cover
Contact Name
Tole Sutikno
Contact Email
ijece@iaesjournal.com
Phone
-
Journal Mail Official
ijece@iaesjournal.com
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
International Journal of Electrical and Computer Engineering
ISSN : 20888708     EISSN : 27222578     DOI : -
International Journal of Electrical and Computer Engineering (IJECE, ISSN: 2088-8708, a SCOPUS indexed Journal, SNIP: 1.001; SJR: 0.296; CiteScore: 0.99; SJR & CiteScore Q2 on both of the Electrical & Electronics Engineering, and Computer Science) is the official publication of the Institute of Advanced Engineering and Science (IAES). The journal is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication and computer engineering from the global world.
Articles 150 Documents
Search results for , issue "Vol 8, No 5: October 2018" : 150 Documents clear
Energy Aware Routing Protocol for Energy Constrained Mobile Ad-hoc Networks Nadeem Iqbal; Mohammad Shafie Bin Abd Latiff; Shafi’i Muhammad Abdulhamid
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 5: October 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (407.322 KB) | DOI: 10.11591/ijece.v8i5.pp2979-2987

Abstract

Dynamic topology change and decentralized makes routing a challenging task in mobile ad hoc network. Energy efficient routing is the most challenging task in MANET due to limited energy of mobile nodes. Limited power of batteries typically use in MANET, and this is not easy to change or replace while running communication. Network disorder can occur for many factors but in middle of these factors deficiency of energy is the most significant one for causing broken links and early partition of the network. Evenly distribution of power between nodes could enhance the lifetime of the network, which leads to improving overall network transmission and minimizes the connection request. To discourse this issue, we propose an Energy Aware Routing Protocol (EARP) which considers node energy in route searching process and chooses nodes with higher energy levels. The EARP aim is to establish the shortest route from source to destination that contains energy efficient nodes. The performance of EARP is evaluated in terms of packet delivery ratio, network lifetime, end-to-end delay and throughput. Results of simulation done by using NS2 network simulator shows that EARP can achieve both high throughput and delivery ratio, whereas increase network lifetime and decreases end-to-end delay.
Real-time Multi-object Face Recognition Using Content Based Image Retrieval (CBIR) Muhammad Fachrurrozi; Saparudin Saparudin; Erwin Erwin; Mardiana Mardiana; Clara Fin Badillah; Junia Erlina; Auzan Lazuardi
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 5: October 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (269.606 KB) | DOI: 10.11591/ijece.v8i5.pp2812-2817

Abstract

Face recognition system in real time is divided into three processes, namely feature extraction, clustering, detection, and recognition. Each of these stages uses different methods, Local Binary Pattern (LBP), Agglomerative Hierarchical Clustering (AHC) and Euclidean Distance. Multi-face image search using Content Based Image Retrieval (CBIR) method. CBIR performs image search by image feature itself. Based on real time trial results, the accuracy value obtained is 61.64%.  
Probabilistic Performance Index based Contingency Screening for Composite Power System Reliability Evaluation Venkata Satheesh Babu K; Madhusudan V; Ganesh V
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 5: October 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (285.328 KB) | DOI: 10.11591/ijece.v8i5.pp2661-2670

Abstract

Composite power system reliability involves assessing the adequacy of generation and transmission system to meet the demand at major system load points. Contingency selection was being the most tedious step in reliability evaluation of large electric systems. Contingency in power system might be a possible event in future which was not predicted with certainty in earlier research. Therefore, uncertainty may be inevitable in power system operation. Deterministic indices may not guarantee the randomness in reliability assessment. In order to account for volatility in contingencies, a new performance index proposed in the current research. Proposed method assimilates the uncertainty in computational procedure. Reliability test systems like Roy Billinton Test System-6 bus system and IEEE-24 bus reliability test systems were used to test the effectiveness of a proposed method.
User Selective Encryption Method for Securing MANETs Amal Ahmad; Shereen Ismail
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 5: October 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (260.11 KB) | DOI: 10.11591/ijece.v8i5.pp3103-3111

Abstract

Security issue is getting important day by day. At present, there are a variety of methodologies to provide protection for data confidentiality. MANETs have lots of security challenges than traditional networks like infrastructureless and self-organizing requirements. As the MANETs are dynamic networks that’s make every transmission in such networks vulnerable to many attacks and improving security level becomes a main issue. This paper introduces a user selective encryption method by operating Data Encryption Standard (DES), Triple DES (3DES), Advanced Encryption Standard (AES) and the Diffie-Hellman Key Exchange (DHKE) protocol for key management in order to improve MANET security. Through the Network Simulator-2 (NS-2), the we investigate the performance of the proposed method in terms of data transfer time and network throughput for different data sizes and different sender-to-receiver number of hops. The results show the superiority of AES over other encryption algorithms. Furthermore, the effectiveness of our proposed method is verified through comparing our results with those obtained from previous studies.
Simplified Space Vector Pulse Width Modulation based on Switching Schemes with Reduced Switching Frequency and Harmonics for Five Level Cascaded H-Bridge Inverter B. Sirisha; P. Satishkumar
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 5: October 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (621.159 KB) | DOI: 10.11591/ijece.v8i5.pp3417-3426

Abstract

This paper presents a simplified control strategy of spacevector pulse width modulation technique with a three segment switching sequence and seven segment switching sequence for high power applications of multilevel inverters. In the proposed method, the inverter switching sequences are optimized for minimization of device switching frequency and improvement of harmonic spectrum by using the three most desired switching states and one suitable redundant state for each space vector. The proposed three-segment sequence is compared with conventional seven-segment sequence for five level Cascaded H-Bridge inverter with various values of switching frequencies including very low frequency. The output spectrum of the proposed sequence design shows the reduction of device switching frequency, current and line voltage THD, thereby minimizing the filter size requirement of the inverter, employed in industrial applications, where sinusoidal output voltage is required.
Balancing Compression and Encryption of Satellite Imagery Ali J. Abboud; Ali N. Albu-Rghaif; Abbood Kirebut Jassim
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 5: October 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1945.7 KB) | DOI: 10.11591/ijece.v8i5.pp3568-3586

Abstract

With the rapid developments in the remote sensing technologies and services, there is a necessity for combined compression and encryption of satellite imagery. The onboard satellite compression is used to minimize storage and communication bandwidth requirements of high data rate satellite applications. While encryption is employed to secure these resources and prevent illegal use of image sensitive information. In this paper, we propose an approach to address these challenges which raised in the highly dynamic satellite based networked environment. This approach combined compression algorithms (Huffman and SPIHT) and encryptions algorithms (RC4, blowfish and AES) into three complementary modes: (1) secure lossless compression, (2) secure lossy compression and (3) secure hybrid compression. The extensive experiments on the 126 satellite images dataset showed that our approach outperforms traditional and state of art approaches by saving approximately (53%) of computational resources. In addition, the interesting feature of this approach is these three options that mimic reality by imposing every time a different approach to deal with the problem of limited computing and communication resources.
CBIR of Batik Images using Micro Structure Descriptor on Android Agus Eko Minarno; Yuda Munarko; Arrie Kurniawardhani
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 5: October 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (499.175 KB) | DOI: 10.11591/ijece.v8i5.pp3778-3783

Abstract

Batik is part of a culture that has long developed and known by the people of Indonesia and the world. However, the knowledge is only on the name of batik, not at a more detailed level, such as image characteristic and batik motifs. Batik motif is very diverse, different areas have their own motifs and patterns related to local customs and values. Therefore, it is important to introduce knowledge about batik motifs and patterns effectively and efficiently. So, we build CBIR batik using Micro-Structure Descriptor (MSD) method on Android platform. The data used consisted of 300 images with 50 classes with each class consists of six images. Performance test is held in three scenarios, which the data is divided as test data and data train, with the ratio of scenario 1 is 50%: 50%, scenario 2 is 70%, 30%, and scenario 3 is 80%: 20%. The best results are generated by scenario 3 with precision valur 65.67% and recall value 65.80%, which indicates that the use of MSD on the android platform for CBIR batik performs well.
A Statistical Approach to Adaptive Playout Scheduling in Voice Over Internet Protocol Communication Priya Chandran; Chelpa Lingam
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 5: October 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (282.771 KB) | DOI: 10.11591/ijece.v8i5.pp2926-2933

Abstract

Factors like network delay, latency and bandwidth significantly affect the quality of communication using Voice over Internet Protocol. The use of jitter buffer at the receiving end compensates the effect of varying network delay up to some extent. But the extra buffer delay given for each packet plays a major role in playing late packets and thereby improving voice quality. As the buffer delay increases packet loss rate decreases, which in general is a very good sign. However, an increase of buffer delay beyond a certain limit affects the interactive quality of voice communication. In this paper, we propose a statistical framework for adaptive playout scheduling of voice packets based on network statistics, packet loss rate and availability of packets in the buffer. Experimental results show that the proposed model allocates optimal buffer delay with the lowest packet loss rate when compared with other algorithms.
Modeling of a Microwave Amplifier Operating around 11 GHz for Radar Applications Mohammed Lahsaini; Lahbib Zenkouar; Seddik Bri
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 5: October 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (469.876 KB) | DOI: 10.11591/ijece.v8i5.pp3496-3503

Abstract

The low noise amplifier is one of the basic functional blocks in communication systems. The main interest of the LNA at the input of the analog processing chain is to amplify the signal without adding significant noise. In this work, we have modeled a LNA for radar reception systems operating around 11 GHz, using the technique of impedance transformations with Smith chart utility. The type of transistor used is: the transistor HEMT AFP02N2-00 of Alpha Industries®. The results show that the modeled amplifier has a gain greater than 20 dB, a noise figure less than 2 dB, input and output reflection coefficients lower than -20 dB and unconditional stability.
Tolerance for Emotional Internet Infidelity and Its Correlate with Relationship Flourishing Bernadette Nathania Octaviana; Juneman Abraham
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 5: October 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (168.795 KB) | DOI: 10.11591/ijece.v8i5.pp3158-3168

Abstract

Until today, there is still controversy whether emotional Internet infidelity or cheating is something that can be tolerated. Existing views are diverse, influenced by geographical factors, cultural and ideological backgrounds, as well as biological theory. This present study initially suggested that the higher the relationship flourishing, the higher the tolerance for the infidelity. In an era where monogamous relationships are dynamized by the multiplication of relationship modes through online social networks, this study becomes increasingly urgent, i.e. to recommend a variable capable of providing a buffering effect to the deleterious effect of the infidelity. The study used correlational design. As much as 210 participants (55 males, 155 females, Mage=37.89 years old, SDage=10.870 years) were recruited in the Greater Area of Jakarta, Indonesia to fill out the Relationship Flourishing Scale and Internet Infidelity Tolerance-Emotional Infidelity Subscale. This study found that relationship flourishing and emotional Internet infidelity are negatively correlated (Spearman’s Rho=-0.172, p<0.05) and there is a moderating role of sex (coeff.=0.3481, p<0.05). That is, those with higher relationship flourishing would have a higher intolerance, especially among men. Such intolerance could lead to marital dissatisfaction and, at worst, divorce. The results of this study have implications for (1) an evaluation of psychometric dimensions of the Relationship Flourishing Scale, (2) the need of proposing moderating variables to be integrated into the correlational model between relationship flourishing and the infidelity, as well as (3) online applications development in detecting and managing the Internet infidelity.

Page 9 of 15 | Total Record : 150


Filter by Year

2018 2018


Filter By Issues
All Issue Vol 16, No 1: February 2026 Vol 15, No 6: December 2025 Vol 15, No 5: October 2025 Vol 15, No 4: August 2025 Vol 15, No 3: June 2025 Vol 15, No 2: April 2025 Vol 15, No 1: February 2025 Vol 14, No 6: December 2024 Vol 14, No 5: October 2024 Vol 14, No 4: August 2024 Vol 14, No 3: June 2024 Vol 14, No 2: April 2024 Vol 14, No 1: February 2024 Vol 13, No 6: December 2023 Vol 13, No 5: October 2023 Vol 13, No 4: August 2023 Vol 13, No 3: June 2023 Vol 13, No 2: April 2023 Vol 13, No 1: February 2023 Vol 12, No 6: December 2022 Vol 12, No 5: October 2022 Vol 12, No 4: August 2022 Vol 12, No 3: June 2022 Vol 12, No 2: April 2022 Vol 12, No 1: February 2022 Vol 11, No 6: December 2021 Vol 11, No 5: October 2021 Vol 11, No 4: August 2021 Vol 11, No 3: June 2021 Vol 11, No 2: April 2021 Vol 11, No 1: February 2021 Vol 10, No 6: December 2020 Vol 10, No 5: October 2020 Vol 10, No 4: August 2020 Vol 10, No 3: June 2020 Vol 10, No 2: April 2020 Vol 10, No 1: February 2020 Vol 9, No 6: December 2019 Vol 9, No 5: October 2019 Vol 9, No 4: August 2019 Vol 9, No 3: June 2019 Vol 9, No 2: April 2019 Vol 9, No 1: February 2019 Vol 8, No 6: December 2018 Vol 8, No 5: October 2018 Vol 8, No 4: August 2018 Vol 8, No 3: June 2018 Vol 8, No 2: April 2018 Vol 8, No 1: February 2018 Vol 7, No 6: December 2017 Vol 7, No 5: October 2017 Vol 7, No 4: August 2017 Vol 7, No 3: June 2017 Vol 7, No 2: April 2017 Vol 7, No 1: February 2017 Vol 6, No 6: December 2016 Vol 6, No 5: October 2016 Vol 6, No 4: August 2016 Vol 6, No 3: June 2016 Vol 6, No 2: April 2016 Vol 6, No 1: February 2016 Vol 5, No 6: December 2015 Vol 5, No 5: October 2015 Vol 5, No 4: August 2015 Vol 5, No 3: June 2015 Vol 5, No 2: April 2015 Vol 5, No 1: February 2015 Vol 4, No 6: December 2014 Vol 4, No 5: October 2014 Vol 4, No 4: August 2014 Vol 4, No 3: June 2014 Vol 4, No 2: April 2014 Vol 4, No 1: February 2014 Vol 3, No 6: December 2013 Vol 3, No 5: October 2013 Vol 3, No 4: August 2013 Vol 3, No 3: June 2013 Vol 3, No 2: April 2013 Vol 3, No 1: February 2013 Vol 2, No 6: December 2012 Vol 2, No 5: October 2012 Vol 2, No 4: August 2012 Vol 2, No 3: June 2012 Vol 2, No 2: April 2012 Vol 2, No 1: February 2012 Vol 1, No 2: December 2011 Vol 1, No 1: September 2011 More Issue