cover
Contact Name
Tole Sutikno
Contact Email
ijece@iaesjournal.com
Phone
-
Journal Mail Official
ijece@iaesjournal.com
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
International Journal of Electrical and Computer Engineering
ISSN : 20888708     EISSN : 27222578     DOI : -
International Journal of Electrical and Computer Engineering (IJECE, ISSN: 2088-8708, a SCOPUS indexed Journal, SNIP: 1.001; SJR: 0.296; CiteScore: 0.99; SJR & CiteScore Q2 on both of the Electrical & Electronics Engineering, and Computer Science) is the official publication of the Institute of Advanced Engineering and Science (IAES). The journal is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication and computer engineering from the global world.
Articles 112 Documents
Search results for , issue "Vol 12, No 3: June 2022" : 112 Documents clear
Design and development of anonymous location based routing for mobile ad-hoc network Swetha Mahendrakar Shaymrao; Pushpa Sothenahalli Krishnaraju; Thungamani Mahalingappa; Manjunath Thimmasandra Narayanappa
International Journal of Electrical and Computer Engineering (IJECE) Vol 12, No 3: June 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v12i3.pp2743-2755

Abstract

Mobile ad-hoc network (MANET) consists of wireless nodes interacting with each other impulsively over the air. MANET network is dynamic in nature because of which there is high risk in security. In MANET keeping node and routing secure is main task. Many proposed methods have tried to clear this issue but unable to fully resolve. The proposed method has strong secure anonymous location based routing (S2ALBR) method for MANET using optimal partitioning and trust inference model. Here initially partitions of network is done into sectors by using optimal tug of war (OTW) algorithm and compute the trustiness of every node by parameters received signal strength, mobility, path loss and co-operation rate. The process of trust computation is optimized by the optimal decided trust inference (ODTI) model, which provides the trustiness of each node, highest trust owned node is done in each sector and intermediate nodes used for transmission. The proposed method is focusing towards optimization with respect to parameter such as energy, delay, network lifetime, and throughput also above parameter is compared with the existing methods like anonymous location-based efficient routing protocol (ALERT), anonymous location-aided routing in suspicious MANET (ALARM) and authenticated anonymous secure routing (AASR).
Corn leaf image classification based on machine learning techniques for accurate leaf disease detection Daneshwari Ashok Noola; Dayanand Rangapura Basavaraju
International Journal of Electrical and Computer Engineering (IJECE) Vol 12, No 3: June 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v12i3.pp2509-2516

Abstract

Corn leaf disease possesses a huge impact on the food industry and corn crop yield as corn is one of the essential and basic nutrition of human life especially to vegetarians and vegans. Hence it is obvious that the quality of corn has to be ideal, however, to achieve that it has to be protected from the several diseases. Thus, there is a high demand for an automated method, which can detect the disease in early-stage and take necessary steps. However, early disease detection possesses a huge challenge, and it is highly critical. Thus, in this research work, we focus on designing and developing enhanced-K nearest neighbour (EKNN) model by adopting the basic K nearest neighbour (KNN) model. EKNN helps in distinguishing the different class disease. Further fine and coarse features with high quality are generated to obtain the discriminative, boundary, pattern and structural related information and this information are used for classification procedure. Classification process provides the gradient-based features of high quality. Moreover, the proposed model is evaluated considering the Plant-Village dataset; also, a comparative analysis is carried out with different traditional classification model with different metrics.
Towards smart modeling of mechanical properties of a bio composite based on a machine learning Aziz Moumen; Abdelghani Lakhdar; Zineb Laabid; Khalifa Mansouri
International Journal of Electrical and Computer Engineering (IJECE) Vol 12, No 3: June 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v12i3.pp3138-3145

Abstract

The main interest in many research problems in polymer bio composites and machine learning (ML) is the development of predictive models to one or several variables of interest by the use of suitable independent inputs or variables. Nevertheless, these fields have generally adopted several approaches, while bio composite behavior modeling is usually based on phenomenological theories and physical models. These latter are more robust and precise, but they are generally under the restricted predictive ability due to the particular set of conditions. On the other hand, Machine learning models can be highly efficient in the modeling phase by allowing the management of high and massive dimensional sets of data to predict the best behavior of bio composites. In this situation, biomaterial scientists would like to benefit from the comprehension and implementation of the powerful ML models to characterize or predict the bio composites. In this study, we implement a smart methodology employing supervised neural network models to predict the bio composites properties presenting more significant environmental and economic advantages than composites reinforced by synthetic fibers.
Formation control of non-identical multi-agent systems Djati Wibowo Djamari; Muhamad Rausyan Fikri; Bentang Arief Budiman; Farid Triawan
International Journal of Electrical and Computer Engineering (IJECE) Vol 12, No 3: June 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v12i3.pp2721-2732

Abstract

The problem considered in this work is formation control for non-identical linear multi-agent systems (MASs) under a time-varying communication network. The size of the formation is scalable via a scaling factor determined by a leader agent. Past works on scalable formation are limited to identical agents under a fixed communication network. In addition, the formation scaling variable is updated under a leader-follower network. Differently, this work considers a leaderless undirected network in addition to a leader-follower network to update the formation scaling variable. The control law to achieve scalable formation is based on the internal model principle and consensus algorithm. A biased reference output, updated in a distributed manner, is introduced such that each agent tracks a different reference output. Numerical examples show the effectiveness of the proposed method.
Enhancing highly-collaborative access control system using a new role-mapping algorithm Doaa Abdelfattah; Hesham A. Hassan; Fatma A. Omara
International Journal of Electrical and Computer Engineering (IJECE) Vol 12, No 3: June 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v12i3.pp2765-2782

Abstract

The collaboration among different organizations is considered one of the main benefits of moving applications and services to a cloud computing environment. Unfortunately, this collaboration raises many challenges such as the access of sensitive resources by unauthorized people. Usually, role based access-control (RBAC) Model is deployed in large organizations. The work in this paper is mainly considering the authorization scalability problem, which comes out due to the increase of shared resources and/or the number of collaborating organizations in the same cloud environment. Therefore, this paper proposes replacing the cross-domain RBAC rules with role-to-role (RTR) mapping rules among all organizations. The RTR mapping rules are generated using a newly proposed role-mapping algorithm. A comparative study has been performed to evaluate the performance of the proposed algorithm with concerning the rule-store size and the authorization response time. According to the results, it is found that the proposed algorithm achieves more saving in the number of stored role-mapping rules which minimizes the rule-store size and reduces the authorization response time. Additionally, the RTR model using the proposed algorithm has been implemented by applying a concurrent approach to achieve more saving in the authorization response time. Therefore, it would be suitable in highly-collaborative cloud environments
Integrated tripartite modules for intelligent traffic light system Emad I. Abdul Kareem; Haider K. Hoomod
International Journal of Electrical and Computer Engineering (IJECE) Vol 12, No 3: June 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v12i3.pp2971-2985

Abstract

The traffic in urban areas is primarily controlled by traffic lights, contributing to the excessive, if not properly installed, long waiting times for vehicles. The condition is compounded by the increasing number of road accidents involving pedestrians in cities across the world. Thus, this work presents an integrated tripartite module for an intelligent traffic light system. This system has enough ingredients for success that can solve the above challenges. The proposed system has three modules: the intelligent visual monitoring module, intelligent traffic light control module, and the intelligent recommendation module for emergency vehicles. The monitor module is a visual module capable of identifying the conditions of traffic in the streets. The intelligent traffic light control module configures many intersections in a city to improve the flow of vehicles. Finally, the intelligent recommendation module for emergency vehicles offers an optimal path for emergency vehicles. The evaluation of the proposed system has been carried out in Al-Sader city/Bagdad/Iraq. The intelligent recommendation module for the emergency vehicles module shows that the optimization rate average for the optimal path was in range 67.13% to 92%, where the intelligent traffic light control module shows that the optimization ratio was in range 86% to 91.8%.
Electrical impedance’s effects of flying insects on selectivity of electrical insecticides Lahouaria Neddar; Samir Flazi
International Journal of Electrical and Computer Engineering (IJECE) Vol 12, No 3: June 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v12i3.pp2214-2219

Abstract

The history of controlling destructive insects in the twentieth century makes it clear that the difficulties we encounter today in dealing with these types of insects come from our almost total reliance on one single controlling method, namely the use of chemical insecticides. These toxic and suspected carcinogenic products pose a serious threat to agriculture and the environment. However, the possibility of directing researchers in developing a new way considered as more efficient, more selective and less toxic has proved to be possible. The principle of this approach is based on an attractive effect and an electric effect. Nevertheless, the development of a bio and selective electrical system requires taking into account certain parameters involved in the attraction of insects and electrical discharge such as the electrical impedance. The results showed that the threshold at which the insect is disturbed depends on its conductivity.
Combined Chebyshev and logistic maps to generate pseudorandom number generator for internet of things Abdulghafour Jassim, Sameeh; Farhan, Alaa Kadhim
International Journal of Electrical and Computer Engineering (IJECE) Vol 12, No 3: June 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v12i3.pp3287-3297

Abstract

Sensitive data exchanging among things over the Internet must be protected by a powerful cryptographic system. Conventional cryptographic such as advanced encryption standard (AES), and respiratory sinus arrhythmia (RSA) are not effective enough to protect internet of things (IoT) because of certain inveterate IoT properties like limited memory, computation, and bandwidth. Nowadays, chaotic maps with high sensitivity to initial conditions, strong ergodicity, and non-periodicity have been widely used in IoT security applications. So, it is suitable for IoT. Also, in a stream cipher method, the user needs to deliver the keystream to all clients in advance. Consequently, this paper proposed a method to solve the keys distribution problem based on combine both Chebyshev and logistic maps techniques as well as a master key to generate a random key. The suggested method was compared with the other stream cipher algorithms (Chacha20, RC4, Salsa20) by utilizing the same plaintext and master key as input parameters and the results were successful in the statistical national institute of standards and technology (NIST) test. Simultaneously, the suggestion was evaluated through different evaluation methods like statistical NIST test, histogram, Shannon entropy, correlation coefficient analysis, keyspace and key sensitivity, and others. All mentioned tests are passed successfully. Therefore, the suggested approach was proved it is effective in security issues.
Extraction of image resampling using correlation aware convolution neural networks for image tampering detection Manjunatha Shivanandappa; Malini M. Patil
International Journal of Electrical and Computer Engineering (IJECE) Vol 12, No 3: June 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v12i3.pp3033-3043

Abstract

Detecting hybrid tampering attacks in an image is extremely difficult; especially when copy-clone tampered segments exhibit identical illumination and contrast level about genuine objects. The existing method fails to detect tampering when the image undergoes hybrid transformation such as scaling, rotation, compression, and also fails to detect under small-smooth tampering. The existing resampling feature extraction using the Deep learning techniques fails to obtain a good correlation among neighboring pixels in both horizontal and vertical directions. This work presents correlation aware convolution neural network (CA-CNN) for extracting resampling features for detecting hybrid tampering attacks. Here the image is resized for detecting tampering under a small-smooth region. The CA-CNN is composed of a three-layer horizontal, vertical, and correlated layer. The correlated layer is used for obtaining correlated resampling feature among horizontal sequence and vertical sequence. Then feature is aggregated and the descriptor is built. An experiment is conducted to evaluate the performance of the CA-CNN model over existing tampering detection methodologies considering the various datasets. From the result achieved it can be seen the CA-CNN is efficient considering various distortions and post-processing attacks such joint photographic expert group (JPEG) compression, and scaling. This model achieves much better accuracies, recall, precision, false positive rate (FPR), and F-measure compared existing methodologies.
Improving the iterative back projection estimation through Lorentzian sharp infinite symmetrical filter Amir Nazren Abdul Rahim; Shahrul Nizam Yaakob; Lee Yeng Seng; Mohd Wafi Nasrudin; Iszaidy Ismail
International Journal of Electrical and Computer Engineering (IJECE) Vol 12, No 3: June 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v12i3.pp2539-2552

Abstract

This study proposed an enhancement technique for improvising the estimation technique in iterative back projection (IBP) by using the Lorentzian error function with a sharp infinite symmetrical filter (SISEF). The IBP estimation is an iteratively based error correction that can minimize the error reconstruction significantly. However, the IBP has a drawback in that it suffers from jaggy and ringing artifacts as a result of the iterative reconstruction method and the absence of edge guidance. Furthermore, because the IBP estimator tended to oscillate at the same solution frequently, numerous iterations were required. Therefore, this study proposed edge enhancement to enhance the estimator by using the combination of the IBP with Lorentzian SISEF to produce a finer high-resolution output image. As a result, the SISEF is used to improvise the estimator by providing high accuracy of edge detail information for enhancing the edge image. At the same time, the Lorentzian error norm helps to increase the robustness of the IBP algorithm from contamination of additional noise and the ringing artifacts.

Page 10 of 12 | Total Record : 112


Filter by Year

2022 2022


Filter By Issues
All Issue Vol 16, No 1: February 2026 Vol 15, No 6: December 2025 Vol 15, No 5: October 2025 Vol 15, No 4: August 2025 Vol 15, No 3: June 2025 Vol 15, No 2: April 2025 Vol 15, No 1: February 2025 Vol 14, No 6: December 2024 Vol 14, No 5: October 2024 Vol 14, No 4: August 2024 Vol 14, No 3: June 2024 Vol 14, No 2: April 2024 Vol 14, No 1: February 2024 Vol 13, No 6: December 2023 Vol 13, No 5: October 2023 Vol 13, No 4: August 2023 Vol 13, No 3: June 2023 Vol 13, No 2: April 2023 Vol 13, No 1: February 2023 Vol 12, No 6: December 2022 Vol 12, No 5: October 2022 Vol 12, No 4: August 2022 Vol 12, No 3: June 2022 Vol 12, No 2: April 2022 Vol 12, No 1: February 2022 Vol 11, No 6: December 2021 Vol 11, No 5: October 2021 Vol 11, No 4: August 2021 Vol 11, No 3: June 2021 Vol 11, No 2: April 2021 Vol 11, No 1: February 2021 Vol 10, No 6: December 2020 Vol 10, No 5: October 2020 Vol 10, No 4: August 2020 Vol 10, No 3: June 2020 Vol 10, No 2: April 2020 Vol 10, No 1: February 2020 Vol 9, No 6: December 2019 Vol 9, No 5: October 2019 Vol 9, No 4: August 2019 Vol 9, No 3: June 2019 Vol 9, No 2: April 2019 Vol 9, No 1: February 2019 Vol 8, No 6: December 2018 Vol 8, No 5: October 2018 Vol 8, No 4: August 2018 Vol 8, No 3: June 2018 Vol 8, No 2: April 2018 Vol 8, No 1: February 2018 Vol 7, No 6: December 2017 Vol 7, No 5: October 2017 Vol 7, No 4: August 2017 Vol 7, No 3: June 2017 Vol 7, No 2: April 2017 Vol 7, No 1: February 2017 Vol 6, No 6: December 2016 Vol 6, No 5: October 2016 Vol 6, No 4: August 2016 Vol 6, No 3: June 2016 Vol 6, No 2: April 2016 Vol 6, No 1: February 2016 Vol 5, No 6: December 2015 Vol 5, No 5: October 2015 Vol 5, No 4: August 2015 Vol 5, No 3: June 2015 Vol 5, No 2: April 2015 Vol 5, No 1: February 2015 Vol 4, No 6: December 2014 Vol 4, No 5: October 2014 Vol 4, No 4: August 2014 Vol 4, No 3: June 2014 Vol 4, No 2: April 2014 Vol 4, No 1: February 2014 Vol 3, No 6: December 2013 Vol 3, No 5: October 2013 Vol 3, No 4: August 2013 Vol 3, No 3: June 2013 Vol 3, No 2: April 2013 Vol 3, No 1: February 2013 Vol 2, No 6: December 2012 Vol 2, No 5: October 2012 Vol 2, No 4: August 2012 Vol 2, No 3: June 2012 Vol 2, No 2: April 2012 Vol 2, No 1: February 2012 Vol 1, No 2: December 2011 Vol 1, No 1: September 2011 More Issue