cover
Contact Name
Tole Sutikno
Contact Email
ijece@iaesjournal.com
Phone
-
Journal Mail Official
ijece@iaesjournal.com
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
International Journal of Electrical and Computer Engineering
ISSN : 20888708     EISSN : 27222578     DOI : -
International Journal of Electrical and Computer Engineering (IJECE, ISSN: 2088-8708, a SCOPUS indexed Journal, SNIP: 1.001; SJR: 0.296; CiteScore: 0.99; SJR & CiteScore Q2 on both of the Electrical & Electronics Engineering, and Computer Science) is the official publication of the Institute of Advanced Engineering and Science (IAES). The journal is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication and computer engineering from the global world.
Articles 128 Documents
Search results for , issue "Vol 9, No 6: December 2019" : 128 Documents clear
Enhanced IPFIX flow monitoring for VXLAN based cloud overlay networks Osman Ghazali; Shahzada Khurram
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 6: December 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (880.87 KB) | DOI: 10.11591/ijece.v9i6.pp5519-5528

Abstract

The demands for cloud computing services is rapidly growing due to its fast adoption and the migration of workloads from private data centers to cloud data centers. Many companies, small and large, prefer switching their data to the enterprise cloud environment rather than expanding their own data centers. As a result, the network traffic in cloud data centers is increasing rapidly. However, due to the dynamic resource provisioning and high-speed virtualized cloud networks, the traditional flow-monitoring systems is unable to provide detail visibility and information of traffic traversing the cloud overlay network environment. Hence, it does not fulfill the monitoring requirement of cloud overlay traffic. As the growth of cloud network traffic causes difficulties for the service providers and end-users to manage the traffic efficiently, an enhanced IPFIX flow monitoring mechanism for cloud overlay networks was proposed to address this problem. The monitoring mechanism provided detail visibility and information of overlay network traffic that traversed the cloud environment, which is not available in the current network monitoring systems. The experimental results showed that the proposed monitoring system able to capture overlay network traffic and segregated the tenant traffic based on virtual machines as compare to the standard monitoring system.
Robust features extraction for general fish classification Mutasem K. Alsmadi; Mohammed Tayfour; Raed A. Alkhasawneh; Usama Badawi; Ibrahim Almarashdeh; Firas Haddad
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 6: December 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (625.626 KB) | DOI: 10.11591/ijece.v9i6.pp5192-5204

Abstract

Image recognition process could be plagued by many problems including noise, overlap, distortion, errors in the outcomes of segmentation, and impediment of objects within the image. Based on feature selection and combination theory between major extracted features, this study attempts to establish a system that could recognize fish object within the image utilizing texture, anchor points, and statistical measurements. Then, a generic fish classification is executed with the application of an innovative classification evaluation through a meta-heuristic algorithm known as Memetic Algorithm (Genetic Algorithm with Simulated Annealing) with back-propagation algorithm (MA-B Classifier). Here, images of dangerous and non-dangerous fish are recognized. Images of dangerous fish are further recognized as Predatory or Poison fish family, whereas families of non-dangerous fish are classified into garden and food family.  A total of 24 fish families were used in testing the proposed prototype, whereby each family encompasses different number of species. The process of classification was successfully undertaken by the proposed prototype, whereby 400 distinct fish images were used in the experimental tests. Of these fish images, 250 were used for training phase while 150 were used for testing phase. The back-propagation algorithm and the proposed MA-B Classifier produced a general accuracy recognition rate of 82.25 and 90% respectively.
Security assessment framework for educational ERP systems Hafsa Ashraf; Mamdouh Alenezi; Muhammad Nadeem; Yasir Javid
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 6: December 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1711.057 KB) | DOI: 10.11591/ijece.v9i6.pp5570-5585

Abstract

The educational ERP systems have vulnerabilities at the different layers such as version-specific vulnerabilities, configuration level vulnerabilities and vulnerabilities of the underlying infrastructure. This research has identified security vulnerabilities in an educational ERP system with the help of automated tools; penetration testing tool and public vulnerability repositories (CVE, CCE) at all layers. The identified vulnerabilities are analyzed for any false positives and then clustered with mitigation techniques, available publicly in security vulnerability solution repository like CCE and CWE. These mitigation techniques are mapped over reported vulnerabilities using mapping algorithms. Security vulnerabilities are then prioritized based on the Common Vulnerability Scoring System (CVSS). Finally, open standards-based vulnerability mitigation recommendations are discussed.
Optimal placement of wind generation units in order to increase revenues and reduce the imposed costs in the distribution system considering uncertainty Seyed Mohsen Mousavi Khormandichali; Mehrdad Ahmadi Kamarposhti
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 6: December 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1009.95 KB)

Abstract

Recent advances in the field of new energies such as wind turbines, solar power plants, fuel cells, micro-turbines, etc., and also the great benefits of these power plants for the power network, attract the attention of distribution companies towards them. As, today, many distribution companies are examining options for changing the distribution network structure in order to exploit new energies. In the meantime, wind energy is one of the most widely used types of distributed generation in the power network. In addition, wind power generation has the most changes to other types of renewable energy. Distribution network planning is one of the major concerns of system designers, especially when wind generation units by their random and variable nature are in system development. Since the proper placement of wind units in the network plays an essential role in improving the performance of the distribution network, providing a comprehensive and appropriate solution for placement of these units in the network is important. In this paper, a method has been presented that by considering the uncertainty in generation and consumption and the network constraints, the placement of wind units in the network is done with the aim of increasing revenues and reducing the imposed costs in the distribution system, taking into account the uncertainity. The algorithm used in this paper is a genetic algorithm with improved operators.
Efficient Multi-task offloading with energy and computational resources optimization in a mobile edge computing node Mohamed El Ghmary; Tarik Chanyour; Youssef Hmimz; Mohammed Ouçamah Cherkaoui Malki
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 6: December 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (756.571 KB) | DOI: 10.11591/ijece.v9i6.pp4908-4919

Abstract

With the fifth-generation (5G) networks, Mobile edge computing (MEC) is a promising paradigm to provide near computing and storage capabilities to smart mobile devices. In addition, mobile devices are most of the time battery dependent and energy constrained while they are characterized by their limited processing and storage capacities. Accordingly, these devices must offload a part of their heavy tasks that require a lot of computation and are energy consuming. This choice remains the only option in some circumstances, especially when the battery drains off. Besides, the local CPU frequency allocated to processing has a huge impact on devices energy consumption. Additionally, when mobile devices handle many tasks, the decision of the part to offload becomes critical. Actually, we must consider the wireless network state, the available processing resources at both sides, and particularly the local available battery power. In this paper, we consider a single mobile device that is energy constrained and that retains a list of heavy offloadable tasks that are delay constrained. Therefore, we formulated the corresponding optimization problem, and proposed a Simulated Annealing based heuristic solution scheme. In order to evaluate our solution, we carried out a set of simulation experiments. Finally, the obtained results in terms of energy are very encouraging. Moreover, our solution performs the offloading decisions within an acceptable and feasible timeframes.
Bivariate modified hotelling’s T2 charts using bootstrap data Firas Haddad; Mutasem K. Alsmadi; Usama Badawi; Tamer Farag; Raed Alkhasawneh; Ibrahim Almarashdeh; Walaa Hassan
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 6: December 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (839.277 KB) | DOI: 10.11591/ijece.v9i6.pp4721-4727

Abstract

The conventional Hotelling’s  charts are evidently inefficient as it has resulted in disorganized data with outliers, and therefore, this study proposed the application of a novel alternative robust Hotelling’s  charts approach. For the robust scale estimator , this approach encompasses the use of the Hodges-Lehmann vector and the covariance matrix in place of the arithmetic mean vector and the covariance matrix, respectively.  The proposed chart was examined performance wise. For the purpose, simulated bivariate bootstrap datasets were used in two conditions, namely independent variables and dependent variables. Then, assessment was made to the modified chart in terms of its robustness. For the purpose, the likelihood of outliers’ detection and false alarms were computed. From the outcomes from the computations made, the proposed charts demonstrated superiority over the conventional ones for all the cases tested.
The exploitation of western and southern deserts in Iraq for the production of solar energy Ahmed Zkear Abass; D. A. Pavlyuchenko
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 6: December 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (625.996 KB) | DOI: 10.11591/ijece.v9i6.pp4617-4624

Abstract

We have, an overview is presented of the potential future demands and possible supply of solar energy to Iraq. Solar energy, which is clean, unlimited, and environmentally friendly, is presented as a renewable energy resource. Many problems such as CO2 emissions, industry, human activities, and electricity distribution grids have attracted much attention because of the current state of crude oil production and its prices. Moreover, estimations of solar radiation levels and of the efficiencies of photovoltaics (PVs), concentrated solar power (CSP), and solar chimney towers, have all been investigated. Those systems that combine various sources of energy are called hybrids and they have received much attention in recent decades. The basic features of solar radiation in Iraq are outlined, and the selection of those sites with potential for development of solar plants is based on the local largest solar radiation. Moreover, longitudinal and latitudinal orientation, wind, solar intensity, dust, temperature, rain, humidity, and pollution factors are all considered in the calculation of PV/CSP efficiencies. We know there is an abundance of fossil fuels in Iraq, energy shortages began in 1991 because of the perturbation caused by the full ruin of the country. The obvious renewable energy resource available in Iraq is the solar energy, and its exploitation would provide a means to reduce CO2 emissions from the burning of fossil fuels and to achieve self-sufficiency of electric energy and export the rest to neighboring countries. Solar energy is becoming increasingly important because of the climatic change in the form of global warming.
A review on cloud based knowledge management in higher education institutions Ahmad Shukri Mohd Noor; muhammad younas; Muhammad Arshad
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 6: December 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (852.468 KB) | DOI: 10.11591/ijece.v9i6.pp5420-5427

Abstract

Knowledge Management (KM) is widely discussed by researcher and attracts many enterprisers to extract, dispense and use information in a systematic way under Knowledge Management System (KMS). New technology adoption within the knowledge management system is one of the core issue, identified by researcher and underlined as future research agenda. Cloud computing becomes the most adoptable choice for enterprisers to reduce infrastructure and maintenance cost by shifting business on the cloud. Higher Education Institutions (HEIs) are more enthusiastic about knowledge management due to its primary goal of knowledge creation and sharing. Cloud based knowledge management attract higher education institutions by changing the educational method and objectives due to innovative trends in technology. This exploratory research based on literature review for cloud-based knowledge management, targeting higher education institutions. This study highlights the benefits and challenges associated with cloud-based knowledge management system and its impact on knowledge.
The use of Least Significant Bit (LSB) and Knight Tour Algorithm for image steganography of cover image Soo Ann Nie; Ghazali Sulong; Rozniza Ali; Andrew Abel
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 6: December 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (578.452 KB) | DOI: 10.11591/ijece.v9i6.pp5218-5226

Abstract

Steganography is one of the method to communicate in a hidden way. In another word, steganography literally means the practice of hiding messages or information within another data. Previous studies have proposed various steganography techniques using different approaches including Least Significant Bit (LSB), Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT). However, different approaches still have its own weaknesses. Therefore image stenography using Knight Tour Algorithm with Least Significant Bit (LSB) technique is presented. The main objective is to improve the security factor in the stego image. Basically, the proposed technique is divided into two parts which are the sender and receiver side. Then, steganalysis which is a type of attack on stenography algorithm is used to detect the secret message in the cover image by the statistical analysis of pixel values. Chi Square Statistical Attach which is one of the type of steganalysis is used to detect these near-equal Po Vs in images and bases the probability of embedding on how close to equal the even pixel values and their corresponding odd pixel values are in the test image. The Knight Tour Algorithm is applied due to the common Least Significant Bit technique that is weak in security and easily decoded by outsider.
A new approach for enhancing LSB steganography using bidirectional coding scheme Mohammed M. Saeed Abdullah Al-Momin; Issa Ahmed Abed; Hussein A. Leftah
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 6: December 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (795.9 KB) | DOI: 10.11591/ijece.v9i6.pp5286-5294

Abstract

This paper proposes a new algorithm for embedding private information within a cover image. Unlike all other already existing algorithms, this one tends to employ the data of the carrier image more efficiently such that the image looks less distorted. As a consequence, the private data is maintained unperceived and the sent information stays unsuspicious.  This task is achieved by dividing the least significant bit plane of the cover image into fixed size blocks, and then embedding the required top-secret message within each block using one of two opposite ways depending on the extent of similarity of each block with the private information needed to be hidden. This technique will contribute to lessen the number of bits needed to be changed in the cover image to accommodate the private data, and hence will substantially reduce the   amount of distortion in the stego-image when compared to the classic LSB image steganography algorithms.

Page 1 of 13 | Total Record : 128


Filter by Year

2019 2019


Filter By Issues
All Issue Vol 15, No 6: December 2025 Vol 15, No 5: October 2025 Vol 15, No 4: August 2025 Vol 15, No 3: June 2025 Vol 15, No 2: April 2025 Vol 15, No 1: February 2025 Vol 14, No 6: December 2024 Vol 14, No 5: October 2024 Vol 14, No 4: August 2024 Vol 14, No 3: June 2024 Vol 14, No 2: April 2024 Vol 14, No 1: February 2024 Vol 13, No 6: December 2023 Vol 13, No 5: October 2023 Vol 13, No 4: August 2023 Vol 13, No 3: June 2023 Vol 13, No 2: April 2023 Vol 13, No 1: February 2023 Vol 12, No 6: December 2022 Vol 12, No 5: October 2022 Vol 12, No 4: August 2022 Vol 12, No 3: June 2022 Vol 12, No 2: April 2022 Vol 12, No 1: February 2022 Vol 11, No 6: December 2021 Vol 11, No 5: October 2021 Vol 11, No 4: August 2021 Vol 11, No 3: June 2021 Vol 11, No 2: April 2021 Vol 11, No 1: February 2021 Vol 10, No 6: December 2020 Vol 10, No 5: October 2020 Vol 10, No 4: August 2020 Vol 10, No 3: June 2020 Vol 10, No 2: April 2020 Vol 10, No 1: February 2020 Vol 9, No 6: December 2019 Vol 9, No 5: October 2019 Vol 9, No 4: August 2019 Vol 9, No 3: June 2019 Vol 9, No 2: April 2019 Vol 9, No 1: February 2019 Vol 8, No 6: December 2018 Vol 8, No 5: October 2018 Vol 8, No 4: August 2018 Vol 8, No 3: June 2018 Vol 8, No 2: April 2018 Vol 8, No 1: February 2018 Vol 7, No 6: December 2017 Vol 7, No 5: October 2017 Vol 7, No 4: August 2017 Vol 7, No 3: June 2017 Vol 7, No 2: April 2017 Vol 7, No 1: February 2017 Vol 6, No 6: December 2016 Vol 6, No 5: October 2016 Vol 6, No 4: August 2016 Vol 6, No 3: June 2016 Vol 6, No 2: April 2016 Vol 6, No 1: February 2016 Vol 5, No 6: December 2015 Vol 5, No 5: October 2015 Vol 5, No 4: August 2015 Vol 5, No 3: June 2015 Vol 5, No 2: April 2015 Vol 5, No 1: February 2015 Vol 4, No 6: December 2014 Vol 4, No 5: October 2014 Vol 4, No 4: August 2014 Vol 4, No 3: June 2014 Vol 4, No 2: April 2014 Vol 4, No 1: February 2014 Vol 3, No 6: December 2013 Vol 3, No 5: October 2013 Vol 3, No 4: August 2013 Vol 3, No 3: June 2013 Vol 3, No 2: April 2013 Vol 3, No 1: February 2013 Vol 2, No 6: December 2012 Vol 2, No 5: October 2012 Vol 2, No 4: August 2012 Vol 2, No 3: June 2012 Vol 2, No 2: April 2012 Vol 2, No 1: February 2012 Vol 1, No 2: December 2011 Vol 1, No 1: September 2011 More Issue