cover
Contact Name
Tole Sutikno
Contact Email
ijece@iaesjournal.com
Phone
-
Journal Mail Official
ijece@iaesjournal.com
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
International Journal of Electrical and Computer Engineering
ISSN : 20888708     EISSN : 27222578     DOI : -
International Journal of Electrical and Computer Engineering (IJECE, ISSN: 2088-8708, a SCOPUS indexed Journal, SNIP: 1.001; SJR: 0.296; CiteScore: 0.99; SJR & CiteScore Q2 on both of the Electrical & Electronics Engineering, and Computer Science) is the official publication of the Institute of Advanced Engineering and Science (IAES). The journal is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication and computer engineering from the global world.
Articles 6,301 Documents
Performance Analysis of Digital Modulation for Coherent Detection of OFDM Scheme on Radio over Fiber System Fauza Khair; Fakhriy Hario P; I Wayan Mustika; Budi Setiyanto
International Journal of Electrical and Computer Engineering (IJECE) Vol 6, No 3: June 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1811.147 KB) | DOI: 10.11591/ijece.v6i3.pp1086-1095

Abstract

Radio over fiber (RoF) system with the coherent detection offers high linearity for the transparent transport of high-frequency microwave signals, and better receiver sensitivity compared with intensity-modulated direct detection systems. The purpose of this paper is to analyze the performance of digital modulation for coherent detection of orthogonal frequency division multiplexing (OFDM) scheme on RoF system at 10 Gbps up to 100 km fiber length. The results show that coherent detection of OFDM-RoF system with 16 quadrature amplitude modulation (16-QAM) has the value of  bit error rate (BER) and the symbol error rate (SER) is very low and its constellation is better compared with other modulation formats (4-QAM, quadrature phase shift keying (QPSK), 8-PSK and 16-PSK), which BER 16-QAM is 0.053 and SER is 15.7%. The results also show that BER value of 4-QAM and QPSK relatively similar to fiber length variations. In general, an increasing value of the BER and SER for each modulation format are almost equal to the fiber length of 60-70 km (Region I and II). However, there is a significant increase in the value of BER in fiber length of 80-100 km (Region III. A and III. B) for the modulation of 4-QAM, QPSK, 8-PSK, and 16-PSK.
Insight on Effectiveness of Frequently Exercised PQ Classification Techniques BDevi Vighneshwari; R. Neela
International Journal of Electrical and Computer Engineering (IJECE) Vol 6, No 5: October 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (249.383 KB) | DOI: 10.11591/ijece.v6i5.pp2437-2446

Abstract

The growing demands of global consumer market in green energy system have opened the doors for many technologies as well as various sophisticated electrical devices for both commercial and domestic usage. However, with the increasing demands of energy and better quality of services, there is a significant increase in non-linearity in load distribution causing potential effect on the Power Quality (PQ). The harmful effects on PQ are various events e.g. sag, swell, harmonics etc that causes significant amount of system degradation. Therefore, this paper discusses various significant research techniques pertaining to the PQ disturbance classification system introduced by the authors in the past and analyzes its effectiveness scale in terms of research gap. The paper discusses some of the frequently exercised PQ classification techniques from the most relevant literatures in order to have more insights of the techniques.
HybridConcatenated Coding Scheme for MIMO Systems Ilesanmi Banjo Oluwafemi
International Journal of Electrical and Computer Engineering (IJECE) Vol 5, No 3: June 2015
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (265.124 KB) | DOI: 10.11591/ijece.v5i3.pp464-476

Abstract

Abstract: Inthis paper, two hybrid concatenated super-orthogonal space-time trellis codes(SOSTTC) applying iterative decoding are proposed for flat fading channels. Theencoding operation is based on the concatenation of convolutional codes,interleaving and super-orthogonal space-time trellis codes. The firstconcatenated scheme consists of a serial concatenation of a parallelconcatenated convolutional code with a SOSTTC while the second consists ofparallel concatenation of two serially concatenated convolutional and SOSTTCcodes. The decoding of these two schemes is described, their pairwise errorprobabilities are derived and the frame error rate (FER) performances areevaluated by computer simulation in Rayleigh fading channels. The proposedtopologies are shown to perform better than existing concatenated schemes with aconstituent code of convolutional andspace-time codes in literature.
Modeling and analysis of IEEE 1609.4 MAC in the presence of error-prone channels Akram A. Almohammedi; Nor K. Noordin; A. Sali; Fazirulhisyam Hashim; Waheb A. Jabbar; Sabri Saeed
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 5: October 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1148.826 KB) | DOI: 10.11591/ijece.v9i5.pp3531-3541

Abstract

Vehicular Ad Hoc Networks (VANETs) have been developed to improve the safety, comfort and efficiency of driving on the road. The IEEE 1609.4 is a standard intended to support multi-channel in VANETs. These channels include one control channel for safety applications and six service channels for service applications. However, there is still no comprehensive analysis for the average delay and system throughput of IEEE 1609.4 MAC in VANETs considering error-prone channel under non-saturated conditions. In this paper, we propose an analytical models based on 1-D and 2-D Markov chain to evaluate the performance analysis of IEEE 1609.4 MAC in the presence of error-prone channels. Besides, freezing of the back-off timer is taken into consideration to provide an accurate estimation of access to the channel. The simulation results have been carried out to validate the analytical results of our model. The results show that the performance of our model outperforms the existing model in terms of packet delivery ratio and average delay of safety packets over CCH, and system throughput of service packets over SCHs.
Modeling and Simulation of Fuzzy Logic based Maximum Power Point Tracking (MPPT) for PV Application Ahmad Saudi Samosir; Herri Gusmedi; Sri Purwiyanti; Endah Komalasari
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 3: June 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (400.733 KB) | DOI: 10.11591/ijece.v8i3.pp1315-1323

Abstract

This paper presents modeling and simulation of maximum power point tracking (MPPT) used in solar PV power systems. The Fuzzy logic algorithm is used to minimize the error between the actual power and the estimated maximum power.  The simulation model was developed and tested to investigate the effectiveness of the proposed MPPT controller. MATLAB Simulink was employed for simulation studies. The proposed system was simulated and tested successfully on a photovoltaic solar panel model. The Fuzzy logic algorithm succesfully tracking the MPPs and performs precise control under rapidly changing atmospheric conditions. Simulation results indicate the feasibility and improved functionality of the system.
Adding Psychological Factor in the Model of Electricity Consumption in Office Building Meredita Susanty
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 6: December 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1150.106 KB) | DOI: 10.11591/ijece.v8i6.pp4486-4495

Abstract

Researches indicate that energy behaviour is the key to energy conservation and suggest that comparative feedback on energy usage can generate savings in residential and organizational settings. In implementing comparative feedback in workplace, there are two different ways to disaggregate collective energy consumption and apportion it to building users; individual or group level. This research uses agent-based modelling and simulation to examine the impact of applying different approaches of energy data apportionment to change staff behaviour toward energy consumption reduction. A simulation model of energy consumption in workplace as a base model is a re-implementation and simplification from former research. Several psychological factors and decision-making mechanism are then being added as an extension. The model divides staffs into four energy awareness stereotypes based on motivation level. Sensitivity analysis suggests that motivation is an important factor in changing user‟s behaviour and the experiment results indicates greater potential for energy saving when energy usage is apportioned to group level. The significant difference of energy consumption level makes user with low and medium motivation should become the target of energy reduction campaign.
Performance of Non-Uniform Duty-Cycled ContikiMAC in Wireless Sensor Networks Nur Rabiul Liyana Mohamed; Ansar Jamil; Lukman Hanif Audah Audah; Jiwa Abdullah; Rozlan Alias
International Journal of Electrical and Computer Engineering (IJECE) Vol 7, No 2: April 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (501.313 KB) | DOI: 10.11591/ijece.v7i2.pp942-949

Abstract

Wireless Sensor Network (WSN) is a promising technology in Internet of Things (IoTs) because it can be implemented in many applications. However, a main drawback of WSN is it has limited energy because each sensor node is powered using batteries. Therefore, duty-cycle mechanisms are introduced to reduce power consumption of the sensor nodes by ensuring the sensor nodes in the sleep mode almost of the time in order to prolong the network lifetime. One of the de-facto standard of duty-cycle mechanism in WSN is ContikiMAC, which is the default duty-cycle mechanism in Contiki OS. ContikiMAC ensures nodes can participate in network communication yet keep it in sleep mode for roughly 99\% of the time. However, it is found that the ContikiMAC does not perform well in dynamic network conditions. In a bursty network, ContikiMAC provides a poor performance in term of packet delivery ratio, which is caused by congestion. One possible solution is ContikiMAC should increase its duty-cycle rate in order to support the bursty traffic. This solution creates a non-uniform duty-cycle rates among the sensor nodes in the network. This work aims to investigate the effect of non-uniform duty-cycle rates on the performance on ContikiMAC. Cooja simulator is selected as the simulation tool. Three different simulation scenarios are considered depending on the Clear Channel Assessment Rate (CCR) configurations: a low uniform CCR value (Low-CCR), a high uniform CCR value (High-CCR) and non-uniform CCR values (Non-uniform-CCR). The simulation results show that the Low-CCR scenario provides the worst performance of PDR. On the other hand, the High-CCR scenario provides the best performance of PDR. The Non-uniform-CCR provides PDR in between of Low-CCR and High-CCR.
Image steganography using least significant bit and secret map techniques Ashwaq Alabaichi; Maisa'a Abid Ali K. Al-Dabbas; Adnan Salih
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 1: February 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (612.474 KB) | DOI: 10.11591/ijece.v10i1.pp935-946

Abstract

In steganography, secret data are invisible in cover media, such as text, audio, video and image. Hence, attackers have no knowledge of the original message contained in the media or which algorithm is used to embed or extract such message. Image steganography is a branch of steganography in which secret data are hidden in host images. In this study, image steganography using least significant bit and secret map techniques is performed by applying 3D chaotic maps, namely, 3D Chebyshev and 3D logistic maps, to obtain high security. This technique is based on the concept of performing random insertion and selecting a pixel from a host image. The proposed algorithm is comprehensively evaluated on the basis of different criteria, such as correlation coefficient, information entropy, homogeneity, contrast, image, histogram, key sensitivity, hiding capacity, quality index, mean square error (MSE), peak signal-to-noise ratio (PSNR) and image fidelity. Results show that the proposed algorithm satisfies all the aforementioned criteria and is superior to other previous methods. Hence, it is efficient in hiding secret data and preserving the good visual quality of stego images. The proposed algorithm is resistant to different attacks, such as differential and statistical attacks, and yields good results in terms of key sensitivity, hiding capacity, quality index, MSE, PSNR and image fidelity.
Parametric Investigation of Near End and Far End Crosstalks in Printed Circuit Board Lands Md. Masud Rana; Md. Rabiul Islam; Md Kamal Hosain
International Journal of Electrical and Computer Engineering (IJECE) Vol 1, No 2: December 2011
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (229.663 KB)

Abstract

Multi-conductor transmission line and interconnect carry signals with wide rage of frequencies from sending end to receiving end. The signal in one transmission line may be interupted by the unwanted contributions from the neighboring line conductors. If data speed increases, high frequency effects occur and the signals suffer from difficulties such as ringing, crosstalk, reflections, and ground bounce that seriously hamper the quality of the received signal. In order to estimate the signal quality, signal integrity analysis is needed. In this paper, an attempt has been made to investigate the sensitivity of the near and far end crosstalk on the parameters such as physical geometry of the conductors, electrical property of the substrate and the rise and fall time of excitation signal. The method of moments (MOM) is used to calculate the line parameters for different geometries. The simulation studies are carried out in TNT. The time domain and frequency domain analyses are performed using transmission line model of PSPICE. Moreover, a model is developed and tested in the laboratory. It is observed that the coupling inductance and capacitance vary with the variation of physical geometry and the substrate parameter.DOI:http://dx.doi.org/10.11591/ijece.v1i2.164
Development of Quranic Reciter Identification System using MFCC and GMM Classifier Teddy Surya Gunawan; Nur Atikah Muhamat Saleh; Mira Kartiwi
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 1: February 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (392.361 KB) | DOI: 10.11591/ijece.v8i1.pp372-378

Abstract

Nowadays, there are many beautiful recitation of Al-Quran available. Quranic recitation has its own characteristics, and the problem to identify the reciter is similar to the speaker recognition/identification problem. The objective of this paper is to develop Quran reciter identification system using Mel-frequency Cepstral Coefficient (MFCC) and Gaussian Mixture Model (GMM). In this paper, a database of five Quranic reciters is developed and used in training and testing phases. We carefully randomized the database from various surah in the Quran so that the proposed system will not prone to the recited verses but only to the reciter. Around 15 Quranic audio samples from 5 reciters were collected and randomized, in which 10 samples were used for training the GMM and 5 samples were used for testing. Results showed that our proposed system has 100% recognition rate for the five reciters tested. Even when tested with unknown samples, the proposed system is able to reject it.

Filter by Year

2011 2026


Filter By Issues
All Issue Vol 16, No 1: February 2026 Vol 15, No 6: December 2025 Vol 15, No 5: October 2025 Vol 15, No 4: August 2025 Vol 15, No 3: June 2025 Vol 15, No 2: April 2025 Vol 15, No 1: February 2025 Vol 14, No 6: December 2024 Vol 14, No 5: October 2024 Vol 14, No 4: August 2024 Vol 14, No 3: June 2024 Vol 14, No 2: April 2024 Vol 14, No 1: February 2024 Vol 13, No 6: December 2023 Vol 13, No 5: October 2023 Vol 13, No 4: August 2023 Vol 13, No 3: June 2023 Vol 13, No 2: April 2023 Vol 13, No 1: February 2023 Vol 12, No 6: December 2022 Vol 12, No 5: October 2022 Vol 12, No 4: August 2022 Vol 12, No 3: June 2022 Vol 12, No 2: April 2022 Vol 12, No 1: February 2022 Vol 11, No 6: December 2021 Vol 11, No 5: October 2021 Vol 11, No 4: August 2021 Vol 11, No 3: June 2021 Vol 11, No 2: April 2021 Vol 11, No 1: February 2021 Vol 10, No 6: December 2020 Vol 10, No 5: October 2020 Vol 10, No 4: August 2020 Vol 10, No 3: June 2020 Vol 10, No 2: April 2020 Vol 10, No 1: February 2020 Vol 9, No 6: December 2019 Vol 9, No 5: October 2019 Vol 9, No 4: August 2019 Vol 9, No 3: June 2019 Vol 9, No 2: April 2019 Vol 9, No 1: February 2019 Vol 8, No 6: December 2018 Vol 8, No 5: October 2018 Vol 8, No 4: August 2018 Vol 8, No 3: June 2018 Vol 8, No 2: April 2018 Vol 8, No 1: February 2018 Vol 7, No 6: December 2017 Vol 7, No 5: October 2017 Vol 7, No 4: August 2017 Vol 7, No 3: June 2017 Vol 7, No 2: April 2017 Vol 7, No 1: February 2017 Vol 6, No 6: December 2016 Vol 6, No 5: October 2016 Vol 6, No 4: August 2016 Vol 6, No 3: June 2016 Vol 6, No 2: April 2016 Vol 6, No 1: February 2016 Vol 5, No 6: December 2015 Vol 5, No 5: October 2015 Vol 5, No 4: August 2015 Vol 5, No 3: June 2015 Vol 5, No 2: April 2015 Vol 5, No 1: February 2015 Vol 4, No 6: December 2014 Vol 4, No 5: October 2014 Vol 4, No 4: August 2014 Vol 4, No 3: June 2014 Vol 4, No 2: April 2014 Vol 4, No 1: February 2014 Vol 3, No 6: December 2013 Vol 3, No 5: October 2013 Vol 3, No 4: August 2013 Vol 3, No 3: June 2013 Vol 3, No 2: April 2013 Vol 3, No 1: February 2013 Vol 2, No 6: December 2012 Vol 2, No 5: October 2012 Vol 2, No 4: August 2012 Vol 2, No 3: June 2012 Vol 2, No 2: April 2012 Vol 2, No 1: February 2012 Vol 1, No 2: December 2011 Vol 1, No 1: September 2011 More Issue