cover
Contact Name
Tole Sutikno
Contact Email
ijece@iaesjournal.com
Phone
-
Journal Mail Official
ijece@iaesjournal.com
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
International Journal of Electrical and Computer Engineering
ISSN : 20888708     EISSN : 27222578     DOI : -
International Journal of Electrical and Computer Engineering (IJECE, ISSN: 2088-8708, a SCOPUS indexed Journal, SNIP: 1.001; SJR: 0.296; CiteScore: 0.99; SJR & CiteScore Q2 on both of the Electrical & Electronics Engineering, and Computer Science) is the official publication of the Institute of Advanced Engineering and Science (IAES). The journal is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication and computer engineering from the global world.
Articles 150 Documents
Search results for , issue "Vol 8, No 5: October 2018" : 150 Documents clear
Network Function Modeling and Performance Estimation Mario Baldi; Amedeo Sapio
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 5: October 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1927.429 KB) | DOI: 10.11591/ijece.v8i5.pp3021-3037

Abstract

This work introduces a methodology for the modelization of network functions focused on the identification of recurring execution patterns as basic building blocks and aimed at providing a platform independent representation. By mapping each modeling building block on specific hardware, the performance of the network function can be estimated in termsof maximum throughput that the network function can achieve on the specific execution platform. The approach is such that once the basic modeling building blocks have been mapped, the estimate can be computed automatically for any modeled network function. Experimental results on several sample network functions show that although our approach cannot be very accurate without taking in consideration traffic characteristics, it is very valuable for those application where even loose estimates are key. One such example is orchestration in network functions virtualization (NFV) platforms, as well as in general virtualization platforms where virtual machine placement is based also on the performanceof network services offered to them. Being able to automatically estimate the performance of a virtualized network function (VNF) on different execution hardware, enables optimal placement of VNFs themselves as well as the virtual hosts they serve, while efficiently utilizing available resources.
Assessment-driven Learning through Serious Games: Guidance and Effective Outcomes Othman Bakkali Yedri; Lotfi El Aachak; Mohamed Bouhorma
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 5: October 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (274.04 KB) | DOI: 10.11591/ijece.v8i5.pp3304-3316

Abstract

Evaluation in serious games is an important aspect; it aims to evaluate the good transmission of pedagogical objectives, the performance of student in relation to these objectives defined in the pedagogical scenario, the content of the course and the predefined criteria. However, the effectiveness of learning is under-studied due to the complexity involved to gamify the assessment concept, particularly when it comes to intangible measures related to the progression of learning outcomes, which is among the most important aspects of evaluation in serious games. This paper reviews the literature regarding assessment due to their importance in the learning process with a detailed assessment plan applied on serious game. Then, it presents a framework used to facilitate the assessment design integrated in serious games. Finally, a significant example of how the proposed framework proved successful with corresponding results will conclude the paper.
Improving E-Learning by Integrating a Metacognitive Agent Hanane Elbasri; Adil Haddi; Hakim Allali
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 5: October 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (432.772 KB) | DOI: 10.11591/ijece.v8i5.pp3359-3367

Abstract

The major disadvantage of the current Learning Management Systems is the lack of learner assistance in their learning processes and, therefore, they can not replace the presence of the teacher who ensures the progress of learning. In fact, we proposed to integrate, for each learner, a metacognitive agent that supported the metacognitive assistance and extracts the defectsin the learning process and strategies. The goal is to invite the learner to correct himself and improve his learning method. Metacognitive questionnaires were distributed to a group of 100 students before, during and after a computer course. The goal is to evaluatethe metacognitive attributes and to determine their influence on the success of learning. Decision trees were used as data analysis tools to extract a set of rules and to discover the influence of these metacognitive attributes on the result obtained by the learners. The results indicate that there are relationships between the different metacognitive attributes and the learners’ success. We note there is the influence of metacognitive incitement on learner outcomes, which reflects the degree of understanding of a learning pedagogical unit by the learner.
Performance Analysis of Adaptive Filter Channel Estimated MIMO OFDM Communication System Srinu Pyla; K Padma Raju; N Bala Subrahmanyam
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 5: October 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (458.894 KB) | DOI: 10.11591/ijece.v8i5.pp3829-3838

Abstract

Advanced Communication Systems are wideband systems to support multiple applications such as audio, video and data so and so forth. These systems require high spectral efficiency and data rates. In addition, they should provide multipath fading and inter-symbol interference (ISI) free transmission. Multiple input multiple output orthogonal frequency division multiplexing (MIMO OFDM) meets these requirements Hence, MIMO-OFDM is the most preferable technique for long term evaluation advanced (LTE-A). The primary objective of this paper is to control bit error rate (BER) by proper channel coding, pilot carriers, adaptive filter channel estimation schemes and space time coding (STC). A combination of any of these schemes results in better BER performance over individual schemes. System performance is analyzed for various digital modulation schemes. In this paper,adaptive filter channel estimated MIMO OFDM system is proposed by integrating channel coding, adaptivefilter channel estimation, digital modulation and space time coding. From the simulation results, channel estimated 2×2 MIMO OFDM system shows superior performance over individual schemes.
Novel Approach for Evaluating Video Transmission using Combined Scalable Video Coding over Wireless Broadband Network Kalvein Rantelobo; Kalamullah Ramli; Wirawan Wirawan
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 5: October 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (790.511 KB) | DOI: 10.11591/ijece.v8i5.pp3407-3416

Abstract

One of the main problems in video transmission is the bandwidth fluctuation in wireless channel. Therefore, there is an urgent need to find an efficient bandwidth utilization and method. This research utilizes the Combined Scalable Video Coding (CSVC) which comes from Joint Scalable Video Model (JSVM). In the combined scalable video coding, we implement Coarse Grain Scalability (CGS) and Medium Grain Scalability (MGS). We propose a new scheme in which it can be implemented on Network Simulator II (NS-2) over wireless broadband network. The advantages of this new scheme over the other schemes are more realistic and based on open source program. The result shows that CSVC implementation on MGS mode outperforms CGS mode.
A Miniature Microstrip Antenna Array using Circular Shaped Dumbbell for ISM Band Applications Ahmed Ghaloua; Jamal Zbitou; Larbi El Abdellaoui; Mohamed Latrach; Ahmed Errkik; Abdelali Tajmouati
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 5: October 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (528.315 KB) | DOI: 10.11591/ijece.v8i5.pp3793-3800

Abstract

The aim of this work is the achievement, and the validation of a small microstrip patch antenna array using a circular shaped dumbbell defected ground structure. This work has been dividing into two stages: The first step is to miniaturize a microstrip patch antenna resonating at 5.8GHz, which operate in the Industrial Scientific Medical band (ISM) and the second is to use a circular defected ground structure to shift the resonance frequency of the antenna array from 5.8GHz to 2.45GHz. At last, a miniaturization up to 74.47%, relative to the original microstrip antenna array has accomplished. The antenna structure has designed, optimized and miniaturized using CST MW Studio. The obtained results have compared with Ansoft’s HFSS electromagnetic solver. The antenna array has fabricated on FR-4 substrate, and its reflection coefficient is measured.
An Enhancement Role and Attribute Based Access Control Mechanism in Big Data M Meneka; K. Meenakshisundaram
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 5: October 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (162.513 KB) | DOI: 10.11591/ijece.v8i5.pp3187-3193

Abstract

To be able to leverage big data to achieve enhanced strategic insight and make informed decision, an efficient access control mechanism is needed for ensuring end to end security of such information asset. Attribute Based Access Control (ABAC), Role Based Access Control (RBAC) and Event Based Access Control (EBAC) are widely used access control mechanisms. The ABAC system is much more complex in terms of policy reviews, hence analyzing the policy and reviewing or changing user permission are quite complex task. RBAC system is labor intensive and time consuming to build a model instance and it lacks flexibility to efficiently adapt to changing user’s, objects and security policies. EBAC model considered only the events to allocate access controls. Yet these mechanisms have limitations and offer feature complimentary to each other. So in this paper, Event-Role-Attribute based fine grained Access Control mechanism is proposed, it provide a flexible boundary which effectively adapt to changing user’s, objects and security policies based on the event. The flexible boundary is achieved by using temporal and environment state of an event. It improves the big data security and overcomes the disadvantages of the ABAC and RBAC mechanisms. The experiments are conducted to prove the effectiveness of the proposed Event-Role-Attribute based Access Control mechanism over ABAC and RBAC in terms of computational overhead.
An Effective PSO-inspired Algorithm for Workflow Scheduling Toan Phan Thanh; Loc Nguyen The; Said Elnaffar; Cuong Nguyen Doan; Huu Dang Quoc
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 5: October 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (597.575 KB) | DOI: 10.11591/ijece.v8i5.pp3852-3859

Abstract

The Cloud is a computing platform that provides on-demand access to a shared pool of configurable resources such as networks, servers and storage that can be rapidly provisioned and released with minimal management effort from clients. At its core, Cloud computing focuses on maximizing the effectiveness of the shared resources. Therefore, workflow scheduling is one of the challenges that the Cloud must tackle especially if a large number of tasks are executed on geographically distributed servers. This entails the need to adopt an effective scheduling algorithm in order to minimize task completion time (makespan). Although workflow scheduling has been the focus of many researchers, a handful efficient solutions have been proposed for Cloud computing. In this paper, we propose the LPSO, a novel algorithm for workflow scheduling problem that is based on the Particle Swarm Optimization method. Our proposed algorithm not only ensures a fast convergence but also prevents getting trapped in local extrema. We ran realistic scenarios using CloudSim and found that LPSO is superior to previously proposed algorithms and noticed that the deviation between the solution found by LPSO and the optimal solution is negligible.
A Deterministic Eviction Model for Removing Redundancies in Video Corpus Jyoti Malhotra; Jagdish Bakal
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 5: October 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (321.432 KB) | DOI: 10.11591/ijece.v8i5.pp3221-3231

Abstract

The traditional storage approaches are being challenged by huge data volumes. In multimedia content, every file does not necessarily get tagged as an exact duplicate; rather they are prone to editing and resulting in similar copies of the same file. This paper proposes the similarity-based deduplication approach to evict similar duplicates from the archive storage, which compares the samples of binary hashes to identify the duplicates. This eviction is done by initially dividing the query video into dynamic key frames based on the video length. Binary hash codes of these frames are then compared with existing key frames to identify the differences. The similarity score is determined based on these differences, which decides the eradication strategy of duplicate copy. Duplicate elimination goes through two levels, namely removal of exact duplicates and similar duplicates. The proposed approach has shortened the comparison window by comparing only the candidate hash codes based on the dynamic key frames and aims the accurate lossless duplicate removals. The presented work is executed and tested on the produced synthetic video dataset. Results show the reduction in redundant data and increase in the storage space. Binary hashes and similarity scores contributed to achieving good deduplication ratio and overall performance.
Design of Linear Plasma Position Controllers with Intelligent Feedback Systems for Aditya Tokamak Femila Roseline J; N M. Nandhitha
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 5: October 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (322.867 KB) | DOI: 10.11591/ijece.v8i5.pp2904-2909

Abstract

In order to increase the performance of Aditya tokamak, it is necessary to determine the feedback coil current for positioning the plasma within the magnetic chamber. In this paper, transfer functions are obtained for the plasma position prediction system. Four different feedback controllers are developed to improve the performance of the prediction system. From the analysis, Neural Network controller does not have overshoot while the PID controller has lesser settling time than the other two controllers. 

Filter by Year

2018 2018


Filter By Issues
All Issue Vol 16, No 1: February 2026 Vol 15, No 6: December 2025 Vol 15, No 5: October 2025 Vol 15, No 4: August 2025 Vol 15, No 3: June 2025 Vol 15, No 2: April 2025 Vol 15, No 1: February 2025 Vol 14, No 6: December 2024 Vol 14, No 5: October 2024 Vol 14, No 4: August 2024 Vol 14, No 3: June 2024 Vol 14, No 2: April 2024 Vol 14, No 1: February 2024 Vol 13, No 6: December 2023 Vol 13, No 5: October 2023 Vol 13, No 4: August 2023 Vol 13, No 3: June 2023 Vol 13, No 2: April 2023 Vol 13, No 1: February 2023 Vol 12, No 6: December 2022 Vol 12, No 5: October 2022 Vol 12, No 4: August 2022 Vol 12, No 3: June 2022 Vol 12, No 2: April 2022 Vol 12, No 1: February 2022 Vol 11, No 6: December 2021 Vol 11, No 5: October 2021 Vol 11, No 4: August 2021 Vol 11, No 3: June 2021 Vol 11, No 2: April 2021 Vol 11, No 1: February 2021 Vol 10, No 6: December 2020 Vol 10, No 5: October 2020 Vol 10, No 4: August 2020 Vol 10, No 3: June 2020 Vol 10, No 2: April 2020 Vol 10, No 1: February 2020 Vol 9, No 6: December 2019 Vol 9, No 5: October 2019 Vol 9, No 4: August 2019 Vol 9, No 3: June 2019 Vol 9, No 2: April 2019 Vol 9, No 1: February 2019 Vol 8, No 6: December 2018 Vol 8, No 5: October 2018 Vol 8, No 4: August 2018 Vol 8, No 3: June 2018 Vol 8, No 2: April 2018 Vol 8, No 1: February 2018 Vol 7, No 6: December 2017 Vol 7, No 5: October 2017 Vol 7, No 4: August 2017 Vol 7, No 3: June 2017 Vol 7, No 2: April 2017 Vol 7, No 1: February 2017 Vol 6, No 6: December 2016 Vol 6, No 5: October 2016 Vol 6, No 4: August 2016 Vol 6, No 3: June 2016 Vol 6, No 2: April 2016 Vol 6, No 1: February 2016 Vol 5, No 6: December 2015 Vol 5, No 5: October 2015 Vol 5, No 4: August 2015 Vol 5, No 3: June 2015 Vol 5, No 2: April 2015 Vol 5, No 1: February 2015 Vol 4, No 6: December 2014 Vol 4, No 5: October 2014 Vol 4, No 4: August 2014 Vol 4, No 3: June 2014 Vol 4, No 2: April 2014 Vol 4, No 1: February 2014 Vol 3, No 6: December 2013 Vol 3, No 5: October 2013 Vol 3, No 4: August 2013 Vol 3, No 3: June 2013 Vol 3, No 2: April 2013 Vol 3, No 1: February 2013 Vol 2, No 6: December 2012 Vol 2, No 5: October 2012 Vol 2, No 4: August 2012 Vol 2, No 3: June 2012 Vol 2, No 2: April 2012 Vol 2, No 1: February 2012 Vol 1, No 2: December 2011 Vol 1, No 1: September 2011 More Issue