cover
Contact Name
Tole Sutikno
Contact Email
ijece@iaesjournal.com
Phone
-
Journal Mail Official
ijece@iaesjournal.com
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
International Journal of Electrical and Computer Engineering
ISSN : 20888708     EISSN : 27222578     DOI : -
International Journal of Electrical and Computer Engineering (IJECE, ISSN: 2088-8708, a SCOPUS indexed Journal, SNIP: 1.001; SJR: 0.296; CiteScore: 0.99; SJR & CiteScore Q2 on both of the Electrical & Electronics Engineering, and Computer Science) is the official publication of the Institute of Advanced Engineering and Science (IAES). The journal is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication and computer engineering from the global world.
Articles 82 Documents
Search results for , issue "Vol 9, No 3: June 2019" : 82 Documents clear
PID-based temperature control device for electric kettle Mohd Badril Nor Shah; Norfahaniza Zailany; Amar Faiz Zainal Abidin; Mohd Firdaus Halim; Khalil Azha Annuar; Arman Hadi Azahar; Muhamad Haniff Harun; Muhammad Faizal Yaakub
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 3: June 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (4323.294 KB) | DOI: 10.11591/ijece.v9i3.pp1683-1693

Abstract

A normal electric kettle usually is intended to boil water until boiling point and cannot be controlled. Most of the kettle does not provide the temperature display for user to track the current temperature reading. Thus, this project is inspired from the shortcoming of most kettles that are sold at the market. By using Arduino microcontroller, a device is developed to control water temperature inside electric kettle. To provide automated temperature control, PID controller is chosen since it can provides precise water temperature control with less fluctuation. The device is also equipped with the display of the current water temperature and desired temperature. The device is tested to an electric kettle and the performance of PID controller in controlling water temperature is compared to on-off controller. An analysis is performed based on the amount of fluctuation with respect to desired temperature to verify the efficacy of the designed circuit and controller. It is found that the developed device and PID controller are capable to control the water temperature inside kettle based on the desired temperature set by user with less amount of fluctuation
A cellular base station antenna configuration for variable coverage Abdul-Rahman Shakeeb; K. H. Sayidmarie
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 3: June 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (759.008 KB) | DOI: 10.11591/ijece.v9i3.pp1887-1893

Abstract

The field coverage offered by the base station antenna in GSM systems influences the reception and interference performances. The coverage can be varied by scanning the mainbeam direction or varying the shape of the radiation pattern. In cellular system applications, a simple technique is desirable to achieve this goal. A simple technique to vary the coverage of cellular base station is investigated. The technique uses two conventional antennas tilted by a certain angle and fed by the same signal but at variable amplitudes. It is demonstrated that the field across one half of the covered sector can be gradually increased while that at the other half is reduced by varying the excitations of the two antenna elements. This can be deployed in a simple electronic means in response to the changing scenario rather readjusting the direction of the base station antenna.
Novel steganography scheme using Arabic text features in Holy Quran Huda Kadhim Tayyeh; Mohammed Salih Mahdi; Ahmed Sabah Ahmed AL-Jumaili
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 3: June 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (613.024 KB) | DOI: 10.11591/ijece.v9i3.pp1910-1918

Abstract

With the rapid growth of the Internet and mobile devices, the need for hidden communications has significantly increased. Steganography is a technique introduced for establishing hidden communication, Most steganography techniques have been applied to audio, images, videos, and text. Many researchers used steganography in Arabic texts to take advantage of adding, editing or changing letters or diacritics, but lead to notable and suspicious text. In this paper, we propose two novel steganography algorithms for Arabic text using the Holy Quran as cover text. The fact that it is forbidden to add, edit or change any letter or diacritics in the Holy Quran provides the valuable feature of its robustness and difficulty as a cover in steganography. The algorithms hide secret messages elements within Arabic letters benefiting from the existence of sun letters (Arabic: ḥurūf shamsīyah) and moon letters (ḥurūf qamarīyah). Also, we consider the existence of some Arabic language characteristics represented as small vowel letters (Arabic Diacritics). Our experiments using the proposed two algorithms demonstrate high capacity for text files. The proposed algorithms are robust against attack since the changes in the cover text are imperceptible, so our contribution offers a more secure algorithm that provides good capacity.
Data collection algorithm for wireless sensor networks using collaborative mobile elements Alhasanat Abdullah; Alhasanat Khaled; Ahmed Maamoun
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 3: June 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (564.21 KB) | DOI: 10.11591/ijece.v9i3.pp2131-2140

Abstract

The simplest approach to reduce network latency for data gathering in wireless sensor networks (WSN) is to use multiple mobile elements rather than a single mobile sink. However, the most challneging issues faced this approach are firstly the high network cost as a result of using large number of mobile elements. Secondly, it suffers from the difficulty of network partitioning to achieve an efficient load balancing among these mobile elements. In this study, a collaborative data collection algorithm (CDCA) is developed. Simulation results presented in this paper demonstrated that with this algorithm the latency is significantly reduced at small number of mobile elements. Furthermore, the performance of CDCA algorithm is compared with the Area Splitting Algorithm (ASA). Consequently, the CDCA showed superior performance in terms of network latency, load balancing, and the required number of mobile elements.
How software size influence productivity and project duration Mridul Bhardwaj; Ajay Rana; Neeraj Kumar Sharma
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 3: June 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (630.585 KB) | DOI: 10.11591/ijece.v9i3.pp2006-2017

Abstract

To make a perfect project plan, the software size of the order from the customer is the most important factor. The biggest challenge for the project manager is to estimate the project end date in the beginning of the project i.e. in project planning phase with realistic accuracy. Apart from other major inputs to estimate the project end date, expected team capability (productivity) and estimated software size are the major inputs that may influence the project end date. Software size is one of the most significant independent metric available in the planning phase and project manager has to estimate the other metrics based on the initial estimated software size. There is no direct relationship available between software size and project duration or software size and team productivity, however, there are industry data published by Quantitative Software Management and ISBSG that shows how these metrics influence each other. In this paper, using the data published by ISBSG and Quantitative Software Management, we try to statistically establish how productivity and project duration are influenced by software size. We have done linear regression analysis by generating the secondary data based on the data published by ISBSG and Quantitative Software Management. Linear regression equation validated with the actual project data and experimental results suggest that that productivity is significantly dependent on software size, however, project duration does not significantly depend on software size but may also be dependent on other metrics like team size, apart from software size.
CMOS ring oscillator delay cell performance: a comparative study D. A. Hadi; A. Z. Jidin; N. Ab Wahab; Madiha Z.; Nurliyana Abd Mutalib; Siti Halma Johari; Suziana Ahmad; M. Nuzaimah
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 3: June 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (529.147 KB) | DOI: 10.11591/ijece.v9i3.pp1757-1764

Abstract

A common voltage-controlled oscillator (VCO) architecture used in the phase locked loop (PLL) is the ring oscillator (RO). RO consist of number of inverters cascaded together as the input of the first stage connected to the output of the last stage. It is important to design the RO to be work at desired frequency depend on application with low power consumption. This paper presents a review the performance evaluation of different delay cell topologies the implemented in the ring oscillator. The various topologies analyzed includes current starved delay cell, differential delay cell and current follower cell. Performance evaluation includes frequency range, frequency stability, phase noise and power consumption had been reviewed and comparison of different topologies has been discussed. It is observed that starved current delay cell have lower power consumption and the different of the frequency range is small as compared to other type of delay cell.
Information system to enhance medical services quality in Indonesia Susana Limanto; Andre Andre
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 3: June 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (565.988 KB) | DOI: 10.11591/ijece.v9i3.pp2049-2056

Abstract

The consequence of disproportionate distribution and placement of Doctor in Indonesia is affecting people who live in rural area. Patient have to travel to city to receive medical treatment and must encounter another different problem such as: patients often have to wait a long time in the doctor's office even sometimes do not get the service because of holiday or rejected because the queue is full. Medical record in some cases may lost due in Indonesia mostly medical record recorded manually (paper based). Therefore doctor treatment is not optimal because doctor can no longer inspect patient illness history and any treatment that have been conducted before. This research proposes a new concept to help people who live in rural area to get better medical treatment. People could register and monitor doctor service queue via smart phone. System expanded with medical record management facilities to improve service quality of patient. Research object was doctor service in Sulawesi, Indonesia. This research indicates system could increase time efficiency, energy, and cost efficiency for patient and also the doctor. Additionally current system will be optimal if supported with stable internet network.
Crosstalk in misaligned free space optical interconnects: modelling and simulation Nedal Al-Ababneh
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 3: June 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (946.506 KB) | DOI: 10.11591/ijece.v9i3.pp1620-1629

Abstract

We introduce convenient model and an optimization scheme to optimize the signal-to-crosstalk ratio (SCR) in a free space optical interconnects (FSOIs) system that uses microlenses with finite circular apertures. In this model, we consider both the stray light crosstalk and the crosstalk due to the diffraction at the microlens apertures to evaluate the SCR. Using cylindrical form of Collins diffraction integral and the Laguerre–Gaussian (LG) beam model, we derive an approximate closed form formula for the optical field of a multimode LG beam propagating through circular apertured FSOIs by expanding the hard edge circular aperture function of the microlens in terms of complex Gaussian functions. The analyses indicate that the size of the detector is an important factor to optimize the SCR for both the apertured and the unapertured misaligned FSOIs system. The effect of higher order mode of the laser source on the SCR is also considered. 
Optimal remote access trojans detection based on network behavior Khin Swe Yin; May Aye Khine
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 3: June 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (370.276 KB) | DOI: 10.11591/ijece.v9i3.pp2177-2184

Abstract

RAT is one of the most infected malware in the hyper-connected world. Data is being leaked or disclosed every day because new remote access Trojans are emerging and they are used to steal confidential data from target hosts. Network behavior-based detection has been used to provide an effective detection model for Remote Access Trojans. However, there is still short comings: to detect as early as possible, some False Negative Rate and accuracy that may vary depending on ratio of normal and malicious RAT sessions. As typical network contains large amount of normal traffic and small amount of malicious traffic, the detection model was built based on the different ratio of normal and malicious sessions in previous works. At that time false negative rate is less than 2%, and it varies depending on different ratio of normal and malicious instances. An unbalanced dataset will bias the prediction model towards the more common class. In this paper, each RAT is run many times in order to capture variant behavior of a Remote Access Trojan in the early stage, and balanced instances of normal applications and Remote Access Trojans are used for detection model. Our approach achieves 99 % accuracy and 0.3% False Negative Rate by Random Forest Algorithm.
Opinion mining on newspaper headlines using SVM and NLP Chaudhary Jashubhai Rameshbhai; Joy Paulose
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 3: June 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (2953.696 KB) | DOI: 10.11591/ijece.v9i3.pp2152-2163

Abstract

Opinion Mining also known as Sentiment Analysis, is a technique or procedure which uses Natural Language processing (NLP) to classify the outcome from text. There are various NLP tools available which are used for processing text data. Multiple research have been done in opinion mining for online blogs, Twitter, Facebook etc. This paper proposes a new opinion mining technique using Support Vector Machine (SVM) and NLP tools on newspaper headlines. Relative words are generated using Stanford CoreNLP, which is passed to SVM using count vectorizer. On comparing three models using confusion matrix, results indicate that Tf-idf and Linear SVM provides better accuracy for smaller dataset. While for larger dataset, SGD and linear SVM model outperform other models.

Filter by Year

2019 2019


Filter By Issues
All Issue Vol 16, No 1: February 2026 Vol 15, No 6: December 2025 Vol 15, No 5: October 2025 Vol 15, No 4: August 2025 Vol 15, No 3: June 2025 Vol 15, No 2: April 2025 Vol 15, No 1: February 2025 Vol 14, No 6: December 2024 Vol 14, No 5: October 2024 Vol 14, No 4: August 2024 Vol 14, No 3: June 2024 Vol 14, No 2: April 2024 Vol 14, No 1: February 2024 Vol 13, No 6: December 2023 Vol 13, No 5: October 2023 Vol 13, No 4: August 2023 Vol 13, No 3: June 2023 Vol 13, No 2: April 2023 Vol 13, No 1: February 2023 Vol 12, No 6: December 2022 Vol 12, No 5: October 2022 Vol 12, No 4: August 2022 Vol 12, No 3: June 2022 Vol 12, No 2: April 2022 Vol 12, No 1: February 2022 Vol 11, No 6: December 2021 Vol 11, No 5: October 2021 Vol 11, No 4: August 2021 Vol 11, No 3: June 2021 Vol 11, No 2: April 2021 Vol 11, No 1: February 2021 Vol 10, No 6: December 2020 Vol 10, No 5: October 2020 Vol 10, No 4: August 2020 Vol 10, No 3: June 2020 Vol 10, No 2: April 2020 Vol 10, No 1: February 2020 Vol 9, No 6: December 2019 Vol 9, No 5: October 2019 Vol 9, No 4: August 2019 Vol 9, No 3: June 2019 Vol 9, No 2: April 2019 Vol 9, No 1: February 2019 Vol 8, No 6: December 2018 Vol 8, No 5: October 2018 Vol 8, No 4: August 2018 Vol 8, No 3: June 2018 Vol 8, No 2: April 2018 Vol 8, No 1: February 2018 Vol 7, No 6: December 2017 Vol 7, No 5: October 2017 Vol 7, No 4: August 2017 Vol 7, No 3: June 2017 Vol 7, No 2: April 2017 Vol 7, No 1: February 2017 Vol 6, No 6: December 2016 Vol 6, No 5: October 2016 Vol 6, No 4: August 2016 Vol 6, No 3: June 2016 Vol 6, No 2: April 2016 Vol 6, No 1: February 2016 Vol 5, No 6: December 2015 Vol 5, No 5: October 2015 Vol 5, No 4: August 2015 Vol 5, No 3: June 2015 Vol 5, No 2: April 2015 Vol 5, No 1: February 2015 Vol 4, No 6: December 2014 Vol 4, No 5: October 2014 Vol 4, No 4: August 2014 Vol 4, No 3: June 2014 Vol 4, No 2: April 2014 Vol 4, No 1: February 2014 Vol 3, No 6: December 2013 Vol 3, No 5: October 2013 Vol 3, No 4: August 2013 Vol 3, No 3: June 2013 Vol 3, No 2: April 2013 Vol 3, No 1: February 2013 Vol 2, No 6: December 2012 Vol 2, No 5: October 2012 Vol 2, No 4: August 2012 Vol 2, No 3: June 2012 Vol 2, No 2: April 2012 Vol 2, No 1: February 2012 Vol 1, No 2: December 2011 Vol 1, No 1: September 2011 More Issue