cover
Contact Name
Tole Sutikno
Contact Email
ijece@iaesjournal.com
Phone
-
Journal Mail Official
ijece@iaesjournal.com
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
International Journal of Electrical and Computer Engineering
ISSN : 20888708     EISSN : 27222578     DOI : -
International Journal of Electrical and Computer Engineering (IJECE, ISSN: 2088-8708, a SCOPUS indexed Journal, SNIP: 1.001; SJR: 0.296; CiteScore: 0.99; SJR & CiteScore Q2 on both of the Electrical & Electronics Engineering, and Computer Science) is the official publication of the Institute of Advanced Engineering and Science (IAES). The journal is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication and computer engineering from the global world.
Articles 6,301 Documents
Non-integer IMC based PID Design for Load Frequency Control of Power System Through Reduced Model Order Idamakanti Kasireddy; Abdul Wahid Nasir; Arun Kumar Singh
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 2: April 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1766.625 KB) | DOI: 10.11591/ijece.v8i2.pp837-844

Abstract

This paper deals with non-integer internal model control (FIMC) based proportional-integral-derivative(PID) design for load frequency control (LFC) of single area non-reheated thermal power system under parameter divergence and random load disturbance. Firstly, a fractional second order plus dead time(SOPDT) reduced system model is obtained using genetic algorithm through step error minimization. Secondly, a FIMC based PID controller is designed for single area power system based on reduced system model. Proposed controller is equipped with single area non-reheated thermal power system. The resulting controller is tested using MATLAB/SIMULINK under various conditions. The simulation results show that the controller can accommodate system parameter uncertainty and load disturbance. Further, simulation shows that it maintains robust performance as well as minimizes the effect of load fluctuations on frequency deviation. Finally, the proposed method applied to two area power system to show the effectiveness.
Fuzzy Homogeneous Bitopological Spaces Samer Al Ghour; Almothana Azaizeh
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 6: December 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (857.959 KB) | DOI: 10.11591/ijece.v8i6.pp4619-4625

Abstract

We continue the study of the concepts of minimality and homogeneity in the fuzzy context. Concretely, we introduce two new notions of minimality in fuzzy bitopological spaces which are called minimal fuzzy open set and pairwise minimal fuzzy open set. Several relationships between such notions and a known one are given. Also, we provide results about the transformation of minimal, and pairwise minimal fuzzy open sets of a fuzzy bitopological space, via fuzzy continuous and fuzzy open mappings, and pairwise continuous and pairwise open mappings, respectively. Moreover, we present two new notions of homogeneity in the fuzzy framework. We introduce the notions of homogeneous and pairwise homogeneous fuzzy bitopological spaces. Several relationships between such notions and a known one are given. And, some connections between minimality and homogeneity are given. Finally, we show that cut bitopological spaces of a homogeneous (resp. pairwise homogeneous) fuzzy bitopological space are homogeneous (resp. pairwise homogeneous) but not conversely.
Reliability Evaluation and Analysis of Mobile Ad Hoc Networks Deepak Kumar Panda; Ranjan Kumar Dash
International Journal of Electrical and Computer Engineering (IJECE) Vol 7, No 1: February 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (452.729 KB) | DOI: 10.11591/ijece.v7i1.pp479-485

Abstract

The paper addresses the reliability problem of mobile ad hoc networks under link and node failure model. Node reliability is calculated as a function of no. of neighbor nodes, packet success rate, and device type and packet size. The presence of a link between any node pair is binary and its reliability is computed considering the distance between nodes and signal-to-noise ratio (SNR). An efficient algorithm is proposed to analyze and calculate the reliability of mobile ad hoc networks considering multiple routes from source and destination nodes. The effect of different parameters on node reliability and link reliability are analyzed and discussed. The network is simulated and analyzed using INET frame work. Reliability of two distinct cases of this simulation is evaluated. The simulated results and discussions ensure that evaluation of the reliability of any mobile ad hoc networks can be done easily and in an efficient manner by the proposed method.
ResSeg: Residual encoder-decoder convolutional neural network for food segmentation Javier O. Pinzón-Arenas; Robinson Jiménez-Moreno; César G. Pachón-Suescún
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 1: February 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1501.071 KB) | DOI: 10.11591/ijece.v10i1.pp1017-1026

Abstract

This paper presents the implementation and evaluation of different convolutional neural network architectures focused on food segmentation. To perform this task, it is proposed the recognition of 6 categories, among which are the main food groups (protein, grains, fruit, vegetables) and two additional groups, rice and drink or juice. In addition, to make the recognition more complex, it is decided to test the networks with food dishes already started, i.e. during different moments, from its serving to its finishing, in order to verify the capability to see when there is no more food on the plate. Finally, a comparison is made between the two best resulting networks, a SegNet with architecture VGG-16 and a network proposed in this work, called Residual Segmentation Convolutional Neural Network or ResSeg, with which accuracies greater than 90% and interception-over-union greater than 75% were obtained. This demonstrates the ability, not only of SegNet architectures for food segmentation, but the use of residual layers to improve the contour of the segmentation and segmentation of complex distribution or initiated of food dishes, opening the field of application of this type of networks to be implemented in feeding assistants or in automated restaurants, including also for dietary control for the amount of food consumed.
Control Strategy for Three Phase Shunt Active Power Filter with Minimum Current Measurements Y. Kusuma Latha; Ch. Saibabu; Y.P. Obulesh
International Journal of Electrical and Computer Engineering (IJECE) Vol 1, No 1: September 2011
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (765.872 KB)

Abstract

The active power filter has been proved to be an effective method to mitigate harmonic currents generated by nonlinear loads as well as to compensate reactive power. The methods of harmonic current detection play a crucial part in the performance of active power filter (APF). This paper presents a new control strategy in which three Shunt Active Power filter Configurations aredeveloped in order to define new simple control algorithm which  requires minimum number of current measurements. The effecticeveness of the proposed control strategies are demonstrated through results. The entire control system is implemented with MATLAB/SIMULINK. The simulation results are presented for different control strategies and comparison is made among themDOI:http://dx.doi.org/10.11591/ijece.v1i1.23
The Indonesia Public Information Disclosure Act (UU-KIP): Its Challenges and Responses Muharman Lubis; Tien Fabrianti Kusumasari; Lukmanul Hakim
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 1: February 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (616.654 KB) | DOI: 10.11591/ijece.v8i1.pp94-103

Abstract

Information Public Disclosure is one of the regulation that has purpose to encourage good governance for public service and citizen participation in national development. The enactment of Act No.14/2008 (UU KIP) has been strengthen the mandate to enforce the necessity of information disclosure in actualizing transparency and accountability in resource management and budget uses. It also become the primary instrument to prevent corruption, monopolistic competition and information disputes. However, there are certain provinces has not yet established information committee nor when it will be as entrusted by the regulation. Meanwhile, the remedies in term of jail duration and fines, arguably, it could not create deterrent effect to the perpetrator. Furthermore, the concern from ministry and public institution also in question in regard their roles of responsibility, lack of cooperation and continuous support. Thus, human resource, technology infrastructure, public participation, supervision and socialization become crucial factor to increase the awareness and satisfaction towards this regulatory compliance. This study is a qualitative research to evaluate the implementation of this Act by observing its consideration, background, principles and relevant article verses as primary sources through content analysis based on number of legal experts.
A Secure-Coordinated Expansion Planning of Generation and Transmission Using Game Theory and Minimum Singular Value Mehdi Zareian Jahromi; Mohsen Tajdinian; Mojtaba Jalalpour
International Journal of Electrical and Computer Engineering (IJECE) Vol 4, No 6: December 2014
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (328.981 KB)

Abstract

In this paper a novel method have been proposed for expansion planning of generation and transmission that considered static security of the system such as voltage security margin And loadability limit. In the same study of expansion planning Security constraints of the system are neglected. In this study at the first step minimum singular value technique is used to evaluate voltage security margin and loadabolity limit, in order to select best bus for load incrimination. After it, in order to Supply the load, coordinated expansion planning of generation and transmission is needed, therefor the strategic interaction between transmission company (TransCo) and generation company (GenCo) for Transmission expansion planning (TEP) and generation expansion planning (GEP) in a competitive electricity market is proposed using Game Theory (GT).DOI:http://dx.doi.org/10.11591/ijece.v4i6.6682
Experimental dataset to develop a parametric model based of DC geared motor in feeder machine Azlan. W. M.; Salleh S. M.; Mahzan S; Sadikin A; Ahmad S
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 3: June 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1409.084 KB) | DOI: 10.11591/ijece.v9i3.pp1576-1584

Abstract

This paper presents the application of a System Identification based on Particle Swarm Optimization (PSO) technique to develop parametric model of experimental dataset of DC Geared motor in feeder machine. The experimental was conducted to measure the input (voltage) and output (speed) data. The actual data is used to be optimized using PSO algorithm. The parameter emphasized is Time, Man Square Error (MSE) and Average Time. One of the best model has been chosen based on the optimum parameters.
ISAR Image Classification with Wavelet and Watershed Transforms B. Mamatha; V. Valli Kumar
International Journal of Electrical and Computer Engineering (IJECE) Vol 6, No 6: December 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (502.208 KB) | DOI: 10.11591/ijece.v6i6.pp3087-3093

Abstract

Inverse Synthetic Aperture Radar images are playing a significant role in classification of sea and air targets. First we acquire the ISAR images of targets using a sensor like radar and extract the characteristics of targets from the ISAR images in the form of feature vectors. The computed feature vectors are used for classification of targets. In this work, widely used and efficient segmentation tool Watershed transform and the multi resolution technique wavelet transform are explored to derive the target features. An artificial neural network based classifier is used for classification. The Wavelet analysis divides the information of an image into approximation and detail sub signals. The approximate and three detail sub signal values are taken as feature vectors and given as input to the classifier for ship ISAR image classification. The widely used segmentation technique, Watershed transform is applied to the ISAR images. The wavelet coefficients are computed for the segmented ISAR images and used as feature vectors for classification of the ISAR images. Also, the statistical moments mean and standard deviation are computed for the color ISAR images itself, taken in RGB format. These statistical color moments are used as feature vector.  The classification accuracy is compared for the feature vectors.
A new approach for enhancing LSB steganography using bidirectional coding scheme Mohammed M. Saeed Abdullah Al-Momin; Issa Ahmed Abed; Hussein A. Leftah
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 6: December 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (795.9 KB) | DOI: 10.11591/ijece.v9i6.pp5286-5294

Abstract

This paper proposes a new algorithm for embedding private information within a cover image. Unlike all other already existing algorithms, this one tends to employ the data of the carrier image more efficiently such that the image looks less distorted. As a consequence, the private data is maintained unperceived and the sent information stays unsuspicious.  This task is achieved by dividing the least significant bit plane of the cover image into fixed size blocks, and then embedding the required top-secret message within each block using one of two opposite ways depending on the extent of similarity of each block with the private information needed to be hidden. This technique will contribute to lessen the number of bits needed to be changed in the cover image to accommodate the private data, and hence will substantially reduce the   amount of distortion in the stego-image when compared to the classic LSB image steganography algorithms.

Page 22 of 631 | Total Record : 6301


Filter by Year

2011 2026


Filter By Issues
All Issue Vol 16, No 1: February 2026 Vol 15, No 6: December 2025 Vol 15, No 5: October 2025 Vol 15, No 4: August 2025 Vol 15, No 3: June 2025 Vol 15, No 2: April 2025 Vol 15, No 1: February 2025 Vol 14, No 6: December 2024 Vol 14, No 5: October 2024 Vol 14, No 4: August 2024 Vol 14, No 3: June 2024 Vol 14, No 2: April 2024 Vol 14, No 1: February 2024 Vol 13, No 6: December 2023 Vol 13, No 5: October 2023 Vol 13, No 4: August 2023 Vol 13, No 3: June 2023 Vol 13, No 2: April 2023 Vol 13, No 1: February 2023 Vol 12, No 6: December 2022 Vol 12, No 5: October 2022 Vol 12, No 4: August 2022 Vol 12, No 3: June 2022 Vol 12, No 2: April 2022 Vol 12, No 1: February 2022 Vol 11, No 6: December 2021 Vol 11, No 5: October 2021 Vol 11, No 4: August 2021 Vol 11, No 3: June 2021 Vol 11, No 2: April 2021 Vol 11, No 1: February 2021 Vol 10, No 6: December 2020 Vol 10, No 5: October 2020 Vol 10, No 4: August 2020 Vol 10, No 3: June 2020 Vol 10, No 2: April 2020 Vol 10, No 1: February 2020 Vol 9, No 6: December 2019 Vol 9, No 5: October 2019 Vol 9, No 4: August 2019 Vol 9, No 3: June 2019 Vol 9, No 2: April 2019 Vol 9, No 1: February 2019 Vol 8, No 6: December 2018 Vol 8, No 5: October 2018 Vol 8, No 4: August 2018 Vol 8, No 3: June 2018 Vol 8, No 2: April 2018 Vol 8, No 1: February 2018 Vol 7, No 6: December 2017 Vol 7, No 5: October 2017 Vol 7, No 4: August 2017 Vol 7, No 3: June 2017 Vol 7, No 2: April 2017 Vol 7, No 1: February 2017 Vol 6, No 6: December 2016 Vol 6, No 5: October 2016 Vol 6, No 4: August 2016 Vol 6, No 3: June 2016 Vol 6, No 2: April 2016 Vol 6, No 1: February 2016 Vol 5, No 6: December 2015 Vol 5, No 5: October 2015 Vol 5, No 4: August 2015 Vol 5, No 3: June 2015 Vol 5, No 2: April 2015 Vol 5, No 1: February 2015 Vol 4, No 6: December 2014 Vol 4, No 5: October 2014 Vol 4, No 4: August 2014 Vol 4, No 3: June 2014 Vol 4, No 2: April 2014 Vol 4, No 1: February 2014 Vol 3, No 6: December 2013 Vol 3, No 5: October 2013 Vol 3, No 4: August 2013 Vol 3, No 3: June 2013 Vol 3, No 2: April 2013 Vol 3, No 1: February 2013 Vol 2, No 6: December 2012 Vol 2, No 5: October 2012 Vol 2, No 4: August 2012 Vol 2, No 3: June 2012 Vol 2, No 2: April 2012 Vol 2, No 1: February 2012 Vol 1, No 2: December 2011 Vol 1, No 1: September 2011 More Issue