cover
Contact Name
Tole Sutikno
Contact Email
ijece@iaesjournal.com
Phone
-
Journal Mail Official
ijece@iaesjournal.com
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
International Journal of Electrical and Computer Engineering
ISSN : 20888708     EISSN : 27222578     DOI : -
International Journal of Electrical and Computer Engineering (IJECE, ISSN: 2088-8708, a SCOPUS indexed Journal, SNIP: 1.001; SJR: 0.296; CiteScore: 0.99; SJR & CiteScore Q2 on both of the Electrical & Electronics Engineering, and Computer Science) is the official publication of the Institute of Advanced Engineering and Science (IAES). The journal is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication and computer engineering from the global world.
Articles 81 Documents
Search results for , issue "Vol 9, No 1: February 2019" : 81 Documents clear
Generating similarity cluster of Indonesian languages with semi-supervised clustering Arbi Haza Nasution; Yohei Murakami; Toru Ishida
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 1: February 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (435.142 KB) | DOI: 10.11591/ijece.v9i1.pp531-538

Abstract

Lexicostatistic and language similarity clusters are useful for computational linguistic researches that depends on language similarity or cognate recognition. Nevertheless, there are no published lexicostatistic/language similarity cluster of Indonesian ethnic languages available. We formulate an approach of creating language similarity clusters by utilizing ASJP database to generate the language similarity matrix, then generate the hierarchical clusters with complete linkage and mean linkage clustering, and further extract two stable clusters with high language similarities. We introduced an extended k-means clustering semi-supervised learning to evaluate the stability level of the hierarchical stable clusters being grouped together despite of changing the number of cluster. The higher the number of the trial, the more likely we can distinctly find the two hierarchical stable clusters in the generated k-clusters. However, for all five experiments, the stability level of the two hierarchical stable clusters is the highest on 5 clusters. Therefore, we take the 5 clusters as the best clusters of Indonesian ethnic languages. Finally, we plot the generated 5 clusters to a geographical map.
Modeling of the magnetizing phenomena of doubly fed induction generator using neuro-fuzzy algorithm considering non-linearity Julia Tholath Jose; Adhir Baran Chattopadhyay
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 1: February 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (926.634 KB) | DOI: 10.11591/ijece.v9i1.pp23-33

Abstract

Doubly fed Induction Generators (DFIGs) are quite common in wind energy conversion systems because of their variable speed nature and the lower rating of converters. Magnetic flux saturation in the DFIG significantly affect its behavior during transient conditions such as voltage sag, sudden change in input power and short circuit. The effect of including saturation in the DFIG modeling is significant in determining the transient performance of the generator after a disturbance. To include magnetic saturation in DFIG model, an accurate representation of the magnetization characteristics is inevitable. This paper presents a qualitative modeling for magnetization characteristics of doubly fed induction generator using neuro-fuzzy systems. Neuro-fuzzy systems with one hidden layer of Gaussian nodes are capable of approximating continuous functions with arbitrary precision. The results obtained are compared with magnetization characteristics obtained using discrete fourier transform, polynomial and exponential curve fitting. The error analysis is also done to show the effectiveness of the neuro fuzzy modeling of magnetizing characteristics. By neuro-fuzzy algorithm, fast learning convergence is observed and great performance in accuracy is achieved.
The role of speech technology in biometrics, forensics and man-machine interface Satyanand Singh
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 1: February 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (831.48 KB) | DOI: 10.11591/ijece.v9i1.pp281-288

Abstract

Day by day Optimism is growing that in the near future our society will witness the Man-Machine Interface (MMI) using voice technology. Computer manufacturers are building voice recognition sub-systems in their new product lines. Although, speech technology based MMI technique is widely used before, needs to gather and apply the deep knowledge of spoken language and performance during the electronic machine-based interaction. Biometric recognition refers to a system that is able to identify individuals based on their own behavior and biological characteristics. Fingerprint success in forensic science and law enforcement applications with growing concerns relating to border control, banking access fraud, machine access control and IT security, there has been great interest in the use of fingerprints and other biological symptoms for the automatic recognition. It is not surprising to see that the application of biometric systems is playing an important role in all areas of our society. Biometric applications include access to smartphone security, mobile payment, the international border, national citizen register and reserve facilities. The use of MMI by speech technology, which includes automated speech/speaker recognition and natural language processing, has the significant impact on all existing businesses based on personal computer applications. With the help of powerful and affordable microprocessors and artificial intelligence algorithms, the human being can talk to the machine to drive and control all computer-based applications. Today's applications show a small preview of a rich future for MMI based on voice technology, which will ultimately replace the keyboard and mouse with the microphone for easy access and make the machine more intelligent.
Solar energy based impedance-source inverter for grid system S. Kamalakkannan; D. Kirubakaran
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 1: February 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1406.591 KB) | DOI: 10.11591/ijece.v9i1.pp102-108

Abstract

In this work, the fickleness of solar energy can be overcome by using Maximum Power Point Tracking algorithm (MPPT). Perturb and Observation (P&O) MPPT algorithm accomplish fast the maximum power point for rapid change of environmental conditions such as irradiance intensity and temperature. The MPPT algorithm applied to solar PV system keep the boost converter output constant. Output from boost converter is taken to three phase impedance-source inverter with RL load and grid system. Impedance-source inverter performs the transformation of variable DC output of the solar PV system in to near sinusoidal AC output. This near sinusoidal AC output consecutively is served to the RL load first and then to grid system. The simulation is carried out in matlab/simulink platform both for RL load and grid system and the simulation results are experimentally validated for RL load arrangement only.
Enhanced model for ergonomic evaluation of information systems: application to scientific research information system Khaoula Benmoussa; Majida Laaziri; Samira Khoulji; Kerkeb Mohamed Larbi; Abir El Yamami
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 1: February 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1590.998 KB) | DOI: 10.11591/ijece.v9i1.pp683-694

Abstract

Considering the importance of the ergonomic aspect for information systems in providing an easy use of the computing systems, this paper focuses on the elaboration of a hybrid model for the ergonomic evaluation of information systems that merges a set of inspection dimensions such as accessibility, practicality, emotionality, and technological persuasion. Details on how the model has been constructed and data have been collected are presented. For the evaluation of our model, a situation of an information system for scientific research (SIMArech) in Moroccan Universities has been studied. This model can be used by ergonomist and human factor professionals. It is found that the proposed heuristics can effectively assess the most important dimensions of scientific research information systems.
Spam image email filtering using K-NN and SVM Yasmine Khalid Zamil; Suhad A. Ali; Mohammed Abdullah Naser
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 1: February 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1124.041 KB) | DOI: 10.11591/ijece.v9i1.pp245-254

Abstract

The developing utilization of web has advanced a simple and quick method for e-correspondence. The outstanding case for this is e-mail. Presently days sending and accepting email as a method for correspondence is prominently utilized. Be that as it may, at that point there stand up an issue in particular, Spam mails. Spam sends are the messages send by some obscure sender just to hamper the improvement of Internet e.g. Advertisement and many more.  Spammers introduced the new technique of embedding the spam mails in the attached image in the mail. In this paper, we proposed a method based on combination of SVM and KNN. SVM tend to set aside a long opportunity to prepare with an expansive information set. On the off chance that "excess" examples are recognized and erased in pre-handling, the preparation time could be diminished fundamentally. We propose a k-nearest neighbor (k-NN) based example determination strategy. The strategy tries to select the examples that are close to the choice limit and that are effectively named. The fundamental thought is to discover close neighbors to a question test and prepare a nearby SVM that jelly the separation work on the gathering of neighbors. Our experimental studies based on a public available dataset (Dredze) show that results are improved to approximately 98%.
Obtrusiveness of smartphone applications for sleep health M. Vazquez-Briseno; A. Laflor-Hernandez; Fernanda Murillo-Muñoz; Doreen Mendez-Verdugo
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 1: February 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (291 KB) | DOI: 10.11591/ijece.v9i1.pp676-682

Abstract

Unobtrusiveness is one of the main issues concerning health-related systems. Many developers affirm that their systems do not burden users; however, this is not always achieved. This article evaluates the obtrusiveness of various systems developed to improve sleep quality. The systems analyzed are related to sleep hygiene, since it has become an interesting topic for researchers, physicians and people in general, mainly because it has become part of the methods used to estimate a persons’ health status A set of design elements are presented as keys to achieving unobtrusiveness. We propose a scale to measure the level of unobtrusiveness and use it to evaluate several systems, with a focus on smartphone applications. 
Implementation and design of new low-cost foot pressure sensor module using piezoelectric sensor in T-FLoW humanoid robot R. Dimas Pristovani; Dewanto Sanggar; Pramadihanto Dadet
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 1: February 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1531.541 KB) | DOI: 10.11591/ijece.v9i1.pp203-214

Abstract

Basically, human can sense the active body force trough the soles of their feet and can feel the position vector of zero moment point (ZMP) based on the center of pressure (CoP) from active body force. This behavior is adapted by T-FLoW humanoid robot using unique sensor which is piezoelectric sensor. Piezoelectric sensor has a characteristic which is non-continuous reading (record a data only a moment). Because of it, this sensor cannot be used to stream data such as flex sensor, loadcell sensor, and torque sensor like previous research. Therefore, the piezoelectric sensor still can be used to measure the position vector of ZMP. The idea is using this sensor in a special condition which is during landing condition. By utilizing 6 unit of piezoelectric sensor with a certain placement, the position vector of ZMP (X-Y-axis) and pressure value in Z-axis from action body force can be found. The force resultant method is used to find the position vector of ZMP from each piezoelectric sensor. Based on those final conclusions in each experiment, the implementation of foot pressure sensor modul using piezoelectric sensor has a good result (94%) as shown in final conclusions in each experiment. The advantages of this new foot pressure sensor modul is low-cost design and similar result with another sensor. The disadvantages of this sensor are because of the main characteristic of piezoelectric sensor (non-continuous read) sometimes the calculation has outlayer data.
Nolong.in: an android based incident notification application with push notification technology Arthur Bachtiar Gunawan; Seng Hansun; Marcel Bonar Kristanda
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 1: February 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (934.975 KB) | DOI: 10.11591/ijece.v9i1.pp485-495

Abstract

In driving, the most important thing to be considered is safety. The incident problem can happen anytime and anywhere without anyone knowing it before, especially in Cikarang where the level of incident is quite high. It is very important for the public community to act and respond quickly at the time on and around the occurring incident. Nolong.in application is an exact solution because it can send real time notifications to its users. This response is meant to assist individuals who have been using Nolong.in to help other users who need urgent help when the time of incident in order to prevent unwanted situations. In this research, push notification method has been implemented by using Firebase Cloud Messaging (FCM). The result of the research is the notification click ratio is 90.91% and the click time is 1 minute and 27 seconds. Based on the questionnaires’ results given to the community conclude that Nolong.in application is very beneficial for Gojek Cikarang community's safety.
Bin packing algorithms for virtual machine placement in cloud computing: a review Kumaraswamy S; Mydhili K Nair
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 1: February 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (264.284 KB) | DOI: 10.11591/ijece.v9i1.pp512-524

Abstract

Cloud computing has become more commercial and familiar. The Cloud data centers havhuge challenges to maintain QoS and keep the Cloud performance high. The placing of virtual machines among physical machines in Cloud is significant in optimizing Cloud performance. Bin packing based algorithms are most used concept to achieve virtual machine placement(VMP). This paper presents a rigorous survey and comparisons of the bin packing based VMP methods for the Cloud computing environment. Various methods are discussed and the VM placement factors in each methods are analyzed to understand the advantages and drawbacks of each method. The scope of future research and studies are also highlighted.

Filter by Year

2019 2019


Filter By Issues
All Issue Vol 16, No 1: February 2026 Vol 15, No 6: December 2025 Vol 15, No 5: October 2025 Vol 15, No 4: August 2025 Vol 15, No 3: June 2025 Vol 15, No 2: April 2025 Vol 15, No 1: February 2025 Vol 14, No 6: December 2024 Vol 14, No 5: October 2024 Vol 14, No 4: August 2024 Vol 14, No 3: June 2024 Vol 14, No 2: April 2024 Vol 14, No 1: February 2024 Vol 13, No 6: December 2023 Vol 13, No 5: October 2023 Vol 13, No 4: August 2023 Vol 13, No 3: June 2023 Vol 13, No 2: April 2023 Vol 13, No 1: February 2023 Vol 12, No 6: December 2022 Vol 12, No 5: October 2022 Vol 12, No 4: August 2022 Vol 12, No 3: June 2022 Vol 12, No 2: April 2022 Vol 12, No 1: February 2022 Vol 11, No 6: December 2021 Vol 11, No 5: October 2021 Vol 11, No 4: August 2021 Vol 11, No 3: June 2021 Vol 11, No 2: April 2021 Vol 11, No 1: February 2021 Vol 10, No 6: December 2020 Vol 10, No 5: October 2020 Vol 10, No 4: August 2020 Vol 10, No 3: June 2020 Vol 10, No 2: April 2020 Vol 10, No 1: February 2020 Vol 9, No 6: December 2019 Vol 9, No 5: October 2019 Vol 9, No 4: August 2019 Vol 9, No 3: June 2019 Vol 9, No 2: April 2019 Vol 9, No 1: February 2019 Vol 8, No 6: December 2018 Vol 8, No 5: October 2018 Vol 8, No 4: August 2018 Vol 8, No 3: June 2018 Vol 8, No 2: April 2018 Vol 8, No 1: February 2018 Vol 7, No 6: December 2017 Vol 7, No 5: October 2017 Vol 7, No 4: August 2017 Vol 7, No 3: June 2017 Vol 7, No 2: April 2017 Vol 7, No 1: February 2017 Vol 6, No 6: December 2016 Vol 6, No 5: October 2016 Vol 6, No 4: August 2016 Vol 6, No 3: June 2016 Vol 6, No 2: April 2016 Vol 6, No 1: February 2016 Vol 5, No 6: December 2015 Vol 5, No 5: October 2015 Vol 5, No 4: August 2015 Vol 5, No 3: June 2015 Vol 5, No 2: April 2015 Vol 5, No 1: February 2015 Vol 4, No 6: December 2014 Vol 4, No 5: October 2014 Vol 4, No 4: August 2014 Vol 4, No 3: June 2014 Vol 4, No 2: April 2014 Vol 4, No 1: February 2014 Vol 3, No 6: December 2013 Vol 3, No 5: October 2013 Vol 3, No 4: August 2013 Vol 3, No 3: June 2013 Vol 3, No 2: April 2013 Vol 3, No 1: February 2013 Vol 2, No 6: December 2012 Vol 2, No 5: October 2012 Vol 2, No 4: August 2012 Vol 2, No 3: June 2012 Vol 2, No 2: April 2012 Vol 2, No 1: February 2012 Vol 1, No 2: December 2011 Vol 1, No 1: September 2011 More Issue