cover
Contact Name
Tole Sutikno
Contact Email
ijece@iaesjournal.com
Phone
-
Journal Mail Official
ijece@iaesjournal.com
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
International Journal of Electrical and Computer Engineering
ISSN : 20888708     EISSN : 27222578     DOI : -
International Journal of Electrical and Computer Engineering (IJECE, ISSN: 2088-8708, a SCOPUS indexed Journal, SNIP: 1.001; SJR: 0.296; CiteScore: 0.99; SJR & CiteScore Q2 on both of the Electrical & Electronics Engineering, and Computer Science) is the official publication of the Institute of Advanced Engineering and Science (IAES). The journal is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication and computer engineering from the global world.
Articles 41 Documents
Search results for , issue "Vol 5, No 6: December 2015" : 41 Documents clear
De-Identified Personal Health Care System Using Hadoop Dasari Madhavi; B.V. Ramana
International Journal of Electrical and Computer Engineering (IJECE) Vol 5, No 6: December 2015
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (907.418 KB) | DOI: 10.11591/ijece.v5i6.pp1492-1499

Abstract

Hadoop technology plays a vital role in improving the quality of healthcare by delivering right information to right people at right time and reduces its cost and time. Most properly health care functions like admission, discharge, and transfer patient data maintained in Computer based Patient Records (CPR), Personal Health Information (PHI), and Electronic Health Records (EHR). The use of medical Big Data is increasingly popular in health care services and clinical research. The biggest challenges in health care centers are the huge amount of data flows into the systems daily. Crunching this Big Data and de-identifying it in a traditional data mining tools had problems. Therefore to provide solution to the de-identifying personal health information, Map Reduce application uses jar files which contain a combination of MR code and PIG queries. This application also uses advanced mechanism of using UDF (User Data File) which is used to protect the health care dataset. De-identified personal health care system is using Map Reduce, Pig Queries which are needed to be executed on the health care dataset. The application input dataset that contains the information of patients and de-identifies their personal health care.  De-identification using Hadoop is also suitable for social and demographic data.
The Transient Stability Study of a Synchronous Generator Based on the Rotor Angle Stability Selwa Fetissi; Djamel Labed; Imen Labed
International Journal of Electrical and Computer Engineering (IJECE) Vol 5, No 6: December 2015
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (178.282 KB) | DOI: 10.11591/ijece.v5i6.pp1319-1327

Abstract

Transient stability is an important aspect in the operation of electrical power system. In case of fault occurs in the system, the determining of fault clearing time of circuit breaker is considered one of the main factors to ensure power transfer of the system. This paper is aim to study the transient stability of single machine infinite bus system (SMIB), based on the rotor angle stability. The study is performed to determine the influence of the critical clearing time of the circuit breakers on the rotor angle stability of the generator in the case of three phase fault. For obtaining and determining numerically the nature of the rotor angle of machine, we applied the Step-by-step method for different values of fault clearing time. The results of simulation indicate that determine of critical clearing time is a major evaluation in stability studies. The system model is created in MATLAB/ SIMULINK software.
Password Authentication for multicast host using zero knowledge Proof Seetha Ranganathan; R. Saravanan
International Journal of Electrical and Computer Engineering (IJECE) Vol 5, No 6: December 2015
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (123.699 KB) | DOI: 10.11591/ijece.v5i6.pp1468-1471

Abstract

The password which is a more secure and valuable data should be highly protected from eavesdropper. This paper presents how password required for authentication of members of group communication is securely delivered by the source or initiator of the group. The password delivery uses zero knowledge proof and sent to the group member in an encrypted format using cipher block mode encryption. The password delivered is a One Time Password which can be used for certain amount of time in order to ensure a highly secure communication environment among the group.
A Novel Method for Vector Control of Faulty Three-Phase IM Drives Based on FOC Method Mohammad Jannati; Nik Rumzi Nik Idris; Mohd Junaidi Abdul Aziz; Tole Sutikno
International Journal of Electrical and Computer Engineering (IJECE) Vol 5, No 6: December 2015
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1946.523 KB) | DOI: 10.11591/ijece.v5i6.pp1284-1291

Abstract

This paper proposes a novel method for vector control of faulty three-phase Induction Motor (IM) drives based on Field-Oriented Control (FOC) method. The performance characteristics of the presented drive system are investigated at healthy and open-phase fault conditions. The simulation of the case study is carried out by using the Matlab/M-File software for a star-connected three-phase IM. The results show the better performance of the proposed drive system especially in reduction of motor speed and torque oscillations during open-phase fault operating.
Test Case Reduction Using Ant Colony Optimization for Object Oriented Program Sudhir Kumar Mohapatra; Srinivas Prasad
International Journal of Electrical and Computer Engineering (IJECE) Vol 5, No 6: December 2015
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (282.982 KB) | DOI: 10.11591/ijece.v5i6.pp1424-1432

Abstract

Software testing is one in all the vital stages of system development. In software development, developers continually depend upon testing to reveal bugs. Within the maintenance stage test suite size grow due to integration of new functionalities. Addition of latest technique force to make new test case which increase the cost of test suite. In regression testing new test case could also be added to the test suite throughout the entire testing process. These additions of test cases produce risk of presence of redundant test cases. Because of limitation of time and resource, reduction techniques should be accustomed determine and take away. Analysis shows that a set of the test case in a suit should satisfy all the test objectives that is named as representative set. Redundant test case increase the execution price of the test suite, in spite of NP-completeness of the problem there are few sensible reduction techniques are available. During this paper the previous GA primarily based technique proposed is improved to search out cost optimum representative set using ant colony optimization.
Novel Approach for Control Data Theft Attack in Cloud Computing K. Narasimha Sastry; B. Thirumala Rao; T Gunasekhar
International Journal of Electrical and Computer Engineering (IJECE) Vol 5, No 6: December 2015
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (500.057 KB) | DOI: 10.11591/ijece.v5i6.pp1545-1552

Abstract

Information security is a major problem faced by cloud computing around the world. Because of their adverse effects on organizational information systems, viruses, hackers, and attackers insiders can jeopardize organizations capabilities to pursue their undertaken effectively. Although technology based solutions help to mitigate some of the many problems of information security, even the preeminent technology can’t work successfully unless effective human computer communication occurs.IT experts, users and administrators all play crucial role to determine the behavior that occurs as people interact with information technology will support the maintenance of effective security or threaten it. In the present paper we try to apply behavioral science concepts and techniques to understanding problems of information security in organizations.
Numerical and Experimental Investigation of Bridge Currents of an Induction Machine Equipped with Bridge Configured Winding Sivaramakrishnan Natesan; Karuna Kalita; Venkatesu Samala
International Journal of Electrical and Computer Engineering (IJECE) Vol 5, No 6: December 2015
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1191.77 KB) | DOI: 10.11591/ijece.v5i6.pp1262-1274

Abstract

An eccentric rotor motion imbalances the magnetic field distribution in the air-gap region. Due to this uneven flux density distribution, a net radial force called Unbalanced Magnetic Pull (UMP) is in action towards the shortest air-gap. This UMP can degrade the machine’s performance. UMP can be controlled by a special kind of winding called Bridge Configured Winding (BCW). The BCW winding is a single set of winding which is used to produce the torque as well as the controllable force. The main contribution of this paper is to inspect the flow of bridge currents in the bridges when the machine is having rotor eccentricity or unbalance. The bridge currents in the presence of rotor eccentricity with the stator of an In­duction machine model has been analyzed by using an Electromagnetic Finite Element (FE) solver called Opera 2D/RM solver (Rotation Motion Analysis). The bridge currents have been measured for two different cases., (i) Induction machine model with zero eccentricity, (ii) Induction machine model with 10% static eccentricity of the air gap. Experimental re­sults are presented for the validation of Opera 2D/RM results. A modified 37kW Induction machine has been used for this study. A known mass unbalance is introduced in the perfo­rated disc in order to create the unbalance in the system purposefully. The bridge currents have been measured and compared with and without unbalance present in the system. The comparison of measured bridge currents for all the cases are given in the frequency domain.
Optimized PID Controller with Bacterial Foraging Algorithm Seiyed Mohammad Mirzaei; Mohammad Hossein Moattar
International Journal of Electrical and Computer Engineering (IJECE) Vol 5, No 6: December 2015
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (537.725 KB) | DOI: 10.11591/ijece.v5i6.pp1372-1380

Abstract

Fish robot precision depends on a variety of factors including the precision of motion sensors, mobility of links, elasticity of fish robot actuators system, and the precision of controllers. Among these factors, precision and efficiency of controllers play a key role in fish robot precision.  In the present paper, a robot fish has been designed with dynamics and swimming mechanism of a real fish. According to equations of motion, this fish robot is designed with 3 hinged links. Subsequently, its control system was defined based on the same equations. In this paper, an approach is suggested to control fish robot trajectory using optimized PID controller through Bacterial Foraging algorithm, so as to adjust the gains. Then, this controller is compared to the powerful Fuzzy controller and optimized PID controller through PSO algorithm when applying step and sine inputs. The research findings revealed that optimized PID controller through Bacterial Foraging Algorithm had better performance than other approaches in terms of decreasing of the settling time, reduction of the maximum overshoot and desired steady state error in response to step input. Efficiency of the suggested method has been analyzed by MATLAB software.
Sociopsychotechnological Predictors of Individual’s Social Loafing in Virtual Team Juneman Abraham; Melina Trimutiasari
International Journal of Electrical and Computer Engineering (IJECE) Vol 5, No 6: December 2015
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (198.656 KB) | DOI: 10.11591/ijece.v5i6.pp1500-1510

Abstract

The rapid development of technology and the demands of the workers to be productive have made efficiency and effectiveness of virtual team collaboration is becoming increasingly urgent lately. Therefore, it is important to identify the variables undermining the efficiency and effectiveness. This study aimed to investigate the role of perceived usefulness, perceived ease of use, and perceived playfulness of online collaboration tool (as elements of technology acceptance) and xenophobia in predicting social loafing (at the individual level)─a social psychological phenomenon that shows the declining performance of the individual when working in the group. The contribution of this research is its attempt to combine social psychological and technological factors in explaining human performance in the context of the group when interacting with technology. The research design was correlational predictive, with multiple linear regression data analysis technique. Participants of this study were 80 students and employees (43 males, 37 females; mean of age = 25.58 years of old, standard deviation of age = 4.92 years) who work using online collaboration tool in a virtual team. The results showed that the perceived playfulness, perceived ease of use, and xenophobia were able to predict an individual’s social loafing, but the perceived usefulness is not able to predict it. Implications of the results of research in order to prevent social loafing are stated in the Discussion section.
Evaluation of PV, Wind, Diesel Hybrid Energy Potential for GSM Tower in Myanmar Zin Mar Nyo
International Journal of Electrical and Computer Engineering (IJECE) Vol 5, No 6: December 2015
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (158.053 KB) | DOI: 10.11591/ijece.v5i6.pp1245-1251

Abstract

Not only GSM, WCDMA but also CDMA technology can be used in Myanmar but GSM pre-dominates in the market. There are over million unique subscribers across the country in 2013. Power supply for telecom becomes main challenges in Myanmar where the electricity can not access in rural area. To minimize deficit of power, the government has set a target to covert some of tower sites to renewable solutions by 2015. This paper proposes the use of a PV, wind and diesel generator hybrid system with storage element in order to determine the optimal configuration of renewable energy in Myanmar.  This paper discusses the development of a renewable energy sources (RES)  that  can  be  used  for  electric  power  supply  of  GSM  base  station  site  at  any  given  time and  considers  the  feasibility  of  developing  Solar  (photovoltaic)-Wind-Diesel  hybrid power  systems  for  supplying  electricity  to  off-grid  rural telecommunication.  The Hybrid Optimization Model for Electric Renewables (HOMER) was used  to  simulate  and  generate  feasible  solution  through  combinations of photovoltaic, Wind Turbines and Diesel  Generator with  a  minimum  levelised  cost  of  electricity supply and to  determine  the  technical feasibility of the system.

Filter by Year

2015 2015


Filter By Issues
All Issue Vol 16, No 1: February 2026 Vol 15, No 6: December 2025 Vol 15, No 5: October 2025 Vol 15, No 4: August 2025 Vol 15, No 3: June 2025 Vol 15, No 2: April 2025 Vol 15, No 1: February 2025 Vol 14, No 6: December 2024 Vol 14, No 5: October 2024 Vol 14, No 4: August 2024 Vol 14, No 3: June 2024 Vol 14, No 2: April 2024 Vol 14, No 1: February 2024 Vol 13, No 6: December 2023 Vol 13, No 5: October 2023 Vol 13, No 4: August 2023 Vol 13, No 3: June 2023 Vol 13, No 2: April 2023 Vol 13, No 1: February 2023 Vol 12, No 6: December 2022 Vol 12, No 5: October 2022 Vol 12, No 4: August 2022 Vol 12, No 3: June 2022 Vol 12, No 2: April 2022 Vol 12, No 1: February 2022 Vol 11, No 6: December 2021 Vol 11, No 5: October 2021 Vol 11, No 4: August 2021 Vol 11, No 3: June 2021 Vol 11, No 2: April 2021 Vol 11, No 1: February 2021 Vol 10, No 6: December 2020 Vol 10, No 5: October 2020 Vol 10, No 4: August 2020 Vol 10, No 3: June 2020 Vol 10, No 2: April 2020 Vol 10, No 1: February 2020 Vol 9, No 6: December 2019 Vol 9, No 5: October 2019 Vol 9, No 4: August 2019 Vol 9, No 3: June 2019 Vol 9, No 2: April 2019 Vol 9, No 1: February 2019 Vol 8, No 6: December 2018 Vol 8, No 5: October 2018 Vol 8, No 4: August 2018 Vol 8, No 3: June 2018 Vol 8, No 2: April 2018 Vol 8, No 1: February 2018 Vol 7, No 6: December 2017 Vol 7, No 5: October 2017 Vol 7, No 4: August 2017 Vol 7, No 3: June 2017 Vol 7, No 2: April 2017 Vol 7, No 1: February 2017 Vol 6, No 6: December 2016 Vol 6, No 5: October 2016 Vol 6, No 4: August 2016 Vol 6, No 3: June 2016 Vol 6, No 2: April 2016 Vol 6, No 1: February 2016 Vol 5, No 6: December 2015 Vol 5, No 5: October 2015 Vol 5, No 4: August 2015 Vol 5, No 3: June 2015 Vol 5, No 2: April 2015 Vol 5, No 1: February 2015 Vol 4, No 6: December 2014 Vol 4, No 5: October 2014 Vol 4, No 4: August 2014 Vol 4, No 3: June 2014 Vol 4, No 2: April 2014 Vol 4, No 1: February 2014 Vol 3, No 6: December 2013 Vol 3, No 5: October 2013 Vol 3, No 4: August 2013 Vol 3, No 3: June 2013 Vol 3, No 2: April 2013 Vol 3, No 1: February 2013 Vol 2, No 6: December 2012 Vol 2, No 5: October 2012 Vol 2, No 4: August 2012 Vol 2, No 3: June 2012 Vol 2, No 2: April 2012 Vol 2, No 1: February 2012 Vol 1, No 2: December 2011 Vol 1, No 1: September 2011 More Issue