cover
Contact Name
Tole Sutikno
Contact Email
ijece@iaesjournal.com
Phone
-
Journal Mail Official
ijece@iaesjournal.com
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
International Journal of Electrical and Computer Engineering
ISSN : 20888708     EISSN : 27222578     DOI : -
International Journal of Electrical and Computer Engineering (IJECE, ISSN: 2088-8708, a SCOPUS indexed Journal, SNIP: 1.001; SJR: 0.296; CiteScore: 0.99; SJR & CiteScore Q2 on both of the Electrical & Electronics Engineering, and Computer Science) is the official publication of the Institute of Advanced Engineering and Science (IAES). The journal is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication and computer engineering from the global world.
Articles 6,301 Documents
Exciting field and quadrature-axis armature reaction in a cascade equivalent A-H-circuit of a salient-pole generator Alexey Blanc
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 2: April 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (459.78 KB) | DOI: 10.11591/ijece.v10i2.pp1674-1681

Abstract

Cartesian and cylindrical laminated models are well known in calculations of electric machines. In such models, general solutions of partial differential equations are transformed into four-terminal network equations, and this makes possible to synthesize cascade equivalent circuits of electric machines. In salient-pole machines, solutions of partial differential equations are formed on the base of piecewise continuous Sturm-Liouville eigenfunctions. However, in this case, cascade equivalent circuits cannot be synthesized since it needs many piecewise continuous eigenfunctions in the zone of poles and many smooth functions in the zone of the air gap for ensuring uniqueness of a solution. Meanwhile the author of this paper had offered an approximate method on the base of the single piecewise continuous Sturm-Liouville eigenfunction in the zone of poles and many smooth functions in the zone of the air gap. This method allows transforming a solution of a partial differential equation into four-terminal network equations and synthesizing cascade equivalent circuits of salient-pole machines. In this paper, electromagnetic field of a synchronous salient-pole generator is calculated with a cascade equivalent A-H-circuit. The cell that corresponds to rotor poles is synthesized on the base of a solution of Laplace's equation with the single piecewise continuous Sturm-Liouville eigenfunction.
Energy efficiency in virtual machines allocation for cloud data centers with lottery algorithm Mehran Tarahomi; Mohammad Izadi
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 1: February 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (106.644 KB) | DOI: 10.11591/ijece.v9i1.pp546-553

Abstract

Energy usage of data centers is a challenging and complex issue because computing applications and data are growing so quickly that increasingly larger servers and disks are needed to process them fast enough within the required time period. In the past few years, many approaches to virtual machine placement have been proposed. This study proposes a new approach for virtual machine allocation to physical hosts. Either minimizes the physical hosts and avoids the SLA violation. The proposed method in comparison to the other algorithms achieves better results.
Review of Software Fault-Tolerance Methods for Reliability Enhancement of Real-Time Software Systems Anjushi Verma; Ankur Ghartaan; Tirthankar Gayen
International Journal of Electrical and Computer Engineering (IJECE) Vol 6, No 3: June 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (158.473 KB) | DOI: 10.11591/ijece.v6i3.pp1031-1037

Abstract

Real time systems are those systems which must guarantee to response correctly within strict time constraint or within deadline. Failures can arise from both functional errors as well as timing bugs. Hence, it is necessary to provide temporal correctness of programs used in real time applications in addition to providing functional correctness. Although, there are several researches concerned with achieving fault tolerance in the presence of various functional and operational errors but many of them did not address the problem concerned with the timing bugs which is an important issue in real time systems. As for real time systems, many times it becomes a necessity for a given service to be delivered within the specified time deadline. Therefore, this paper reviews the existing approaches from the perspective of  real time systems to analyse the shortcomings of these approaches to  present a versatile and cost effective approach in the presence of timing bugs for providing fault tolerance to enhance the reliability of the real time software applications.
Investigation on the Services of Private Cloud Computing by Using ADAM Method Nur Widiyasono; Imam Riadi; Ahmad Luthfie
International Journal of Electrical and Computer Engineering (IJECE) Vol 6, No 5: October 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (926.321 KB) | DOI: 10.11591/ijece.v6i5.pp2387-2395

Abstract

Cloud services are offered by many cloud service providers, but in for large companies generally are build  by a private cloud computing. In cloud systems of abuse it can be done by internal users or due to misconfiguration or may also refer to weaknesses in the system. This study evaluated the ADAM method (Advanced Data Acquisition Model) and tested the case schemes which are being carried out in the laboratory simulation of the process in order to obtain forensic evidence of digital data on private cloud computing services. Referring to the results of the investigation process by using ADAM Method, it can be verified that there are several parameters of the success investigation including the structure of files, files, time stamp, mac-address, IP address, username password, and the data from a server both from the desktop PC or smartphone, therefore the investigation by using ADAM can be succesed properly and correctly. Another contribution of this study was to identify the weaknesses of the service system that used owncloud in users list of the the same group can change another’s user’s passwod.
Text Preprocessing using Annotated Suffix Tree with Matching Keyphrase Ionia Veritawati; Ito Wasito; T Basaruddin
International Journal of Electrical and Computer Engineering (IJECE) Vol 5, No 3: June 2015
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (254.353 KB) | DOI: 10.11591/ijece.v5i3.pp409-420

Abstract

Text document is an important source of information and knowledge. Most of the knowledge needed in various domains for different purposes is in form of implicit content. Content of text is represented by keyphrases, which consist of one or more meaningful words. Keyphrases can be extracted from text through several steps of processing, including text preprocessing. Annotated Suffix Tree (AST) built from the documents collection itself is used to extract the keyphrase, after basic text preprocessing that includes removing stop words and stemming are applied. Combination of four variations of preprocessing is used. Two words (bi-words) and three words of phrases extracted are used as a list of keyphrases candidate which can help user who needs keyphrase information to understand content of documents. The candidate of keyphrase can be processed further by learning process to determine keyphrase or non keyphrase for the text domain with manual validation. Experiments using simulation corpus which keyphrases are determined from it show that keyphrases of two and three words can be extracted more than 90% and using real corpus of economy, keyphrases or meaning phrases can be extracted about 70%.   The proposed method can be an effective ways to find candidate keyphrases from collection of text documents which can reduce non keyphrases or non meaning phrases from list of keyphrases candidate and detect keyphrases which are separated by stop words.
Asset management and maintenance: a smart grid perspective Chan-Mook Jung; Papia Ray; Surender Reddy Salkuti
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 5: October 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (435.654 KB) | DOI: 10.11591/ijece.v9i5.pp3391-3398

Abstract

This paper presents the importance, issues and challenges related to Smart Grid. It also evaluates various approaches for Smart Grid planning and operation. It discusses tools for asset management and their applicability to the next generation grid. Aging assets, uncertainty in load demand profile and renewable energy resources, and demand management create a challenge for the optimal operation and maintenance of electrical grid. This paper addresses the challenges and opportunities to improve transmission and distribution systems asset maintenance. This paper also presents the asset replacement alternatives. This paper also presents the cost-benefit analysis of asset management using the information/real time data from the utility company. This paper will serve a guide for doing the asset management to the electrification  process, investment and  recovery to sustain reliable and efficient power delivery.
Soft Frequency Reuse (SFR) in LTE-A Heterogeneous Networks based upon Power Ratio Evaluation Alvita Maurizka; F. Hamdani; M. M. Ulfah; Iskandar Iskandar
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 3: June 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (788.443 KB) | DOI: 10.11591/ijece.v8i3.pp1569-1576

Abstract

As the traffic demand grows and the RF environment changes, the mobile network relies on techniques such as SFR in Heterogeneous Network (HetNet) to overcome capacity and link budget limitation to maintain user experience. Inter-Cell Interference (ICI) strongly affecting Signal-to-Interference plus Noise Ratio (SINR) of active UEs, especially cell-edge users, which leads to a significant degradation in the total throughput. In this paper we evaluate the performance of SFR with HetNet system in order dealing with interferences. Simulation result shows that the power ratio control in SFR HetNet system doesn’t have much effect on total achieved capacity for overall cell.
Deep Belief Networks for Recognizing Handwriting Captured by Leap Motion Controller Abas Setiawan; Reza Pulungan
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 6: December 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (677.119 KB) | DOI: 10.11591/ijece.v8i6.pp4693-4704

Abstract

Leap Motion controller is an input device that can track hands and fingers position quickly and precisely. In some gaming environment, a need may arise to capture letters written in the air by Leap Motion, which cannot be directly done right now. In this paper, we propose an approach to capture and recognize which letter has been drawn by the user with Leap Motion. This approach is based on Deep Belief Networks (DBN) with Resilient Backpropagation (Rprop) fine-tuning. To assess the performance of our proposed approach, we conduct experiments involving 30,000 samples of handwritten capital letters, 8,000 of which are to be recognized. Our experiments indicate that DBN with Rprop achieves an accuracy of 99.71%, which is better than DBN with Backpropagation or Multi-Layer Perceptron (MLP), either with Backpropagation or with Rprop. Our experiments also show that Rprop makes the process of fine-tuning significantly faster and results in a much more accurate recognition compared to ordinary Backpropagation. The time needed to recognize a letter is in the order of 5,000 microseconds, which is excellent even for online gaming experience.
5G Coupler Design for Intelligent Transportation System (ITS) Application Dyg Norkhairunnisa Abang Zaidel; Norhudah Seman; Mohd Ridhuan Mohd Sharip; Dyg Azra Awang Mat; Nur Alia Athirah Mohtadzar
International Journal of Electrical and Computer Engineering (IJECE) Vol 7, No 2: April 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (665.899 KB) | DOI: 10.11591/ijece.v7i2.pp899-904

Abstract

Aiming to achieve 3-dB coupling, operating in fifth generation (5G) technologies, this paper introduces a new design of tight coupling coupler that will be operated in 5G technologies. Two stubs and two slots have been implemented into the 3-dB coupler design in order to achieve impedance matching between the ports and to give better coupling performances, respectively. Moreover, a study on the stubs’ and slots’ effects towards the S31 of the 3-dB coupler has also been presented in this paper. The proposed coupler is designed on Rogers RO4003C substrate. The simulation results and the analytical study on the stubs and slots implementation show that both stubs and slots affect the performance of the coupling coefficient.
Random forest age estimation model based on length of left hand bone for Asian population Mohd Faaizie Darmawan; Ahmad Firdaus Zainal Abidin; Shahreen Kasim; Tole Sutikno; Rahmat Budiarto
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 1: February 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (625.495 KB) | DOI: 10.11591/ijece.v10i1.pp549-558

Abstract

In forensic anthropology, age estimation is used to ease the process of identifying the age of a living being or the body of a deceased person. Nonetheless, the specialty of the estimation models is solely suitable to a specific people. Commonly, the models are inter and intra-observer variability as the qualitative set of data is being used which results the estimation of age to rely on forensic experts. This study proposes an age estimation model by using length of bone in left hand of Asian subjects range from newborn up to 18-year-old. One soft computing model, which is Random Forest (RF) is used to develop the estimation model and the results are compared with Artificial Neural Network (ANN) and Support Vector Machine (SVM), developed in the previous case studies. The performance measurement used in this study and the previous case study are R-square and Mean Square Error (MSE) value. Based on the results produced, the RF model shows comparable results with the ANN and SVM model. For male subjects, the performance of the RF model is better than ANN, however less ideal than SVM model. As for female subjects, the RF model overperfoms both ANN and SVM model. Overall, the RF model is the most suitable model in estimating age for female subjects compared to ANN and SVM model, however for male subjects, RF model is the second best model compared to the both models. Yet, the application of this model is restricted only to experimental purpose or forensic practice.

Filter by Year

2011 2026


Filter By Issues
All Issue Vol 16, No 1: February 2026 Vol 15, No 6: December 2025 Vol 15, No 5: October 2025 Vol 15, No 4: August 2025 Vol 15, No 3: June 2025 Vol 15, No 2: April 2025 Vol 15, No 1: February 2025 Vol 14, No 6: December 2024 Vol 14, No 5: October 2024 Vol 14, No 4: August 2024 Vol 14, No 3: June 2024 Vol 14, No 2: April 2024 Vol 14, No 1: February 2024 Vol 13, No 6: December 2023 Vol 13, No 5: October 2023 Vol 13, No 4: August 2023 Vol 13, No 3: June 2023 Vol 13, No 2: April 2023 Vol 13, No 1: February 2023 Vol 12, No 6: December 2022 Vol 12, No 5: October 2022 Vol 12, No 4: August 2022 Vol 12, No 3: June 2022 Vol 12, No 2: April 2022 Vol 12, No 1: February 2022 Vol 11, No 6: December 2021 Vol 11, No 5: October 2021 Vol 11, No 4: August 2021 Vol 11, No 3: June 2021 Vol 11, No 2: April 2021 Vol 11, No 1: February 2021 Vol 10, No 6: December 2020 Vol 10, No 5: October 2020 Vol 10, No 4: August 2020 Vol 10, No 3: June 2020 Vol 10, No 2: April 2020 Vol 10, No 1: February 2020 Vol 9, No 6: December 2019 Vol 9, No 5: October 2019 Vol 9, No 4: August 2019 Vol 9, No 3: June 2019 Vol 9, No 2: April 2019 Vol 9, No 1: February 2019 Vol 8, No 6: December 2018 Vol 8, No 5: October 2018 Vol 8, No 4: August 2018 Vol 8, No 3: June 2018 Vol 8, No 2: April 2018 Vol 8, No 1: February 2018 Vol 7, No 6: December 2017 Vol 7, No 5: October 2017 Vol 7, No 4: August 2017 Vol 7, No 3: June 2017 Vol 7, No 2: April 2017 Vol 7, No 1: February 2017 Vol 6, No 6: December 2016 Vol 6, No 5: October 2016 Vol 6, No 4: August 2016 Vol 6, No 3: June 2016 Vol 6, No 2: April 2016 Vol 6, No 1: February 2016 Vol 5, No 6: December 2015 Vol 5, No 5: October 2015 Vol 5, No 4: August 2015 Vol 5, No 3: June 2015 Vol 5, No 2: April 2015 Vol 5, No 1: February 2015 Vol 4, No 6: December 2014 Vol 4, No 5: October 2014 Vol 4, No 4: August 2014 Vol 4, No 3: June 2014 Vol 4, No 2: April 2014 Vol 4, No 1: February 2014 Vol 3, No 6: December 2013 Vol 3, No 5: October 2013 Vol 3, No 4: August 2013 Vol 3, No 3: June 2013 Vol 3, No 2: April 2013 Vol 3, No 1: February 2013 Vol 2, No 6: December 2012 Vol 2, No 5: October 2012 Vol 2, No 4: August 2012 Vol 2, No 3: June 2012 Vol 2, No 2: April 2012 Vol 2, No 1: February 2012 Vol 1, No 2: December 2011 Vol 1, No 1: September 2011 More Issue