cover
Contact Name
Tole Sutikno
Contact Email
ijece@iaesjournal.com
Phone
-
Journal Mail Official
ijece@iaesjournal.com
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
International Journal of Electrical and Computer Engineering
ISSN : 20888708     EISSN : 27222578     DOI : -
International Journal of Electrical and Computer Engineering (IJECE, ISSN: 2088-8708, a SCOPUS indexed Journal, SNIP: 1.001; SJR: 0.296; CiteScore: 0.99; SJR & CiteScore Q2 on both of the Electrical & Electronics Engineering, and Computer Science) is the official publication of the Institute of Advanced Engineering and Science (IAES). The journal is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication and computer engineering from the global world.
Articles 66 Documents
Search results for , issue "Vol 7, No 3: June 2017" : 66 Documents clear
A Survey on Security Aspects of Server Virtualization in Cloud Computing O Sri Nagesh; Tapas Kumar; Venkateswara Rao Vedula
International Journal of Electrical and Computer Engineering (IJECE) Vol 7, No 3: June 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (542.977 KB) | DOI: 10.11591/ijece.v7i3.pp1326-1336

Abstract

Significant exploitation and utilization of cloud computing in industry is come with and in the identical time vulnerable by unease regarding protection of data hold by cloud computing providers. One of the penalties of moving data processing and storage off business site is that organizations have fewer controls over their infrastructure. seeing that, cloud service (CS) providers must hope that the CS provider is capable to protect their data and infrastructure from both exterior and domestic attacks. Presently however, such hope can only rely on organizational procedures stated by the CS provider and cannot be remotely verified and validated by an external party. The central distinction between cloud computing and conventional enterprise internal Information Technology services is that the proprietor and the consumer of cloud Information Technology infrastructures are separated in cloud. This transform requires a safety responsibility severance in cloud computing. Cloud service providers (CSP) should safe the services they propose and cannot surpass the customers’ authorities. Virtualization is a buildup utterance in the Information Technology world. With the assure to reduce the ever mounting infrastructure inside data centers connected to other important apprehensions such as ease of use and scalability, virtualization technology has been in advance recognition not only with IT experts yet also among administrators and executives as well. The progressively more growing rate of the approval of this technology has exposed these systems to new protection concerns which in recent history have been unnoticed or merely overlooked. This paper presents an in depth state of art gaze at  present most old server virtualization explanations, as well as a writing study on different security matters found inside this virtualization technology. These problems can be practical to all the existing virtualization technologies accessible with no spotlight on a specific answer. Nevertheless, we do susceptibility investigation of two of the mainstream recognized virtualization answers: VMware ESX and Xen. to conclude, we illustrate some clarifications on how to progress the security of online banking and electronic commerce, using virtualization.
Application of PST Source based DC Link Restoration for IDVR Ramchandra Nittala; Alivelu Parimi; K Uma Rao
International Journal of Electrical and Computer Engineering (IJECE) Vol 7, No 3: June 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (878.428 KB) | DOI: 10.11591/ijece.v7i3.pp1103-1111

Abstract

Interline Dynamic Voltage Restorer (IDVR) comprises of several Dynamic Voltage Restorers (DVRs) connected to different distribution feeders in the power system sharing common energy storage. One of the DVR provides for voltage sag compensation appearing in that feeder, while the other DVRs restore the energy in the common dc-link thus dynamically maintaining the voltage of DC link capacitor constant by importing power from the other feeders. Restoration of the DC link energy plays an important role in the capability of the individual DVR in the IDVR to mitigate deep sags with long durations. In this paper the restoration of the DC link energy of the IDVR is achieved by the utilizing the phase shifting transformers (PST) which assist the respective DVR during its power control mode. A controlled switching action is provided to choose the appropriate connection of PST to the feeders depending upon the voltage sag condition. The proposed novel concept is examined in a test power system with IDVR.
Experimental Investigation on Vegetative Oils under Accelerated Thermal Ageing against Their Dielectric Strength Siti Sufiah Abd Wahid; Mohd Fikri Hilmi Mohd Taib; Yanuar Z. Arief; Mohd Hafizi Ahmad; Noor Azlinda Ahmad; Nor Asiah Muhamad; Zuraimy Adzis; Mohd Hafiez Izzwan Saad
International Journal of Electrical and Computer Engineering (IJECE) Vol 7, No 3: June 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (525.125 KB) | DOI: 10.11591/ijece.v7i3.pp1588-1593

Abstract

Insulation is one of the most important parts in high voltage apparatus such as power transformer. Most power transformer use liquid insulation material, known as power transformer oil. Petroleum-based oil so called mineral oil has been used for many years as power transformer oil. This is due to its high dielectric field strength, low dielectric loses and good long-term performance. This research work has been carried out to investigate the effect of thermal accelerated ageing on electrical properties for several vegetative-based oils. The oil samples that have been used in this research work are soy bean-based oil (FR3) and commercial palm-based oil (PFAE). As comparison, Hyrax mineral oil has also been investigated. The results revealed that vegetative-based oils have as well as dielectric strength compared with mineral oil.  It was found that the dielectric strength for all oil samples decreased when undergo the thermal accelerated ageing process.
Embroidery Leaf Shape Dipole Antenna Performances and Characterisation N. J. Ramly; M. K. A. Rahim; N. A. Samsuri; H. A. Majid
International Journal of Electrical and Computer Engineering (IJECE) Vol 7, No 3: June 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (362.726 KB) | DOI: 10.11591/ijece.v7i3.pp1467-1472

Abstract

In this paper, leaf shape textile antenna in ISM band has been chosen to study. The operating frequency of the dipole antenna is 2.45GHz. The effect of conductive threads with three different types of sewing has been analysed. The first type of sewing leaf shape dipole antenna is to stitch around itself and embroidered into a fleece fabric with circular follow by vertical and horizontal stitch respectively. From measured return loss, the antenna with circular stitch shows better performances with optimum resonances compared with the two types of stitching. The measured results confirm that the circular stitch is more suitable for leaf shape dipole antenna design. Thus it can be concluded that different stitch gives different results for leaf shape dipole antenna.
Localization of Distributed Wireless Sensor Networks using Two Sage SDP Optimization Reza Shahbazian; Seyed Ali Ghorashi
International Journal of Electrical and Computer Engineering (IJECE) Vol 7, No 3: June 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1558.547 KB) | DOI: 10.11591/ijece.v7i3.pp1255-1261

Abstract

A wireless sensor network (WSN) may comprise a large distributed set of low cost, low power sensing nodes. In many applications, the location of sensors is a necessity to evaluate the sensed data and it is not energy and cost efficient to equip all sensors with global positioning systems such as GPS. In this paper, we focus on the localization of sensors in a WSN by solving an optimization problem. In WSN localization, some sensors (called anchors) are aware of their location. Then, the distance measurements between sensors and anchors locations are used to localize the whole sensors in the network. WSN localization is a non-convex optimization problem, however, relaxation techniques such as semi-definite programming (SDP) are used to relax the optimization. To solve the optimization problem, all constraints should be considered simultaneously and the solution complexity order is O(n2) where n is the number of sensors. The complexity of SDP prevents solving large size problems. Therefore, it would be beneficial to reduce the problem size in large and distributed WSNs. In this paper, we propose a two stage optimization to reduce the solution time, while provide better accuracy compared with original SDP method. We first select some sensors that have the maximum connection with anchors and perform the SDP localization. Then, we select some of these sensors as virtual anchors. By adding the virtual anchors, we add more reference points and decrease the number of constraints. We propose an algorithm to select and add virtual anchors so that the total solution complexity and time decrease considerably, while improving the localization accuracy.
Fractal Characteristic of Electrical Trees Grown in Silicone Rubber under Environmental Stress M. S. Mohd Fua’ad; M.H. Ahmad; Y. Z. Arief; N. A. Ahmad
International Journal of Electrical and Computer Engineering (IJECE) Vol 7, No 3: June 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (534.992 KB) | DOI: 10.11591/ijece.v7i3.pp1628-1632

Abstract

One of the degradations of insulation is in the form of electrical treeing in which classified as a pre-breakdown phenomenon of electrical insulation. The electrical tree is commonly forming in the shape of tree-like or root-like which may have fractal structures. Due to this fractal structure, electrical treeing formation and patterns are analysed via fractal dimension and lacunarity to study the self-similarity patterns of electrical treeing. Many types of research have been conducted to study the fractal dimension and lacunarity of electrical treeing to fully understand the electrical tree mechanism and characteristics. However, fractal and lacunarity structures of
Modeling the Vibrational Dynamics of Piezoelectric Actuator by System Identification Technique Nurul Bahiah Mohd Noor; Mohd Ridzuan Ahmad
International Journal of Electrical and Computer Engineering (IJECE) Vol 7, No 3: June 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (460.643 KB) | DOI: 10.11591/ijece.v7i3.pp1506-1512

Abstract

Actuators based on smart materials such as piezoelectric actuators (PEAs) are widely used in many applications to transform electrical signal to mechanical signal and vice versa. However, the major drawbacks for these smart actuators are hysteresis nonlinear, creep and residual vibration. In this paper, PEAs are used for active vibration application. Therefore, a model of PEA must be established to control the vibration that occurs in the system. The frequencies of 1 Hz, 20 Hz and 50 Hz were tested on the PEAs. The results obtained from the experimental were used to develop transfer function model by employing system identification technique. Meanwhile, the model validation was based on level of models fitness to estimation data, mean squared error (MSE), final prediction error (FPE) and correlation test. The experimental result showed that the displacement of the actuator is inversely proportional to the frequency. The following consequences caused the time response criteria at 50 Hz achieved smallest overshoot and fastest response of rise time and settling time.
Approximation Measures for Conditional Functional Dependencies Using Stripped Conditional Partitions Anh Duy Tran; Somjit Arch-int; Ngamnij Arch-int
International Journal of Electrical and Computer Engineering (IJECE) Vol 7, No 3: June 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (892.957 KB) | DOI: 10.11591/ijece.v7i3.pp1385-1397

Abstract

Conditional functional dependencies (CFDs) have been used to improve the quality of data, including detecting and repairing data inconsistencies. Approximation measures have significant importance for data dependencies in data mining. To adapt to exceptions in real data, the measures are used to relax the strictness of CFDs for more generalized dependencies, called approximate conditional functional dependencies (ACFDs). This paper analyzes the weaknesses of dependency degree, confidence and conviction measures for general CFDs (constant and variable CFDs). A new measure for general CFDs based on incomplete knowledge granularity is proposed to measure the approximation of these dependencies as well as the distribution of data tuples into the conditional equivalence classes. Finally, the effectiveness of stripped conditional partitions and this new measure are evaluated on synthetic and real data sets. These results are important to the study of theory of approximation dependencies and improvement of discovery algorithms of CFDs and ACFDs.
Evaluation of Feature Reduction using Principal Component Analysis and Sequential Pattern Matching for Manet M. Reji; P.C. Kishore Raja; Bhagyalakshmi M
International Journal of Electrical and Computer Engineering (IJECE) Vol 7, No 3: June 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (333.934 KB) | DOI: 10.11591/ijece.v7i3.pp1228-1239

Abstract

In Mobile Ad hoc Networks (MANETs) there are some security problems because of portability, element topology changes, and absence of any framework. In MANETs, it is of extraordinary significance to identify inconsistency and malignant conduct. With a specific end goal to recognize malignant assaults by means of interruption identification frameworks and dissect the information set, we have to choose some components. Thus, highlight determination assumes basic part in recognizing different assaults. In the writing, there are a few recommendations to choose such elements. For the most part, Principal Component Analysis (PCA) breaks down the information set and the chose highlights. In this paper, we have gathered a list of capabilities from some cutting edge works in the writing. Really, our reproduction demonstrates this list of capabilities identify inconsistency conduct more precise. Likewise, interestingly, we utilize PCA for investigating the information set. In contrast to PCA, our results show Sequential pattern mining (SPM) cannot be affected by outlier data within the network. The  normal and attack states are simulated and the results are analyzed using NS2 simulator.
Comparative Study of Meta-heuristics Optimization Algorithm using Benchmark Function I. Ismail; A. Hanif Halim
International Journal of Electrical and Computer Engineering (IJECE) Vol 7, No 3: June 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (215.279 KB) | DOI: 10.11591/ijece.v7i3.pp1643-1650

Abstract

Meta-heuristics optimization is becoming a popular tool for solving numerous problems in real-world application due to the ability to overcome many shortcomings in traditional optimization. Despite of the good performance, there is limitation in some algorithms that deteriorates by certain degree of problem type. Therefore it is necessary to compare the performance of these algorithms with certain problem type. This paper compares 7 meta-heuristics optimization with 11 benchmark functions that exhibits certain difficulties and can be assumed as a simulation relevant to the real-world problems. The tested benchmark function has different type of problem such as modality, separability, discontinuity and surface effects with steep-drop global optimum, bowl- and plateau-typed function. Some of the proposed function has the combination of these problems, which might increase the difficulty level of search towards global optimum. The performance comparison includes computation time and convergence of global optimum.

Filter by Year

2017 2017


Filter By Issues
All Issue Vol 15, No 6: December 2025 Vol 15, No 5: October 2025 Vol 15, No 4: August 2025 Vol 15, No 3: June 2025 Vol 15, No 2: April 2025 Vol 15, No 1: February 2025 Vol 14, No 6: December 2024 Vol 14, No 5: October 2024 Vol 14, No 4: August 2024 Vol 14, No 3: June 2024 Vol 14, No 2: April 2024 Vol 14, No 1: February 2024 Vol 13, No 6: December 2023 Vol 13, No 5: October 2023 Vol 13, No 4: August 2023 Vol 13, No 3: June 2023 Vol 13, No 2: April 2023 Vol 13, No 1: February 2023 Vol 12, No 6: December 2022 Vol 12, No 5: October 2022 Vol 12, No 4: August 2022 Vol 12, No 3: June 2022 Vol 12, No 2: April 2022 Vol 12, No 1: February 2022 Vol 11, No 6: December 2021 Vol 11, No 5: October 2021 Vol 11, No 4: August 2021 Vol 11, No 3: June 2021 Vol 11, No 2: April 2021 Vol 11, No 1: February 2021 Vol 10, No 6: December 2020 Vol 10, No 5: October 2020 Vol 10, No 4: August 2020 Vol 10, No 3: June 2020 Vol 10, No 2: April 2020 Vol 10, No 1: February 2020 Vol 9, No 6: December 2019 Vol 9, No 5: October 2019 Vol 9, No 4: August 2019 Vol 9, No 3: June 2019 Vol 9, No 2: April 2019 Vol 9, No 1: February 2019 Vol 8, No 6: December 2018 Vol 8, No 5: October 2018 Vol 8, No 4: August 2018 Vol 8, No 3: June 2018 Vol 8, No 2: April 2018 Vol 8, No 1: February 2018 Vol 7, No 6: December 2017 Vol 7, No 5: October 2017 Vol 7, No 4: August 2017 Vol 7, No 3: June 2017 Vol 7, No 2: April 2017 Vol 7, No 1: February 2017 Vol 6, No 6: December 2016 Vol 6, No 5: October 2016 Vol 6, No 4: August 2016 Vol 6, No 3: June 2016 Vol 6, No 2: April 2016 Vol 6, No 1: February 2016 Vol 5, No 6: December 2015 Vol 5, No 5: October 2015 Vol 5, No 4: August 2015 Vol 5, No 3: June 2015 Vol 5, No 2: April 2015 Vol 5, No 1: February 2015 Vol 4, No 6: December 2014 Vol 4, No 5: October 2014 Vol 4, No 4: August 2014 Vol 4, No 3: June 2014 Vol 4, No 2: April 2014 Vol 4, No 1: February 2014 Vol 3, No 6: December 2013 Vol 3, No 5: October 2013 Vol 3, No 4: August 2013 Vol 3, No 3: June 2013 Vol 3, No 2: April 2013 Vol 3, No 1: February 2013 Vol 2, No 6: December 2012 Vol 2, No 5: October 2012 Vol 2, No 4: August 2012 Vol 2, No 3: June 2012 Vol 2, No 2: April 2012 Vol 2, No 1: February 2012 Vol 1, No 2: December 2011 Vol 1, No 1: September 2011 More Issue