cover
Contact Name
Tole Sutikno
Contact Email
ijece@iaesjournal.com
Phone
-
Journal Mail Official
ijece@iaesjournal.com
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
International Journal of Electrical and Computer Engineering
ISSN : 20888708     EISSN : 27222578     DOI : -
International Journal of Electrical and Computer Engineering (IJECE, ISSN: 2088-8708, a SCOPUS indexed Journal, SNIP: 1.001; SJR: 0.296; CiteScore: 0.99; SJR & CiteScore Q2 on both of the Electrical & Electronics Engineering, and Computer Science) is the official publication of the Institute of Advanced Engineering and Science (IAES). The journal is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication and computer engineering from the global world.
Articles 111 Documents
Search results for , issue "Vol 13, No 2: April 2023" : 111 Documents clear
Three level intrusion detection system based on conditional generative adversarial network Hasan Abdulameer; Inam Musa; Noora Salim Al-Sultani
International Journal of Electrical and Computer Engineering (IJECE) Vol 13, No 2: April 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v13i2.pp2240-2258

Abstract

Security threat protection is important in the internet of things (IoT) applications since both the connected device and the captured data can be hacked or hijacked or both at the same time. To tackle the above-mentioned problem, we proposed three-level intrusion detection system conditional generative adversarial network (3LIDS-CGAN) model which includes four phases such as first-level intrusion detection system (IDS), second-level IDS, third-level IDS, and attack type classification. In first-level IDS, features of the incoming packets are extracted by the firewall. Based on the extracted features the packets are classified into three classes such as normal, malicious, and suspicious using support vector machine and golden eagle optimization. Suspicious packets are forwarded to the second-level IDS which classified the suspicious packets as normal or malicious. Here, signature-based intrusions are detected using attack history information, and anomaly-based intrusions are detected using event-based semantic mapping. In third-level IDS, adversary packets are detected using CGAN which automatically learns the adversarial environment and detects adversary packets accurately. Finally, proximal policy optimization is proposed to detect the attack type. Experiments are conducted using the NS-3.26 network simulator and performance is evaluated by various performance metrics which results that the proposed 3LIDS-CGAN model outperforming other existing works.
Investigating the relationship between knowledge management practices and organizational learning practices in the universities’ environment Zainab Amin Al-Sulami; Hayder Salah Hashim; Nor’ashikin Ali; Zaid Ameen Abduljabbar
International Journal of Electrical and Computer Engineering (IJECE) Vol 13, No 2: April 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v13i2.pp1680-1688

Abstract

The concept of knowledge management (KM) and organizational learning (OL) has been embraced by organizations to complement each other. Higher education institutions have embraced KM and OL as a means to improve organizational efficiency. This research explores the link between KM and OL. The target population included all the 432 academicians and administrators from 35 public universities in Iraq. The sampling was selected using a stratified random sampling technique. The correlation among the components of KM and OL was tested as well as the effect of KM components on OL. The findings were derived using smart partial least square. The findings showed that there is significant correlation between components of KM and components of OL. The regression analysis showed also that the effect of KM and its components; knowledge creation, knowledge sharing, knowledge storage, knowledge application and knowledge acquisition on OL are significant. These findings provide insights to universities management on strategies to implement KM practices that can align with OL practices to assure dynamic lifelong mechanisms for the basic daily activities such as teaching, learning, researching, and supervision.
Hydrogen storage for micro-grid application: a framework for ranking fuel cell technologies based on technical parameters John Adetunji Adebisi; Iheanacho Henry Denwigwe; Olubayo Moses Babatunde
International Journal of Electrical and Computer Engineering (IJECE) Vol 13, No 2: April 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v13i2.pp1221-1230

Abstract

To securely address energy shortage and various environmental issues attributed to fossil fuel, the adoption of renewable energy is growing across the globe. However, wind and solar which form the bulk of the emerging renewable energy for micro-grid applications are intermittent and need energy storage device for backup. Due to its environmentally friendly nature, the use of hydrogen as storage mechanism is now being explored for micro-grid applications. However, due to the various technical criteria attributed to various fuel cell (FC) technologies used for hydrogen production, selecting the most suitable alternative remains a challenge. This study uses evaluation based on distance from average solution, a multicriteria decision making tool to rank FC technologies that can be used to produce of hydrogen energy storage in micro-grid applications. The analysis was based on 4 FC technologies and 6 technical criteria. The results of the study show that the most preferred FC technology for micro-grid application is the polymeric electrolyte membrane while the least preferred is molten carbonate FC. It is expected that future analysis would explore the inclusion of socio-economic criteria in the evaluation of the most preferred FC technology for micro-grid application.
Delay-efficient 4:3 counter design using two-bit reordering circuit for high-speed Wallace tree multiplier Madaka Venkata Subbaiah; Galiveeti Umamaheswara Reddy
International Journal of Electrical and Computer Engineering (IJECE) Vol 13, No 2: April 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v13i2.pp1367-1378

Abstract

In many signal processing applications, multiplier is an important functional block that plays a crucial role in computation. It is always a challenging task to design the delay optimized multiplier at the system level. A new and delay-efficient structure for the 4:3 counter is proposed by making use of a two-bit reordering circuit. The proposed 4:3 counter along with the 7:3 counter, full adder (FA), and half adder (HA) circuits are employed in the design of delay-efficient 8-bit and 16-bit Wallace tree multipliers (WTMs). Using Xilinx Vivado 2017.2, the designed circuits are simulated and synthesized by targeting the device ‘xc7s50fgga484-1’ of Spartan 7 family. Further, in terms of lookup table (LUT) count, critical path delay (CPD), total on-chip power, and power-delay-product (PDP), the performance of the proposed multiplier circuit is compared with the existing multipliers.
The use of reversible logic gates in the design of residue number systems Ailin Asadpour; Amir Sabbagh Molahosseini; Azadeh Alsadat Emrani Zarandi
International Journal of Electrical and Computer Engineering (IJECE) Vol 13, No 2: April 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v13i2.pp2009-2022

Abstract

Reversible computing is an emerging technique to achieve ultra-low-power circuits. Reversible arithmetic circuits allow for achieving energy-efficient high-performance computational systems. Residue number systems (RNS) provide parallel and fault-tolerant additions and multiplications without carry propagation between residue digits. The parallelism and fault-tolerance features of RNS can be leveraged to achieve high-performance reversible computing. This paper proposed RNS full reversible circuits, including forward converters, modular adders and multipliers, and reverse converters used for a class of RNS moduli sets with the composite form {2k, 2p-1}. Modulo 2n-1, 2n, and 2n+1 adders and multipliers were designed using reversible gates. Besides, reversible forward and reverse converters for the 3-moduli set {2n-1, 2n+k, 2n+1} have been designed. The proposed RNS-based reversible computing approach has been applied for consecutive multiplications with an improvement of above 15% in quantum cost after the twelfth iteration, and above 27% in quantum depth after the ninth iteration. The findings show that the use of the proposed RNS-based reversible computing in convolution results in a significant improvement in quantum depth in comparison to conventional methods based on weighted binary adders and multipliers.
Discovering the spatial locations of the radio frequency radiations effects around mobile towers Zaid Jabbar Al-Allaq; Haidar Zaeer Dhaam; Mohammed Jawad Al Dujaili Al-Khazraji; Muntadhar Hameed Ismael Al-Khuzaie
International Journal of Electrical and Computer Engineering (IJECE) Vol 13, No 2: April 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v13i2.pp1629-1638

Abstract

Nowadays, smart devices have become a major part of human life, and this need has led to an increase in the demand for these devices, prompting major telecommunications companies to compete with each other to acquire the bulk of this market. This competition led to a significant increase in the number of mobile towers, to expand the coverage area. Each communication tower has transmitters and receivers to connect subscribers within the mobile network and other networks. The receivers and transmitters of each mobile tower operate on radio frequency waves. These waves can cause harm to humans if the body tissues absorb the radiation resulting from these waves. Headache, discomfort, and some other diseases are among the effects resulting from the spatial proximity to the mobile towers. In this paper, a model based on geographic information systems (GIS) software is proposed for the purpose of discovering the area of exposure to radio frequency radiation. This model can assists mitigate the opportunities of exposure to these radiations, thus reducing its danger. Real data of the levels of electromagnetic pollution resulting from mobile towers were analyzed during this study and compared with international safety standards.
Alpha-divergence two-dimensional nonnegative matrix factorization for biomedical blind source separation Abd Majid Darsono; Toh Cheng Chuan; Nurulfajar Abd Manap; Nik Mohd Zarifie Hashim
International Journal of Electrical and Computer Engineering (IJECE) Vol 13, No 2: April 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v13i2.pp1483-1490

Abstract

An alpha-divergence two-dimensional nonnegative matrix factorization (NMF2D) for biomedical signal separation is presented. NMF2D is a popular approach for retrieving low-rank approximations of nonnegative data such as image pixel, audio signal, data mining, pattern recognition and so on. In this paper, we concentrate on biomedical signal separation by using NMF2D with alpha-divergence family which decomposes a mixture into two-dimensional convolution factor matrices that represent temporal code and the spectral basis. The proposed iterative estimation algorithm (alpha-divergence algorithm) is initialized with random values, and it updated using multiplicative update rules until the values converge. Simulation experiments were carried out by comparing the original and estimated signal in term of signal-to-distortion ratio (SDR). The performances have been evaluated by including and excluding the sparseness constraint which sparseness is favored by penalizing nonzero gains. As a result, the proposed algorithm improved the iteration speed and sparseness constraints produce slight improvement of SDR.
Human body blockage effect on wireless network performance for outdoor coverage Karrar Shakir Muttair; Mahmood Farhan Mosleh
International Journal of Electrical and Computer Engineering (IJECE) Vol 13, No 2: April 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v13i2.pp2340-2349

Abstract

The rapid development in the field of communications and growing numbers of the population every year stimulate telecommunications companies to develop communications systems to accommodate all users. In this paper, we will study the blockage effect of the student body on the propagation of the signals in the external wireless network. We took various numbers of the student density on the campus to know the extent it affects especially in crowded environments. The student body structure and buildings are designed in the college according to the real dimensions by Wireless InSite software. We compared scenarios for the different numbers of student density, we noticed that whenever an increase in the student density in the college will lead to increased path loss and delay spread time. In addition, note there is a gradual decrease in the received power (RP) if there is no student density highest RP is -28.2 dBm, when there are 300 students highest RP is -34.7 dBm, and when there are 600 students highest RP is -36.5 dBm. The reasons are that signals path spread inside the college will be passing through several collisions whether student body blockage or buildings that are built from different materials.
A review of the automated timber defect identification approach Teo Hong Chun; Ummi Raba’ah Hashim; Sabrina Ahmad; Lizawati Salahuddin; Ngo Hea Choon; Kasturi Kanchymalay
International Journal of Electrical and Computer Engineering (IJECE) Vol 13, No 2: April 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v13i2.pp2156-2166

Abstract

Timber quality control is undoubtedly a very laborious process in the secondary wood industry. Manual inspections by operators are prone to human error, thereby resulting in poor timber quality inspections and low production volumes. The automation of this process using an automated vision inspection (AVI) system integrated with artificial intelligence appears to be the most plausible approach due to its ease of use and minimal operating costs. This paper provides an overview of previous works on the automated inspection of timber surface defects as well as various machine learning and deep learning approaches that have been implemented for the identification of timber defects. Contemporary algorithms and techniques used in both machine learning and deep learning are discussed and outlined in this review paper. Furthermore, the paper also highlighted the possible limitation of employing both approaches in the identification of the timber defect along with several future directions that may be further explored.
Integration of evolutionary algorithm in an agent-oriented approach for an adaptive e-learning Fatima Zohra Lhafra; Otman Abdoun
International Journal of Electrical and Computer Engineering (IJECE) Vol 13, No 2: April 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v13i2.pp1964-1978

Abstract

This paper describes an agent-oriented approach that aims to create learning situations by solving problems. The proposed system is designed as a multi-agent that organizes interfaces, coordinators, sources of information, and mobiles. The objective of this approach is to get learners to solve a problem that leads them to get engaged in several learning activities, chosen according to their level of knowledge and preferences in order to ensure adaptive learning and reduce the rate of learner abundance in an e-learning system. The search for learning activities procedure is based on evolutionary algorithms typically a genetic algorithm, to offer learners the optimal solution adapted to their profiles and ensure a resolution of the proposed learning problem. In terms of results, we have adopted “immigration strategies” to improve the performance of the genetic algorithm. To show the effectiveness of the proposed approach we have made a comparative study with other artificial intelligence optimization methods. We conducted a real experiment with primary school learners in order to test the effectiveness of the proposed approach and to set up its functioning. The experiment results showed a high rate of success and engagement among the learners who followed the proposed adaptive learning scenario.

Page 6 of 12 | Total Record : 111


Filter by Year

2023 2023


Filter By Issues
All Issue Vol 16, No 1: February 2026 Vol 15, No 6: December 2025 Vol 15, No 5: October 2025 Vol 15, No 4: August 2025 Vol 15, No 3: June 2025 Vol 15, No 2: April 2025 Vol 15, No 1: February 2025 Vol 14, No 6: December 2024 Vol 14, No 5: October 2024 Vol 14, No 4: August 2024 Vol 14, No 3: June 2024 Vol 14, No 2: April 2024 Vol 14, No 1: February 2024 Vol 13, No 6: December 2023 Vol 13, No 5: October 2023 Vol 13, No 4: August 2023 Vol 13, No 3: June 2023 Vol 13, No 2: April 2023 Vol 13, No 1: February 2023 Vol 12, No 6: December 2022 Vol 12, No 5: October 2022 Vol 12, No 4: August 2022 Vol 12, No 3: June 2022 Vol 12, No 2: April 2022 Vol 12, No 1: February 2022 Vol 11, No 6: December 2021 Vol 11, No 5: October 2021 Vol 11, No 4: August 2021 Vol 11, No 3: June 2021 Vol 11, No 2: April 2021 Vol 11, No 1: February 2021 Vol 10, No 6: December 2020 Vol 10, No 5: October 2020 Vol 10, No 4: August 2020 Vol 10, No 3: June 2020 Vol 10, No 2: April 2020 Vol 10, No 1: February 2020 Vol 9, No 6: December 2019 Vol 9, No 5: October 2019 Vol 9, No 4: August 2019 Vol 9, No 3: June 2019 Vol 9, No 2: April 2019 Vol 9, No 1: February 2019 Vol 8, No 6: December 2018 Vol 8, No 5: October 2018 Vol 8, No 4: August 2018 Vol 8, No 3: June 2018 Vol 8, No 2: April 2018 Vol 8, No 1: February 2018 Vol 7, No 6: December 2017 Vol 7, No 5: October 2017 Vol 7, No 4: August 2017 Vol 7, No 3: June 2017 Vol 7, No 2: April 2017 Vol 7, No 1: February 2017 Vol 6, No 6: December 2016 Vol 6, No 5: October 2016 Vol 6, No 4: August 2016 Vol 6, No 3: June 2016 Vol 6, No 2: April 2016 Vol 6, No 1: February 2016 Vol 5, No 6: December 2015 Vol 5, No 5: October 2015 Vol 5, No 4: August 2015 Vol 5, No 3: June 2015 Vol 5, No 2: April 2015 Vol 5, No 1: February 2015 Vol 4, No 6: December 2014 Vol 4, No 5: October 2014 Vol 4, No 4: August 2014 Vol 4, No 3: June 2014 Vol 4, No 2: April 2014 Vol 4, No 1: February 2014 Vol 3, No 6: December 2013 Vol 3, No 5: October 2013 Vol 3, No 4: August 2013 Vol 3, No 3: June 2013 Vol 3, No 2: April 2013 Vol 3, No 1: February 2013 Vol 2, No 6: December 2012 Vol 2, No 5: October 2012 Vol 2, No 4: August 2012 Vol 2, No 3: June 2012 Vol 2, No 2: April 2012 Vol 2, No 1: February 2012 Vol 1, No 2: December 2011 Vol 1, No 1: September 2011 More Issue