cover
Contact Name
Tole Sutikno
Contact Email
ijece@iaesjournal.com
Phone
-
Journal Mail Official
ijece@iaesjournal.com
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
International Journal of Electrical and Computer Engineering
ISSN : 20888708     EISSN : 27222578     DOI : -
International Journal of Electrical and Computer Engineering (IJECE, ISSN: 2088-8708, a SCOPUS indexed Journal, SNIP: 1.001; SJR: 0.296; CiteScore: 0.99; SJR & CiteScore Q2 on both of the Electrical & Electronics Engineering, and Computer Science) is the official publication of the Institute of Advanced Engineering and Science (IAES). The journal is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication and computer engineering from the global world.
Articles 82 Documents
Search results for , issue "Vol 9, No 3: June 2019" : 82 Documents clear
Direct and indirect vector control of a doubly fed induction generator based in a wind energy conversion system Manale Bouderbala; Badre Bossoufi; Ahmed Lagrioui; Mohammed Taoussi; Hala Alami Aroussi; Yasmine Ihedrane
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 3: June 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (536.645 KB) | DOI: 10.11591/ijece.v9i3.pp1531-1540

Abstract

In the recent years, the development and the exploitation of renewable energy knew a great evolution. Among these energy resources, the wind power represents an important potential for that the wind system has been the subject of several researches. The purpose of this study is to improve the power extracted from wind energy, taking into consideration the variation of wind speed which causes a problem in energy production. For this purpose, we have controlled the powers whether it is active or reactive delivered by the generator. This paper, presents essentially the modeling and control of doubly- fed induction generator (DFIG), which is connected to a variable speed wind turbine. Firstly, the model of the wind power system with the maximum power point tracking (MPPT) strategy is shown. Then, the modeling of doubly- fed induction generator (DFIG) and its power control is presented. Finnaly, to ensure the attitude of these controls the simulations is presented in the Matlab/Simulink environment.
Development of portable automatic number plate recognition (ANPR) system on Raspberry Pi S. Fakhar A. G; M. Saad H; A. Fauzan K; R. Affendi H.; M. Aidil A.
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 3: June 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1128.059 KB) | DOI: 10.11591/ijece.v9i3.pp1805-1813

Abstract

ANPR system is used in automating access control and security such as identifying stolen cars in real time by installing it to police patrol cars, and detecting vehicles that are overspeeding on highways. However, this technology is still relatively expensive; in November 2014, the Royal Malaysian Police (PDRM) purchased and installed 20 units of ANPR systems in their patrol vehicles costing nearly RM 30 million. In this paper a cheaper alternative of a portable ANPR system running on a Raspberry Pi with OpenCV library is presented. Once the camera captures an image, image desaturation, filtering, segmentation and character recognition is all done on the Raspberry Pi before the extracted number plate is displayed on the LCD and saved to a database. The main challenges in a portable application include crucial need of an efficient code and reduced computational complexity while offering improved flexibility. The performance time is also presented, where the whole process is run with a noticeable 3 seconds delay in getting the final output.
Modified honey encryption scheme for encoding natural language message Abiodun Esther Omolara; Aman Jantan
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 3: June 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (457.083 KB) | DOI: 10.11591/ijece.v9i3.pp1871-1878

Abstract

Conventional encryption schemes are susceptible to brute-force attacks. This is because bytes encode utf8 (or ASCII) characters. Consequently, an adversary that intercepts a ciphertext and tries to decrypt the message by brute-forcing with an incorrect key can filter out some of the combinations of the decrypted message by observing that some of the sequences are a combination of characters which are distributed non-uniformly and form no plausible meaning. Honey encryption (HE) scheme was proposed to curtail this vulnerability of conventional encryption by producing ciphertexts yielding valid-looking, uniformly distributed but fake plaintexts upon decryption with incorrect keys. However, the scheme works for only passwords and PINS. Its adaptation to support encoding natural language messages (e-mails, human-generated documents) has remained an open problem. Existing proposals to extend the scheme to support encoding natural language messages reveals fragments of the plaintext in the ciphertext, hence, its susceptibility to chosen ciphertext attacks (CCA). In this paper, we modify the HE schemes to support the encoding of natural language messages using Natural Language Processing techniques. Our main contribution was creating a structure that allowed a message to be encoded entirely in binary. As a result of this strategy, most binary string produces syntactically correct messages which will be generated to deceive an attacker who attempts to decrypt a ciphertext using incorrect keys. We evaluate the security of our proposed scheme.
Parallel hybrid chicken swarm optimization for solving the quadratic assignment problem Soukaina Cherif Bourki Semlali; Mohammed Essaid Riffi; Fayçal Chebihi
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 3: June 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (487.801 KB) | DOI: 10.11591/ijece.v9i3.pp2064-2074

Abstract

In this research, we intend to suggest a new method based on a parallel hybrid chicken swarm optimization (PHCSO) by integrating the constructive procedure of GRASP and an effective modified version of Tabu search. In this vein, the goal of this adaptation is straightforward about the fact of preventing the stagnation of the research. Furthermore, the proposed contribution looks at providing an optimal trade-off between the two key components of bio-inspired metaheuristics: local intensification and global diversification, which affect the efficiency of our proposed algorithm and the choice of the dependent parameters. Moreover, the pragmatic results of exhaustive experiments were promising while applying our algorithm on diverse QAPLIB instances . Finally, we briefly highlight perspectives for further research.
Community detection of political blogs network based on structure-attribute graph clustering model Ahmed F. Al-Mukhtar; Eman S. Al-shamery
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 3: June 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (607.807 KB) | DOI: 10.11591/ijece.v9i3.pp2121-2130

Abstract

Complex networks provide means to represent different kinds of networks with multiple features. Most biological, sensor and social networks can be represented as a graph depending on the pattern of connections among their elements. The goal of the graph clustering is to divide a large graph into many clusters based on various similarity criteria’s. Political blogs as standard social dataset network, in which it can be considered as blog-blog connection, where each node has political learning beside other attributes. The main objective of work is to introduce a graph clustering method in social network analysis. The proposed Structure-Attribute Similarity (SAS-Cluster) able to detect structures of community, based on nodes similarities. The method combines topological structure with multiple characteristics of nodes, to earn the ultimate similarity. The proposed method is evaluated using well-known evaluation measures, Density, and Entropy. Finally, the presented method was compared with the state-of-art comparative method, and the results show that the proposed method is superior to the comparative method according to the evaluations measures.
Efficiency and effectiveness video on demand over worldwide interoperability for microwave access Muthanna Jaafar Abbas; Abeer Abd Al Hameed Mahmood
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 3: June 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (424.041 KB) | DOI: 10.11591/ijece.v9i3.pp1919-1923

Abstract

(WiMAX) is another solution for readiness broadband networks inside the region, covered or not, by alternative technologies like (ADSL) or cable through this paper by deploying many mobility patterns such as static, random and path for Video on Demand (VoD) over (WiMAX) Network. The performance of varied (QPSK) and (QAM) modulation techniques, by applying the (OPNET) simulator version 17.5. This work is finished in terms of the transmitted traffic and received traffic. Simulation result indicates that once nodes are moving by (SVC) code schema in (WiMAX). The result is an effective and attainable overall performance of (QPSK) which is better than (QAM) modulation technique.
Development of an automatic can crusher using programmable logic controller N. A. A. Hadi; Lim Hui Yee; K. A. M. Annuar; Zulhilmi Bin Zaid; Z. A Ghani; M.F. Mohd Ab Halim; Amar Faiz Zainal Abidin; M. B. N. Shah
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 3: June 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (592.951 KB) | DOI: 10.11591/ijece.v9i3.pp1795-1804

Abstract

The invention of a can crusher machine in this project is to reduce the wasted storage space occupied by the tremendous amount of use aluminium can at the commercial establishment like in the restaurant, cafeteria and bar. Basically, can crusher machine be operated in manual effort and time in the can crushing process. Shrinking the initial volume of empty used-aluminium cans down to 50% in more effective, faster and effortless way, as well as to develop a low-cost device that is suitable for the small-industry usage are mainly the objectives for the Automatic Can Crusher, where an automated process is executed in Automatic Can Crusher due to the automation in the modern world is inevitable and nominal to be used. The Automatic Can Crusher is run by a Programmable Logic Controller (PLC) with the aid of an inductive and capacitive sensor, where it is applied to detect whether the object is metal or non-metal. Overall, the system can be controlled manually through the push start and stop button as well as using the Human Machine Interface (HMI) using NB-Designer, for displaying the total of cans being crushed per day. The average result of empty can could shrink from 31% to 60 % of the original value, by using the attuned and compatible pressure for this system.
The telecom value chain, opportunities and revenues created by the nigerian telecom boom Nsikan Nkordeh; Uzairue Stanley Idiake; Ibinabo Bob-Manuel; Francis Anyasi
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 3: June 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (745.856 KB) | DOI: 10.11591/ijece.v9i3.pp2018-2024

Abstract

In Nigeria today, we face a serious economic challenge which is as a result of our swindling primary source of revenue (oil), there is fear amongst our economists which is can Nigeria bounce back to what she once was? Can there be an alternative source to serve as a buffer to what we already have. This study aims to bring to prime focus, an industry which has begun blooming in the background. Despite the publicity and popularity enjoyed by today’s telecom giants in the country, there is very little knowledge pertaining to the tremendous impact that it has had directly or indirectly on our economy over the years. Since the liberalization of the telecom industry that brought about the involvement of private investors into the sector, the opportunities and revenues generated has brought about a tremendous effect on the economy. The telecom sector is only second after the oil and gas industry in the amount of finance it contributes to the federal account. This paper discusses some of the value chains, opportunities, revenue that the telecom industry has brought to Nigeria. It uses data obtained from relevant authorities.
Analysis of harmonics using wavelet technique Thangaraj. K; Subramaniam. N. P.; Narmada R; Oma Mageswari. M
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 3: June 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (386.627 KB) | DOI: 10.11591/ijece.v9i3.pp1669-1675

Abstract

This paper develops an approach based on wavelet technique for the estimation of harmonic presents in power system signals. The proposed technique divides the power system signals into different frequency sub-bands corresponding to the odd harmonic components of the signal. The algorithm helps to determine both the time and frequency information from the harmonic frequency bands. The comparative study will be done with the input and the results attained from the wavelet transform (WT) for different conditions and Simulation results are given.
Low-voltage ride-through for a three-phase four-leg photovoltaic system using SRFPI control strategy Haval Sardar Kamil; Dalila Mat Said; Mohd Wazir Mustafa; Mohammad Reza Miveh; Nasarudin Ahmad
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 3: June 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (14.611 KB) | DOI: 10.11591/ijece.v9i3.pp1524-1530

Abstract

With the innovative progresses in power electronics in recent years, photovoltaic (PV) systems emerged as one of the promising sources for electricity generation at the distribution network. Nonetheless, connection of PV power plants to the utility grid under abnormal conditions has become a significant issue and novel grid codes should be recommend. The low-voltage ride-through (LVRT) capability is one of the challenges faced by the integration of PV power stations into electrical grid under abnormal conditions. This work firstly provides a discussion on recent control schemes for PV power plants to enhance the LVRT capabilities. Next, a control scheme for a three-phase four-leg grid-connected PV inverter under unbalanced grid fault conditions using synchronous reference frame proportional integral (SRFPI) controller is proposed. Simulation studies are performed to investigate the influence of the control strategy on the PV inverter.

Filter by Year

2019 2019


Filter By Issues
All Issue Vol 16, No 1: February 2026 Vol 15, No 6: December 2025 Vol 15, No 5: October 2025 Vol 15, No 4: August 2025 Vol 15, No 3: June 2025 Vol 15, No 2: April 2025 Vol 15, No 1: February 2025 Vol 14, No 6: December 2024 Vol 14, No 5: October 2024 Vol 14, No 4: August 2024 Vol 14, No 3: June 2024 Vol 14, No 2: April 2024 Vol 14, No 1: February 2024 Vol 13, No 6: December 2023 Vol 13, No 5: October 2023 Vol 13, No 4: August 2023 Vol 13, No 3: June 2023 Vol 13, No 2: April 2023 Vol 13, No 1: February 2023 Vol 12, No 6: December 2022 Vol 12, No 5: October 2022 Vol 12, No 4: August 2022 Vol 12, No 3: June 2022 Vol 12, No 2: April 2022 Vol 12, No 1: February 2022 Vol 11, No 6: December 2021 Vol 11, No 5: October 2021 Vol 11, No 4: August 2021 Vol 11, No 3: June 2021 Vol 11, No 2: April 2021 Vol 11, No 1: February 2021 Vol 10, No 6: December 2020 Vol 10, No 5: October 2020 Vol 10, No 4: August 2020 Vol 10, No 3: June 2020 Vol 10, No 2: April 2020 Vol 10, No 1: February 2020 Vol 9, No 6: December 2019 Vol 9, No 5: October 2019 Vol 9, No 4: August 2019 Vol 9, No 3: June 2019 Vol 9, No 2: April 2019 Vol 9, No 1: February 2019 Vol 8, No 6: December 2018 Vol 8, No 5: October 2018 Vol 8, No 4: August 2018 Vol 8, No 3: June 2018 Vol 8, No 2: April 2018 Vol 8, No 1: February 2018 Vol 7, No 6: December 2017 Vol 7, No 5: October 2017 Vol 7, No 4: August 2017 Vol 7, No 3: June 2017 Vol 7, No 2: April 2017 Vol 7, No 1: February 2017 Vol 6, No 6: December 2016 Vol 6, No 5: October 2016 Vol 6, No 4: August 2016 Vol 6, No 3: June 2016 Vol 6, No 2: April 2016 Vol 6, No 1: February 2016 Vol 5, No 6: December 2015 Vol 5, No 5: October 2015 Vol 5, No 4: August 2015 Vol 5, No 3: June 2015 Vol 5, No 2: April 2015 Vol 5, No 1: February 2015 Vol 4, No 6: December 2014 Vol 4, No 5: October 2014 Vol 4, No 4: August 2014 Vol 4, No 3: June 2014 Vol 4, No 2: April 2014 Vol 4, No 1: February 2014 Vol 3, No 6: December 2013 Vol 3, No 5: October 2013 Vol 3, No 4: August 2013 Vol 3, No 3: June 2013 Vol 3, No 2: April 2013 Vol 3, No 1: February 2013 Vol 2, No 6: December 2012 Vol 2, No 5: October 2012 Vol 2, No 4: August 2012 Vol 2, No 3: June 2012 Vol 2, No 2: April 2012 Vol 2, No 1: February 2012 Vol 1, No 2: December 2011 Vol 1, No 1: September 2011 More Issue