cover
Contact Name
Tole Sutikno
Contact Email
ijece@iaesjournal.com
Phone
-
Journal Mail Official
ijece@iaesjournal.com
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
International Journal of Electrical and Computer Engineering
ISSN : 20888708     EISSN : 27222578     DOI : -
International Journal of Electrical and Computer Engineering (IJECE, ISSN: 2088-8708, a SCOPUS indexed Journal, SNIP: 1.001; SJR: 0.296; CiteScore: 0.99; SJR & CiteScore Q2 on both of the Electrical & Electronics Engineering, and Computer Science) is the official publication of the Institute of Advanced Engineering and Science (IAES). The journal is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication and computer engineering from the global world.
Articles 6,301 Documents
A New Design of a CPW-Fed Dual-Band Monopole Antenna for RFID Readers Ahmed El Hamraoui; EL Hassane Abdelmounim; Jamal Zbitou; Hamid Bennis; Mohamed Latrach
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 2: April 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (691.465 KB) | DOI: 10.11591/ijece.v8i2.pp1040-1047

Abstract

This paper comes with a new dual-band planar monopole antenna fed by Coplanar Waveguide (CPW) line designed for RFID readers and it operates at 2.45 GHz, 5.80 GHz. This antenna is designed with reasonable gain, low profile and low cost production. The designed antenna based on theoretical equations is simulated and validated by using ADS from Agilent technologies and CST Microwave Studio electromagnetic solvers. A parametric study of the proposed antenna has been carried out by optimizing some critical parameters. The antenna has a total area of 35×38 mm2 and mounted on an FR4 substrate with dielectric permittivity constant 4.4 and thickness of 1.6 mm and loss tangent 0.025. The comparison between simulation and measurement results permits to validate the final achieved antenna structure in the desired RFID frequencies bands. Details of the proposed antenna design and both simulated and experimental results are described and discussed
Performance Analysis of IEEE 802.15.4 Transceiver System under Adaptive White Gaussian Channel Ekhlas Kadhum; Russul Haitham
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 6: December 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1597.328 KB) | DOI: 10.11591/ijece.v8i6.pp4184-4196

Abstract

Zigbee technology has been developed for short range wireless sensor networks and it follows IEEE 802.15.4 standard. For such sensors, several considerations should be taken including; low data rate and less design complexity in order to achieve efficient performance considering to the transceiver systems. This research focuses on implementing a digital transceiver system for Zigbee sensor based on IEEE 802.15.4. The system is implemented using offset quadrature phase shift keying (OQPSK) modulation technique with half sine pulse-shaping method. Direct conversion scheme has been used in the design of Zigbee receiver in order to fulfill the requirements mentioned above. System performance is analyzed considering to BER when it encountered adaptive white Gaussian noise (AWGN), besides showing the effect of using direct sequence spread spectrum (DSSS) technique.
Noise Characterization in InAlAs/InGaAs/InP pHEMTs for Low Noise Applications Z. A. Djennati; K. Ghaffour
International Journal of Electrical and Computer Engineering (IJECE) Vol 7, No 1: February 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (746.139 KB) | DOI: 10.11591/ijece.v7i1.pp176-183

Abstract

In this paper, a noise revision of an InAlAs/InGaAs/InP psoeudomorphic high electron mobility transistor (pHEMT) in presented. The noise performances of the device were predicted over a range of frequencies from 1GHz to 100GHz. The minimum noise figure (NFmin), the noise resistance (Rn) and optimum source impedance (Zopt) were extracted using two approaches. A physical model that includes diffusion noise and G-R noise models and an analytical model based on an improved PRC noise model that considers the feedback capacitance Cgd. The two approaches presented matched results allowing a good prediction of the noise behaviour. The pHEMT was used to design a single stage S-band low noise amplifier (LNA). The LNA demonstrated a gain of 12.6dB with a return loss coefficient of 2.6dB at the input and greater than -7dB in the output and an overall noise figure less than 1dB.
A survey of data recovery on flash memory Van Dai Tran; Dong-Joo Park Park
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 1: February 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (832.84 KB) | DOI: 10.11591/ijece.v10i1.pp360-376

Abstract

In recent years, flash memory has become more widely used due to its advantages, such as fast data access, low power consumption, and high mobility. However, flash memory also has drawbacks that need to be overcome, such as erase-before-write, and the limitations of block deletion. In order to address this issue, the FTL (Flash Translation Layer) has been proposed with useful functionalities like address mapping, garbage collection, and wear-leveling. During the process of using, the data may be lost on power failure in the storage systems. In some systems, the data is very important. Thus recovery of data in the event of the system crash or a sudden power outage is of prime importance. This problem has attracted attention from researchers and many studies have been done. In this paper, we investigate previous studies on data recovery for flash memory from FTL processing solutions to PLR (Power Loss Recovery) solutions that have been proposed by authors in the conference proceeding, patents, or professional journals. This will provide a discussion of the proposed solutions to the data recovery in flash memory as well as an overview.
CHN and Swap Heuristic to Solve the Maximum Independent Set Problem Bouhouch Adil; Loqman Chakir; El Qadi Abderrahime
International Journal of Electrical and Computer Engineering (IJECE) Vol 7, No 6: December 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (108.436 KB) | DOI: 10.11591/ijece.v7i6.pp3583-3592

Abstract

We describe a new approach to solve the problem to find the maximum independent set in a given Graph, known also as Max-Stable set problem (MSSP). In this paper, we show how Max-Stable problem can be reformulated into a linear problem under quadratic constraints, and then we resolve the QP result by a hybrid approach based Continuous Hopfeild Neural Network (CHN) and Local Search. In a manner that the solution given by the CHN will be the starting point of the local search. The new approach showed a good performance than the original one which executes a suite of CHN runs, at each execution a new leaner constraint is added into the resolved model. To prove the efficiency of our approach, we present some computational experiments of solving random generated problem and typical MSSP instances of real life problem.
Extracted features based multi-class classification of orthodontic images Hicham Riri; Mohammed Ed-Dhahraouy; Abdelmajid Elmoutaouakkil; Abderrahim Beni-Hssane; Farid Bourzgui
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 4: August 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (966.976 KB) | DOI: 10.11591/ijece.v10i4.pp3558-3567

Abstract

The purpose of this study is to investigate computer vision and machine learning methods for classification of orthodontic images in order to provide orthodontists with a solution for multi-class classification of patients’ images to evaluate the evolution of their treatment. Of which, we proposed three algorithms based on extracted features, such as facial features and skin colour using YCbCrcolour space, assigned to nodes of a decision tree to classify orthodontic images: an algorithm for intra-oral images, an algorithm for mould images and an algorithm for extra-oral images. Then, we compared our method by implementing the Local Binary Pattern (LBP) algorithm to extract textural features from images. After that, we applied the principal component analysis (PCA) algorithm to optimize the redundant parameters in order to classify LBP features with six classifiers; Quadratic Support Vector Machine (SVM), Cubic SVM, Radial Basis Function SVM, Cosine K-Nearest Neighbours (KNN), Euclidian KNN, and Linear Discriminant Analysis (LDA). The presented algorithms have been evaluated on a dataset of images of 98 different patients, and experimental results demonstrate the good performances of our proposed method with a high accuracy compared with machine learning algorithms. Where LDA classifier achieves an accuracy of 84.5%.
Investigation of electricity production feasibility in Tabriz using biomass resources Mahin Tahmasebpour; Abdollah Jafarian
International Journal of Electrical and Computer Engineering (IJECE) Vol 3, No 3: June 2013
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (83.094 KB)

Abstract

In this research, the feasibility of biogas production using biomass in collected wastes is studied. In this paper, first the different methods of recycling energy and for most used algorithms are studied. Second, by analyzing daily collected wastes and considering the realistic obtained data from leachate of Tabriz waste landfills, the average amount of Chemical Oxygen Demand (COD) and Biochemical Oxygen Demand (BOD) are obtained. Then, an appropriate scenario is presented to get the maximum reachable biogas. Also, an economic model taking into account the effect of main variables of preparations such as the cost of waste transport vehicles, capacity of the purchased devices, special costs of biomass and distributed density are considered and the best and most economical method is utilized based on generated gas volume in biomass power plants. Finally, the shortterm and long-term models are presented for power generation and investment using biogas. The proposed method is applied for the wastes of Tabriz City, as one of the largest industrial metropolitan in Iran, with a daily waste more than 1200 tons.DOI:http://dx.doi.org/10.11591/ijece.v3i3.2622
A collaborative physical layer security scheme Dimitrios Efstathiou
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 3: June 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (536.407 KB) | DOI: 10.11591/ijece.v9i3.pp1924-1934

Abstract

High level of security is essential in wireless 5G communications. The last few years there has been an increase in research interest in the potential of the radio channel’s physical properties to provide communications security. These research efforts investigate fading, interference, and path diversity to develop security techniques for implementation in 5G New Radio (NR). In this paper, we propose a collaborative scheme to existing physical layer security schemes, taking advantage of the characteristics of the OFDM technique. An OFDM symbol includes the pilot subcarriers, typically essential for the pilot channel estimation process performed at the legitimate receiver. In this work we propose the positions of the subcarriers to change on every OFDM symbol following a probability distribution known only to the legitimate transmitter and legitimate receiver. An eavesdropper, does not have access to the information of the pilot subcarriers positions so, it performs blind channel estimation. The theoretical analysis is based on the information theoretic problem formulation and is confirmed by simulations. The performance metrics used are the secrecy capacity and the outage probability. The proposed scheme is very simple and robust, strengthening security in multimedia applications.
The Contour Extraction of Cup in Fundus Images for Glaucoma Detection Anindita Septiarini; Hamdani Hamdani; Dyna Marisa Khairina
International Journal of Electrical and Computer Engineering (IJECE) Vol 6, No 6: December 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (880.959 KB) | DOI: 10.11591/ijece.v6i6.pp2797-2804

Abstract

Glaucoma is the second leading cause of blindness in the world; therefore the detection of glaucoma is required. The detection of glaucoma is used to distinguish whether a patient's eye is normal or glaucoma. An expert observed the structure of the retina using fundus image to detect glaucoma. In this research, we propose feature extraction method based on cup area contour using fundus images to detect glaucoma. Our proposed method has been evaluated on 44 fundus images consisting of 23 normal and 21 glaucoma. The data is divided into two parts: firstly, used to the learning phase and secondly, used to the testing phase. In order to identify the fundus images including the class of normal or glaucoma, we applied Support Vector Machines (SVM) method. The performance of our method achieves the accuracy of 94.44%.
Ensuring telecommunication network security through cryptology: a case of 4G and 5G LTE cellular network providers Adnan Manasreh; Ahmed A. M. Sharadqh; Jawdat S. Alkasassbeh; Aws Al-Qaisi
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 6: December 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (438.337 KB) | DOI: 10.11591/ijece.v9i6.pp4860-4865

Abstract

This paper aims to present the details regarding telecommunication network security through cryptology protocols. The data was based on scientific data collection and the quantitative method was adopted. The questionnaire was developed and the primary respondents were approached who were working in 4 telecommunication networking companies namely Huawei, Ericsson, SK Telecom and Telefonica. The sample size of the research was 60 participants and the statistical analysis was used to analyze research. The finding shows that cryptology protocol such as SSH, SSL, Kerberos PGP and SET are implemented within the companies in order to secure network.

Filter by Year

2011 2026


Filter By Issues
All Issue Vol 16, No 1: February 2026 Vol 15, No 6: December 2025 Vol 15, No 5: October 2025 Vol 15, No 4: August 2025 Vol 15, No 3: June 2025 Vol 15, No 2: April 2025 Vol 15, No 1: February 2025 Vol 14, No 6: December 2024 Vol 14, No 5: October 2024 Vol 14, No 4: August 2024 Vol 14, No 3: June 2024 Vol 14, No 2: April 2024 Vol 14, No 1: February 2024 Vol 13, No 6: December 2023 Vol 13, No 5: October 2023 Vol 13, No 4: August 2023 Vol 13, No 3: June 2023 Vol 13, No 2: April 2023 Vol 13, No 1: February 2023 Vol 12, No 6: December 2022 Vol 12, No 5: October 2022 Vol 12, No 4: August 2022 Vol 12, No 3: June 2022 Vol 12, No 2: April 2022 Vol 12, No 1: February 2022 Vol 11, No 6: December 2021 Vol 11, No 5: October 2021 Vol 11, No 4: August 2021 Vol 11, No 3: June 2021 Vol 11, No 2: April 2021 Vol 11, No 1: February 2021 Vol 10, No 6: December 2020 Vol 10, No 5: October 2020 Vol 10, No 4: August 2020 Vol 10, No 3: June 2020 Vol 10, No 2: April 2020 Vol 10, No 1: February 2020 Vol 9, No 6: December 2019 Vol 9, No 5: October 2019 Vol 9, No 4: August 2019 Vol 9, No 3: June 2019 Vol 9, No 2: April 2019 Vol 9, No 1: February 2019 Vol 8, No 6: December 2018 Vol 8, No 5: October 2018 Vol 8, No 4: August 2018 Vol 8, No 3: June 2018 Vol 8, No 2: April 2018 Vol 8, No 1: February 2018 Vol 7, No 6: December 2017 Vol 7, No 5: October 2017 Vol 7, No 4: August 2017 Vol 7, No 3: June 2017 Vol 7, No 2: April 2017 Vol 7, No 1: February 2017 Vol 6, No 6: December 2016 Vol 6, No 5: October 2016 Vol 6, No 4: August 2016 Vol 6, No 3: June 2016 Vol 6, No 2: April 2016 Vol 6, No 1: February 2016 Vol 5, No 6: December 2015 Vol 5, No 5: October 2015 Vol 5, No 4: August 2015 Vol 5, No 3: June 2015 Vol 5, No 2: April 2015 Vol 5, No 1: February 2015 Vol 4, No 6: December 2014 Vol 4, No 5: October 2014 Vol 4, No 4: August 2014 Vol 4, No 3: June 2014 Vol 4, No 2: April 2014 Vol 4, No 1: February 2014 Vol 3, No 6: December 2013 Vol 3, No 5: October 2013 Vol 3, No 4: August 2013 Vol 3, No 3: June 2013 Vol 3, No 2: April 2013 Vol 3, No 1: February 2013 Vol 2, No 6: December 2012 Vol 2, No 5: October 2012 Vol 2, No 4: August 2012 Vol 2, No 3: June 2012 Vol 2, No 2: April 2012 Vol 2, No 1: February 2012 Vol 1, No 2: December 2011 Vol 1, No 1: September 2011 More Issue