International Journal of Electrical and Computer Engineering
International Journal of Electrical and Computer Engineering (IJECE, ISSN: 2088-8708, a SCOPUS indexed Journal, SNIP: 1.001; SJR: 0.296; CiteScore: 0.99; SJR & CiteScore Q2 on both of the Electrical & Electronics Engineering, and Computer Science) is the official publication of the Institute of Advanced Engineering and Science (IAES). The journal is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication and computer engineering from the global world.
Articles
113 Documents
Search results for
, issue
"Vol 13, No 3: June 2023"
:
113 Documents
clear
Medical image encryption techniques: a technical survey and potential challenges
Ammar Odeh;
Qasem Abu Al-Haija
International Journal of Electrical and Computer Engineering (IJECE) Vol 13, No 3: June 2023
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijece.v13i3.pp3170-3177
Among the most sensitive and important data in telemedicine systems are medical images. It is necessary to use a robust encryption method that is resistant to cryptographic assaults while transferring medical images over the internet. Confidentiality is the most crucial of the three security goals for protecting information systems, along with availability, integrity, and compliance. Encryption and watermarking of medical images address problems with confidentiality and integrity in telemedicine applications. The need to prioritize security issues in telemedicine applications makes the choice of a trustworthy and efficient strategy or framework all the more crucial. The paper examines various security issues and cutting-edge methods to secure medical images for use with telemedicine systems.
Priority based energy efficient hybrid cluster routing protocol for underwater wireless sensor network
Tejaswini R Murgod;
S. Meenakshi Sundaram;
Sowmya Manchaiah;
Santhosh Kumar
International Journal of Electrical and Computer Engineering (IJECE) Vol 13, No 3: June 2023
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijece.v13i3.pp3161-3169
A little change in the environment that goes unnoticed in an underwater communication network might lead to calamity. A little alteration in the environment must also be adequately analyzed in order to deal with a potential crisis. A priority-based routing protocol is required to ensure that the vital data perceived by the sensor about the environment changes. The priority-based routing system guarantees that vital data packets are delivered at a quicker pace to the destination or base station for further processing. In this work, we present a priority-based routing protocol based on the energy efficient hybrid cluster routing protocol (EEHRCP) algorithm. The suggested approach keeps two distinct queues for lower and higher priority data packets. In order to ensure that these packets get at their destination without any information loss and at a quicker rate, all of the crucial sensed data is passed through a higher priority queue. Test findings show that the suggested technique increases throughput, delivery percentage, and reduces latency for the crucial data packets.
Automatic food bio-hazard detection system
Robinson Jimenez Moreno;
Javier Eduardo Martinez Baquero
International Journal of Electrical and Computer Engineering (IJECE) Vol 13, No 3: June 2023
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijece.v13i3.pp2652-2659
This paper presents the design of a convolutional neural network architecture oriented to the detection of food waste, to generate a low, medium, or critical-level alarm. An architecture based on four convolution layers is used, for which a database of 100 samples is prepared. The database is used with the different hyperparameters that make up the final architecture, after the training process. By means of confusion matrix analysis, a 100% performance of the network is obtained, which delivers its output to a fuzzy system that, depending on the duration of the detection time, generates the different alarm levels associated with the risk.
An analysis between different algorithms for the graph vertex coloring problem
Velin Kralev;
Radoslava Kraleva
International Journal of Electrical and Computer Engineering (IJECE) Vol 13, No 3: June 2023
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijece.v13i3.pp2972-2980
This research focuses on an analysis of different algorithms for the graph vertex coloring problem. Some approaches to solving the problem are discussed. Moreover, some studies for the problem and several methods for its solution are analyzed as well. An exact algorithm (using the backtracking method) is presented. The complexity analysis of the algorithm is discussed. Determining the average execution time of the exact algorithm is consistent with the multitasking mode of the operating system. This algorithm generates optimal solutions for all studied graphs. In addition, two heuristic algorithms for solving the graph vertex coloring problem are used as well. The results show that the exact algorithm can be used to solve the graph vertex coloring problem for small graphs with 30-35 vertices. For half of the graphs, all three algorithms have found the optimal solutions. The suboptimal solutions generated by the approximate algorithms are identical in terms of the number of colors needed to color the corresponding graphs. The results show that the linear increase in the number of vertices and edges of the analyzed graphs causes a linear increase in the number of colors needed to color these graphs.
Flagging clickbait in Indonesian online news websites using fine-tuned transformers
Muhammad Noor Fakhruzzaman;
Sa'idah Zahrotul Jannah;
Ratih Ardiati Ningrum;
Indah Fahmiyah
International Journal of Electrical and Computer Engineering (IJECE) Vol 13, No 3: June 2023
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijece.v13i3.pp2921-2930
Click counts are related to the amount of money that online advertisers paid to news sites. Such business models forced some news sites to employ a dirty trick of click-baiting, i.e., using hyperbolic and interesting words, sometimes unfinished sentences in a headline to purposefully tease the readers. Some Indonesian online news sites also joined the party of clickbait, which indirectly degrade other established news sites' credibility. A neural network with a pre-trained language model multilingual bidirectional encoder representations from transformers (BERT) that acted as an embedding layer is then combined with a 100 node-hidden layer and topped with a sigmoid classifier was trained to detect clickbait headlines. With a total of 6,632 headlines as a training dataset, the classifier performed remarkably well. Evaluated with 5-fold cross-validation, it has an accuracy score of 0.914, an F1-score of 0.914, a precision score of 0.916, and a receiver operating characteristic-area under curve (ROC-AUC) of 0.92. The usage of multilingual BERT in the Indonesian text classification task was tested and is possible to be enhanced further. Future possibilities, societal impact, and limitations of clickbait detection are discussed.
Cloud service analysis using round-robin algorithm for quality-of-service aware task placement for internet of things services
Nor Syazwani Mohd Pakhrudin;
Murizah Kassim;
Azlina Idris
International Journal of Electrical and Computer Engineering (IJECE) Vol 13, No 3: June 2023
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijece.v13i3.pp3464-3473
Round-robin (RR) is a process approach to sharing resources that requires each user to get a turn using them in an agreed order in cloud computing. It is suited for time-sharing systems since it automatically reduces the problem of priority inversion, which are low-priority tasks delayed. The time quantum is limited, and only a one-time quantum process is allowed in round-robin scheduling. The objective of this research is to improve the functionality of the current RR method for scheduling actions in the cloud by lowering the average waiting, turnaround, and response time. CloudAnalyst tool was used to enhance the RR technique by changing the parameter value in optimizing the high accuracy and low cost. The result presents the achieved overall min and max response times are 36.69 and 650.30 ms for running 300 min RR. The cost for the virtual machines (VMs) is identified from $0.5 to $3. The longer the time used, the higher the cost of the data transfer. This research is significant in improving communication and the quality of relationships within groups.
Secure authentication and data aggregation scheme for routing packets in wireless sensor network
Rudramurthy Veeregowdanadoddi Chandraiah;
Aparna Ramalingappa
International Journal of Electrical and Computer Engineering (IJECE) Vol 13, No 3: June 2023
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijece.v13i3.pp3217-3226
Wireless sensor networks (WSNs) comprise a huge number of sensors that sense real-time data; in general, WSNs are designed for monitoring in various application mainly internet of things based (IoT) application. Moreover, these sensors possess a certain amount of energy i.e., they are battery based; thus, the network model must be efficient. Furthermore, data aggregation is a mechanism that minimizes the energy; however, in addition, these aggregated data and networks can be subject to different types of attacks due to the vulnerable characteristics of the network. Hence it is important to provide end-to-end security in the data aggregation mechanism in this we design and develop dual layer integrated (DLI)-security architecture for secure data aggregation; DLI-security architecture is an integration of two distinctive layers. The first layer of architecture deals with developing an authentication for reputation-based communication; the second layer of architecture focuses on securing the aggregated data through a consensus-based approach. The experiment outcome shows that DLI identifies the correct data packets and discards the unsecured data packets in energy efficient way with minimal computation overhead and higher throughput in comparison with the existing model.
Application and growth of long-range communications technology in vehicular communications
Siti Fatimah Abdul Razak;
Sumendra Yogarayan;
Noor Hisham Kamis;
Mohd Fikri Azli Abdullah;
Ibrahim Yusof
International Journal of Electrical and Computer Engineering (IJECE) Vol 13, No 3: June 2023
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijece.v13i3.pp3484-3497
Long range communications technology (LoRa) has been widely used in a variety of applications and researched in different domains to exploit its full potential. Its openness makes it ideal for a variety of internet of things (IoT) installations which further allows opportunities for viable solutions in vehicular communications. Hence, a bibliometric analysis was performed to distinguish the application and growth of the technology specifically in vehicular communications. The scoping review processes from Arksey and O’Malley was applied to guide the review process. The selected scholarly works adhered to the PRISMA-Sc framework where 385 articles from two main electronic databases, i.e., Scopus and Science Direct which discussed LoRa in vehicular communications contexts were assessed. This study aims to: i) examine how LoRa’s research has grown from year 2010 to 2021 among the scholars; ii) determine key areas discussed in LoRa’s vehicular communications research. Findings from 70 studies in the final analysis indicated that LoRa has been widely studied based on application, theoretical or protocol and performance. However, it has not been widely explored in vehicular context. Hence, our findings support the global research community in this context.
Design of sliding mode controller for chaotic Josephson-junction
Bassam A. Harb;
Ahmad M. Harb
International Journal of Electrical and Computer Engineering (IJECE) Vol 13, No 3: June 2023
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijece.v13i3.pp3540-3548
It is known that a shunted nonlinear resistive-capacitive-inductance Josephson-junction (RCLSJ) model has a chaotic attractor. This attractor is created as a result of Hopf bifurcation that occurs when a certain direct current (DC) applied to one of the junction terminals. This chaotic attractor prevents the system from reaching the phase-locked state and hence degrade the performance of the junction. This paper aims at controlling and taming this chaotic attractor induced in this model and pulling the system to the phase-locked state. To achieve this task, a sliding mode controller is proposed. The design procedures involve two steps. In the first one, we construct a suitable sliding surface so that the dynamic of the system follows the sliding manifolds in order to meet design specifications. Secondly, a control law is created to force the chaotic attractor to slide on the sliding surface and hence stabilizes system trajectory. The RCLSJ model under consideration is simulated with and without the designed controller. Results demonstrate the validity of the designed controller in taming the induced chaos and stabilizing the system under investigation.
An optimized discrete wavelet transform compression technique for image transferring over wireless multimedia sensor network
Mohamed Taj Bennani;
Mohamed Faysal Yaden
International Journal of Electrical and Computer Engineering (IJECE) Vol 13, No 3: June 2023
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijece.v13i3.pp2769-2777
Transferring images in a wireless multimedia sensor network (WMSN) knows a fast development in both research and fields of application. Nevertheless, this area of research faces many problems such as the low quality of the received images after their decompression, the limited number of reconstructed images at the base station, and the high-energy consumption used in the process of compression and decompression. In order to fix these problems, we proposed a compression method based on the classic discrete wavelet transform (DWT). Our method applies the wavelet compression technique multiple times on the same image. As a result, we found that the number of received images is higher than using the classic DWT. In addition, the quality of the received images is much higher compared to the standard DWT. Finally, the energy consumption is lower when we use our technique. Therefore, we can say that our proposed compression technique is more adapted to the WMSN environment.