cover
Contact Name
Tole Sutikno
Contact Email
ijece@iaesjournal.com
Phone
-
Journal Mail Official
ijece@iaesjournal.com
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
International Journal of Electrical and Computer Engineering
ISSN : 20888708     EISSN : 27222578     DOI : -
International Journal of Electrical and Computer Engineering (IJECE, ISSN: 2088-8708, a SCOPUS indexed Journal, SNIP: 1.001; SJR: 0.296; CiteScore: 0.99; SJR & CiteScore Q2 on both of the Electrical & Electronics Engineering, and Computer Science) is the official publication of the Institute of Advanced Engineering and Science (IAES). The journal is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication and computer engineering from the global world.
Articles 17 Documents
Search results for , issue "Vol 4, No 1: February 2014" : 17 Documents clear
A Novel Implementation of an Extended 8x8 Playfair Cipher Using Interweaving on DNA-encoded Data Safwat Hamad
International Journal of Electrical and Computer Engineering (IJECE) Vol 4, No 1: February 2014
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (445.011 KB)

Abstract

Recentlty, cryptography makes extensive use of different fields includingbioinformatics. The fundamental idea behind the cipher presented here is to transform any kind of binary message; such as text, sound tracks, and even images, into the form of a single-stranded DNA sequence. Subsequently, digraphs of codon triplets are encrypted using a grid of 8x8 codon matrix that is randomly constructed according to some secret key. Although the encryption/decryption rules were kept almost the same as the classical 5x5 Playfair, using the DNA encoding step makes it almost impossible for an attacker to perform a frequency analysis on that vast number of character digraphs. Furthermore, an interweaving step is added to scramble the encrypted sequence offering more randomness. When compared with other modifications of the Playfair cipher, the proposed method showed a number of advantages including the ability to cipher any type of digital media, the elimination of plain-text preprocessing step, and the applicability to be integrated into larger security systems such as DNA steganography. Furthermore, due to the very weak correlation between cipher-data and original message, the proposed method shows a strong robustness against cipher attacks.DOI:http://dx.doi.org/10.11591/ijece.v4i1.4969
Miniaturized CSRR TAG Antennas for 60GHz Applications O. Ncibi; Abdelhak Ferchichi; TP. Vuong; A. Gharsallah
International Journal of Electrical and Computer Engineering (IJECE) Vol 4, No 1: February 2014
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (606.814 KB)

Abstract

In this paper, a novel approach to design an antenna for a transponder inradio frequency identification (RFID) is proposed. This approach is based onusing a slot-ring antenna with a coplanar waveguide excitation integratedantennas in silicon technology. The RFID frequency chosen is the worldwideavailable free 60-GHz band .The structure is simulated by using ComputerSimulation Technology (CST). The antenna size is 1.5 × 1.3 mm2. Thisproposed antenna presents a gain about 3.82 dB which means a possibility toincrease the readable range.DOI:http://dx.doi.org/10.11591/ijece.v4i1.4724
Improving semantic clustering using with Ontology and rules Elham Bahrami Foroutan; Hasan Khotanlou
International Journal of Electrical and Computer Engineering (IJECE) Vol 4, No 1: February 2014
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (310.178 KB)

Abstract

Access to huge data is needed for an appropriate structure and grouping of data such that the access to the data becomes easier, the status which clustering algorithms are doing this for us. However, special attentions are paid in recent years on semantic data clustering which in semantic interpretation of the input data is needed. In this paper, three modified clustering methods are used and the results of these techniques are evaluated. Based on this, first a technique is developed in which some rules are applied to prevent confusion within clusters. A rule-based clustering can be applied to the given data. Then, next technique performs these rules with applying ontology-based semantics. And last and basic technique changes presumed ontology and then rules applied on clusters. The result shows that the clusters derived from the information provided within them were very similar and very different from other clusters and a significant reduction in the k-distance of these clusters is also occurred and the correlation is increased.DOI:http://dx.doi.org/10.11591/ijece.v4i1.4078
Economic Load Dispatch Downside with Valve - Point Result Employing a Binary Bat Formula Mallikrjuna Bestha; K. Harinath Reddy; O. Hemakeshavulu
International Journal of Electrical and Computer Engineering (IJECE) Vol 4, No 1: February 2014
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (156.626 KB)

Abstract

This paper proposes application of BAT algorithm for solving economic load dispatch problem. BAT algorithmic rule is predicated on the localization characteristics of micro bats. The proposed approach has been examined and tested with the numerical results of economic load dispatch problems with three and five generating units with valve point loading without considering prohibited operating zones and ramp rate limits. The results of the projected BAT formula are compared with that of other techniques such as lambda iteration, GA, PSO, APSO, ABC and basic principle. For each the cases, the projected algorithmic program outperforms the answer reported for the existing algorithms. Additionally, the promising results show the hardiness, quick convergence and potency of the projected technique.DOI:http://dx.doi.org/10.11591/ijece.v4i1.4233
Testing of Radio Frequency Identification and Parameter Analysis Based on DOE Lidong Wang
International Journal of Electrical and Computer Engineering (IJECE) Vol 4, No 1: February 2014
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (250.679 KB)

Abstract

The maximum read range of a Radio Frequency Identification (RFID) system depends on a number of factors. In this paper, the maximum read ranges of an RFID system with a handheld RFID reader and another RFID system with a fixed RFID reader were tested when a tag was attached to different materials. Distinguishing factors that influence the maximum read range is important. A design of experiments (DOE) method was used to understand and quantify the relative influence of three factors (the antenna number, the tagged material, and the RF interference) on the maximum read range of the RFID system with a fixed RFID reader. The influences of the three factors and their interaction effects were classified by an order of importance. The methods in this paper also apply to the study of other RFID systems and determining the relative influences of other selected factors or parameters as well as other materials.DOI:http://dx.doi.org/10.11591/ijece.v4i1.5103
A Novel Semantic Statistical Model for Automatic Image Annotation Using the Relationship between the Regions Based on Multi-Criteria Decision Making Hengame Deljooi; Ahmad Reza Eskandari
International Journal of Electrical and Computer Engineering (IJECE) Vol 4, No 1: February 2014
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (520.572 KB)

Abstract

Automatic image annotation has emerged as an important research topic due to the existence of the semantic gap and in addition to its potential application on image retrieval and management.  In this paper we present an approach which combines regional contexts and visual topics to automatic image annotation. Regional contexts model the relationship between the regions, whereas visual topics provide the global distribution of topics over an image. Conventional image annotation methods neglected the relationship between the regions in an image, while these regions are exactly explanation of the image semantics, therefore considering the relationship between them are helpful to annotate the images. The proposed model extracts regional contexts and visual topics from the image, and incorporates them by MCDM (Multi Criteria Decision Making) approach based on TOPSIS (Technique for Order Preference by Similarity to the Ideal Solution) method. Regional contexts and visual topics are learned by PLSA (Probability Latent Semantic Analysis) from the training data. The experiments on 5k Corel images show that integrating these two kinds of information is beneficial to image annotation.DOI:http://dx.doi.org/10.11591/ijece.v4i1.4598
Implementation of Gabor Filters Combined with Binary Features for Gender Recognition Milad JafariBarani; Karim Faez; Fooad Jalili
International Journal of Electrical and Computer Engineering (IJECE) Vol 4, No 1: February 2014
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (770.003 KB)

Abstract

The human face is an important biometric Includes a great deal of useful information, such as gender, age, race and identity.Gender classification is very convenient for humans,but for a computer this is a challenge. Recently, gender classification from face images is of great interest.Gender detection can be useful for human-computer interaction, Such as the designation of individuals.Several algorithms have been designed for this purpose and the proportion of each of these issues has been resolved, our proposed method is based on Gabor filters and Local Binary Patterns (LBP), which extract facial features that these characteristics are robust against interference. In order to achieve an appropriate classification, we used self-organizing neural networks, in this neural network weights are extracted for each gender with little error.The results are compared with existing data sets that this comparison will prove the superiority of the proposed method.DOI:http://dx.doi.org/10.11591/ijece.v4i1.4348
Novel Antennas for UHF RFID Tags: Design and Miniaturization Anas Sofi; Khalid Roky; Mohammed Bouhorma; Ibrahim Hadj Baraka
International Journal of Electrical and Computer Engineering (IJECE) Vol 4, No 1: February 2014
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (248.05 KB)

Abstract

This article focuses of study the nature and characteristics of the antenna, The collective electrical signals acquired from RFID antennas require advanced techniques for feeding, gains and radiation patterns. After an introduction to RFID technology itself (principle and characteristics of different RFID tags), the article offers some examples of applications of this technology in everyday life or in the industry. In order to use radio frequency identification (RFID) antenna for wireless communication and real world applications military and personal communication systems, mobile phones, personal digital assistant (PDA), blue-tooth systems, wireless local area networks (WLAN), road tolling systems, animal traceability etc, studying the nature and characteristics of the antenna is an important use. A novel printed antenna is proposed for Radio Frequency Identification. The antenna has a much wider bandwidth than known printed antenna, mostly planar antennas. The antenna geometry is much smaller than a printed dipole antenna at the same frequency band.DOI:http://dx.doi.org/10.11591/ijece.v4i1.4751
A Systematic Method for Identification of Anti-patterns in Service Oriented System Development Mohammad Ali Torkamani; Hamid Bagheri
International Journal of Electrical and Computer Engineering (IJECE) Vol 4, No 1: February 2014
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (226.312 KB)

Abstract

Service-Oriented Architecture is one of the popular software architecture's patterns used for developing lots of modern systems. However, it has been involved in many failures. Anti-patterns are solutions which have good view, but in fact they are wrong solutions that cause failure of systems. There are a lot of anti-patterns for SOA and new anti-patterns are revealed every day. Anti-patterns have their own reasons for being formed and also they are appeared in special area of the problem. As human's mind is restricted and it can process a limited number of states (piece of information) therefore identification of anti-patterns will be difficult for architects. In this paper, we propose a systematic method based on repository of anti-patterns along with a check list to identify anti-patterns of SOA. This method will assist architects to easily detect and avoid anti-patterns in development process and so escape from risks which related to anti-patterns. Furthermore, in this paper, we present a repository of forty five general anti-patterns in SOA. Reviewing these anti-patterns will help developers to work with clear understanding of patterns in phases of software development and so avoid from many potential problems. Also, our method is evaluated in action.DOI:http://dx.doi.org/10.11591/ijece.v4i1.4097
A Review on Expert System Applications in Power Plants Mayadevi N.; Vinodchandra S. S.; S. Ushakumari
International Journal of Electrical and Computer Engineering (IJECE) Vol 4, No 1: February 2014
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (299.934 KB)

Abstract

The control and monitoring of power generation plants is being complicated day by day, with the increase size and capacity of equipments involved in power generation process. This calls for the presence of experienced and well trained operators for decision making and management of various plant related activities. Scarcity of well trained and experienced plant operators is one of the major problems faced by modern power industry. Application of artificial intelligence techniques, especially expert systems whose main characteristics is to simulate expert plant operator’s actions is one of the actively researched areas in the field of plant automation. This paper presents an overview of various expert system applications in power generation plants. It points out technological advancement of expert system technology and its integration with various types of modern techniques such as fuzzy, neural network, machine vision and data acquisition systems. Expert system can significantly reduce the work load on plant operators and experts, and act as an expert for plant fault diagnosis and maintenance. Various other applications include data processing, alarm reduction, schedule optimisation, operator training and evaluation. The review point out that integration of modern techniques such as neural network, fuzzy, machine vision, data base, simulators etc. with conventional rule based methodologies have added greater dimensions to problem solving capabilities of an expert system.DOI:http://dx.doi.org/10.11591/ijece.v4i1.5025

Page 1 of 2 | Total Record : 17


Filter by Year

2014 2014


Filter By Issues
All Issue Vol 15, No 5: October 2025 Vol 15, No 4: August 2025 Vol 15, No 3: June 2025 Vol 15, No 2: April 2025 Vol 15, No 1: February 2025 Vol 14, No 6: December 2024 Vol 14, No 5: October 2024 Vol 14, No 4: August 2024 Vol 14, No 3: June 2024 Vol 14, No 2: April 2024 Vol 14, No 1: February 2024 Vol 13, No 6: December 2023 Vol 13, No 5: October 2023 Vol 13, No 4: August 2023 Vol 13, No 3: June 2023 Vol 13, No 2: April 2023 Vol 13, No 1: February 2023 Vol 12, No 6: December 2022 Vol 12, No 5: October 2022 Vol 12, No 4: August 2022 Vol 12, No 3: June 2022 Vol 12, No 2: April 2022 Vol 12, No 1: February 2022 Vol 11, No 6: December 2021 Vol 11, No 5: October 2021 Vol 11, No 4: August 2021 Vol 11, No 3: June 2021 Vol 11, No 2: April 2021 Vol 11, No 1: February 2021 Vol 10, No 6: December 2020 Vol 10, No 5: October 2020 Vol 10, No 4: August 2020 Vol 10, No 3: June 2020 Vol 10, No 2: April 2020 Vol 10, No 1: February 2020 Vol 9, No 6: December 2019 Vol 9, No 5: October 2019 Vol 9, No 4: August 2019 Vol 9, No 3: June 2019 Vol 9, No 2: April 2019 Vol 9, No 1: February 2019 Vol 8, No 6: December 2018 Vol 8, No 5: October 2018 Vol 8, No 4: August 2018 Vol 8, No 3: June 2018 Vol 8, No 2: April 2018 Vol 8, No 1: February 2018 Vol 7, No 6: December 2017 Vol 7, No 5: October 2017 Vol 7, No 4: August 2017 Vol 7, No 3: June 2017 Vol 7, No 2: April 2017 Vol 7, No 1: February 2017 Vol 6, No 6: December 2016 Vol 6, No 5: October 2016 Vol 6, No 4: August 2016 Vol 6, No 3: June 2016 Vol 6, No 2: April 2016 Vol 6, No 1: February 2016 Vol 5, No 6: December 2015 Vol 5, No 5: October 2015 Vol 5, No 4: August 2015 Vol 5, No 3: June 2015 Vol 5, No 2: April 2015 Vol 5, No 1: February 2015 Vol 4, No 6: December 2014 Vol 4, No 5: October 2014 Vol 4, No 4: August 2014 Vol 4, No 3: June 2014 Vol 4, No 2: April 2014 Vol 4, No 1: February 2014 Vol 3, No 6: December 2013 Vol 3, No 5: October 2013 Vol 3, No 4: August 2013 Vol 3, No 3: June 2013 Vol 3, No 2: April 2013 Vol 3, No 1: February 2013 Vol 2, No 6: December 2012 Vol 2, No 5: October 2012 Vol 2, No 4: August 2012 Vol 2, No 3: June 2012 Vol 2, No 2: April 2012 Vol 2, No 1: February 2012 Vol 1, No 2: December 2011 Vol 1, No 1: September 2011 More Issue