cover
Contact Name
Tole Sutikno
Contact Email
ijece@iaesjournal.com
Phone
-
Journal Mail Official
ijece@iaesjournal.com
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
International Journal of Electrical and Computer Engineering
ISSN : 20888708     EISSN : 27222578     DOI : -
International Journal of Electrical and Computer Engineering (IJECE, ISSN: 2088-8708, a SCOPUS indexed Journal, SNIP: 1.001; SJR: 0.296; CiteScore: 0.99; SJR & CiteScore Q2 on both of the Electrical & Electronics Engineering, and Computer Science) is the official publication of the Institute of Advanced Engineering and Science (IAES). The journal is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication and computer engineering from the global world.
Articles 6,301 Documents
FSDA: Framework for Secure Data Aggregation in Wireless Sensor Network for Enhancing Key Management Jyoti Metan; K. N. Narashinha Murthy
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 6: December 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (524.824 KB) | DOI: 10.11591/ijece.v8i6.pp4684-4692

Abstract

An effective key management plays a crucial role in imposing a resilient security technique in Wireless Sensor Network (WSN). After reviewing the existing approaches of key management, it is confirmed that existing approachs does not offer good coverage on all potential security breaches in WSN. With WSN being essential part of Internet-of-Things (IoT), the existing approaches of key management can definitely not address such security breaches. Therefore, this paper introduces a Framework for Secure Data Aggregation (FSDA) that hybridizes the public key encryption mechanism in order to obtain a novel key management system. The proposed system does not target any specific attacks but is widely applicable for both internal and external attacks in WSN owing to its design principle. The study outcome exhibits that proposed FSDA offers highly reduced computational burden, minimal delay, less energy consumption, and higher data transmission perforance in contrast to frequency used encryption schemes in WSN.
Size Reduction and Gain Enhancement of a Microstrip Antenna using Partially Defected Ground Structure and Circular/Cross Slots Nada N. Tawfeeq
International Journal of Electrical and Computer Engineering (IJECE) Vol 7, No 2: April 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (563.634 KB) | DOI: 10.11591/ijece.v7i2.pp894-898

Abstract

Microwave engineers have been known to designedly created defects in the shape of carved out patterns on the ground plane of microstrip circuits and transmission lines for a long time, although their implementations to the antennas are comparatively new. The term Defected Ground Structure (DGS), precisely means a single or finite number of defects. At the beginning, DGS was employed underneath printed feed lines to suppress higher harmonics. Then DGS was directly integrated with antennas to improve the radiation characteristics, gain and to suppress mutual coupling between adjacent elements. Since then, the DGS techniques have been explored extensively and have led to many possible applications in the communication industry. The objective of this paper is to design and investigate microstrip patch antenna that operates at 2.4 GHz for Wireless Local Area Network WLAN IEEE 802.11b/g/n, ,Zigbee, Wireless HART, Bluetooth and several proprietary technologies that operate in the 2.4 GHz band. The design of the proposed antenna involves using partially Defected Ground Structure and circular/cross slots and compare it to the traditional microstrip patch antenna.  The results show improvement in both the gain of 3.45 dB and the S11 response of -22.3 dB along with reduction in the overall dimensions of the antenna. As a conclusion, the performance of the antenna has been improved through the incorporation with the DGS and slots structures regarding the S11 response and the gain. The proposed antenna become more compact. Finally, the radiation pattern of proposed antenna has remained directional in spite of adding slots on the ground plane.
DNA computing based stream cipher for internet of things using MQTT protocol Noor A. Hussein; Mohamed Ibrahim Shujaa
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 1: February 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (735.015 KB) | DOI: 10.11591/ijece.v10i1.pp1035-1042

Abstract

Internet of Things (IoT) is a rapidly developing technology that enables “devices” to communicate and share information amongst them without human control. The devices have the features of internet connectivity and networking. Due to the increasing demands of a secure environment in IoT application, security has become a crucial aspect on which researchers have been increasingly focused. Connecting devices to the internet can facilitate intruders to attack devices as they can access the data from anywhere in the globe. In this work, an encryption–decryption process-based stream cipher has been used. The messages between IoT nodes were encrypted using One Time Pad (OTP) and DNA computing. Furthermore, the required key sequence was generated using a linear feedback shift register (LFSR) as a pseudo number key generator. This key sequence was combined to generate a unique key for each message. The algorithm was implemented using source python and tested on a Raspberry pi under Linux open operation system.
Comparison Analysis Of Recovery Mechanism At Mpls Network Mohammad Yanuar Hariyawan
International Journal of Electrical and Computer Engineering (IJECE) Vol 1, No 2: December 2011
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (283.273 KB)

Abstract

Multi-protocol Label Switching (MPLS) has become an attractive technology of choice for Internet backbone service providers.  MPLS features the ability to perform traffic engineering and provides support for Quality of Service traffic provisioning. To deliver reliable service, MPLS requires a set of procedures to provide protection for the traffic carried on Label Switched Paths (LSP). In this case Lable Switched Routers (LSRS) supports recovery mechanism when failure happened in the network.This paper studied about performance from usage of different techniques that can be used to reroute traffic faster then  the current IP rerouting methods in the case of a failure in a network. Local rerouting, fast reroute one to one backs up, Haskin, PSL oriented path protection and 1+1 path protection recovery mechanism was compared by given of aggregate traffic which has self-similarity character. Packet drop, rejection probability, recovery time, service disruption time and pre-reserved resources backup will be made as comparator parameter with various bitrate and different position of link failure. Packet loss, rejection probability, recovery time and service disruption time at five recovery mechanisms influenced by position of link failure to ingress. 1+1 path protection mechanism has least packet drop, but costliest way to do recovery in the case of usage resources, as traffic is sent simultaneously in two paths which disjoint. Fast reroute one to one backup is quickest way to operate protection switching recovery after 1+1 path protection mechanism. Keywords: MPLS, recovery, rerouting, self-similar traffic, protection switchingDOI:http://dx.doi.org/10.11591/ijece.v1i2.84
Presentation of an Algorithm for Secure Data Transmission based on Optimal Route Selection during Electromagnetic Interference Occurrence A. H. Poursoltan Mohammadi; M. Chehel Amirani; F. Faghihi
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 1: February 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (868.229 KB) | DOI: 10.11591/ijece.v8i1.pp259-270

Abstract

This paper proposes a comprehensive algorithm for secure data transmission via communication conductors considering route optimization, shielding and data authentication. Using of appropriate coding method causes more efficiency for suggested algorithm during electromagnetic field attack occurrence. In this paper, MOM simulation via FIKO software is done for field distribution. Due to critical situation of malfunctioning of data transferring, appropriate shield is designed and examined by shielding effectiveness (SE) criterion resulted of MOM simulation; finally to achieve reliability of data security, MAC hash function is used for space with field attack probability, turbo code is employed.
Cognitive Sensor Platform Mark McDermott
International Journal of Electrical and Computer Engineering (IJECE) Vol 4, No 4: August 2014
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (618.356 KB)

Abstract

This paper describes a platform that is used to build embedded sensor systems for low energy implantable applications. One of the key characteristics of the platform is the ability to reason about the environment and dynamically modify the operational parameters of the system. Additionally the platform provides to ability to compose application specific sensor systems using a novel computational element that directly supports a synchronous-dataflow (SDF) programming paradigm. Cognition in the context of a sensor platform is defined as the “process of knowing, including aspects of awareness, perception, reasoning, and judgment”.DOI:http://dx.doi.org/10.11591/ijece.v4i4.5680
Mobile Location Indexing Based On Synthetic Moving Objects Thu Thu Zan; Sabai Phyu
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 4: August 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (398.701 KB) | DOI: 10.11591/ijece.v9i4.pp2556-2563

Abstract

Today, the number of researches based on the data they move known as mobile objects indexing came out from the traditional static one. There are some indexing approaches to handle the complicated moving positions. One of the suitable ideas is pre-ordering these objects before building index structure. In this paper, a structure, a presorted-nearest index tree algorithm is proposed that allowed maintaining, updating, and range querying mobile objects within the desired period. Besides, it gives the advantage of an index structure to easy data access and fast query along with the retrieving nearest locations from a location point in the index structure. A synthetic mobile position dataset is also proposed for performance evaluation so that it is free from location privacy and confidentiality. The detail experimental results are discussed together with the performance evaluation of KDtree-based index structure. Both approaches are similarly efficient in range searching. However, the proposed approach is especially much more save time for the nearest neighbor search within a range than KD tree-based calculation.
Low Common-Mode Gain Instrumentation Amplifier Architecture Insensitive to Resistor Mismatches Zainul Abidin; Koichi Tanno; Shota Mago; Hiroki Tamura
International Journal of Electrical and Computer Engineering (IJECE) Vol 6, No 6: December 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (397.404 KB) | DOI: 10.11591/ijece.v6i6.pp3247-3254

Abstract

In this paper, an instrumentation amplifier architecture for biological signal is proposed. First stage of conventional IA architecture was modified by using fully balanced differential difference amplifier and evaluated by using 1P 2M 0.6μm CMOS process. From HSPICE simulation result, lower common-mode voltage can be achieved by proposed IA architecture. Actual fabrication was done and six chips were evaluated. From the evaluation result, average common-mode gain of proposed IA architecture is 10.84 dB lower than that of conventional one without requiring well-matched resistors. Therefore, the proposed IA architecture is suitable for biological signal processing.
Information System Success Framework based on Interpersonal Conflict Factors Mohammed Aboaoga; Mohd Juzaiddin Ab Aziz; Ibrahim Mohamed
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 5: October 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (434.486 KB) | DOI: 10.11591/ijece.v8i5.pp3740-3746

Abstract

Information system success (ISS) has received considerable attention from researchers as it plays an important role in improving the efficiency and productivity of an organization. Several researchers have conducted empirical studies using numerous factors (e.g. organizational, technological, and individual factors) which affect the information system success. However, there are several factors which are related to interpersonal conflict which may affect information system success. The interpersonal conflict is a critical dimension which can greatly influence information system success in a competitive environment such as the financial sector. Therefore, this study introduces a framework to investigate the influence of interpersonal conflict factors on information system success in the Ministry of Finance, Yemen. The study employed a quantitative method which consists of the following steps: survey design, data collection and data analysis. A sample size comprising 130 employees were distributed in the Ministry of Finance, Yemen. Questionnaires were used to collect data from this sample. Data analysis (reliability, validity, correlation and factor analysis) has been carried out using SPSS.  In addition, structural equation modelling (SEM) has been used for evaluation the research model. Based on the experimental results, the findings in this study revealed that the interpersonal factors (interference, disagreement and instability) significantly negatively (at 0.05 level of significance) influence user satisfaction of information system success.
Product recommendation system based user purchase criteria and product reviews Jinyoung Kim; Doyeun Hwang; Hoekyung Jung
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 6: December 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (694.117 KB) | DOI: 10.11591/ijece.v9i6.pp5454-5462

Abstract

In this paper, we propose a system that provides customized product recommendation information after crawling product review data of internet shopping mall with unstructured data, morphological analysis using Python. User searches for a proudct to be purchased and select the most important purchase criteria when purchasing the product. User searches for a proudct to be purchased and select the most important purchase criteria when purchasing the product. And extracts and analyzes only the review including the purchase criterion selected by the user among the product reviews left by other users. The positive and negative evaluations contained in the extracted product review data are quantified and using the average value, we extract the top 10 products with good product evaluation, sort and recommend to users. And provides user-customized information that reflects the user's preference by arranging and providing a center around the criteria that the user occupies the largest portion of the product purchase. This allows users to reduce the time it takes to purchase a product and make more efficient purchasing decisions.

Filter by Year

2011 2026


Filter By Issues
All Issue Vol 16, No 1: February 2026 Vol 15, No 6: December 2025 Vol 15, No 5: October 2025 Vol 15, No 4: August 2025 Vol 15, No 3: June 2025 Vol 15, No 2: April 2025 Vol 15, No 1: February 2025 Vol 14, No 6: December 2024 Vol 14, No 5: October 2024 Vol 14, No 4: August 2024 Vol 14, No 3: June 2024 Vol 14, No 2: April 2024 Vol 14, No 1: February 2024 Vol 13, No 6: December 2023 Vol 13, No 5: October 2023 Vol 13, No 4: August 2023 Vol 13, No 3: June 2023 Vol 13, No 2: April 2023 Vol 13, No 1: February 2023 Vol 12, No 6: December 2022 Vol 12, No 5: October 2022 Vol 12, No 4: August 2022 Vol 12, No 3: June 2022 Vol 12, No 2: April 2022 Vol 12, No 1: February 2022 Vol 11, No 6: December 2021 Vol 11, No 5: October 2021 Vol 11, No 4: August 2021 Vol 11, No 3: June 2021 Vol 11, No 2: April 2021 Vol 11, No 1: February 2021 Vol 10, No 6: December 2020 Vol 10, No 5: October 2020 Vol 10, No 4: August 2020 Vol 10, No 3: June 2020 Vol 10, No 2: April 2020 Vol 10, No 1: February 2020 Vol 9, No 6: December 2019 Vol 9, No 5: October 2019 Vol 9, No 4: August 2019 Vol 9, No 3: June 2019 Vol 9, No 2: April 2019 Vol 9, No 1: February 2019 Vol 8, No 6: December 2018 Vol 8, No 5: October 2018 Vol 8, No 4: August 2018 Vol 8, No 3: June 2018 Vol 8, No 2: April 2018 Vol 8, No 1: February 2018 Vol 7, No 6: December 2017 Vol 7, No 5: October 2017 Vol 7, No 4: August 2017 Vol 7, No 3: June 2017 Vol 7, No 2: April 2017 Vol 7, No 1: February 2017 Vol 6, No 6: December 2016 Vol 6, No 5: October 2016 Vol 6, No 4: August 2016 Vol 6, No 3: June 2016 Vol 6, No 2: April 2016 Vol 6, No 1: February 2016 Vol 5, No 6: December 2015 Vol 5, No 5: October 2015 Vol 5, No 4: August 2015 Vol 5, No 3: June 2015 Vol 5, No 2: April 2015 Vol 5, No 1: February 2015 Vol 4, No 6: December 2014 Vol 4, No 5: October 2014 Vol 4, No 4: August 2014 Vol 4, No 3: June 2014 Vol 4, No 2: April 2014 Vol 4, No 1: February 2014 Vol 3, No 6: December 2013 Vol 3, No 5: October 2013 Vol 3, No 4: August 2013 Vol 3, No 3: June 2013 Vol 3, No 2: April 2013 Vol 3, No 1: February 2013 Vol 2, No 6: December 2012 Vol 2, No 5: October 2012 Vol 2, No 4: August 2012 Vol 2, No 3: June 2012 Vol 2, No 2: April 2012 Vol 2, No 1: February 2012 Vol 1, No 2: December 2011 Vol 1, No 1: September 2011 More Issue