cover
Contact Name
Tole Sutikno
Contact Email
ijece@iaesjournal.com
Phone
-
Journal Mail Official
ijece@iaesjournal.com
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
International Journal of Electrical and Computer Engineering
ISSN : 20888708     EISSN : 27222578     DOI : -
International Journal of Electrical and Computer Engineering (IJECE, ISSN: 2088-8708, a SCOPUS indexed Journal, SNIP: 1.001; SJR: 0.296; CiteScore: 0.99; SJR & CiteScore Q2 on both of the Electrical & Electronics Engineering, and Computer Science) is the official publication of the Institute of Advanced Engineering and Science (IAES). The journal is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication and computer engineering from the global world.
Articles 113 Documents
Search results for , issue "Vol 13, No 3: June 2023" : 113 Documents clear
Medical image encryption techniques: a technical survey and potential challenges Ammar Odeh; Qasem Abu Al-Haija
International Journal of Electrical and Computer Engineering (IJECE) Vol 13, No 3: June 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v13i3.pp3170-3177

Abstract

Among the most sensitive and important data in telemedicine systems are medical images. It is necessary to use a robust encryption method that is resistant to cryptographic assaults while transferring medical images over the internet. Confidentiality is the most crucial of the three security goals for protecting information systems, along with availability, integrity, and compliance. Encryption and watermarking of medical images address problems with confidentiality and integrity in telemedicine applications. The need to prioritize security issues in telemedicine applications makes the choice of a trustworthy and efficient strategy or framework all the more crucial. The paper examines various security issues and cutting-edge methods to secure medical images for use with telemedicine systems.
Priority based energy efficient hybrid cluster routing protocol for underwater wireless sensor network Tejaswini R Murgod; S. Meenakshi Sundaram; Sowmya Manchaiah; Santhosh Kumar
International Journal of Electrical and Computer Engineering (IJECE) Vol 13, No 3: June 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v13i3.pp3161-3169

Abstract

A little change in the environment that goes unnoticed in an underwater communication network might lead to calamity. A little alteration in the environment must also be adequately analyzed in order to deal with a potential crisis. A priority-based routing protocol is required to ensure that the vital data perceived by the sensor about the environment changes. The priority-based routing system guarantees that vital data packets are delivered at a quicker pace to the destination or base station for further processing. In this work, we present a priority-based routing protocol based on the energy efficient hybrid cluster routing protocol (EEHRCP) algorithm. The suggested approach keeps two distinct queues for lower and higher priority data packets. In order to ensure that these packets get at their destination without any information loss and at a quicker rate, all of the crucial sensed data is passed through a higher priority queue. Test findings show that the suggested technique increases throughput, delivery percentage, and reduces latency for the crucial data packets.
Automatic food bio-hazard detection system Robinson Jimenez Moreno; Javier Eduardo Martinez Baquero
International Journal of Electrical and Computer Engineering (IJECE) Vol 13, No 3: June 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v13i3.pp2652-2659

Abstract

This paper presents the design of a convolutional neural network architecture oriented to the detection of food waste, to generate a low, medium, or critical-level alarm. An architecture based on four convolution layers is used, for which a database of 100 samples is prepared. The database is used with the different hyperparameters that make up the final architecture, after the training process. By means of confusion matrix analysis, a 100% performance of the network is obtained, which delivers its output to a fuzzy system that, depending on the duration of the detection time, generates the different alarm levels associated with the risk.
An analysis between different algorithms for the graph vertex coloring problem Velin Kralev; Radoslava Kraleva
International Journal of Electrical and Computer Engineering (IJECE) Vol 13, No 3: June 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v13i3.pp2972-2980

Abstract

This research focuses on an analysis of different algorithms for the graph vertex coloring problem. Some approaches to solving the problem are discussed. Moreover, some studies for the problem and several methods for its solution are analyzed as well. An exact algorithm (using the backtracking method) is presented. The complexity analysis of the algorithm is discussed. Determining the average execution time of the exact algorithm is consistent with the multitasking mode of the operating system. This algorithm generates optimal solutions for all studied graphs. In addition, two heuristic algorithms for solving the graph vertex coloring problem are used as well. The results show that the exact algorithm can be used to solve the graph vertex coloring problem for small graphs with 30-35 vertices. For half of the graphs, all three algorithms have found the optimal solutions. The suboptimal solutions generated by the approximate algorithms are identical in terms of the number of colors needed to color the corresponding graphs. The results show that the linear increase in the number of vertices and edges of the analyzed graphs causes a linear increase in the number of colors needed to color these graphs.
Flagging clickbait in Indonesian online news websites using fine-tuned transformers Muhammad Noor Fakhruzzaman; Sa'idah Zahrotul Jannah; Ratih Ardiati Ningrum; Indah Fahmiyah
International Journal of Electrical and Computer Engineering (IJECE) Vol 13, No 3: June 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v13i3.pp2921-2930

Abstract

Click counts are related to the amount of money that online advertisers paid to news sites. Such business models forced some news sites to employ a dirty trick of click-baiting, i.e., using hyperbolic and interesting words, sometimes unfinished sentences in a headline to purposefully tease the readers. Some Indonesian online news sites also joined the party of clickbait, which indirectly degrade other established news sites' credibility. A neural network with a pre-trained language model multilingual bidirectional encoder representations from transformers (BERT) that acted as an embedding layer is then combined with a 100 node-hidden layer and topped with a sigmoid classifier was trained to detect clickbait headlines. With a total of 6,632 headlines as a training dataset, the classifier performed remarkably well. Evaluated with 5-fold cross-validation, it has an accuracy score of 0.914, an F1-score of 0.914, a precision score of 0.916, and a receiver operating characteristic-area under curve (ROC-AUC) of 0.92. The usage of multilingual BERT in the Indonesian text classification task was tested and is possible to be enhanced further. Future possibilities, societal impact, and limitations of clickbait detection are discussed.
Cloud service analysis using round-robin algorithm for quality-of-service aware task placement for internet of things services Nor Syazwani Mohd Pakhrudin; Murizah Kassim; Azlina Idris
International Journal of Electrical and Computer Engineering (IJECE) Vol 13, No 3: June 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v13i3.pp3464-3473

Abstract

Round-robin (RR) is a process approach to sharing resources that requires each user to get a turn using them in an agreed order in cloud computing. It is suited for time-sharing systems since it automatically reduces the problem of priority inversion, which are low-priority tasks delayed. The time quantum is limited, and only a one-time quantum process is allowed in round-robin scheduling. The objective of this research is to improve the functionality of the current RR method for scheduling actions in the cloud by lowering the average waiting, turnaround, and response time. CloudAnalyst tool was used to enhance the RR technique by changing the parameter value in optimizing the high accuracy and low cost. The result presents the achieved overall min and max response times are 36.69 and 650.30 ms for running 300 min RR. The cost for the virtual machines (VMs) is identified from $0.5 to $3. The longer the time used, the higher the cost of the data transfer. This research is significant in improving communication and the quality of relationships within groups.
Secure authentication and data aggregation scheme for routing packets in wireless sensor network Rudramurthy Veeregowdanadoddi Chandraiah; Aparna Ramalingappa
International Journal of Electrical and Computer Engineering (IJECE) Vol 13, No 3: June 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v13i3.pp3217-3226

Abstract

Wireless sensor networks (WSNs) comprise a huge number of sensors that sense real-time data; in general, WSNs are designed for monitoring in various application mainly internet of things based (IoT) application. Moreover, these sensors possess a certain amount of energy i.e., they are battery based; thus, the network model must be efficient. Furthermore, data aggregation is a mechanism that minimizes the energy; however, in addition, these aggregated data and networks can be subject to different types of attacks due to the vulnerable characteristics of the network. Hence it is important to provide end-to-end security in the data aggregation mechanism in this we design and develop dual layer integrated (DLI)-security architecture for secure data aggregation; DLI-security architecture is an integration of two distinctive layers. The first layer of architecture deals with developing an authentication for reputation-based communication; the second layer of architecture focuses on securing the aggregated data through a consensus-based approach. The experiment outcome shows that DLI identifies the correct data packets and discards the unsecured data packets in energy efficient way with minimal computation overhead and higher throughput in comparison with the existing model.
Application and growth of long-range communications technology in vehicular communications Siti Fatimah Abdul Razak; Sumendra Yogarayan; Noor Hisham Kamis; Mohd Fikri Azli Abdullah; Ibrahim Yusof
International Journal of Electrical and Computer Engineering (IJECE) Vol 13, No 3: June 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v13i3.pp3484-3497

Abstract

Long range communications technology (LoRa) has been widely used in a variety of applications and researched in different domains to exploit its full potential. Its openness makes it ideal for a variety of internet of things (IoT) installations which further allows opportunities for viable solutions in vehicular communications. Hence, a bibliometric analysis was performed to distinguish the application and growth of the technology specifically in vehicular communications. The scoping review processes from Arksey and O’Malley was applied to guide the review process. The selected scholarly works adhered to the PRISMA-Sc framework where 385 articles from two main electronic databases, i.e., Scopus and Science Direct which discussed LoRa in vehicular communications contexts were assessed. This study aims to: i) examine how LoRa’s research has grown from year 2010 to 2021 among the scholars; ii) determine key areas discussed in LoRa’s vehicular communications research. Findings from 70 studies in the final analysis indicated that LoRa has been widely studied based on application, theoretical or protocol and performance. However, it has not been widely explored in vehicular context. Hence, our findings support the global research community in this context.
Design of sliding mode controller for chaotic Josephson-junction Bassam A. Harb; Ahmad M. Harb
International Journal of Electrical and Computer Engineering (IJECE) Vol 13, No 3: June 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v13i3.pp3540-3548

Abstract

It is known that a shunted nonlinear resistive-capacitive-inductance Josephson-junction (RCLSJ) model has a chaotic attractor. This attractor is created as a result of Hopf bifurcation that occurs when a certain direct current (DC) applied to one of the junction terminals. This chaotic attractor prevents the system from reaching the phase-locked state and hence degrade the performance of the junction. This paper aims at controlling and taming this chaotic attractor induced in this model and pulling the system to the phase-locked state. To achieve this task, a sliding mode controller is proposed. The design procedures involve two steps. In the first one, we construct a suitable sliding surface so that the dynamic of the system follows the sliding manifolds in order to meet design specifications. Secondly, a control law is created to force the chaotic attractor to slide on the sliding surface and hence stabilizes system trajectory. The RCLSJ model under consideration is simulated with and without the designed controller. Results demonstrate the validity of the designed controller in taming the induced chaos and stabilizing the system under investigation.
An optimized discrete wavelet transform compression technique for image transferring over wireless multimedia sensor network Mohamed Taj Bennani; Mohamed Faysal Yaden
International Journal of Electrical and Computer Engineering (IJECE) Vol 13, No 3: June 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v13i3.pp2769-2777

Abstract

Transferring images in a wireless multimedia sensor network (WMSN) knows a fast development in both research and fields of application. Nevertheless, this area of research faces many problems such as the low quality of the received images after their decompression, the limited number of reconstructed images at the base station, and the high-energy consumption used in the process of compression and decompression. In order to fix these problems, we proposed a compression method based on the classic discrete wavelet transform (DWT). Our method applies the wavelet compression technique multiple times on the same image. As a result, we found that the number of received images is higher than using the classic DWT. In addition, the quality of the received images is much higher compared to the standard DWT. Finally, the energy consumption is lower when we use our technique. Therefore, we can say that our proposed compression technique is more adapted to the WMSN environment.

Page 10 of 12 | Total Record : 113


Filter by Year

2023 2023


Filter By Issues
All Issue Vol 16, No 1: February 2026 Vol 15, No 6: December 2025 Vol 15, No 5: October 2025 Vol 15, No 4: August 2025 Vol 15, No 3: June 2025 Vol 15, No 2: April 2025 Vol 15, No 1: February 2025 Vol 14, No 6: December 2024 Vol 14, No 5: October 2024 Vol 14, No 4: August 2024 Vol 14, No 3: June 2024 Vol 14, No 2: April 2024 Vol 14, No 1: February 2024 Vol 13, No 6: December 2023 Vol 13, No 5: October 2023 Vol 13, No 4: August 2023 Vol 13, No 3: June 2023 Vol 13, No 2: April 2023 Vol 13, No 1: February 2023 Vol 12, No 6: December 2022 Vol 12, No 5: October 2022 Vol 12, No 4: August 2022 Vol 12, No 3: June 2022 Vol 12, No 2: April 2022 Vol 12, No 1: February 2022 Vol 11, No 6: December 2021 Vol 11, No 5: October 2021 Vol 11, No 4: August 2021 Vol 11, No 3: June 2021 Vol 11, No 2: April 2021 Vol 11, No 1: February 2021 Vol 10, No 6: December 2020 Vol 10, No 5: October 2020 Vol 10, No 4: August 2020 Vol 10, No 3: June 2020 Vol 10, No 2: April 2020 Vol 10, No 1: February 2020 Vol 9, No 6: December 2019 Vol 9, No 5: October 2019 Vol 9, No 4: August 2019 Vol 9, No 3: June 2019 Vol 9, No 2: April 2019 Vol 9, No 1: February 2019 Vol 8, No 6: December 2018 Vol 8, No 5: October 2018 Vol 8, No 4: August 2018 Vol 8, No 3: June 2018 Vol 8, No 2: April 2018 Vol 8, No 1: February 2018 Vol 7, No 6: December 2017 Vol 7, No 5: October 2017 Vol 7, No 4: August 2017 Vol 7, No 3: June 2017 Vol 7, No 2: April 2017 Vol 7, No 1: February 2017 Vol 6, No 6: December 2016 Vol 6, No 5: October 2016 Vol 6, No 4: August 2016 Vol 6, No 3: June 2016 Vol 6, No 2: April 2016 Vol 6, No 1: February 2016 Vol 5, No 6: December 2015 Vol 5, No 5: October 2015 Vol 5, No 4: August 2015 Vol 5, No 3: June 2015 Vol 5, No 2: April 2015 Vol 5, No 1: February 2015 Vol 4, No 6: December 2014 Vol 4, No 5: October 2014 Vol 4, No 4: August 2014 Vol 4, No 3: June 2014 Vol 4, No 2: April 2014 Vol 4, No 1: February 2014 Vol 3, No 6: December 2013 Vol 3, No 5: October 2013 Vol 3, No 4: August 2013 Vol 3, No 3: June 2013 Vol 3, No 2: April 2013 Vol 3, No 1: February 2013 Vol 2, No 6: December 2012 Vol 2, No 5: October 2012 Vol 2, No 4: August 2012 Vol 2, No 3: June 2012 Vol 2, No 2: April 2012 Vol 2, No 1: February 2012 Vol 1, No 2: December 2011 Vol 1, No 1: September 2011 More Issue