adaptive operator, which helped to identify the speaker’s voice in a fast and efficient manner. We test the efficiency and the performance of our method by comparing it with another approach, mel-frequency cepstral coefficients (MFCCs), which is widely used by researchers as their feature extraction method. The experimental results show the importance of creating the adaptive operator, which gives added value to the proposed approach. The performance of the system achieved 96.8% accuracy using Fourier transform as a compression method and 98.1% using Correlation as a compression method.

Page 8 of 11 | Total Record : 110


Filter by Year

2022 2022


Filter By Issues
All Issue Vol 16, No 1: February 2026 Vol 15, No 6: December 2025 Vol 15, No 5: October 2025 Vol 15, No 4: August 2025 Vol 15, No 3: June 2025 Vol 15, No 2: April 2025 Vol 15, No 1: February 2025 Vol 14, No 6: December 2024 Vol 14, No 5: October 2024 Vol 14, No 4: August 2024 Vol 14, No 3: June 2024 Vol 14, No 2: April 2024 Vol 14, No 1: February 2024 Vol 13, No 6: December 2023 Vol 13, No 5: October 2023 Vol 13, No 4: August 2023 Vol 13, No 3: June 2023 Vol 13, No 2: April 2023 Vol 13, No 1: February 2023 Vol 12, No 6: December 2022 Vol 12, No 5: October 2022 Vol 12, No 4: August 2022 Vol 12, No 3: June 2022 Vol 12, No 2: April 2022 Vol 12, No 1: February 2022 Vol 11, No 6: December 2021 Vol 11, No 5: October 2021 Vol 11, No 4: August 2021 Vol 11, No 3: June 2021 Vol 11, No 2: April 2021 Vol 11, No 1: February 2021 Vol 10, No 6: December 2020 Vol 10, No 5: October 2020 Vol 10, No 4: August 2020 Vol 10, No 3: June 2020 Vol 10, No 2: April 2020 Vol 10, No 1: February 2020 Vol 9, No 6: December 2019 Vol 9, No 5: October 2019 Vol 9, No 4: August 2019 Vol 9, No 3: June 2019 Vol 9, No 2: April 2019 Vol 9, No 1: February 2019 Vol 8, No 6: December 2018 Vol 8, No 5: October 2018 Vol 8, No 4: August 2018 Vol 8, No 3: June 2018 Vol 8, No 2: April 2018 Vol 8, No 1: February 2018 Vol 7, No 6: December 2017 Vol 7, No 5: October 2017 Vol 7, No 4: August 2017 Vol 7, No 3: June 2017 Vol 7, No 2: April 2017 Vol 7, No 1: February 2017 Vol 6, No 6: December 2016 Vol 6, No 5: October 2016 Vol 6, No 4: August 2016 Vol 6, No 3: June 2016 Vol 6, No 2: April 2016 Vol 6, No 1: February 2016 Vol 5, No 6: December 2015 Vol 5, No 5: October 2015 Vol 5, No 4: August 2015 Vol 5, No 3: June 2015 Vol 5, No 2: April 2015 Vol 5, No 1: February 2015 Vol 4, No 6: December 2014 Vol 4, No 5: October 2014 Vol 4, No 4: August 2014 Vol 4, No 3: June 2014 Vol 4, No 2: April 2014 Vol 4, No 1: February 2014 Vol 3, No 6: December 2013 Vol 3, No 5: October 2013 Vol 3, No 4: August 2013 Vol 3, No 3: June 2013 Vol 3, No 2: April 2013 Vol 3, No 1: February 2013 Vol 2, No 6: December 2012 Vol 2, No 5: October 2012 Vol 2, No 4: August 2012 Vol 2, No 3: June 2012 Vol 2, No 2: April 2012 Vol 2, No 1: February 2012 Vol 1, No 2: December 2011 Vol 1, No 1: September 2011 More Issue