cover
Contact Name
Tole Sutikno
Contact Email
ijece@iaesjournal.com
Phone
-
Journal Mail Official
ijece@iaesjournal.com
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
International Journal of Electrical and Computer Engineering
ISSN : 20888708     EISSN : 27222578     DOI : -
International Journal of Electrical and Computer Engineering (IJECE, ISSN: 2088-8708, a SCOPUS indexed Journal, SNIP: 1.001; SJR: 0.296; CiteScore: 0.99; SJR & CiteScore Q2 on both of the Electrical & Electronics Engineering, and Computer Science) is the official publication of the Institute of Advanced Engineering and Science (IAES). The journal is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication and computer engineering from the global world.
Articles 50 Documents
Search results for , issue "Vol 6, No 1: February 2016" : 50 Documents clear
3LRM-3 Layer Risk Mitigation Modelling of ICT Software Development Projects Salma Firdose; L. Manjunath Rao
International Journal of Electrical and Computer Engineering (IJECE) Vol 6, No 1: February 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (407.951 KB) | DOI: 10.11591/ijece.v6i1.pp349-356

Abstract

With the adoption of new technology and quality standards, the software development firms are still encountering the critical issues of risk modelling. With the changing dynamics of customer needs, potential competition has being mushrooming in the global IT markets to relay a new standard of software engineering which has higher capability of sustaining risk.  However, till date, it is still theoretical to large extent from research viewpoint. Hence, this paper presents a mathematical model called as 3LRM that is designed with the simple approach keeping in mind the real-time issues of risk factors in software engineering for ICT software development project. The study has also identified requirement volatility as one of the prominent source of risk and hence, the framework intends to identify a risk as well as mitigating the risk to a large extent. The paper is illustrated with some of the simple statistical approaches of random probability.
Projected Range Dependent Tunneling Current of Asymmetric Double Gate MOSFET Hak Kee Jung
International Journal of Electrical and Computer Engineering (IJECE) Vol 6, No 1: February 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (139.227 KB) | DOI: 10.11591/ijece.v6i1.pp113-119

Abstract

This study is to analyze the changes of tunneling current according to projected range, a variable of Gaussian function of channel doping function of Asymmetric Double Gate; ADG MOSFET. In MOSFET with channel length below 10 nm, tunneling current occupies a large percentage among off-currents. The increase of tunneling current has a large effect on the characteristics of subthreshold such as threshold voltage movement and the decline of subthreshold swing value, so the accurate analysis of this is being required. To analyze this, potential distribution of series form was obtained using Gaussian distribution function, and using this hermeneutic potential distribution, thermionic emission current and tunneling current making up off-current were obtained. At this point, the effect that the changes of projected range, a variable of Gaussian distribution function, have on the ratio of tunneling current among off-currents was analyzed. As a result, the smaller projected range was, the lower the ratio of tunneling current was. When projected range increased, tunneling current increased largely. Also, it was observed that the value of projected range which the ratio of tunneling current increased changed according to maximum channel doping value, channel length, and channel width.
The Selection of Useful Visual Words for Class-Imbalanced Data in Image Classification Sutasinee Chimlek; Part Pramokchon; Punpiti Piamsa-nga
International Journal of Electrical and Computer Engineering (IJECE) Vol 6, No 1: February 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1433.551 KB) | DOI: 10.11591/ijece.v6i1.pp307-319

Abstract

The bag of visual words (BOVW) has recently been used for image classification in large datasets. A major problem of image classification using BOVW is high dimensionality, with most features usually being irrelevant and different BOVW for multi-view images in each class. Therefore, the selection of significant visual words for multi-view images in each class is an essential method to reduce the size of BOVW while retaining the high performance of image classification. Many feature scores for ranking produce low classification performance for class imbalanced distributions and multi-views in each class. We propose a feature score based on the statistical t-test technique, which is a statistical evaluation of the difference between two sample means, to assess the discriminating power of each individual feature. The multi-class image classification performance of the proposed feature score is compared with four modern feature scores, such as Document Frequency (DF), Mutual information (MI), Pointwise Mutual information (PMI) and Chi-square statistics (CHI). The results show that the average F1-measure performance on the Paris dataset and the SUN397 dataset using the proposed feature score are 92% and 94%, respectively, while all other feature scores do not exceed 80%.
Threshold Computation to Discover Cluster Structure: A New Approach Preeti Mulay
International Journal of Electrical and Computer Engineering (IJECE) Vol 6, No 1: February 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (250.405 KB) | DOI: 10.11591/ijece.v6i1.pp275-282

Abstract

Cluster members are decided based on how close they are with each other. Compactness of cluster plays an important role in forming better quality clusters. ICNBCF incremental clustering algorithm computes closeness factor between every two data series. To decide members of cluster, it is necessary to know one more decisive factor to compare, threshold. Internal evaluation measure of cluster like variance and dunn index provide required decisive factor. in intial phase of ICNBCF, this decisive factor was given manually by investigative formed closeness factors. With values generated by internal evaluation measure formule, this process can be automated. This paper shows the detailed study of various evaluation measuress to work with new incremental clustreing algorithm ICNBCF.
Defect Detection in Ceramic Images Using Sigma Edge Information and Contour Tracking Method Kwang-Baek Kim; Young Woon Woo
International Journal of Electrical and Computer Engineering (IJECE) Vol 6, No 1: February 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1366.601 KB) | DOI: 10.11591/ijece.v6i1.pp160-166

Abstract

In this paper, we suggest a method of detecting defects by applying Hough transform and least squares on ceramic images obtained from non-destructive testing. In the ceramic images obtained from non-destructive testing, the background area, where the defect does not exist, commonly shows gradual change of luminosity in vertical direction. In order to extract the background area which is going to be used in the detection of defects, Hough transform is performed to rotate the ceramic image in a way that the direction of overall luminosity change lies in the vertical direction as much as possible. Least squares is then applied on the rotated image to approximate the contrast value of the background area. The extracted background area is used for extracting defects from the ceramic images. In this paper we applied this method on ceramic images acquired from non-destructive testing. It was confirmed that extracted background area could be effectively applied for searching the section where the defect exists and detecting the defect.
Three Dimensional Space Vector Modulation Theory: Practices without Proofs Bhaskar Bhattacharya; Ajoy Kumar Chakraborty
International Journal of Electrical and Computer Engineering (IJECE) Vol 6, No 1: February 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (223.627 KB) | DOI: 10.11591/ijece.v6i1.pp21-25

Abstract

In three dimensional (3D) space vector modulation (SVM) theory with α-β-γ frame there are some issues which are well known and are widely practiced being quite obvious but without any proof so far. In this paper necessary scientific foundations to those issues have been provided. The foremost of these issues has been with the frame of reference to be considered in 3D SVM applications for unbalanced three phase systems. Although for balanced three phase systems there has been no controversy with α-β frame as the frame of reference but in 3D it has not yet been established which one, α-β-γ frame or the a-b-c frame, is mathematically correct. Another significant issue addressed in this work has been to ascertain the exact reason when a three phase system has to be represented in 2D or 3D space to apply SVM. It has been presented for the first time in this work that the key factor that determines whether 3D or 2D SVM has to be applied depends on the presence of time independent symmetrical components in a three phase ac system. Also it has been proved that the third axis, the Y–axis, represents the time independent quantity and that it must be directed perpendicular to the α-β plane passing through the origin.
Augmented Reality Navigation System on Android Chee Oh Chung; Yilun He; Hoe Kyung Jung
International Journal of Electrical and Computer Engineering (IJECE) Vol 6, No 1: February 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (194.017 KB) | DOI: 10.11591/ijece.v6i1.pp406-412

Abstract

With the advent of the Android system, smart phones are rapidly developing and through the conveniency of accessing internet on the smart phones, a user’s location information can be accessed anywhere and anytime easily. Augmented Reality Based Technology enables the provision of variety information such as pictures and location of buildings in the navigation field. Most of the augmented reality program used to Visual Trace Method (Marker method and Markerless Method). For the Visual Trace Method, the marker installation and digital information should be assigned while the Non-visual Trace Method requires the use of hardware (G.P.S, sensors etc). Most navigation systems can only show the path from a user’s current location to their destination. In this paper, the design and implementation of an augmented reality program is discussed. It will use the smart phone’s inbuilt camera and GPS to display a user’s surround information in real time on the smart phone. The proposed system will combine the G.P.S location-based technology and virtual trace technology to provide the user with basic information about a building they are looking for or one in their immediate surrounding.
QoS Design Consideration for Enterprise and Provider’s Network at Ingress and Egress Router for VoIP protocols Manjur Kolhar; Mosleh M Abualhaj; Faiza Rizwan
International Journal of Electrical and Computer Engineering (IJECE) Vol 6, No 1: February 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (411.428 KB) | DOI: 10.11591/ijece.v6i1.pp235-241

Abstract

Compliance with the Service Level Agreement (SLA) metric is a major challenge in a Multiprotocol Label Switching Virtual Private Network (MPLS VPN) because mandatory models must be maintained on both sides of the MPLS VPN in order to achieve end-to-end service levels. The end-to-end service of an MPLS VPN can be degraded owing to various issues such as distributed denial of service (DDoS), and Random Early Detection (RED) that prevents congestion and differentiates between legitimate and illegitimate user traffic. In this study, we propose a centralized solution that uses a SLA Violation Detector (SLAVD) and intrusion detection to prevent SLA violation.
Application of Component Criticality Importance Measures in Design Scheme of Power Plants Smajo Bisanovic; Mersiha Samardzic; Damir Aganovic
International Journal of Electrical and Computer Engineering (IJECE) Vol 6, No 1: February 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (110.803 KB) | DOI: 10.11591/ijece.v6i1.pp63-70

Abstract

This paper presents application of component criticality importance measures in phase of preparation and design of power plants. These measures provide a numerical rank to determine which components are more important for power plant reliability improvement or more critical for power plant failure. Identifying critical components for power plant reliability provides an important input for decision-making and guidance throughout the development project. The study on several schematic design options of conventional thermal power plant show that the importance measures can be used as an effective tool to assess component criticality in the project phase of new production capacities.
Sentimental Analysis of Twitter Data using Classifier Algorithms Sharvil Shah; Kannan Kumar; Ra. K. Sarvananguru
International Journal of Electrical and Computer Engineering (IJECE) Vol 6, No 1: February 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (288.681 KB) | DOI: 10.11591/ijece.v6i1.pp357-366

Abstract

Microblogging has become a daily routine for most of the people in this world. With the help of Microblogging people get opinions about several things going on, not only around the nation but also worldwide. Twitter is one such online social networking website where people can post their views regarding something. It is a huge platform having over 316 Million users registered from all over the world. It enables users to send and read short messages with over 140 characters for compatibility with SMS messaging. A good sentimental analysis of data of this huge platform can lead to achieve many new applications like – Movie reviews, Product reviews, Spam detection, Knowing consumer needs, etc. In this paper, we have devised a new algorithm with which the above needs can be achieved. Our algorithm uses three specific techniques for sentimental analysis and can be called a hybrid algorithm – (1) Hash Tag Classification for topic modeling; (2) Naïve Bayes Classifier Algorithm for polarity classification; (3) Emoticon Analysis for Neutral polar data. These techniques individually have some limitations for sentimental analysis.

Filter by Year

2016 2016


Filter By Issues
All Issue Vol 15, No 5: October 2025 Vol 15, No 4: August 2025 Vol 15, No 3: June 2025 Vol 15, No 2: April 2025 Vol 15, No 1: February 2025 Vol 14, No 6: December 2024 Vol 14, No 5: October 2024 Vol 14, No 4: August 2024 Vol 14, No 3: June 2024 Vol 14, No 2: April 2024 Vol 14, No 1: February 2024 Vol 13, No 6: December 2023 Vol 13, No 5: October 2023 Vol 13, No 4: August 2023 Vol 13, No 3: June 2023 Vol 13, No 2: April 2023 Vol 13, No 1: February 2023 Vol 12, No 6: December 2022 Vol 12, No 5: October 2022 Vol 12, No 4: August 2022 Vol 12, No 3: June 2022 Vol 12, No 2: April 2022 Vol 12, No 1: February 2022 Vol 11, No 6: December 2021 Vol 11, No 5: October 2021 Vol 11, No 4: August 2021 Vol 11, No 3: June 2021 Vol 11, No 2: April 2021 Vol 11, No 1: February 2021 Vol 10, No 6: December 2020 Vol 10, No 5: October 2020 Vol 10, No 4: August 2020 Vol 10, No 3: June 2020 Vol 10, No 2: April 2020 Vol 10, No 1: February 2020 Vol 9, No 6: December 2019 Vol 9, No 5: October 2019 Vol 9, No 4: August 2019 Vol 9, No 3: June 2019 Vol 9, No 2: April 2019 Vol 9, No 1: February 2019 Vol 8, No 6: December 2018 Vol 8, No 5: October 2018 Vol 8, No 4: August 2018 Vol 8, No 3: June 2018 Vol 8, No 2: April 2018 Vol 8, No 1: February 2018 Vol 7, No 6: December 2017 Vol 7, No 5: October 2017 Vol 7, No 4: August 2017 Vol 7, No 3: June 2017 Vol 7, No 2: April 2017 Vol 7, No 1: February 2017 Vol 6, No 6: December 2016 Vol 6, No 5: October 2016 Vol 6, No 4: August 2016 Vol 6, No 3: June 2016 Vol 6, No 2: April 2016 Vol 6, No 1: February 2016 Vol 5, No 6: December 2015 Vol 5, No 5: October 2015 Vol 5, No 4: August 2015 Vol 5, No 3: June 2015 Vol 5, No 2: April 2015 Vol 5, No 1: February 2015 Vol 4, No 6: December 2014 Vol 4, No 5: October 2014 Vol 4, No 4: August 2014 Vol 4, No 3: June 2014 Vol 4, No 2: April 2014 Vol 4, No 1: February 2014 Vol 3, No 6: December 2013 Vol 3, No 5: October 2013 Vol 3, No 4: August 2013 Vol 3, No 3: June 2013 Vol 3, No 2: April 2013 Vol 3, No 1: February 2013 Vol 2, No 6: December 2012 Vol 2, No 5: October 2012 Vol 2, No 4: August 2012 Vol 2, No 3: June 2012 Vol 2, No 2: April 2012 Vol 2, No 1: February 2012 Vol 1, No 2: December 2011 Vol 1, No 1: September 2011 More Issue