cover
Contact Name
Tole Sutikno
Contact Email
ijece@iaesjournal.com
Phone
-
Journal Mail Official
ijece@iaesjournal.com
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
International Journal of Electrical and Computer Engineering
ISSN : 20888708     EISSN : 27222578     DOI : -
International Journal of Electrical and Computer Engineering (IJECE, ISSN: 2088-8708, a SCOPUS indexed Journal, SNIP: 1.001; SJR: 0.296; CiteScore: 0.99; SJR & CiteScore Q2 on both of the Electrical & Electronics Engineering, and Computer Science) is the official publication of the Institute of Advanced Engineering and Science (IAES). The journal is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication and computer engineering from the global world.
Articles 6,301 Documents
A Systematic Review of Existing Data Mining Approaches Envisioned for Knowledge Discovery from Multimedia Benaka Santosha S; Chitra Kiran N
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 2: April 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (310.369 KB) | DOI: 10.11591/ijece.v8i2.pp908-916

Abstract

The extensive use of multimedia technologies extended the applicability of information technology to a large extent which results enormous generation of complex multimedia contents over the internet. Therefore the number of multimedia contents available to the user is also exponentially increasing. In this digital era of the cloud-enabled Internet of Things (IoT), analysis of complex video and image data plays a crucial role.It aims to extract meaningful information as the distributed storages and processing elements within a bandwidth constraint network seek optimal solutions to increase the throughput along with an optimal trade-off between computational complexity and power consumption. However, due to complex characteristics of visual patterns and variations in video frames, it is not a trivial task to discover meaningful information and correlation. Hence, data mining has emerged as a field which has diverse aspects presently in extracting meaningful hidden patterns from the complex image and video data considering different pattern classification approach. The study mostly investigates the existing data-mining tools and their performance metric for the purpose of reviewing this research track.It also highlights the relationship between frequent patterns and discriminativefeatures associated with a video object. Finally, the study addresses the existing research issues to strengthen up the future direction of research towards video analytics and pattern recognition.
MetOp Satellites Data Processing for Air Pollution Monitoring in Morocco Mohamed Akram Zaytar; Chaker El Amrani
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 6: December 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (769.17 KB) | DOI: 10.11591/ijece.v8i6.pp4584-4592

Abstract

This paper presents a data processing system based on an architecture comprised of multiple stacked layers of computational processes that transforms Raw Binary Pollution Data coming directly from Two EUMETSAT MetOp satellites to our servers, into ready to interpret and visualise continuous data stream in near real time using techniques varying from task automation, data preprocessing and data analysis to machine learning using feedforward artificial neural networks. The proposed system handles the acquisition, cleaning, processing, normalizing, and predicting of Pollution Data in our area of interest of Morocco.
Decision-Making Model for Student Assessment by Unifying Numerical and Linguistic Data Sri Andayani; Sri Hartati; Retantyo Wardoyo; Djemari Mardapi
International Journal of Electrical and Computer Engineering (IJECE) Vol 7, No 1: February 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (582.803 KB) | DOI: 10.11591/ijece.v7i1.pp363-373

Abstract

Learning assessment deals with the process of making a decision on the quality or performance of student achievement in a number of competency standards. In the process, teacher’s preferences are provided through both test and non-test, generally in a numeric value, from which the final results are then converted into letters or linguistic value. In the proposed model, linguistic variables are exploited as a form of teacher’s preferences in non-test techniques. Consequently, the assessment data set will consist of numerical and linguistic information, so it requires a method to unify them to obtain the final value. A model that uses the 2-tuple linguistic approach and based on matrix operations is proposed to solve the problem. This study proposed a new procedure that consists of four stages: preprocessing, transformation, aggregation and exploitation. The final result is presented in 2-tuple linguistic representation and its equivalent number, accompanied by a description of the achievement of each competency. The α value of 2-tuple linguistic in the final result and in the description of each competency becomes meaningful information that can be interpreted as a comparative ability one student has related to other students, and shows how much potential is achieved to reach higher ranks. The proposed model contributes to enrich the learning assessment techniques, since the exploitation of linguistic variable as representation preferences provides flexible space for teachers in their assessments. Moreover, using the result with respect to students’ levels of each competency, students’ mastery of each attribute can be diagnosed and their progress of learning can be estimated.
Detecting malicious URLs using binary classification through adaboost algorithm Firoz Khan; Jinesh Ahamed; Seifedine Kadry; Lakshmana Kumar Ramasamy
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 1: February 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (652.843 KB) | DOI: 10.11591/ijece.v10i1.pp997-1005

Abstract

Malicious Uniform Resource Locator (URL) is a frequent and severe menace to cybersecurity. Malicious URLs are used to extract unsolicited information and trick inexperienced end users as a sufferer of scams and create losses of billions of money each year. It is crucial to identify and appropriately respond to such URLs. Usually, this discovery is made by the practice and use of blacklists in the cyber world. However, blacklists cannot be exhaustive, and cannot recognize zero-day malicious URLs. So to increase the observation of malicious URL indicators, machine learning procedures should be incorporated. This study aims to discuss the exposure of malicious URLs as a binary classification problem using machine learning through an AdaBoost algorithm.
An Analysis of Harmonic and Interharmonic Contribution of Electric Arc Furnace by Using Periodogram M.R. Yusoff; M.H. Jopri; A.R. Abdullah; T. Sutikno; M. Manap; A.S. Hussin
International Journal of Electrical and Computer Engineering (IJECE) Vol 7, No 6: December 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (639.895 KB) | DOI: 10.11591/ijece.v7i6.pp3753-3760

Abstract

Fast and accurate detection of the harmonic and interharmonic contribution of electric arc furnace (EAF) is crucial in identifying and to mitigate the undesired effects to the system.  In this paper, periodogram, a fast and accurate technique is introduced for the analysis of the contribution. Based on a rule-based classifier and the threshold settings that referred to the IEEE Standard 1159 2009, the analysis of the harmonic and interharmonic contribution of EAF are carried out successfully. Moreover, the impact of contribution is measured using total harmonic distortion (THD) and total non-harmonic distortion (TnHD). In addition, periodogram also gives 100 percent correct detection and able to analyze the contribution impact. It is proven that the proposed method is accurate, fast and cost efficient for analyzing the impact of harmonic and interharmonic of EAF.
A New Methodology for Allocation of Stabilizers in Uncontrollable poles of multi-machine power systems Nadali Gharahajilo; Hamid Lesani; Mahmood Fotuhi
International Journal of Electrical and Computer Engineering (IJECE) Vol 3, No 1: February 2013
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1118.981 KB)

Abstract

One of the main problems in power systems is dynamic stability and damping of Electromechanical  oscillations which for this reason power system stabilizers are being used and the method for determining the location of stabilizer for the purpose of damping critical modes, is using participation factors, in which controllability and observability of modes have influence. The real value or the amplitude of participation factor is usually used as evaluation criterion, while in case that the real values of participation factors are close, the imaginary part of these coefficients are also influential, and if the imaginary part of coefficients are either negative or positive, different results will be obtained. The method introduced in this paper, in modes that the value of participation factors are close to each other, priority for the placement of generator, installation of stabilizer and the optimum value for the stabilizer's gain, is very accurate and appropriate.DOI:http://dx.doi.org/10.11591/ijece.v3i1.1835
Development of an automatic can crusher using programmable logic controller N. A. A. Hadi; Lim Hui Yee; K. A. M. Annuar; Zulhilmi Bin Zaid; Z. A Ghani; M.F. Mohd Ab Halim; Amar Faiz Zainal Abidin; M. B. N. Shah
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 3: June 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (592.951 KB) | DOI: 10.11591/ijece.v9i3.pp1795-1804

Abstract

The invention of a can crusher machine in this project is to reduce the wasted storage space occupied by the tremendous amount of use aluminium can at the commercial establishment like in the restaurant, cafeteria and bar. Basically, can crusher machine be operated in manual effort and time in the can crushing process. Shrinking the initial volume of empty used-aluminium cans down to 50% in more effective, faster and effortless way, as well as to develop a low-cost device that is suitable for the small-industry usage are mainly the objectives for the Automatic Can Crusher, where an automated process is executed in Automatic Can Crusher due to the automation in the modern world is inevitable and nominal to be used. The Automatic Can Crusher is run by a Programmable Logic Controller (PLC) with the aid of an inductive and capacitive sensor, where it is applied to detect whether the object is metal or non-metal. Overall, the system can be controlled manually through the push start and stop button as well as using the Human Machine Interface (HMI) using NB-Designer, for displaying the total of cans being crushed per day. The average result of empty can could shrink from 31% to 60 % of the original value, by using the attuned and compatible pressure for this system.
A Cloud Based Secure Voting System using Homomorphic Encryption for Android Platform Manish Ranjan; Ayub Hussain Mondal; Monjul Saikia
International Journal of Electrical and Computer Engineering (IJECE) Vol 6, No 6: December 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (797.625 KB) | DOI: 10.11591/ijece.v6i6.pp2994-3000

Abstract

Cloud based service provider are at its top of its services for various applications, as their services are very much reachable from anywhere anytime in current days. It is responsibility of the company that the Cloud storage is owned and maintained by themselves keeping the data available and accessible, and the physical environment protected and running. Could storage provider seem to be uncertain of confidentiality in many cases, as we need to limit ourselves on trust to a third party. Keeping our sensitive data ready to access any time anywhere with preventing any information leakage is a challenging task. Cryptography in this scenario plays an important role, providing security for information to protect valuable information resources on intranets, Internet and the cloud. In addition, Homomorphic cryptosystem is a form of Cryptography where some specific computation can be performed over the cipher text producing a resultant cipher text which, when decrypted, equals the result of operations carry out on the plaintext. With help of this unique property of homomorphism cryptography we proposed a system to keep sensitive information in encrypted form in the cloud storage/service provider and used those data as whenever we require. The scheme proposed here is designed for a secure online voting system on Android platform and voted information is encrypted and stored those in the cloud.
Malaysian Sign Language Mobile Learning Application : A recommendation app to communicate with hearing-impaired communities Hanayanti Hafit; Chiam Wui Xiang; Munirah Mohd Yusof; Norfaradilla Wahid; Shahreen Kassim
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 6: December 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (623.8 KB) | DOI: 10.11591/ijece.v9i6.pp5512-5518

Abstract

Malaysian Sign Language (MSL) is an important language that is used as the primary communication method for the deaf communities with the others. Currently, the MSL is poorly known by the Malaysians and the existing platform of learning the sign language is inefficient, not to mention the incomplete functionality of the existing mobile learning application in the market. Hence, the purpose of developing this application is aimed to increase the knowledge and recognition of the public towards the MSL and allows them to learn the sign language more effectively. One of the features in this application is sign detection, which could analyze the image captured by phone camera into sign meaning. The application also comprised various categories of the sign for efficient learning and quiz to test user knowledge against their learned sign language. Besides, there is a feedback module for the user to express their opinions and suggestions towards the application to the developer. This application is aimed to help the public to learn MSL efficiently by selecting the category of sign they wish to learn and test themselves by using the quiz module. Besides, the application could also detect the unknown sign by capturing the image and analyze it. The application helped to raise the recognition of MSL among the public and expose the public to the sign language knowledge. It had also become a small help in breaking the barrier of communication between the deaf communities and the public.
FIToplankton: Wireless Controlled Remotely-operated Underwater Vehicle (ROV) for Shallow Water Exploratio Muhammad Ikhsan Sani; Simon Siregar; Aris Pujud Kurniawan; M. Abid Irwan
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 5: October 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (380.368 KB) | DOI: 10.11591/ijece.v8i5.pp3325-3332

Abstract

Remotely Operated Vehicle (ROV) for underwater exploration is typically controlled using umbilical cable connected to ground control station. Unfortunately, while it’s used for power distribution and data transmission, it also obstruct the movement of ROV especially for shallow water (<50 cm). This paper proposed an alternative method for controlling ROV using wireless remote control system. This work also aims to explore the possibility of using RF wireless technology between 420-450 MHz as underwater communication system. Furthermore, the control system was used to manage actuators i.e. DC motor and bilge pump for maneuvring and picking small size cargo. To help the ROV to hold on a desired, Inertial Measurement Unit (IMU) is installed on board ROV within maximum deviation 0.2 m/s2. The prototype of the system has been successfully implemented and evaluated to confirm the  functionality and the feasibility of the proposed approach.

Filter by Year

2011 2026


Filter By Issues
All Issue Vol 16, No 1: February 2026 Vol 15, No 6: December 2025 Vol 15, No 5: October 2025 Vol 15, No 4: August 2025 Vol 15, No 3: June 2025 Vol 15, No 2: April 2025 Vol 15, No 1: February 2025 Vol 14, No 6: December 2024 Vol 14, No 5: October 2024 Vol 14, No 4: August 2024 Vol 14, No 3: June 2024 Vol 14, No 2: April 2024 Vol 14, No 1: February 2024 Vol 13, No 6: December 2023 Vol 13, No 5: October 2023 Vol 13, No 4: August 2023 Vol 13, No 3: June 2023 Vol 13, No 2: April 2023 Vol 13, No 1: February 2023 Vol 12, No 6: December 2022 Vol 12, No 5: October 2022 Vol 12, No 4: August 2022 Vol 12, No 3: June 2022 Vol 12, No 2: April 2022 Vol 12, No 1: February 2022 Vol 11, No 6: December 2021 Vol 11, No 5: October 2021 Vol 11, No 4: August 2021 Vol 11, No 3: June 2021 Vol 11, No 2: April 2021 Vol 11, No 1: February 2021 Vol 10, No 6: December 2020 Vol 10, No 5: October 2020 Vol 10, No 4: August 2020 Vol 10, No 3: June 2020 Vol 10, No 2: April 2020 Vol 10, No 1: February 2020 Vol 9, No 6: December 2019 Vol 9, No 5: October 2019 Vol 9, No 4: August 2019 Vol 9, No 3: June 2019 Vol 9, No 2: April 2019 Vol 9, No 1: February 2019 Vol 8, No 6: December 2018 Vol 8, No 5: October 2018 Vol 8, No 4: August 2018 Vol 8, No 3: June 2018 Vol 8, No 2: April 2018 Vol 8, No 1: February 2018 Vol 7, No 6: December 2017 Vol 7, No 5: October 2017 Vol 7, No 4: August 2017 Vol 7, No 3: June 2017 Vol 7, No 2: April 2017 Vol 7, No 1: February 2017 Vol 6, No 6: December 2016 Vol 6, No 5: October 2016 Vol 6, No 4: August 2016 Vol 6, No 3: June 2016 Vol 6, No 2: April 2016 Vol 6, No 1: February 2016 Vol 5, No 6: December 2015 Vol 5, No 5: October 2015 Vol 5, No 4: August 2015 Vol 5, No 3: June 2015 Vol 5, No 2: April 2015 Vol 5, No 1: February 2015 Vol 4, No 6: December 2014 Vol 4, No 5: October 2014 Vol 4, No 4: August 2014 Vol 4, No 3: June 2014 Vol 4, No 2: April 2014 Vol 4, No 1: February 2014 Vol 3, No 6: December 2013 Vol 3, No 5: October 2013 Vol 3, No 4: August 2013 Vol 3, No 3: June 2013 Vol 3, No 2: April 2013 Vol 3, No 1: February 2013 Vol 2, No 6: December 2012 Vol 2, No 5: October 2012 Vol 2, No 4: August 2012 Vol 2, No 3: June 2012 Vol 2, No 2: April 2012 Vol 2, No 1: February 2012 Vol 1, No 2: December 2011 Vol 1, No 1: September 2011 More Issue