cover
Contact Name
Tole Sutikno
Contact Email
ijece@iaesjournal.com
Phone
-
Journal Mail Official
ijece@iaesjournal.com
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
International Journal of Electrical and Computer Engineering
ISSN : 20888708     EISSN : 27222578     DOI : -
International Journal of Electrical and Computer Engineering (IJECE, ISSN: 2088-8708, a SCOPUS indexed Journal, SNIP: 1.001; SJR: 0.296; CiteScore: 0.99; SJR & CiteScore Q2 on both of the Electrical & Electronics Engineering, and Computer Science) is the official publication of the Institute of Advanced Engineering and Science (IAES). The journal is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication and computer engineering from the global world.
Articles 94 Documents
Search results for , issue "Vol 7, No 6: December 2017" : 94 Documents clear
Ultra-Wideband Monostatic Antenna for behind the Wall Detection Jawad Ali; Roshayati Yahya; Noorsaliza Abdullah; Syarfa Zahirah Sapuan
International Journal of Electrical and Computer Engineering (IJECE) Vol 7, No 6: December 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (434.786 KB) | DOI: 10.11591/ijece.v7i6.pp2936-2941

Abstract

This article introduces an ultra-wideband (UWB) shifted arc antenna, designed using Rogers RT-5880 Duroid substrate for the human detection behind the wall. The frequency for this proposed antenna ranges from 2.8 - 15.6 GHz with the gain of around 6.05 dB. A high gain for antenna has been achieved by the implementation of defected ground structure (DGS) method to make it a suitable configuration for through wall detection applications. For the verification of through wall detection configuration, a simulation-based experiment using ground penetrating radar (GPR) technology has been conducted. The results showed that proposed single antenna can act as a monostatic transceiver in order to detect human skin behind the concrete wall. Later, the reflections received from the target have been analyzed to detect and identify the antenna, wall and target for distance calculation.
Design and Development of a Shortwave near Infrared Spectroscopy using NIR LEDs and Regression Model Kim Seng Chia; Yit Peng Tan
International Journal of Electrical and Computer Engineering (IJECE) Vol 7, No 6: December 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (358.783 KB) | DOI: 10.11591/ijece.v7i6.pp3070-3075

Abstract

Near infrared (NIR) spectroscopic technology has been getting more attention in various fields. The development of a low cost NIR spectroscopy is crucial to reduce the financial barriers so that more NIR spectroscopic applications will be investigated and developed by means of the NIR spectroscopic technology. This study proposes an alternative to measure shortwave NIR spectrum using one collimating lens, two slits, one NIR transmission grating, one linear array sensor, and one microcontroller. Five high precision narrow bands NIR light emitting diodes (LEDs) were used to calibrate the proposed spectroscopy. The effects of the proposed two slits design, the distance between the grating and linear array sensor, and three different regression models were investigated. The accuracy of the proposed design was cross-validated using leave-one-out cross-validation. Results show that the proposed two slits design was able to eliminate unwanted signals substantially, and the cross-validation was able to estimate the best model with root mean squared error of cross-validation of 3.8932nm. Findings indicate that the cross-validation approach is a good approach to estimate the final model without over-fitting, and the proposed shortwave NIR spectroscopy was able to estimate the peak value of the acquired spectrum from NIR LEDs with RMSE of 1.1616nm.
An Optimal LFC in Two-Area Power Systems Using a Meta-heuristic Optimization Algorithm Mushtaq Najeeb; Muhamad Mansor; Hameed Feyad; Esam Taha; Ghassan Abdullah
International Journal of Electrical and Computer Engineering (IJECE) Vol 7, No 6: December 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (686.3 KB) | DOI: 10.11591/ijece.v7i6.pp3217-3225

Abstract

In this study, an optimal meta-heuristic optimization algorithm for load frequency control (LFC) is utilized in two-area power systems. This meta-heuristic algorithm is called harmony search (HS), it is used to tune PI controller parameters ( ) automatically. The developed controller (HS-PI) with LFC loop is very important to minimize the system frequency and keep the system power is maintained at scheduled values under sudden loads changes. Integral absolute error (IAE) is used as an objective function to enhance the overall system performance in terms of settling time, maximum deviation, and peak time. The two-area power systems and developed controller are modelled using MATLAB software (Simulink/Code). As a result, the developed control algorithm (HS-PI) is more robustness and efficient as compared to PSO-PI control algorithm under same operation conditions.
New Watermarking/Encryption Method for Medical Imaging FULL Protection in m-Health Mohamed Boussif; Nourredinne Aloui; Adnene Cherif
International Journal of Electrical and Computer Engineering (IJECE) Vol 7, No 6: December 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v7i6.pp3385-3394

Abstract

In this paper, we present a new method for medical images security dedicated to m-Health based on a combination between a novel semi reversible watermarking approach robust to JPEG compression, a new proposed fragile watermarking and a new proposed encryption algorithm. The purpose of the combination of these three proposed algorithms (encryption, robust and fragile watermarking) is to ensure the full protection of medical image, its information and its report in terms of confidentiality and reliability (authentication and integrity). A hardware implementation to evaluate our system is done using the Texas instrument C6416 DSK card by converting m-files to C/C++ using MATLAB coder. Our m-health security system is then run on the android platform. Experimental results show that the proposed algorithm can achieve high security with good performance.
Reviewing the Effectivity Factor in Existing Techniques of Image Forensics Shashidhar TM; KB Ramesh
International Journal of Electrical and Computer Engineering (IJECE) Vol 7, No 6: December 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (384.705 KB) | DOI: 10.11591/ijece.v7i6.pp3558-3569

Abstract

Studies towards image forensics are about a decade old and various forms of research techniques have been presented till date towards image forgery detection. Majority of the existing techniques deals with identification of tampered regions using different forms of research methodologies. However, it is still an open-end question about the effectiveness of existing image forgery detection techniques as there is no reported benchmarked outcome till date about it. Therefore, the present manuscript discusses about the most frequently addressed image attacks e.g. image splicing and copy-move attack and elaborates the existing techniques presented by research community to resist it. The paper also contributes to explore the direction of present research trend with respect to tool adoption, database adoption, and technique adoption, and frequently used attack scenario. Finally, significant open research gap are explored after reviewing effectiveness of existing techniques.
A Survey on Automatically Mining Facets for Web Queries Duhita Pawar; Vina M. Lomte
International Journal of Electrical and Computer Engineering (IJECE) Vol 7, No 6: December 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (184.309 KB) | DOI: 10.11591/ijece.v7i6.pp3700-3704

Abstract

In this paper, a detailed survey on different facet mining techniques, their advantages and disadvantages is carried out. Facets are any word or phrase which summarize an important aspect about the web query. Researchers proposed different efficient techniques which improves the user’s web query search experiences magnificently. Users are happy when they find the relevant information to their query in the top results. The objectives of their research are: (1) To present automated solution to derive the query facets by analyzing the text query; (2) To create taxonomy of query refinement strategies for efficient results; and (3) To personalize search according to user interest.
An Analysis of Harmonic and Interharmonic Contribution of Electric Arc Furnace by Using Periodogram M.R. Yusoff; M.H. Jopri; A.R. Abdullah; T. Sutikno; M. Manap; A.S. Hussin
International Journal of Electrical and Computer Engineering (IJECE) Vol 7, No 6: December 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (639.895 KB) | DOI: 10.11591/ijece.v7i6.pp3753-3760

Abstract

Fast and accurate detection of the harmonic and interharmonic contribution of electric arc furnace (EAF) is crucial in identifying and to mitigate the undesired effects to the system.  In this paper, periodogram, a fast and accurate technique is introduced for the analysis of the contribution. Based on a rule-based classifier and the threshold settings that referred to the IEEE Standard 1159 2009, the analysis of the harmonic and interharmonic contribution of EAF are carried out successfully. Moreover, the impact of contribution is measured using total harmonic distortion (THD) and total non-harmonic distortion (TnHD). In addition, periodogram also gives 100 percent correct detection and able to analyze the contribution impact. It is proven that the proposed method is accurate, fast and cost efficient for analyzing the impact of harmonic and interharmonic of EAF.
Non-contact Heart Rate Monitoring Analysis from Various Distances with different Face Regions Norwahidah Ibrahim; Razali Tomari; Wan Nurshazwani Wan Zakaria; Nurmiza Othman
International Journal of Electrical and Computer Engineering (IJECE) Vol 7, No 6: December 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (397.049 KB) | DOI: 10.11591/ijece.v7i6.pp3030-3036

Abstract

Heart rate (HR) is one of vital biomedical signals for medical diagnosis. Previously, conventional camera is proven to be able to detect small changes in the skin due to the cardiac activity and can be used to measure the HR. However, most of the previous systems operate on near distance mode with a single face patch, thus the feasibility of the remote heart rate for various distances remains vague. This paper tackles this issue by analyzing an optimal framework that capable to works under the mentioned issues. Initially, plausible face landmarks are estimated by employing cascaded of regression mechanism. Next, the region of interest (ROI) was constructed from the landmarks in a face location where non rigid motion is minimal. From the ROI, temporal photoplethysmograph (PPG) signal is calculated based on the average green pixels intensity and environmental illumination is separated using Independent Component Analysis (ICA) filter. Eventually, the PPG signal is further processed using series of temporal filter to exclude frequencies outside the range of interest prior to estimate the HR. As a conclusion, the HR can be detected up to 5 meters range with 94% accuracy using lower part of face region.
Towards a Consistent Measurement Stream Processing from Heterogeneous Data Sources Mario Diván; María de los Ángeles Martín
International Journal of Electrical and Computer Engineering (IJECE) Vol 7, No 6: December 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1201.368 KB) | DOI: 10.11591/ijece.v7i6.pp3164-3175

Abstract

In this work an updating of the C-INCAMI (Context-Information Need, Concept model, Attribute, Metric and Indicator) conceptual framework for Measurement and Evaluation projects was proposed. The updating incorporated better supporting for the measures stream processing. Therefore, a new version of the measurement interchange schema based on the updated C-INCAMI framework was introduced. This new schema incorporated the concept of “complementary data” linking them with geographic information. The complementary data could be associated with the measures and allowed us incorporating video, geographic information, text plain, audio or pictures with the quantitative measures (deterministic or estimated) jointly. A practical case associated with the Weather Radar of the Experimental Agricultural Station (EAS) INTA Anguil (Province of La Pampa, Argentina) was shown, indicating the advantages of the new schema.
Robust Video Watermarking Scheme Based on Intra-Coding Process in MPEG-2 Style Rakesh Ahuja; S. S. Bedi
International Journal of Electrical and Computer Engineering (IJECE) Vol 7, No 6: December 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (687.244 KB) | DOI: 10.11591/ijece.v7i6.pp3332-3343

Abstract

The proposed scheme implemented a semi blind digital watermarking method for video exploiting MPEG-2 standard. The watermark is inserted into selected high frequency coefficients of plain types of discrete cosine transform blocks instead of edge and texture blocks during intra coding process. The selection is essential because the error in such type of blocks is less sensitive to human eyes as compared to other categories of blocks. Therefore, the perceptibility of watermarked video does not degraded sharply. Visual quality is also maintained as motion vectors used for generating the motion compensated images are untouched during the entire watermarking process. Experimental results revealed that the scheme is not only robust to re-compression attack, spatial synchronization attacks like cropping, rotation but also strong to temporal synchronization attacks like frame inserting, deleting, swapping and averaging. The superiority of the anticipated method is obtaining the best sturdiness results contrast to the recently delivered schemes.

Page 8 of 10 | Total Record : 94


Filter by Year

2017 2017


Filter By Issues
All Issue Vol 16, No 1: February 2026 Vol 15, No 6: December 2025 Vol 15, No 5: October 2025 Vol 15, No 4: August 2025 Vol 15, No 3: June 2025 Vol 15, No 2: April 2025 Vol 15, No 1: February 2025 Vol 14, No 6: December 2024 Vol 14, No 5: October 2024 Vol 14, No 4: August 2024 Vol 14, No 3: June 2024 Vol 14, No 2: April 2024 Vol 14, No 1: February 2024 Vol 13, No 6: December 2023 Vol 13, No 5: October 2023 Vol 13, No 4: August 2023 Vol 13, No 3: June 2023 Vol 13, No 2: April 2023 Vol 13, No 1: February 2023 Vol 12, No 6: December 2022 Vol 12, No 5: October 2022 Vol 12, No 4: August 2022 Vol 12, No 3: June 2022 Vol 12, No 2: April 2022 Vol 12, No 1: February 2022 Vol 11, No 6: December 2021 Vol 11, No 5: October 2021 Vol 11, No 4: August 2021 Vol 11, No 3: June 2021 Vol 11, No 2: April 2021 Vol 11, No 1: February 2021 Vol 10, No 6: December 2020 Vol 10, No 5: October 2020 Vol 10, No 4: August 2020 Vol 10, No 3: June 2020 Vol 10, No 2: April 2020 Vol 10, No 1: February 2020 Vol 9, No 6: December 2019 Vol 9, No 5: October 2019 Vol 9, No 4: August 2019 Vol 9, No 3: June 2019 Vol 9, No 2: April 2019 Vol 9, No 1: February 2019 Vol 8, No 6: December 2018 Vol 8, No 5: October 2018 Vol 8, No 4: August 2018 Vol 8, No 3: June 2018 Vol 8, No 2: April 2018 Vol 8, No 1: February 2018 Vol 7, No 6: December 2017 Vol 7, No 5: October 2017 Vol 7, No 4: August 2017 Vol 7, No 3: June 2017 Vol 7, No 2: April 2017 Vol 7, No 1: February 2017 Vol 6, No 6: December 2016 Vol 6, No 5: October 2016 Vol 6, No 4: August 2016 Vol 6, No 3: June 2016 Vol 6, No 2: April 2016 Vol 6, No 1: February 2016 Vol 5, No 6: December 2015 Vol 5, No 5: October 2015 Vol 5, No 4: August 2015 Vol 5, No 3: June 2015 Vol 5, No 2: April 2015 Vol 5, No 1: February 2015 Vol 4, No 6: December 2014 Vol 4, No 5: October 2014 Vol 4, No 4: August 2014 Vol 4, No 3: June 2014 Vol 4, No 2: April 2014 Vol 4, No 1: February 2014 Vol 3, No 6: December 2013 Vol 3, No 5: October 2013 Vol 3, No 4: August 2013 Vol 3, No 3: June 2013 Vol 3, No 2: April 2013 Vol 3, No 1: February 2013 Vol 2, No 6: December 2012 Vol 2, No 5: October 2012 Vol 2, No 4: August 2012 Vol 2, No 3: June 2012 Vol 2, No 2: April 2012 Vol 2, No 1: February 2012 Vol 1, No 2: December 2011 Vol 1, No 1: September 2011 More Issue