International Journal of Electrical and Computer Engineering
International Journal of Electrical and Computer Engineering (IJECE, ISSN: 2088-8708, a SCOPUS indexed Journal, SNIP: 1.001; SJR: 0.296; CiteScore: 0.99; SJR & CiteScore Q2 on both of the Electrical & Electronics Engineering, and Computer Science) is the official publication of the Institute of Advanced Engineering and Science (IAES). The journal is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication and computer engineering from the global world.
Articles
6,301 Documents
Development of Wireless Patient’s Vital Sign Monitor Using Wireless LAN (IEEE.802.11.b/g) Protocol
Achmad Rizal;
Vera Suryani;
Jondri Jondri;
Sugondo Hadiyoso
International Journal of Electrical and Computer Engineering (IJECE) Vol 4, No 6: December 2014
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (563.464 KB)
Vital sign monitor is typical medical instrument for basic physiological measurement. Medical practitioner assesses a patient’s health condition by observing measurement results shown in display. In this research, we designed low cost, wireless, PC-based vital sign monitor. Signals captured in designed vital sign monitor are electrocardiogram (ECG), photoplethysmogram (PPG), and body temperature. Captured data are transmitted via wireless LAN module so that medical practitioner is able to monitor patient’s condition remotely from another room or place. The system worked well for maximum transmission distance about 45 meters for LOS condition and 20 meter for NLOS condition.DOI:http://dx.doi.org/10.11591/ijece.v4i6.6429
Image watermarking based on integer wavelet transform-singular value decomposition with variance pixels
Ferda Ernawan;
Dhani Ariatmanto
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 3: June 2019
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (882.464 KB)
|
DOI: 10.11591/ijece.v9i3.pp2185-2195
With the era of rapid technology in multimedia, the copyright protection is very important to preserve an ownership of multimedia data. This paper proposes an image watermarking scheme based on Integer Wavelet Transform (IWT) and Singular Value Decomposition (SVD). The binary watermark is scrambled by Arnold transform before embedding watermark. Embedding locations are determined by using variance pixels. Selected blocks with the lowest variance pixels are transformed by IWT, thus the LL sub-band of 8×8 IWT is computed by using SVD. The orthogonal U matrix component of U3,1 and U4,1 are modified using certain rules by considering the watermark bits and an optimal threshold. This research reveals an optimal threshold value based on the trade-off between robustness and imperceptibility of watermarked image. In order to measure the watermarking performance, the proposed scheme is tested under various attacks. The experimental results indicate that our scheme achieves higher robustness than other scheme under different types of attack.
A Novel Human STR Similarity Method using Cascade Statistical Fuzzy Rules with Tribal Information Inference
M. Rahmat Widyanto;
Reggio N. Hartono;
Nurtami Soedarsono
International Journal of Electrical and Computer Engineering (IJECE) Vol 6, No 6: December 2016
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (903.876 KB)
|
DOI: 10.11591/ijece.v6i6.pp3103-3111
A novel human STR (Short Tandem Repeat) similarity method using cascade statistical fuzzy rules with tribal information inference is proposed. The proposed method consists of two cascade Fuzzy Inference Systems (FIS). The first FIS is to discriminate the tribal similarity, and the second FIS is to calculate the STR similarity. By using the allele marker’s statistical distribution probability density function as the membership function in the Fuzzy Rules of the first FIS, the new method makes it possible to tell the tribal similarity between two STR profiles. A 727 data acquired from tribal groups of Indonesia is used to examine the method produced promising result, being able to indicate higher tribal similarity score within a tribal group and lower similarity between tribal groups. In the light of Indonesia’s diverse tribal groups, these properties are able to be leveraged as a new way to improve the versatility of existing DNA matching algorithm.
Hand detection and segmentation using smart path tracking fingers as features and expert system classifier
Khaled N. Yasen;
Fahad Layth Malallah;
Lway Faisal Abdulrazak;
Aso Mohammad Darwesh;
Asem Khmag;
Baraa T. Shareef
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 6: December 2019
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (5.602 KB)
|
DOI: 10.11591/ijece.v9i6.pp5277-5285
Nowadays, hand gesture recognition (HGR) is getting popular due to several applications such as remote based control using a hand, and security for access control. One of the major problems of HGR is the accuracy lacking hand detection and segmentation. In this paper, a new algorithm of hand detection will be presented, which works by tracking fingers smartly based on the planned path. The tracking operation is accomplished by assuming a point at the top middle of the image containing the object then this point slides few pixels down to be a reference point then branching into two slopes: left and right. On these slopes, fingers will be scanned to extract flip-numbers, which are considered as features to be classified accordingly by utilizing the expert system. Experiments were conducted using 100 images for 10-individual containing hand inside a cluttered background by using Dataset of Leap Motion and Microsoft Kinect hand acquisitions. The recorded accuracy is depended on the complexity of the Flip-Number setting, which is achieved 96%, 84% and 81% in case 6, 7 and 8 Flip_Numbers respectively, in which this result reflects a high level of finite accuracy in comparing with existing techniques.
Hexa-band MIMO CPW Bow-tie Aperture Antenna Using Particle Swarm Optimization
A.K. hamid;
W. Obaid
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 5: October 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (569.905 KB)
|
DOI: 10.11591/ijece.v8i5.pp3118-3128
A MIMO hexa-band Bowtie Antenna for Wi-Fi is proposed. The MIMO antenna can operate at six frequency bands: 2.4, 4.4, 6.1, 8.5, 10.25 and 12.8 GHz. The MIMO antenna consists of four loaded bowtie hexa-band antennas having the same structure. Each single antenna element is loaded with six metallic strips as well as interconnected parasitic rectangular components. The presented HFSS simulations will show that the MIMO loaded antenna can operate at six frequency bands including 2.4 GHz by obtaining the return loss results, radiation patterns, and other antenna parameters. It will be shown also that the MIMO bowtie antenna has a very low mutual coupling at all the operating frequencies for the specific loaded metallic strips width which was obtained using Particle Swarm Optimization technique.
Design and implementation of heterogeneous surface gateway for underwater acoustic sensor network
Youngjun Jo;
Sangsoon Lim
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 2: April 2019
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (479.078 KB)
|
DOI: 10.11591/ijece.v9i2.pp1226-1231
Underwater Acoustic Sensor Networks (UASNs) are used for diverse purposes such as pollution monitoring, disaster prevention and industrial sensing in the oceans. Especially, UASNs are mainly focusing on monitoring various underwater environmental data and delivering the data to a monitoring center where nearby or far from the deployed area. To reliably deliver the data, a surface gateway should convert acoustic signal to RF (Radio Frequency) signal. In this paper, we devise a multiple interfaces-based surface gateway that can connect both a cellular network and a Zigbee network. Depends on the service requirement, the surface gateway can easily adopt each wireless interface and relay the data to a low power ZigBee network or a long range CDMA network.
A Hybrid Digital Watermarking Approach Using Wavelets and LSB
V. Ashok Kumar;
C. Dharmaraj;
Ch. Srinivasa Rao
International Journal of Electrical and Computer Engineering (IJECE) Vol 7, No 5: October 2017
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (876.435 KB)
|
DOI: 10.11591/ijece.v7i5.pp2483-2495
The present paper proposed a novel approach called Wavelet based Least Significant Bit Watermarking (WLSBWM) for high authentication, security and copyright protection. Alphabet Pattern (AP) approach is used to generate shuffled image in the first stage and Pell’s Cat Map (PCM) is used for providing more security and strong protection from attacks. PCM applied on each 5×5 sub images. A wavelet concept is used to reduce the dimensionality of the image until it equals to the size of the watermark image. Discrete Cosign Transform is applied in the first stage; later N level Discrete Wavelet Transform (DWT) is applied for reducing up to the size of the watermark image. The water mark image is inserted in LHn Sub band of the wavelet image using LSB concept. Simulation results show that the proposed technique produces better PSNR and similarity measure. The experimental results indicate that the present approach is more reliable and secure efficient.The robustness of the proposed scheme is evaluated against various image-processing attacks.
Ransomware protection in IoT using software defined networking
Azka Wani;
S. Revathi
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 3: June 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (681.785 KB)
|
DOI: 10.11591/ijece.v10i3.pp3166-3175
Internet of things (IoT) is the network of physical objects connected to provide various services. IoT is expanding rapidly, and is positively influencing many areas. The impact of IoT is evident in medical field, manufacturing units and livestock. The IoT is also vulnerable to many cyber threats, owing to its limited resources and battery operation. In contemporary times the security threats like DDoS, botnet malware, man in the middle, flood attacks and ransomware are affecting the smooth functioning of IoT. Ransomware has emerged as one of the biggest threat in cyber world. Ransomware is a type of malware that stops the access to files by encrypting them and decrypts the files only when a ransom is paid. The negligence towards the IoT ransomware can result in disastrous outcomes. In this paper, the growth of ransomware attacks for past few years is shown with special focus on ransomwares threatening IoT. A detection mechanism for IoT ransomware attack is presented that is designed after study of ransomware for IoT. The proposed model monitors the incoming IoT traffic through Software Defined Network (SDN) gateway. It uses policies framed in SDN controller for detection and alleviation of ransomware in IoT.
Bridging XML and Relational Databases: An Effective Mapping Scheme based on Persistent
Samini Subramaniam;
Su-Cheng Haw;
Poo Kuan Hoong
International Journal of Electrical and Computer Engineering (IJECE) Vol 2, No 2: April 2012
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (342.265 KB)
XML has emerged as the leading medium for data transfer over the World Wide Web. At the present days, relational database is still widely used as the back-end database in most organizations. Since there is mismatch in these two structures, an effective mapping scheme is definitely essential that provides seamless integration with relational databases. On the other hand, an immutable labeling scheme is certainly significant to dentify the XML nodes uniquely as well as supports dynamic update without having the existing labels to be re-labeled when there is an occurance of dynamic update. As such, in this paper, we propose s-XML by adopting the Persistent Labeling scheme as the annotation scheme to ensure seamless integration with relational database and able to support updates without the need to re-construct the existing labels. We conduct experiments to show that s-XML performs better in terms of mapping the XML nodes to relational databases, query retrieval and dynamic update compared to the existing approaches.DOI:http://dx.doi.org/10.11591/ijece.v2i2.215
Optimal Generation Scheduling of Power System for Maximum Renewable Energy Harvesting and Power Losses Minimization
Bounthanh Banhthasit;
Chaowanan Jamroen;
Sanchai Dechanupaprittha
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 4: August 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1872.03 KB)
|
DOI: 10.11591/ijece.v8i4.pp1954-1966
This paper proposes an optimal generation scheduling method for a power system integrated with renewable energy sources (RES) based distributed generations (DG) and energy storage systems (ESS) considering maximum harvesting of RES outputs and minimum power system operating losses. The main contribution aims at economically employing RES in a power system. In particular, maximum harvesting of renewable energy is achieved by the mean of ESS management. In addition, minimum power system operating losses can be obtained by properly scheduling operating of ESS and controllable generations. Particle Swam Optimization (PSO) algorithm is applied to search for a near global optimal solutions. The optimization problem is formulated and evaluated taking into account power system operating constraints. The different operation scenarios have been used to investigate the effective of the proposed method via DIgSILENT PowerFactory software. The proposed method is examined with IEEE standard 14-bus and 30-bus test systems.