cover
Contact Name
Tole Sutikno
Contact Email
ijece@iaesjournal.com
Phone
-
Journal Mail Official
ijece@iaesjournal.com
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
International Journal of Electrical and Computer Engineering
ISSN : 20888708     EISSN : 27222578     DOI : -
International Journal of Electrical and Computer Engineering (IJECE, ISSN: 2088-8708, a SCOPUS indexed Journal, SNIP: 1.001; SJR: 0.296; CiteScore: 0.99; SJR & CiteScore Q2 on both of the Electrical & Electronics Engineering, and Computer Science) is the official publication of the Institute of Advanced Engineering and Science (IAES). The journal is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication and computer engineering from the global world.
Articles 6,301 Documents
Multi Units of Three Phase Photovoltaic using Band Pass Filter to Enhance Power Quality in Distribution Network under Variable Temperature and Solar Irradiance Level Adiananda Adiananda; Agus Kiswantono; Amirullah Amirullah
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 2: April 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (789.063 KB) | DOI: 10.11591/ijece.v8i2.pp806-817

Abstract

The paper proposed power quality enhancement on three phase grid of point common coupling (PCC) bus due to integration of multi units of photovoltaic (PV) to 380 volt (phase-phase) 50 Hz low voltage distribution network under variable temperature and irradiance level. The band pass filter models (single tuned and double tuned) were installed to improvement power quality on the conditions i.e. without filter, with single tuned filter, and with double tuned filter. Multi units of PV generator without filter, with single tuned, and with double tuned filter at all temperatures and irradiance levels resulted in relatively stable phase voltage (308 and 310 volt), so able to generate an unbalanced voltage of 0%. The maximum phase current for the system without filter at all temperatures and radiation levels of 9.8, 12.5, and 10 ampere respectively, resulted in an unbalanced current of 16.10% . Under the same condition, single tuned and double tuned filters were able to balance phase current to 10.45 A and 10.44 ampere respectively, resulting in an unbalanced current of 0%. Implementation of single tuned and double tuned filters was able to reduce unbalance current according to ANSI/IEEE 241-1990. At constant temperature and irradiance increased, both average voltage and current harmonics also increased. Double tuned active filter was the most effective to suppress the 11th and 13th harmonics so that capable to migitate average voltage and current harmonics better than system using single tuned filter which could only reduce 5th harmonic within IEEE 519-1992.
Domain Examination of Chaos Logistics Function As A Key Generator in Cryptography Alz Danny Wowor; Vania Beatrice Liwandouw
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 6: December 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1314.485 KB) | DOI: 10.11591/ijece.v8i6.pp4577-4583

Abstract

The use of logistics functions as a random number generator in a cryptography algorithm is capable of accommodating the diffusion properties of the Shannon principle. The problem that occurs is initialization x was static and was not affected by changes in the key, so that the algorithm will generate a random number that is always the same. This study design three schemes that can providing the flexibility of the input keys in conducting the examination of the value of the domain logistics function. The results of each schemes do not show a pattern that is directly proportional or inverse with the value of x0 and relative error x and successfully fulfill the properties of the butterfly effect. Thus, the existence of logistics functions in generating chaos numbers can be accommodated based on key inputs. In addition, the resulting random numbers are distributed evenly over the chaos range, thus reinforcing the algorithm when used as a key in cryptography.
Performance Evaluation of Interactive Video Streaming over WiMAX Network Sanam Narejo; Farzana Kulsoom; M. Moazzam Jawaid
International Journal of Electrical and Computer Engineering (IJECE) Vol 7, No 1: February 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (611.393 KB) | DOI: 10.11591/ijece.v7i1.pp344-352

Abstract

Nowadays, the desire of internet access and the need of digital encodings have influenced quite a large number of users to access high quality video application. Offering multimedia services not only to the wired but to wireless mobile client is becoming more viable. In wireless medium, video-streaming still has high resource requirements, for example, bandwidth, traffic priority, smooth play-backs. Therefore, bandwidth demands of these applications are far exceeding the capacity of 3G and Wireless Local Area Networks (LANs). The current research demonstrates the introductory understanding of the Worldwide Interoperability for Microwave Access (WiMax) network, applications, the mechanisms, its potential features, and techniques used to provide QoS in WiMAX, and lastly the network is simulated  to report the diverse requirements of streamed video conferencing traffic and its specifications. For this purpose two input parameters of video traffic are selected, i.e, refresh rate, which is monitored in terms of frames per second and pixel resolutions which basically counts the number of pixels in digital imaging. The network model is developed in OPNET. Different outcomes from simulation based models are analyzed and appropriate reasons are also discussed. Apart from this, the second aim of the current research is to address whether WiMAX access technology for streaming video applications could provide comparable network performance to Asymmetric Digital Subscriber Line (ADSL). For this purpose network metrices such as End to End delay and throughput is taken into consideration for optimization.
Performance analysis of binary and multiclass models using azure machine learning Smitha Rajagopal; Katiganere Siddaramappa Hareesha; Poornima Panduranga Kundapur
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 1: February 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (418.108 KB) | DOI: 10.11591/ijece.v10i1.pp978-986

Abstract

Network data is expanding and that too at an alarming rate. Besides, the sophisticated attack tools used by hackers lead to capricious cyber threat landscape. Traditional models proposed in the field of network intrusion detection using machine learning algorithms emphasize more on improving attack detection rate and reducing false alarms but time efficiency is often overlooked. Therefore, in order to address this limitation, a modern solution has been presented using Machine Learning-as-a-Service platform. The proposed work analyses the performance of eight two-class and three multiclass algorithms using UNSW NB-15, a modern intrusion detection dataset. 82,332 testing samples were considered to evaluate the performance of algorithms. The proposed two class decision forest model exhibited 99.2% accuracy and took 6 seconds to learn 1,75,341 network instances. Multiclass classification task was also undertaken wherein attack types like generic, exploits, shellcode and worms were classified with a recall percentage of 99%, 94.49%, 91.79% and 90.9% respectively by the multiclass decision forest model that also leapfrogged others in terms of training and execution time.
Intelligent Robotics Navigation System: Problems, Methods, and Algorithm Siti Nurmaini; Bambang Tutuko
International Journal of Electrical and Computer Engineering (IJECE) Vol 7, No 6: December 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (611.098 KB) | DOI: 10.11591/ijece.v7i6.pp3711-3726

Abstract

This paper set out to supplement new studies with a brief and comprehensible review of the advanced development in the area of the navigation system, starting from a single robot, multi-robot, and swarm robots from a particular perspective by taking insights from these biological systems. The inspiration is taken from nature by observing the human and the social animal that is believed to be very beneficial for this purpose. The intelligent navigation system is developed based on an individual characteristic or a social animal biological structure. The discussion of this paper will focus on how simple agent’s structure utilizes flexible and potential outcomes in order to navigate in a productive and unorganized surrounding. The combination of the navigation system and biologically inspired approach has attracted considerable attention, which makes it an important research area in the intelligent robotic system. Overall, this paper explores the implementation, which is resulted from the simulation performed by the embodiment of robots operating in real environments.
Theoretical Analysis for Scale-down-Aware Service Allocation in Cloud Storage Systems Angli Liu
International Journal of Electrical and Computer Engineering (IJECE) Vol 3, No 1: February 2013
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (122.519 KB)

Abstract

Servcie allocation algorithms have been drawing popularity in cloudcomputing research community. There has been lots of research onimprovingservice allocation schemes for high utilization, latency reductionand VM migration enfficient, but few work focus on energy consumptionaffected by instance placement in data centers. In this paper we propose an algorithm in which to maximize the number of freed-up machines in data centers, machines that host purely scale-down instances, which are reuiqred to be shut down for energy saving at certain points of time. We intuitively employ a probability partitioning mechanism to schedule services such that the goal of the maximization can be achieved. Furthermore we perform a set of experiments to test the partitioning rules, which show that the proposed algorithms can dynamically increase the number of freed-up machines substantially.DOI:http://dx.doi.org/10.11591/ijece.v3i1.1792
Flood disaster indicator of water level monitoring system Wan Haszerila Wan Hassan; Aiman Zakwan Jidin; Siti Asma Che Aziz; Norain Rahim
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 3: June 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (443.374 KB) | DOI: 10.11591/ijece.v9i3.pp1694-1699

Abstract

The early warning systems for flood management have been developed rapidly with the growth of technologies. These system help to alert people early with the used of Short Message Service (SMS) via Global System for Mobile Communications (GSM). This paper presents a simple, portable and low cost of early warning system using Arduino board, which is used to control the whole system and GSM shields to send the data. System has been designed and implemented based on two components which is hardware and software. The model determines the water level using float switch sensors, then it analyzes the collected data and determine the type of danger present. The detected level is translated into an alert message and sent to the user. The GSM network is used to connect the overall system units via SMS.
Finding the Optimal Value for Threshold Cryptography on Cloud Computing Weena Janratchakool; Sirapat Boonkrong; Sucha Smanchat
International Journal of Electrical and Computer Engineering (IJECE) Vol 6, No 6: December 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (789.655 KB) | DOI: 10.11591/ijece.v6i6.pp2979-2988

Abstract

The objective of using threshold cryptography on cloud environment is to protect the keys, which are the most important elements in cryptographic systems. Threshold cryptography works by dividing the private key to a number of shares, according to the number of virtual machines, then distributing them each share to each virtual machine. In order to generate the key back, not all the shares are needed. Howerver, the problem is that there has been no research attemping to find a suitable threshold value for key reconstruction. Therefore, this paper presented a guildline designed and implemented that can assist to choose such value. The experiment was setup using CloudSim to simulate cloud environment and collecting time taken in key distribution and key reconstruction process to achieve the optimal threshold value.
A data modeling conceptual framework for ubiquitous computing based on context awareness Stenly Richard Pungus; Jamaiah Haji Yahaya; Aziz Deraman; Noor Hasrina Binti Bakar
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 6: December 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (579.837 KB) | DOI: 10.11591/ijece.v9i6.pp5495-5501

Abstract

This paper introduces a framework for data modeling to support ubiquitous computing based on context-awareness.  Data always grow in term of volume, variety, velocity, and value. The problem arises when it grows exponentially. Consequently, data is anywhere and requirements change in early data definitions then data design become not as the plan.  Therefore, suitable approach with new paradigm and methods of data modeling needs to be enhanced to solve the problems in the real world. Data model must consider the active object that related to each other. Any objects may interact with each other in a ubiquitous way and recorded in digital technology. Sensors, actuator devices, and radio frequency identification technology may support communication between objects through ubiquitous computing. The data model in Ubiquitous Computing needs to restructure to become active and dynamic.  Ubiquitous computing is a model that enable all objects around the people to communicate and invisible. In order to support this paradigm, a new perspective of how data are designed and stored on each object is needed. Furthermore, using ubiquitous computing, the pervasive network can request and response information, which means the devices may communicate and has the initiative to solve a problem without human intervention.  Human wants more intelligence objects. Therefore, more sensors and memory are required. Data structures need to enhance or embedded into any devices that interact with the human.
Analysis of Blackhole Attack in AODV and DS Niranjan Panda; Binod Kumar Pattanayak
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 5: October 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (454.898 KB) | DOI: 10.11591/ijece.v8i5.pp3092-3102

Abstract

Mobile Ad-Hoc Networks (MANETs) are supreme ruler and demoralization wireless scheme. MANETs are infrastructure less i.e. their structure is not fixed, and the nodes be able to move about and can leave the network whenever they want. The nodes are to perform as more over router and host. In MANETs, the node can be in contact with every node as their configuration is not fixed and the nodes starts transmitting the packets to each other for the establishment of the connection. To hitch the link, the nodes make use of some routing protocols like Ad-Hoc On Demand Distance Vector (AODV), Dynamic Source Routing (DSR), and DestinationSequenced Distance Vector (DSDV). Security in MANET is the key matter meant for the fundamental utility of network. There are many attacks caused in MANET. Blackhole attack is one that occurs in MANET. A Black hole attack is an attack where the node, which is malicious advertise itself as having the optimal route to the destination and drops all the packets instead of forwarding further to the destination. Here, we have shown the blackhole attack in AODV and DSR. Through simulation we evaluate the performance of the two above protocols under blackhole attack.

Filter by Year

2011 2026


Filter By Issues
All Issue Vol 16, No 1: February 2026 Vol 15, No 6: December 2025 Vol 15, No 5: October 2025 Vol 15, No 4: August 2025 Vol 15, No 3: June 2025 Vol 15, No 2: April 2025 Vol 15, No 1: February 2025 Vol 14, No 6: December 2024 Vol 14, No 5: October 2024 Vol 14, No 4: August 2024 Vol 14, No 3: June 2024 Vol 14, No 2: April 2024 Vol 14, No 1: February 2024 Vol 13, No 6: December 2023 Vol 13, No 5: October 2023 Vol 13, No 4: August 2023 Vol 13, No 3: June 2023 Vol 13, No 2: April 2023 Vol 13, No 1: February 2023 Vol 12, No 6: December 2022 Vol 12, No 5: October 2022 Vol 12, No 4: August 2022 Vol 12, No 3: June 2022 Vol 12, No 2: April 2022 Vol 12, No 1: February 2022 Vol 11, No 6: December 2021 Vol 11, No 5: October 2021 Vol 11, No 4: August 2021 Vol 11, No 3: June 2021 Vol 11, No 2: April 2021 Vol 11, No 1: February 2021 Vol 10, No 6: December 2020 Vol 10, No 5: October 2020 Vol 10, No 4: August 2020 Vol 10, No 3: June 2020 Vol 10, No 2: April 2020 Vol 10, No 1: February 2020 Vol 9, No 6: December 2019 Vol 9, No 5: October 2019 Vol 9, No 4: August 2019 Vol 9, No 3: June 2019 Vol 9, No 2: April 2019 Vol 9, No 1: February 2019 Vol 8, No 6: December 2018 Vol 8, No 5: October 2018 Vol 8, No 4: August 2018 Vol 8, No 3: June 2018 Vol 8, No 2: April 2018 Vol 8, No 1: February 2018 Vol 7, No 6: December 2017 Vol 7, No 5: October 2017 Vol 7, No 4: August 2017 Vol 7, No 3: June 2017 Vol 7, No 2: April 2017 Vol 7, No 1: February 2017 Vol 6, No 6: December 2016 Vol 6, No 5: October 2016 Vol 6, No 4: August 2016 Vol 6, No 3: June 2016 Vol 6, No 2: April 2016 Vol 6, No 1: February 2016 Vol 5, No 6: December 2015 Vol 5, No 5: October 2015 Vol 5, No 4: August 2015 Vol 5, No 3: June 2015 Vol 5, No 2: April 2015 Vol 5, No 1: February 2015 Vol 4, No 6: December 2014 Vol 4, No 5: October 2014 Vol 4, No 4: August 2014 Vol 4, No 3: June 2014 Vol 4, No 2: April 2014 Vol 4, No 1: February 2014 Vol 3, No 6: December 2013 Vol 3, No 5: October 2013 Vol 3, No 4: August 2013 Vol 3, No 3: June 2013 Vol 3, No 2: April 2013 Vol 3, No 1: February 2013 Vol 2, No 6: December 2012 Vol 2, No 5: October 2012 Vol 2, No 4: August 2012 Vol 2, No 3: June 2012 Vol 2, No 2: April 2012 Vol 2, No 1: February 2012 Vol 1, No 2: December 2011 Vol 1, No 1: September 2011 More Issue