cover
Contact Name
Tole Sutikno
Contact Email
ijece@iaesjournal.com
Phone
-
Journal Mail Official
ijece@iaesjournal.com
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
International Journal of Electrical and Computer Engineering
ISSN : 20888708     EISSN : 27222578     DOI : -
International Journal of Electrical and Computer Engineering (IJECE, ISSN: 2088-8708, a SCOPUS indexed Journal, SNIP: 1.001; SJR: 0.296; CiteScore: 0.99; SJR & CiteScore Q2 on both of the Electrical & Electronics Engineering, and Computer Science) is the official publication of the Institute of Advanced Engineering and Science (IAES). The journal is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication and computer engineering from the global world.
Articles 6,301 Documents
Modeling of New Three-Phase High Voltage Power Supply For Industrial Microwave Generators With One Magnetron Per Phase El Ghazal Naama; M. Chraygane; M. Ferfra; A. Belhaiba; M. Fadel; B. Bahani
International Journal of Electrical and Computer Engineering (IJECE) Vol 3, No 2: April 2013
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (332.818 KB)

Abstract

This original work treats the feasibility study of a new HV power supply with a three-phase character, supplying a magnetron 800 Watts-2450 MHz per phase, for industrial microwave generators from the modeling with the EMTP code of a single-phase HV power supply for one magnetron. The exploitation of the modeling, with EMTP code, of the power system for one magnetron is to use, essentially, the developed model of its transformer, which is a π quadruple, consisting of saturable inductances able to translate the non-linear phenomena of saturation, while guaranteeing the stabilization process of the magnetron current. Using the new power supply device with a three-phase character and the EMTP code, the feasibility study, in nominal mode, of the three-phase power supply was performed satisfactory. The analysis of the results obtained helped to confirm the possibility of functioning of this new system without interaction between magnetrons, which provides, relative to the current device, gains of size, volume, cost of implementation and maintenance and makes this new system more economical, while guaranteeing the regulation process of the current in each magnetron.DOI:http://dx.doi.org/10.11591/ijece.v3i2.2409
PID controller using rapid control prototyping techniques Odair A. Trujillo; Nicolás Toro-García; Fredy E. Hoyos
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 3: June 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (340.85 KB) | DOI: 10.11591/ijece.v9i3.pp1645-1655

Abstract

To analyze the performance of the PID controller in a buck type converter implemented in real time. We begin by designing a continuous controller using the analytical method for calculating PIDs. Pulse width modulation is then used and bifurcation diagrams analyzed to reveal some problems of switching and sampling time. The model converter is then implemented with a PID controller in dSPACE. The experimental results provide detailed requirements of sampling frequency and switching speed, and show the performance of the PID controller. Converters are used in power generation solar systems and conmuted power sources for feed telecommunication devices, smart grids, and other applications.
Evaluation of Recognition-Based Graphical Password Schemes in Terms of Usability and Security Attributes Touraj Khodadadi; A.K.M. Muzahidul Islam; Sabariah Baharun; Shozo Komaki
International Journal of Electrical and Computer Engineering (IJECE) Vol 6, No 6: December 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (415.339 KB) | DOI: 10.11591/ijece.v6i6.pp2939-2948

Abstract

User Authentication is a critical component in information security. Several widely used mechanisms for security to protect services from illegal access include alphanumerical usernames passwords. However, there are several drawbacks attached in this method. For instance, the users themselves usually those passwords that are easy to guess. As difficult passwords are difficult to recall. A new alternative is the graphic-based password and there has been a growing trend in the use of such a password. The human psychology study reveals that humans find it easier to remember pictures as opposed to words. There are two main aspects to the graphical password scheme, namely security and usability. This study comprises of a comprehensive research in the current Recognition-Based graphical password schemes. The common usability attributes and possible attacks on the Recognition-Based graphical password are reviewed, identified and examined in detail. There are several previous surveys on the graphical passwords. The latest research review and summarize graphical password systems concisely and at the same time, analyze usability features for every design. However it was found that there is not a single method that has the most resounding usability attributes. Therefore, this research suggests a set of usability attributes that can be applied into a single Recognition-Based graphical password system. In addition, this study examines and compares success rates on login, login time and memorability of existing systems which are the usability measures most often reported in user studies of graphical passwords.  Lastly, a comparison table is revealed to put forth the limitations and strengths of each approach in terms of security and usability.
Novelty circular neighboring technique using reactive fault tolerance method Ahmad Shukri Mohd Noor; Nur Farhah Mat Zian; Noor Hafhizah Abd Rahim; Rabiei Mamat; Wan Nur Amira Wan Azman
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 6: December 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (449.946 KB) | DOI: 10.11591/ijece.v9i6.pp5211-5217

Abstract

The availability of the data in a distributed system can be increase by implementing fault tolerance mechanism in the system. Reactive method in fault tolerance mechanism deals with restarting the failed services, placing redundant copies of data in multiple nodes across network, in other words data replication and migrating the data for recovery. Even if the idea of data replication is solid, the challenge is to choose the right replication technique that able to provide better data availability as well as consistency that involves read and write operations on the redundant copies. Circular Neighboring Replication (CNR) technique exploits neighboring policy in replicating the data items in the system performs well with regards to lower copies needed to maintain the system availability at the highest. In a performance analysis with existing techniques, results show that CNR improves system availability by average 37% by offering only two replicas needed to maintain data availability and consistency. The study demonstrates the possibility of the proposed technique and the potential of deploying in larger and complex environment.
Load Balance in Data Center SDN Networks Tariq Emad Ali; Ameer Hussein Morad; Mohammed A. Abdala
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 5: October 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (282.785 KB) | DOI: 10.11591/ijece.v8i5.pp3084-3091

Abstract

In the last two decades, networks had been changed according to the rapid changing in its requirements.  The current Data Center Networks have large number of hosts (tens or thousands) with special needs of bandwidth as the cloud network and the multimedia content computing is increased. The conventional Data Center Networks (DCNs) are highlighted by the increased number of users and bandwidth requirements which in turn have many implementation limitations.  The current networking devices with its control and forwarding planes coupling result in network architectures are not suitable for dynamic computing and storage needs.  Software Defined networking (SDN) is introduced to change this notion of traditional networks by decoupling control and forwarding planes. So, due to the rapid increase in the number of applications, websites, storage space, and some of the network resources are being underutilized due to static routing mechanisms. To overcome these limitations, a Software Defined Network based Openflow Data Center network architecture is used to obtain better performance parameters and implementing traffic load balancing function. The load balancing distributes the traffic requests over the connected servers, to diminish network congestions, and reduce underutilization problem of servers. As a result, SDN is developed to afford more effective configuration, enhanced performance, and more flexibility to deal with huge network designs
Managing usability evaluation practices in agile development environments Aziz Bin Deraman; Fouad Abdulameer Salman
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 2: April 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (428.504 KB) | DOI: 10.11591/ijece.v9i2.pp1288-1297

Abstract

Usability evaluation is a core usability activity that minimizes risks and improves product quality. The returns from usability evaluation are undeniable. Neglecting such evaluation at the development stage negatively affects software usability. In this paper, the authors develop a software management tool used to incorporate usability evaluation activities into the agile environment. Using this tool, agile development teams can manage a continuous evaluation process, tightly coupled with the development process, allowing them to develop high quality software products with adequate level of usability. The tool was evaluated through verification, followed by the validation on satisfaction. The evaluation results show that the tool increased software development practitioner satisfaction and is practical for supporting usability work in software projects. 
Inter-cell Interference Management Technique for Multi-Cell LTE-A Network Iskandar Iskandar; I. Setyawan; H. Nuraini
International Journal of Electrical and Computer Engineering (IJECE) Vol 7, No 5: October 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (866.405 KB) | DOI: 10.11591/ijece.v7i5.pp2696-2705

Abstract

In modern cellular system such as LTE Advanced (LTE-A), frequency reuse scheme is targeted to be applied to fulfill the requirement of high capacity broadband access and high spectrum efficiency. But this kind of frequency planning may lead to the worse inter-cell interference (ICI) level experienced especially by a user located at the cell edge. Soft Frequency Reuse (SFR) is considered as an effective way to mitigate inter-cell interference and maintain capacity. We propose a power division SFR, known as multi level SFR technique to minimize ICI in a designed LTE-A network for sub-urban environment. Service area of LTE-A network was first developed to deploy particular number of eNB by using LTE network planning tools in the frequency of 1800 MHz with the use of SISO (Single Input Single Output) antennas. Coverage dimensioning and propagation consideration determine LTE-A parameters which were used in the simulation. Monte carlo simulation is executed to examine the performance of SFR for LTE-A downlink transmission to address different power ratio and traffic loads problem. Both performance of cell edge users and overall cell performance are evaluated in terms of CINR, BLER, and throughput. Performance with SFR is also compared with the classical frequency reuse one and three.
Cooperative-hybrid detection of primary user emulators in cognitive radio networks S. A. Adebo; E. N. Onwuka; A. U. Usman; A. J. Onumanyi
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 3: June 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (972.223 KB) | DOI: 10.11591/ijece.v10i3.pp3116-3124

Abstract

Primary user emulator (PUE) attack occurs in Cognitive Radio Networks (CRNs) when a malicious secondary user (SU) poses as a primary user (PU) in order to deprive other legitimate SUs the right to free spectral access for opportunistic communication. In most cases, these legitimate SUs are unable to effectively detect PUEs because the quality of the signals received from a PUE may be severely attenuated by channel fading and/or shadowing. Consequently, in this paper, we have investigated the use of cooperative spectrum sensing (CSS) to improve PUE detection based on a hybrid localization scheme. We considered different pairs of secondary users (SUs) over different received signal strength (RSS) values to evaluate the energy efficiency, accuracy, and speed of the new cooperative scheme. Based on computer simulations, our findings suggest that a PUE can be effectively detected by a pair of SUs with a low Root Mean Square Error rate of 0.0047 even though these SUs may have close RSS values within the same cluster. Furthermore, our scheme performs better in terms of speed, accuracy and low energy consumption rates when compared with other PUE detection schemes. Thus, it is a viable proposition to better detect PUEs in CRNs.
Congestion Management in Hybrid Electricity Markets with FACTS Devices with Loadability Limits Ashwani Kumar Sharma
International Journal of Electrical and Computer Engineering (IJECE) Vol 2, No 1: February 2012
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (345.047 KB)

Abstract

Congestion management (CM) is one of the most important challenging tasks of the Independent System Operator (ISO) in the deregulated environment. In this paper, generators’ rescheduling based CM approach to manage transmission line congestion considering loadability limit has been presented for hybrid based electricity market model. The main contribution of the paper is (i) to obtain secure transactions for hybrid market model, (ii) optimal rescheduling of generators with loadability limits taken into account with secure transactions, (iii) and impact of FACTS devices on transmission line congestion management. The ISO ensures secure bilateral transactions in a hybrid market model and CM is managed with minimum preferred schedule to obtain minimum congestion cost. The results have been obtained for IEEE 24 bus test system.  Keywords: Generator re-dispatch, congestion management, pool electricity market, bid function, loadability limit.DOI:http://dx.doi.org/10.11591/ijece.v2i1.114
Fairness Comparison of TCP Variants over Proactive and Reactive Routing Protocol in MANET Nahida Nigar; Muhammad Anwarul Azim
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 4: August 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (9.282 KB) | DOI: 10.11591/ijece.v8i4.pp2199-2206

Abstract

Mobile ad hoc networks (MANETs) are applicable in an infrastructureless environment where the mobile devices act as routers and intermediate nodes are used to transfer segments to their final destination. As Transmission control protocol (TCP) was originated for Internet with fundamentally different properties, faces serious challenges when used in mobile ad hoc networks. TCP functionality degrades, due to special properties of MANET such as route failure because of significant change of network topology and link errors. TCP uses Congestion Control Algorithms; TCP Vegas is one of them which claim to have better throughput comparing with other TCP variants in a wired network. Fairness issues of TCP Variants in MANET including existing routing protocol are still unsolved. To determine the best TCP Variants in MANET environment over renowned routing protocol is the main objective of this paper. A Study on the throughput fairness of TCP Variants namely, Vegas, Reno, New Reno, SACK, FACK, and Cubic are performed via simulation experiment using network simulator (ns-2) over existing routing protocol, named, AODV, AOMDV, DSDV, and DSR. This fairness evaluation of TCP flows arranged a contrast medium for the TCP Variants using stated routing protocol in MANET. However, TCP Vegas obtain unfair throughput in MANET. The simulation results show that TCP Reno outperforms other TCP variants under DSDV routing protocol.

Filter by Year

2011 2026


Filter By Issues
All Issue Vol 16, No 1: February 2026 Vol 15, No 6: December 2025 Vol 15, No 5: October 2025 Vol 15, No 4: August 2025 Vol 15, No 3: June 2025 Vol 15, No 2: April 2025 Vol 15, No 1: February 2025 Vol 14, No 6: December 2024 Vol 14, No 5: October 2024 Vol 14, No 4: August 2024 Vol 14, No 3: June 2024 Vol 14, No 2: April 2024 Vol 14, No 1: February 2024 Vol 13, No 6: December 2023 Vol 13, No 5: October 2023 Vol 13, No 4: August 2023 Vol 13, No 3: June 2023 Vol 13, No 2: April 2023 Vol 13, No 1: February 2023 Vol 12, No 6: December 2022 Vol 12, No 5: October 2022 Vol 12, No 4: August 2022 Vol 12, No 3: June 2022 Vol 12, No 2: April 2022 Vol 12, No 1: February 2022 Vol 11, No 6: December 2021 Vol 11, No 5: October 2021 Vol 11, No 4: August 2021 Vol 11, No 3: June 2021 Vol 11, No 2: April 2021 Vol 11, No 1: February 2021 Vol 10, No 6: December 2020 Vol 10, No 5: October 2020 Vol 10, No 4: August 2020 Vol 10, No 3: June 2020 Vol 10, No 2: April 2020 Vol 10, No 1: February 2020 Vol 9, No 6: December 2019 Vol 9, No 5: October 2019 Vol 9, No 4: August 2019 Vol 9, No 3: June 2019 Vol 9, No 2: April 2019 Vol 9, No 1: February 2019 Vol 8, No 6: December 2018 Vol 8, No 5: October 2018 Vol 8, No 4: August 2018 Vol 8, No 3: June 2018 Vol 8, No 2: April 2018 Vol 8, No 1: February 2018 Vol 7, No 6: December 2017 Vol 7, No 5: October 2017 Vol 7, No 4: August 2017 Vol 7, No 3: June 2017 Vol 7, No 2: April 2017 Vol 7, No 1: February 2017 Vol 6, No 6: December 2016 Vol 6, No 5: October 2016 Vol 6, No 4: August 2016 Vol 6, No 3: June 2016 Vol 6, No 2: April 2016 Vol 6, No 1: February 2016 Vol 5, No 6: December 2015 Vol 5, No 5: October 2015 Vol 5, No 4: August 2015 Vol 5, No 3: June 2015 Vol 5, No 2: April 2015 Vol 5, No 1: February 2015 Vol 4, No 6: December 2014 Vol 4, No 5: October 2014 Vol 4, No 4: August 2014 Vol 4, No 3: June 2014 Vol 4, No 2: April 2014 Vol 4, No 1: February 2014 Vol 3, No 6: December 2013 Vol 3, No 5: October 2013 Vol 3, No 4: August 2013 Vol 3, No 3: June 2013 Vol 3, No 2: April 2013 Vol 3, No 1: February 2013 Vol 2, No 6: December 2012 Vol 2, No 5: October 2012 Vol 2, No 4: August 2012 Vol 2, No 3: June 2012 Vol 2, No 2: April 2012 Vol 2, No 1: February 2012 Vol 1, No 2: December 2011 Vol 1, No 1: September 2011 More Issue