cover
Contact Name
Tole Sutikno
Contact Email
ijece@iaesjournal.com
Phone
-
Journal Mail Official
ijece@iaesjournal.com
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
International Journal of Electrical and Computer Engineering
ISSN : 20888708     EISSN : 27222578     DOI : -
International Journal of Electrical and Computer Engineering (IJECE, ISSN: 2088-8708, a SCOPUS indexed Journal, SNIP: 1.001; SJR: 0.296; CiteScore: 0.99; SJR & CiteScore Q2 on both of the Electrical & Electronics Engineering, and Computer Science) is the official publication of the Institute of Advanced Engineering and Science (IAES). The journal is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication and computer engineering from the global world.
Articles 6,301 Documents
Automatic Segmentation of Brachial Artery based on Fuzzy C-Means Pixel Clustering from Ultrasound Images Joonsung Park; Doo Heon Song; Hosung Nho; Hyun-Min Choi; Kyung-Ae Kim; Hyun Jun Park; Kwang Baek Kim
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 2: April 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (514.778 KB) | DOI: 10.11591/ijece.v8i2.pp638-643

Abstract

Automatic extraction of brachial artery and measuring associated indices such as flow-mediated dilatation and Intima-media thickness are important for early detection of cardiovascular disease and other vascular endothelial malfunctions. In this paper, we propose the basic but important component of such decision-assisting medical software development – noise tolerant fully automatic segmentation of brachial artery from ultrasound images. Pixel clustering with Fuzzy C-Means algorithm in the quantization process is the key component of that segmentation with various image processing algorithms involved. This algorithm could be an alternative choice of segmentation process that can replace speckle noise-suffering edge detection procedures in this application domain.
An Efficient Data Transmission by using Modern USB Flash Drive B.Naresh Kumar Reddy; N. Venktram; Sireesha Sireesha
International Journal of Electrical and Computer Engineering (IJECE) Vol 4, No 5: October 2014
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (296.007 KB)

Abstract

Now a day’s Electronics plays a vital role in our daily life. It is a key in making this world a small and making everything happen at our finger tips, today’s most used and flexible is USB flash drives, which is used to store the data and data transfer between them related with computer, and we are not able to share files between two USB flash drives when user is away from computer. So to overcome this problem we are designing a complete blend of hardware and software With the help of this project we can not only transfer the data but also we can see the transfer of the particular file which we want to send by using LCD display. In our proposal we are transferring the data between two USB flash drives using two ways. One is Wireless Technology either Wi-Fi technology which we can send/receive File or Bluetooth Technology which we can send/receive data to USB flash drive with Bluetooth enabled devices like Mobiles, laptops etc.. Another is in-built USB slots to perform data transmission to other pen drives directly without the use of the computer system. The implementation of an operating system and a processor to the USB Flash drive are the main challenges in this proposed system.DOI:http://dx.doi.org/10.11591/ijece.v4i5.6577
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm Siva Sankaran P.; Kirubanand V B
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 4: August 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (729.777 KB) | DOI: 10.11591/ijece.v9i4.pp2578-2584

Abstract

Cloud computing is a structure for rendering service to the user for free or paid basis through internet facility where we can access to a bulk of shared resources which results in saving managing cost and time for large companies, The data which are stored in the data center may incur various security, damage and threat issues which may result in data leakage, insecure interface and inside attacks. This paper will demonstrate the implementation of hybrid cryptography security in public cloud by a combination of Elliptical Curve Cryptography and Twofish algorithm, which provides an innovative solution to enhance the security features of the cloud so that we can improve the service thus results in increasing the trust over the technology.    
Autonomous Abnormal Behaviour Detection Using Trajectory Analysis Muhammed Shuaau; Ka Fei Thang; Nai Shyan Lai
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 4: August 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (977.626 KB) | DOI: 10.11591/ijece.v9i4.pp2403-2415

Abstract

Abnormal behaviour detection has attracted signification amount of attention in the past decade due to increased security concerns around the world. The amount of data from surveillance cameras have exceeded human capacity and there is a greater need for anomaly detection systems for crime monitoring. This paper proposes a solution to this problem in a reception area context by using trajectory extraction through Gaussian Mixture Models and Kalman Filter for data association. Here, trajectory analysis was performed on extracted trajectories to detect four different anomalies such as entering staff area, running, loitering and squatting down. The developed anomaly detection algorithms were tested on videos captured at Asia Pacific University’s reception area. These algorithms were able to achieve a promising detection accuracy of 89% and a false positive rate of 4.52%.
Sleep Apnea Identification using HRV Features of ECG Signals Billy Sulistyo; Nico Surantha; Sani M. Isa
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 5: October 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (548.931 KB) | DOI: 10.11591/ijece.v8i5.pp3940-3948

Abstract

Sleep apnea is a common sleep disorder that interferes with the breathing of a person. During sleep, people can stop breathing for a moment that causes the body lack of oxygen that lasts for several seconds to minutes even until the range of hours. If it happens for a long period, it can result in more serious diseases, e.g. high blood pressure, heart failure, stroke, diabetes, etc. Sleep apnea can be prevented by identifying the indication of sleep apnea itself from ECG, EEG, or other signals to perform early prevention. The purpose of this study is to build a classification model to identify sleep disorders from the Heart Rate Variability (HRV) features that can be obtained with Electrocardiogram (ECG) signals. In this study, HRV features were processed using several classification methods, i.e. ANN, KNN, N-Bayes and SVM linear Methods. The classification is performed using subject-specific scheme and subject-independent scheme. The simulation results show that the SVM method achieves higher accuracy other than three other methods in identifying sleep apnea. While, time domain features shows the most dominant performance among the HRV features.
Optimizing PEMFC model parameters using ant lion optimizer and dragonfly algorithm: A comparative study Zainuddin Mat Isa; Norkharziana Mohd Nayan; Mohd Hafiz Arshad; Nor Ashbahani Mohamad Kajaan
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 6: December 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (932.689 KB) | DOI: 10.11591/ijece.v9i6.pp5295-5303

Abstract

This paper introduced two optimization algorithms which are Ant Lion Optimizer (ALO) and Dragonfly Algorithm (DA) for extracting the Proton Exchange Membrane Fuel Cell (PEMFC) polarization curve parameters. The results produced by both algorithms are being compared to observe their performance. As a results, the ALO shows great performance compared to DA. Furthermore, these results also being compared with the results of the other reported metaheuristics algorithms. The ALO and DA presented competitive results.
Pseudo-Random Bit Generator Using Chaotic Seed for Cryptographic Algorithm in Data Protection of Electric Power Consumption Francisca Angélica Elizalde-Canales; Iván de Jesus Rivas-Cambero; Lucio Fidel Rebolledo-Herrera; Cesar Joel Camacho-Bello
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 2: April 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (786.406 KB) | DOI: 10.11591/ijece.v9i2.pp1399-1409

Abstract

Cryptographic algorithms have played an important role in information security for protecting privacy. The literature provides evidence that many types of chaotic cryptosystems have been proposed. These chaotic systems encode information to obviate its orbital instability and ergodicity. In this work, a pseudo-random cryptographic generator algorithm with a symmetric key, based on chaotic functions, is proposed. Moreover, the algorithm exploits dynamic simplicity and synchronization to generate encryption sub-keys using unpredictable seeds, extracted from a chaotic zone, in order to increase their level of randomness. Also, it is applied to a simulated electrical energy consumption signal and implemented on a prototype, using low hardware resources, to measure physical variables; hence, the unpredictability degree was statistically analyzed using the resulting cryptogram. It is shown that the pseudo-random sequences produced by the cryptographic key generator have acceptable properties with respect to randomness, which are validated in this paper using National Institute of Standards and Technology (NIST) statistical tests. To complement the evaluation of the encrypted data, the Lena image is coded and its metrics are compared with those reported in the literature, yielding some useful results.
Multi-way Array Decomposition on Acoustic Source Separation for Fault Diagnosis of a Motor-Pump System Anindita Adikaputri Vinaya; Dhany Arifianto
International Journal of Electrical and Computer Engineering (IJECE) Vol 7, No 6: December 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (754.048 KB) | DOI: 10.11591/ijece.v7i6.pp3052-3059

Abstract

In this study, we propose a multi-way array decomposition approach to solve the complexity of approximate joint diagonalization process for fault diagnosis of a motor-pump system. Sources used in this study came from  drive end-motor, nondrive end-motor , drive end pump , and nondrive end pump. An approximate joint diagonalization is a common approach to resolving an underdetermined cases in blind source separation. However, it has quite heavy computation and requires more complexity. In this study, we use an acoustic emission to detect faults based on multi-way array decomposition approach. Based on the obtained results, the difference types of machinery fault such as misalignment and outer bearing fault can be detected by vibration spectrum and estimated acoustic spectrum. The performance of proposed method is evaluated using MSE and LSD. Based on the results of the separation, the estimated signal of the nondrive end pump is the closest to the baseline signal compared to other signals with  LSD is 1.914 and MSE is 0.0707. The instantaneous frequency of the estimated source signal will also be compared with the vibration signal in frequency spectrum to test the effectiveness of the proposed method.
Personal identity verification based ECG biometric using non-fiducial features Marwa A. Elshahed
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 3: June 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (604.569 KB) | DOI: 10.11591/ijece.v10i3.pp3007-3013

Abstract

Biometrics was used as an automated and fast acceptable technology for human identification and it may be behavioral or physiological traits. Any biometric system based on identification or verification modes for human identity. The electrocardiogram (ECG) is considered as one of the physiological biometrics which impossible to mimic or stole. ECG feature extraction methods were performed using fiducial or non-fiducial approaches. This research presents an authentication ECG biometric system using non-fiducial features obtained by Discrete Wavelet Decomposition and the Euclidean Distance technique was used to implement the identity verification. From the obtained results, the proposed system accuracy is 96.66% also, using the verification system is preferred for a large number of individuals as it takes less time to get the decision.
Energy Transfer by Resonance Coupling Heinz Zenkner; Werachet Khan-Ngern
International Journal of Electrical and Computer Engineering (IJECE) Vol 3, No 5: October 2013
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (637.487 KB)

Abstract

This paper presents the research work focusing on the possibility to transmit power with a high power densitiy and a high efficiency. The applications of power supply require a smaller size, lower weight with a good energy on-board management. This work shows not only the possibility of wireless power transfer, but also the biological effect is taken into account for the safety precaution of human use. The system is described and set up using the resonance coupling effect and impedance adaption for multi-stage conversion. The transmitting power up to 180W is applied at a frequency of 6.78 MHz across a gap in the range between 30 mm to 80 mm. The experimental results show that the maximum efficiency up to 88 % has been achieved. The maximum transmitted power density reaches up to 0.14 W/mm2. High power can be transmitted using resonant coupling with high efficiency. Coupling coil characteristics significantly affect wireless power system losses. High power density of the active areas can be in the high range of 0.14 W/mm2. Resonance coupling can be applied in short range applications keeping EMC and EMF restrictions.DOI:http://dx.doi.org/10.11591/ijece.v3i5.3938

Filter by Year

2011 2026


Filter By Issues
All Issue Vol 16, No 1: February 2026 Vol 15, No 6: December 2025 Vol 15, No 5: October 2025 Vol 15, No 4: August 2025 Vol 15, No 3: June 2025 Vol 15, No 2: April 2025 Vol 15, No 1: February 2025 Vol 14, No 6: December 2024 Vol 14, No 5: October 2024 Vol 14, No 4: August 2024 Vol 14, No 3: June 2024 Vol 14, No 2: April 2024 Vol 14, No 1: February 2024 Vol 13, No 6: December 2023 Vol 13, No 5: October 2023 Vol 13, No 4: August 2023 Vol 13, No 3: June 2023 Vol 13, No 2: April 2023 Vol 13, No 1: February 2023 Vol 12, No 6: December 2022 Vol 12, No 5: October 2022 Vol 12, No 4: August 2022 Vol 12, No 3: June 2022 Vol 12, No 2: April 2022 Vol 12, No 1: February 2022 Vol 11, No 6: December 2021 Vol 11, No 5: October 2021 Vol 11, No 4: August 2021 Vol 11, No 3: June 2021 Vol 11, No 2: April 2021 Vol 11, No 1: February 2021 Vol 10, No 6: December 2020 Vol 10, No 5: October 2020 Vol 10, No 4: August 2020 Vol 10, No 3: June 2020 Vol 10, No 2: April 2020 Vol 10, No 1: February 2020 Vol 9, No 6: December 2019 Vol 9, No 5: October 2019 Vol 9, No 4: August 2019 Vol 9, No 3: June 2019 Vol 9, No 2: April 2019 Vol 9, No 1: February 2019 Vol 8, No 6: December 2018 Vol 8, No 5: October 2018 Vol 8, No 4: August 2018 Vol 8, No 3: June 2018 Vol 8, No 2: April 2018 Vol 8, No 1: February 2018 Vol 7, No 6: December 2017 Vol 7, No 5: October 2017 Vol 7, No 4: August 2017 Vol 7, No 3: June 2017 Vol 7, No 2: April 2017 Vol 7, No 1: February 2017 Vol 6, No 6: December 2016 Vol 6, No 5: October 2016 Vol 6, No 4: August 2016 Vol 6, No 3: June 2016 Vol 6, No 2: April 2016 Vol 6, No 1: February 2016 Vol 5, No 6: December 2015 Vol 5, No 5: October 2015 Vol 5, No 4: August 2015 Vol 5, No 3: June 2015 Vol 5, No 2: April 2015 Vol 5, No 1: February 2015 Vol 4, No 6: December 2014 Vol 4, No 5: October 2014 Vol 4, No 4: August 2014 Vol 4, No 3: June 2014 Vol 4, No 2: April 2014 Vol 4, No 1: February 2014 Vol 3, No 6: December 2013 Vol 3, No 5: October 2013 Vol 3, No 4: August 2013 Vol 3, No 3: June 2013 Vol 3, No 2: April 2013 Vol 3, No 1: February 2013 Vol 2, No 6: December 2012 Vol 2, No 5: October 2012 Vol 2, No 4: August 2012 Vol 2, No 3: June 2012 Vol 2, No 2: April 2012 Vol 2, No 1: February 2012 Vol 1, No 2: December 2011 Vol 1, No 1: September 2011 More Issue