cover
Contact Name
Tole Sutikno
Contact Email
ijece@iaesjournal.com
Phone
-
Journal Mail Official
ijece@iaesjournal.com
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
International Journal of Electrical and Computer Engineering
ISSN : 20888708     EISSN : 27222578     DOI : -
International Journal of Electrical and Computer Engineering (IJECE, ISSN: 2088-8708, a SCOPUS indexed Journal, SNIP: 1.001; SJR: 0.296; CiteScore: 0.99; SJR & CiteScore Q2 on both of the Electrical & Electronics Engineering, and Computer Science) is the official publication of the Institute of Advanced Engineering and Science (IAES). The journal is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication and computer engineering from the global world.
Articles 112 Documents
Search results for , issue "Vol 12, No 5: October 2022" : 112 Documents clear
An efficient lightweight key exchange algorithm for internet of things applications Fasila Kasfa Ali; Sheena Mathew
International Journal of Electrical and Computer Engineering (IJECE) Vol 12, No 5: October 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v12i5.pp5609-5618

Abstract

Internet of things (IoT) gained wide popularity in recent years, and this is proved by tremendous increase in use of IoT applications worldwide. Distributed IoT applications can be implemented securely with the support of blockchain. By default, blockchain will ensure authentication of involved entities as well as integrity of data. Due to storage restrictions, use of hybrid system is preferred, and this involves cloud server for storage and blockchain for other functionalities. Data kept in cloud has to be encrypted by a strong encryption algorithm. Even though core security objectives are achieved, it is necessary to provide a secure method to exchange the key. Since, the key is the backbone of a security algorithm, protection of the key has to be ensured. In this work, an algorithm is proposed to provide a no-share key exchange between two communicating parties in a resource constrained environment. The same was implemented and compared with conventional key sharing algorithms. Security analysis was formally conducted by using widely accepted automated validation of internet security protocols and applications (AVISPA) tool and the proposed method proved to be secure.
Design methodology for general enhancement of a single-stage self-compensated folded-cascode operational transconductance amplifiers in 65 nm CMOS process Hayder Khaleel AL-Qaysi; Adham Hadi Saleh; Tahreer Mahmood
International Journal of Electrical and Computer Engineering (IJECE) Vol 12, No 5: October 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v12i5.pp4712-4721

Abstract

The problems resulting from the use of nano-MOSFETs in the design of operational trans-conductance amplifiers (OTAs) lead to an urgent need for new design techniques to produce high-performance metrics OTAs suitable for very high-frequency applications. In this paper, the enhancement techniques and design equations for the proposed single-stage folded-cascode operational trans-conductance amplifiers (FCOTA) are presented for the enhancement of its various performance metrics. The proposed single-stage FCOTA adopts the folded-cascode (FC) current sources with cascode current mirrors (CCMs) load. Using 65 nm complementary metal-oxide semiconductor (CMOS) process from predictive technology model (PTM), the HSPICE2019-based simulation results show that the designed single-stage FCOTA can achieve a high open-loop differential-mode DC voltage gain of 65.64 dB, very high unity-gain bandwidth of 263 MHz, very high stability with phase-margin of 73°, low power dissipation of 0.97 mW, very low DC input-offset voltage of 0.14 uV, high swing-output voltages from −0.97 to 0.91 V, very low equivalent input-referred noise of 15.8 nV/Hz, very high common-mode rejection ratio of 190.64 dB, very high positive/negative slew-rates of 157.5/58.3 V⁄us, very fast settling-time of 5.1 ns, high extension input common-mode range voltages from −0.44to 1 V, and high positive/negative power-supply rejection ratios of 75.5/68.8 dB. The values of the small/large-signal figures-of-merits (????????????s) are the highest when compared to other reported FCOTAs in the literature.
Novel lightweight video encryption method based on ChaCha20 stream cipher and hybrid chaotic map Abeer Tariq Maolood; Ekhlas Khalaf Gbashi; Eman Shakir Mahmood
International Journal of Electrical and Computer Engineering (IJECE) Vol 12, No 5: October 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v12i5.pp4988-5000

Abstract

In the recent years, an increasing demand for securing visual resource-constrained devices become a challenging problem due to the characteristics of these devices. Visual resource-constrained devices are suffered from limited storage space and lower power for computation such as wireless sensors, internet protocol (IP) camera and smart cards. Consequently, to support and preserve the video privacy in video surveillance system, lightweight security methods are required instead of the existing traditional encryption methods. In this paper, a new light weight stream cipher method is presented and investigated for video encryption based on hybrid chaotic map and ChaCha20 algorithm. Two chaotic maps are employed for keys generation process in order to achieve permutation and encryption tasks, respectively. The frames sequences are encrypted-decrypted based on symmetric scheme with assist of ChaCha20 algorithm. The proposed lightweight stream cipher method has been tested on several video samples to confirm suitability and validation in term of encryption–decryption procedures. The performance evaluation metrics include visual test, histogram analysis, information entropy, correlation analysis and differential analysis. From the experimental results, the proposed lightweight encryption method exhibited a higher security with lower computation time compared with state-of-the-art encryption methods.
Face mask detection using deep learning on NVIDIA Jetson Nano Noor Faleh Abdul Hassan; Ali A. Abed; Turki Y. Abdalla
International Journal of Electrical and Computer Engineering (IJECE) Vol 12, No 5: October 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v12i5.pp5427-5434

Abstract

In December 2019, the coronavirus pandemic started. Coronavirus desease-19 (COVID-19) is transmitted directly from contaminated surfaces via direct touch. To combat the virus, a multitude of equipment is needed. Masks are a vital element of personal protection in crowded places. As a result, determining if a person is wearing a face mask is critical to assimilating to contemporary society. To accomplish the objective, the model presented in this paper used deep learning libraries and OpenCV. This approach was chosen for safety concerns due to its high resource efficiency during deployment. The classifier was built using the MobileNetV2 structure, which was designed to be lightweight and capable of being utilized in embedded devices such as the NVIDIA Jetson Nano to do real-time mask recognition. The stages of model construction were collecting, pre-processing, splitting data, creating the model, training the model, and applying the model. This system utilized image processing techniques and deep learning to process a live video feed. When someone is not wearing a mask, the output eventually produces an alarm sound through a built-in buzzer. Experimental results and testing were used to verify the suggested system's performance. Including both training and testing, the achieved recognition rate was 99%.
New approach on global optimization problems based on meta-heuristic algorithm and quasi-Newton method Yosza Dasril; Goh Khang Wen; Nazarudin bin Bujang; Shahrul Nizam Salahudin
International Journal of Electrical and Computer Engineering (IJECE) Vol 12, No 5: October 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v12i5.pp5182-5190

Abstract

This paper presents an innovative approach in finding an optimal solution of multimodal and multivariable function for global optimization problems that involve complex and inefficient second derivatives. Artificial bees colony (ABC) algorithm possessed good exploration search, but the major weakness at its exploitation stage. The proposed algorithms improved the weakness of ABC algorithm by hybridized with the most effective gradient based method which are Davidon-Flecher-Powell (DFP) and Broyden-Flecher-Goldfarb-Shanno (BFGS) algorithms. Its distinguished features include maximizing the employment of possible information related to the objective function obtained at previous iterations. The proposed algorithms have been tested on a large set of benchmark global optimization problems and it has shown a satisfactory computational behaviour and it has succeeded in enhancing the algorithm to obtain the solution for global optimization problems.
Development and characterization of an automated portable wound irrigation device for diabetic ulcers Muhammad Hanif Nadhif; Hanif Assyarify; Muhammad Irsyad; Em Yunir; Tri Juli Edi Tarigan; Angela Sarumpaet; Eni Iswati
International Journal of Electrical and Computer Engineering (IJECE) Vol 12, No 5: October 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v12i5.pp4746-4755

Abstract

Patients with diabetes mellitus may experience peripheral neuropathy and extremity system impairment, which may lead to ulceration if the treatments are delayed. Diabetic ulcers, unfortunately, are chronic, which require proper treatments, including debridement and bacterial removal using an irrigation device. To date, commercial irrigation devices included pulsed-lavage, bulb syringe, and gravity bags. Unfortunately, the devices have limitations in terms of portability, measurability, controllability, and disposability. To tackle the limitations, this study aims to design, fabricate, and characterize an automated portable wound irrigation device (Apdice), which is controllable non-disposable, and portable. The device was designed and fabricated using a lightweight construction, a rechargeable battery, and non-disposable materials to support the portability and non-disposable means. Meanwhile, the proportional-derivative-integral controller with its peripheral components were featured to enable controllability. Furthermore, the device was also tested regarding the contamination using a particle counter, and appeared to be contamination free. In short, Apdice showed a robust technological performance. However, it is also worth the try to test the contamination test against biological agents to guarantee the biocompatibility of the device.
Improving blockchain security for the internet of things: challenges and solutions Mohammed Al-Shabi; Abdulrahman Al-Qarafi
International Journal of Electrical and Computer Engineering (IJECE) Vol 12, No 5: October 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v12i5.pp5619-5629

Abstract

Due to its uniquely suited to the knowledge era, the blockchain technology has currently become highly appealing to the next generation. In addition, such technology has been recently extended to the internet of things (IoT). In essence, the blockchain concept necessitates the use of a decentralized data operation system to store as well as to distribute data and the transactions across the net. Therefore, this study examines the specific concept of the blockchain as a decentralized data management system in the face of probable protection threats. Furthermore, it discusses the present solutions that can be used to counteract those attacks. The blockchain security enhancement solutions are included in this study by summarizing the key points of these solutions. Several blockchain systems and safety devices that register security defenselessness can be developed using such key points. At last, this paper discusses the pending matters and the outlook research paths of blockchain-IoT systems.
A hybrid framework for detecting structured query language injection attacks in web-based applications Md. Hasan Furhad; Ripon K. Chakrabortty; Michael J. Ryan; Jia Uddin; Iqbal H. Sarker
International Journal of Electrical and Computer Engineering (IJECE) Vol 12, No 5: October 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v12i5.pp5405-5414

Abstract

Almost every web-based application is managed and operated through a number of websites, each of which is vulnerable to cyber-attacks that are mounted across the same networks used by the applications, with much less risk to the attacker than physical attacks. Such web-based attacks make use of a range of modern techniques-such as structured query language injection (SQLi), cross-site scripting, and data tampering-to achieve their aims. Among them, SQLi is the most popular and vulnerable attack, which can be performed in one of two ways; either by an outsider of an organization (known as the outside attacker) or by an insider with a good knowledge of the system with proper administrative rights (known as the inside attacker). An inside attacker, in contrast to an outsider, can take down the system easily and pose a significant challenge to any organization, and therefore needs to be identified in advance to mitigate the possible consequences. Blockchain-based technique is an efficient approach to detect and mitigate SQLi attacks and is widely used these days. Thus, in this study, a hybrid method is proposed that combines a SQL query matching technique (SQLMT) and a standard blockchain framework to detect SQLi attacks created by insiders. The results obtained by the proposed hybrid method through computational experiments are further validated using standard web validation tools.
Duct quiet zones utilization for an enhancement the acoustical air-condition noise control Mahmoud Kamel, Mohamed; Soliman Ahmed Said, EL-Sayed; Mohamed AL-Sagheer, Ragab
International Journal of Electrical and Computer Engineering (IJECE) Vol 12, No 5: October 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v12i5.pp4915-4925

Abstract

This paper investigates the duct’s noise distribution pattern due to the heating, ventilation, and air conditioning systems. This study is considering the longitudinal sound wave distribution that can permit a higher reduction of these heating, ventilation, and air conditioning systems duct noise. The proposed technique is depending on the lowest sound pressure level points in the duct or duct quiet zones. Moreover, each heating, ventilation, and air conditioning systems duct has several quiet zones, depending on the sound pressure level of the fan noise source and the duct length as well as the duct diameter. Furthermore, the noise standing wave has a wavelength (λ) which is the distance between two successive quiet zones. This work utilizes orthogonal acoustical noise with the standing wave via feed-forward control speakers. This system confirmed that the distance (λ) is linearly proportional to the duct source noise level. This system noise reduction enhancement has been fulfilled by installing further noise feed-forward control speakers at different duct quiet zones. The system simulation results were displaying satisfactory agreement with the field experimental results.
A novel convolutional neural network based dysphonic voice detection algorithm using chromagram Rumana Islam; Mohammed Tarique
International Journal of Electrical and Computer Engineering (IJECE) Vol 12, No 5: October 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v12i5.pp5511-5518

Abstract

This paper presents a convolutional neural network (CNN) based non-invasive pathological voice detection algorithm using signal processing approach. The proposed algorithm extracts an acoustic feature, called chromagram, from voice samples and applies this feature to the input of a CNN for classification. The main advantage of chromagram is that it can mimic the way humans perceive pitch in sounds and hence can be considered useful to detect dysphonic voices, as the pitch in the generated sounds varies depending on the pathological conditions. The simulation results show that classification accuracy of 85% can be achieved with the chromagram. A comparison of the performances for the proposed algorithm with those of other related works is also presented.

Page 7 of 12 | Total Record : 112


Filter by Year

2022 2022


Filter By Issues
All Issue Vol 15, No 6: December 2025 Vol 15, No 5: October 2025 Vol 15, No 4: August 2025 Vol 15, No 3: June 2025 Vol 15, No 2: April 2025 Vol 15, No 1: February 2025 Vol 14, No 6: December 2024 Vol 14, No 5: October 2024 Vol 14, No 4: August 2024 Vol 14, No 3: June 2024 Vol 14, No 2: April 2024 Vol 14, No 1: February 2024 Vol 13, No 6: December 2023 Vol 13, No 5: October 2023 Vol 13, No 4: August 2023 Vol 13, No 3: June 2023 Vol 13, No 2: April 2023 Vol 13, No 1: February 2023 Vol 12, No 6: December 2022 Vol 12, No 5: October 2022 Vol 12, No 4: August 2022 Vol 12, No 3: June 2022 Vol 12, No 2: April 2022 Vol 12, No 1: February 2022 Vol 11, No 6: December 2021 Vol 11, No 5: October 2021 Vol 11, No 4: August 2021 Vol 11, No 3: June 2021 Vol 11, No 2: April 2021 Vol 11, No 1: February 2021 Vol 10, No 6: December 2020 Vol 10, No 5: October 2020 Vol 10, No 4: August 2020 Vol 10, No 3: June 2020 Vol 10, No 2: April 2020 Vol 10, No 1: February 2020 Vol 9, No 6: December 2019 Vol 9, No 5: October 2019 Vol 9, No 4: August 2019 Vol 9, No 3: June 2019 Vol 9, No 2: April 2019 Vol 9, No 1: February 2019 Vol 8, No 6: December 2018 Vol 8, No 5: October 2018 Vol 8, No 4: August 2018 Vol 8, No 3: June 2018 Vol 8, No 2: April 2018 Vol 8, No 1: February 2018 Vol 7, No 6: December 2017 Vol 7, No 5: October 2017 Vol 7, No 4: August 2017 Vol 7, No 3: June 2017 Vol 7, No 2: April 2017 Vol 7, No 1: February 2017 Vol 6, No 6: December 2016 Vol 6, No 5: October 2016 Vol 6, No 4: August 2016 Vol 6, No 3: June 2016 Vol 6, No 2: April 2016 Vol 6, No 1: February 2016 Vol 5, No 6: December 2015 Vol 5, No 5: October 2015 Vol 5, No 4: August 2015 Vol 5, No 3: June 2015 Vol 5, No 2: April 2015 Vol 5, No 1: February 2015 Vol 4, No 6: December 2014 Vol 4, No 5: October 2014 Vol 4, No 4: August 2014 Vol 4, No 3: June 2014 Vol 4, No 2: April 2014 Vol 4, No 1: February 2014 Vol 3, No 6: December 2013 Vol 3, No 5: October 2013 Vol 3, No 4: August 2013 Vol 3, No 3: June 2013 Vol 3, No 2: April 2013 Vol 3, No 1: February 2013 Vol 2, No 6: December 2012 Vol 2, No 5: October 2012 Vol 2, No 4: August 2012 Vol 2, No 3: June 2012 Vol 2, No 2: April 2012 Vol 2, No 1: February 2012 Vol 1, No 2: December 2011 Vol 1, No 1: September 2011 More Issue