cover
Contact Name
Tole Sutikno
Contact Email
ijece@iaesjournal.com
Phone
-
Journal Mail Official
ijece@iaesjournal.com
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
International Journal of Electrical and Computer Engineering
ISSN : 20888708     EISSN : 27222578     DOI : -
International Journal of Electrical and Computer Engineering (IJECE, ISSN: 2088-8708, a SCOPUS indexed Journal, SNIP: 1.001; SJR: 0.296; CiteScore: 0.99; SJR & CiteScore Q2 on both of the Electrical & Electronics Engineering, and Computer Science) is the official publication of the Institute of Advanced Engineering and Science (IAES). The journal is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication and computer engineering from the global world.
Articles 151 Documents
Search results for , issue "Vol 8, No 6: December 2018" : 151 Documents clear
Process Mining in Supply Chains: A Systematic Literature Review Bambang Jokonowo; Jan Claes; Riyanarto Sarno; Siti Rochimah
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 6: December 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (18.006 KB) | DOI: 10.11591/ijece.v8i6.pp4626-4636

Abstract

Performance analysis and continuous process improvement efforts are often supported by the construction of process models representing the interactions of the partners in the supply chain. This study was conducted to determine the state of the art in the process mining field, specifically in the context of cross-organizational process. The Systematic Literature Review (SLR) method is used to review a collection of twenty-one papers that are classified according to the Artifact framework of Hevner, et al. and within the Process Mining framework of Van der Aalst. In the reviewed papers, the authors conducted a variety of techniques to establish the event log, which is then used to perform the process mining analysis. Eight of the reviewed papers focus on the definition of concepts or measures. Five of the papers describe models and other abstractions that are used as a theoretical basis for process mining in the context of supply chains. The majority twenty of papers describe some kind of informal method or formal algorithm to perform process mining analysis. Nine of the papers that propose a formal algorithm also present an accompanying software implementation. Eight papers discuss the data preparation challenges and twelve papers discuss process discovery techniques.
A Two Channel Analog Front end Design AFE Design with Continuous Time Σ-Δ Modulator for ECG Signal Mohammed Abdul Raheem; K Manjunathachari
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 6: December 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (364.411 KB) | DOI: 10.11591/ijece.v8i6.pp5041-5049

Abstract

In this context, the AFE with 2-channels is described, which has high impedance for low power application of bio-medical electrical activity. The challenge in obtaining accurate recordings of biomedical signals such as EEG/ECG to study the human body in research work. This paper is to propose Multi-Vt in AFE circuit design cascaded with CT modulator. The new architecture is anticipated with two dissimilar input signals filtered from 2-channel to one modulator. In this methodology, the amplifier is low powered multi-VT Analog Front-End which consumes less power by applying dual threshold voltage. Type -I category 2 channel signals of the first mode: 50 and 150 Hz amplified from AFE are given to 2nd CT sigma-delta ADC. Depict the SNR and SNDR as 63dB and 60dB respectively, consuming the power of 11mW. The design was simulated in a 0.18 um standard UMC CMOS process at 1.8V supply. The AFE measured frequency response from 50 Hz to 360 Hz, depict the SNR and SNDR as 63dB and 60dB respectively, consuming the power of 11mW. The design was simulated in 0.18 m standard UMC CMOS process at 1.8V supply. The AFE measured frequency response from 50 Hz to 360 Hz, programmable gains from 52.6 dB to 72 dB, input referred noise of 3.5 μV in the amplifier bandwidth, NEF of 3.
A Survey of Arabic Text Classification Models Ahed M. F. Al-Sbou
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 6: December 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (248.85 KB) | DOI: 10.11591/ijece.v8i6.pp4352-4355

Abstract

There is a huge content of Arabic text available over online that requires an organization of these texts. As result, here are many applications of natural languages processing (NLP) that concerns with text organization. One of the is text classification (TC). TC helps to make dealing with unorganized text. However, it is easier to classify them into suitable class or labels. This paper is a survey of Arabic text classification. Also, it presents comparison among different methods in the classification of Arabic texts, where Arabic text is represented a complex text due to its vocabularies. Arabic language is one of the richest languages in the world, where it has many linguistic bases. The researche in Arabic language processing is very few compared to English. As a result, these problems represent challenges in the classification, and organization of specific Arabic text. Text classification (TC) helps to access the most documents, or information that has already classified into specific classes, or categories to one or more classes or categories. In addition, classification of documents facilitate search engine to decrease the amount of document to, and then to become easier to search and matching with queries.
Analysing Tuberculosis Trends in South Asia Kumar Abhishek; M. P Singh; Md. Sadik Hussain
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 6: December 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (517.597 KB) | DOI: 10.11591/ijece.v8i6.pp5245-5252

Abstract

Tuberculosis (TB) has been one of the top ten causes of death in the world. As per the World Health Organization (WHO) around 1.8 million people have died due to tuberculosis in 2015. This paper aims to investigate the spatial and temporal variations in TB incident in South Asia (India, Bangladesh, Pakistan, Maldives, Nepal, and Sri-Lanka). Asia had been counted for the largest number of new TB cases in 2015. The paper underlines and relates the relationship between various features like gender, age, location, occurrence, and mortality due to TB in these countries for the period 1993-2012.
MetOp Satellites Data Processing for Air Pollution Monitoring in Morocco Mohamed Akram Zaytar; Chaker El Amrani
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 6: December 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (769.17 KB) | DOI: 10.11591/ijece.v8i6.pp4584-4592

Abstract

This paper presents a data processing system based on an architecture comprised of multiple stacked layers of computational processes that transforms Raw Binary Pollution Data coming directly from Two EUMETSAT MetOp satellites to our servers, into ready to interpret and visualise continuous data stream in near real time using techniques varying from task automation, data preprocessing and data analysis to machine learning using feedforward artificial neural networks. The proposed system handles the acquisition, cleaning, processing, normalizing, and predicting of Pollution Data in our area of interest of Morocco.
Post Event Investigation of Multi-stream Video Data Utilizing Hadoop Cluster Jyoti Parsola; Durgaprasad Gangodkar; Ankush Mittal
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 6: December 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (811.619 KB) | DOI: 10.11591/ijece.v8i6.pp5089-5097

Abstract

Rapid advancement in technology and in-expensive camera has raised the necessity of monitoring systems for surveillance applications. As a result data acquired from numerous cameras deployed for surveillance is tremendous. When an event is triggered then, manually investigating such a massive data is a complex task. Thus it is essential to explore an approach that, can store massive multi-stream video data as well as, process them to find useful information. To address the challenge of storing and processing multi-stream video data, we have used Hadoop, which has grown into a leading computing model for data intensive applications. In this paper we propose a novel technique for performing post event investigation on stored surveillance video data. Our algorithm stores video data in HDFS in such a way that it efficiently identifies the location of data from HDFS based on the time of occurrence of event and perform further processing. To prove efficiency of our proposed work, we have performed event detection in the video based on the time period provided by the user. In order to estimate the performance of our approach, we evaluated the storage and processing of video data by varying (i) pixel resolution of video frame (ii) size of video data (iii) number of reducers (workers) executing the task (iv) the number of nodes in the cluster. The proposed framework efficiently achieve speed up of 5.9 for large files of 1024X1024 pixel resolution video frames thus makes it appropriate for the feasible practical deployment in any applications.
Elliptic Curve Cryptography Based Data Transmission against Blackhole Attack in MANET Jeenat Sultana; Tasnuva Ahmed
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 6: December 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1325.657 KB) | DOI: 10.11591/ijece.v8i6.pp4412-4422

Abstract

Mobile nodes roaming around in the hostile environment of mobile adhoc network (MANET) play the role of router as well as terminal. While acting as a router, a node needs to choose a reliable routing protocol. Besides, an encryption algorithm is needed to secure data to be conveyed through the unfriendly atmosphere while acting as a terminal. We have implemented Elliptic Curve Cryptography (ECC) along with Adhoc On Demand Multipath Distance Vector (AOMDV) routing protocol to secure data transmission against blackhole attack in a MANET. ECC, a public key cryptography that works on discrete logarithm problem with a much smaller key size, has been used to encrypt data packets at source node before transmission. We have used AOMDV, a reliable routing protocol compared to its parent protocol, Adhoc On Demand Distance Vector (AODV), with a multipath extension, for routing. The encrypted packets transferring between nodes via AOMDV, has been proved secured against blackhole attack. The performance of the secured protocol has been analyzed in terms of different performance metrics and in terms of varying number of blackhole attacker nodes.
Smart Microwave Oven with Image Classification and Temperature Recommendation Algorithm Tareq Khan
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 6: December 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (13.995 KB) | DOI: 10.11591/ijece.v8i6.pp4239-4252

Abstract

When food is warmed in a microwave oven, the user guesses the estimated time for the heating. This cognitive process of guessing can be incorrect - resulting the final food temperature to be too hot or still cold. In this research, a novel closed-loop microwave oven is designed which automatically suggests the target temperature of a food by learning from previous experiences and the heating stops automatically when the food temperature reaches the target temperature. The proposed microwave captures and classifies the food image, and recommends the target temperature, thus the user does not need to remember the target food temperature each time the same food is warmed. The algorithm gradually learns the type of foods that are used in that household and becomes smarter in the recommendation. The proposed algorithm can recommend target temperature with an accuracy of 86.31% for solid food and 100% for liquid food. A prototype of the proposed microwave is developed using the embedded system and tested.
Complaint Analysis in Indonesian Language Using WPKE and RAKE Algorithm Rini Wongso; Novita Hanafiah; Jaka Hartanto; Alexander Kevin; Charles Sutanto; Fiona Kesuma
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 6: December 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (371.603 KB) | DOI: 10.11591/ijece.v8i6.pp5311-5317

Abstract

Social media provides convenience in communicating and can present two-way communication that allows companies to interact with their customer. Companies can use information obtained from social media to analyze how the communities respond to their services or products. The biggest challenge in processing information in social media like Twitter, is the unstructured sentences which could lead to incorrect text processing. However, this information is very important for companies’ survival. In this research, we proposed a method to extract keywords from tweets in Indonesian language, WPKE. We compared it with RAKE, an algorithm that is language independent and usually used for keyword extraction. Finally, we develop a method to do clustering to groups the topics of complaints with data set obtained from Twitter using the “komplain” hashtag. Our method can obtain the accuracy of 72.92% while RAKE can only obtain 35.42%.
Multi-Channel Preemptive Priority Model for Spectrum Mobility in Cognitive Radio Networks S. E. Saad; I. F. Tarrad; A. A. Ammar
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 6: December 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (559.515 KB) | DOI: 10.11591/ijece.v8i6.pp5169-5177

Abstract

Cognitive Radio techniques have been proposed for improving utilization of the spectrum by exploiting the unoccupied bands of the licensed spectrum. This paper proposes a preemptive multi-channel access model for prioritized cognitive radio networks using an iterative method of queuing theory to solve the spectrum scarcity problem. The proposed model formulates accurate closed form of an expected waiting time in the queue, an expected number of users in the queue, an expected waiting time in the system, and an expected number of users in the system. The results compared to the basic model (without preemptive priority) show that, the waiting time in queue and the waiting time in the system compared to the basic model will be improved by 92.99% and 33.15% respectively for class one secondary user. The results also show that, the waiting time in queue and the waiting time in the system will be improved by 43.25% and 15.42% respectively for class two secondary users. The proposed model investigates the desirable schedules of primary and secondary users.

Filter by Year

2018 2018


Filter By Issues
All Issue Vol 16, No 1: February 2026 Vol 15, No 6: December 2025 Vol 15, No 5: October 2025 Vol 15, No 4: August 2025 Vol 15, No 3: June 2025 Vol 15, No 2: April 2025 Vol 15, No 1: February 2025 Vol 14, No 6: December 2024 Vol 14, No 5: October 2024 Vol 14, No 4: August 2024 Vol 14, No 3: June 2024 Vol 14, No 2: April 2024 Vol 14, No 1: February 2024 Vol 13, No 6: December 2023 Vol 13, No 5: October 2023 Vol 13, No 4: August 2023 Vol 13, No 3: June 2023 Vol 13, No 2: April 2023 Vol 13, No 1: February 2023 Vol 12, No 6: December 2022 Vol 12, No 5: October 2022 Vol 12, No 4: August 2022 Vol 12, No 3: June 2022 Vol 12, No 2: April 2022 Vol 12, No 1: February 2022 Vol 11, No 6: December 2021 Vol 11, No 5: October 2021 Vol 11, No 4: August 2021 Vol 11, No 3: June 2021 Vol 11, No 2: April 2021 Vol 11, No 1: February 2021 Vol 10, No 6: December 2020 Vol 10, No 5: October 2020 Vol 10, No 4: August 2020 Vol 10, No 3: June 2020 Vol 10, No 2: April 2020 Vol 10, No 1: February 2020 Vol 9, No 6: December 2019 Vol 9, No 5: October 2019 Vol 9, No 4: August 2019 Vol 9, No 3: June 2019 Vol 9, No 2: April 2019 Vol 9, No 1: February 2019 Vol 8, No 6: December 2018 Vol 8, No 5: October 2018 Vol 8, No 4: August 2018 Vol 8, No 3: June 2018 Vol 8, No 2: April 2018 Vol 8, No 1: February 2018 Vol 7, No 6: December 2017 Vol 7, No 5: October 2017 Vol 7, No 4: August 2017 Vol 7, No 3: June 2017 Vol 7, No 2: April 2017 Vol 7, No 1: February 2017 Vol 6, No 6: December 2016 Vol 6, No 5: October 2016 Vol 6, No 4: August 2016 Vol 6, No 3: June 2016 Vol 6, No 2: April 2016 Vol 6, No 1: February 2016 Vol 5, No 6: December 2015 Vol 5, No 5: October 2015 Vol 5, No 4: August 2015 Vol 5, No 3: June 2015 Vol 5, No 2: April 2015 Vol 5, No 1: February 2015 Vol 4, No 6: December 2014 Vol 4, No 5: October 2014 Vol 4, No 4: August 2014 Vol 4, No 3: June 2014 Vol 4, No 2: April 2014 Vol 4, No 1: February 2014 Vol 3, No 6: December 2013 Vol 3, No 5: October 2013 Vol 3, No 4: August 2013 Vol 3, No 3: June 2013 Vol 3, No 2: April 2013 Vol 3, No 1: February 2013 Vol 2, No 6: December 2012 Vol 2, No 5: October 2012 Vol 2, No 4: August 2012 Vol 2, No 3: June 2012 Vol 2, No 2: April 2012 Vol 2, No 1: February 2012 Vol 1, No 2: December 2011 Vol 1, No 1: September 2011 More Issue