cover
Contact Name
Tole Sutikno
Contact Email
ijece@iaesjournal.com
Phone
-
Journal Mail Official
ijece@iaesjournal.com
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
International Journal of Electrical and Computer Engineering
ISSN : 20888708     EISSN : 27222578     DOI : -
International Journal of Electrical and Computer Engineering (IJECE, ISSN: 2088-8708, a SCOPUS indexed Journal, SNIP: 1.001; SJR: 0.296; CiteScore: 0.99; SJR & CiteScore Q2 on both of the Electrical & Electronics Engineering, and Computer Science) is the official publication of the Institute of Advanced Engineering and Science (IAES). The journal is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication and computer engineering from the global world.
Articles 6,301 Documents
Computing Subspace Skylines without Dominance Tests Using Set Interaction Approaches T. Vijaya Saradhi; K. Subrahmanyam; Ch.V. Phani Krishna
International Journal of Electrical and Computer Engineering (IJECE) Vol 5, No 5: October 2015
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (199.814 KB) | DOI: 10.11591/ijece.v5i5.pp1188-1193

Abstract

Now a day’s preference answering plays major role in all crucial applications. If user wants to find top k–objects from a set of high dimensional data based on any monotonic function requires huge computation. One of the promising methods to compute preference set is Skyline Technology. Sky line computation returns the set objects that are not overruled by any other objects in n a multi dimensional space. If data is high dimensional, different users requests sky line set based on different dimensions. It requires subspace skyline computation. If objects are d-dimensional we need to compute skyline sets in 2d different subspaces, called as SKYLINE CUBE computation, which incurs lot of computation cost. In this paper we address the problem of finding subspace skyline computation with minimum effort by using simple set interaction methods. By that we can decrease the number of subspace skylines need to be searched to find full sky cube. In this paper we developed one algorithm which uses Boolean algebra rules, skyline lattice to reduce dominance test for preparing sub space skylines.
Implementation of AES using biometric Srividya R.; Ramesh B.
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 5: October 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (633.057 KB) | DOI: 10.11591/ijece.v9i5.pp4266-4276

Abstract

Mobile Adhoc network is the most advanced emerging technology in the field of wireless communication. MANETs mainly have the capacity of self-forming, self-healing, enabling peer to peer communication between the nodes, without relying on any centralized network architecture. MANETs are made applicable mainly to military applications, rescue operations and home networking. Practically, MANET could be attacked by several ways using multiple methods. Research on MANET emphasizes on data security issues, as the Adhoc network does not befit security mechanism associated with static networks. This paper focuses mainly on data security techniques incorporated in MANET. Also this paper proposes an implementation of Advanced Encryption Standard using biometric key for MANETs. AES implementation includes, the design of most robust Substitution-Box implementation which defines a nonlinear behavior and mitigates malicious attacks, with an extended security definition. The key for AES is generated using most reliable, robust and precise biometric processing. In this paper, the input message is encrypted by AES powered by secured nonlinear S-box using finger print biometric feature and is decrypted using the reverse process.
Enhanced Position Control for Pneumatic System by Applying Constraints in MPC Algorithm Siti Fatimaah Sulaiman; M.F. Rahmat; A.A.M. Faudzi; Khairuddin Osman; Sy Najib Sy Salim; S.I. Samsudin; A.R. Azira
International Journal of Electrical and Computer Engineering (IJECE) Vol 7, No 3: June 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (357.861 KB) | DOI: 10.11591/ijece.v7i3.pp1633-1642

Abstract

This paper demonstrates the effectiveness of applying constraints in a controller algorithm as a strategy to enhance the pneumatic actuator system’s positioning performance. The aim of the present study is to reduce the overshoot in the pneumatic actuator positioning system’s response. An autoregressive with exogenous input (ARX) model structure has been used to model the pneumatic system, while a model predictive control (MPC) has been employed as a control strategy. The input constraint has been applied to the control signals (on/off valves signals) to ensure accurate position tracking. Results show that the strategy with constraint effectively reduced overshoot by more than 99.0837 % and 97.0596 % in simulation and real-time experiments, respectively. Moreover, the performance of the proposed strategy in controlling the pneumatic positioning system is considered good enough under various loads. The proposed strategy can be applied in any industry that used pneumatic actuator in their applications, especially in industries that involved with position control such as in manufacturing, automation and robotics. The strategy proved to be capable of controlling the pneumatic system better, especially in the real-time environment.
A hybrid algorithm to reduce energy consumption management in cloud data centers Mehran Tarahomi; Mohammad Izadi
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 1: February 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (106.644 KB) | DOI: 10.11591/ijece.v9i1.pp554-561

Abstract

There are several physical data centers in cloud environment with hundreds or thousands of computers. Virtualization is the key technology to make cloud computing feasible. It separates virtual machines in a way that each of these so-called virtualized machines can be configured on a number of hosts according to the type of user application. It is also possible to dynamically alter the allocated resources of a virtual machine. Different methods of energy saving in data centers can be divided into three general categories: 1) methods based on load balancing of resources; 2) using hardware facilities for scheduling; 3) considering thermal characteristics of the environment. This paper focuses on load balancing methods as they act dynamically because of their dependence on the current behavior of system. By taking a detailed look on previous methods, we provide a hybrid method which enables us to save energy through finding a suitable configuration for virtual machines placement and considering special features of virtual environments for scheduling and balancing dynamic loads by live migration method.
A Hybrid Model Schema Matching Using Constraint-Based and Instance-Based Edhy Sutanta; Retantyo Wardoyo; Khabib Mustofa; Edi Winarko
International Journal of Electrical and Computer Engineering (IJECE) Vol 6, No 3: June 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (238.058 KB) | DOI: 10.11591/ijece.v6i3.pp1048-1058

Abstract

Schema matching is an important process in the Enterprise Information Integration (EII) which is at the level of the back end to solve the problems due to the schematic heterogeneity. This paper is a summary of preliminary result work of the model development stage as part of research on the development of models and prototype of hybrid schema matching that combines two methods, namely constraint-based and instance-based. The discussion includes a general description of the proposed models and the development of models, start from requirement analysis, data type conversion, matching mechanism, database support, constraints and instance extraction, matching and compute the similarity, preliminary result, user verification, verified result, dataset for testing, as well as the performance measurement. Based on result experiment on 36 datasets of heterogeneous RDBMS, it obtained the highest P value is 100.00% while the lowest is 71.43%; The highest R value is 100.00% while the lowest is 75.00%; and F-Measure highest value is 100.00% while the lowest is 81.48%. Unsuccessful matching on the model still happens, including use of an id attribute with data type as autoincrement; using codes that are defined in the same way but different meanings; and if encountered in common instance with the same definition but different meaning.
Trust-Based Privacy for Internet of Things Vera Suryani; Selo Sulistyo; Widyawan Widyawan
International Journal of Electrical and Computer Engineering (IJECE) Vol 6, No 5: October 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (265.138 KB) | DOI: 10.11591/ijece.v6i5.pp2396-2402

Abstract

Internet of Things or widely known as IOT makes smart objects become active participants in the communication process between objects and their environment. IoT services that utilize Internet connection require solutions to a new problem: security and privacy. Smart objects and machine-to-machine communications in IOT now become interesting research, including that related to security. Privacy, which is a safe condition in which object is free from interference from other objects, is one of the important aspects in IOT. Privacy can be implemented using various ways for examples by applying encryption algorithms, restrictions on access to data or users, as well as implementing rules or specific policy. Trustable object selection is one technique to improve privacy. The process of selecting a trustable object can be done based on past activities or trust history of the object, also by applying a threshold value to determine whether an object is "trusted" or not. Some researchers have studied this approach. In this study, the selection processes of trustable objects are calculated using Modified Ant Colony algorithm. The simulation was performed and resulted in declining graphic trend but stabilized in certain trust value.
Evaluation of Noise Exclusion of Medical Images Using Hybridization of Particle Swarm Optimization and Bivariate Shrinkage Methods Shruti Bhargava; Ajay Somkuwar
International Journal of Electrical and Computer Engineering (IJECE) Vol 5, No 3: June 2015
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (288.66 KB) | DOI: 10.11591/ijece.v5i3.pp421-428

Abstract

Denoising of images got corrupted by addition of noise signals (generated by no single reason) has always a subject of interest for researchers. This paper proposes and classifies the efficiency of an algorithm based on bivariate shrinkage further optimized by Particle Swarm Optimization (PSO).The estimator for undecimatedfilterbank which incorporate the adaptive subbands thresholding further represented with singal threshold based on denosing performs.The paper evaluate performance of medical image denoising by calculation of PSNR, MSE, WPSNR and SSIM. The simulation results based on testing the model at MATLAB 2010A platform shows significant enhancement in mitigation of Gaussian noise, speckle noise, poisson noise and salt & pepper noises from experimental data
Short-term optimal hydro-thermal scheduling using clustered adaptive teaching learning based optimization Surender Reddy Salkuti
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 5: October 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (418.537 KB) | DOI: 10.11591/ijece.v9i5.pp3359-3365

Abstract

In this paper, Clustered Adaptive Teaching Learning Based Optimization (CATLBO) algorithm is proposed for determining the optimal hourly schedule of power generation in a hydro-thermal power system. In the proposed approach, a multi-reservoir cascaded hydro-electric system with a non-linear relationship between water discharge rate, net head and power generation is considered. Constraints such as power balance, water balance, reservoir volume limits and operation limits of hydro and thermal plants are considered. The feasibility and effectiveness of the proposed algorithm is demonstrated through a test system, and the results are compared with existing conventional and evolutionary algorithms. Simulation results reveals that the proposed CATLBO algorithm appears to be the best in terms of convergence speed and optimal cost compared with other techniques.
The Fact-Finding Security Examination in NFC-enabled Mobile Payment System Pinki Prakash Vishwakarma; Amiya Kumar Tripathy; Srikanth Vemuru
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 3: June 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (261.549 KB) | DOI: 10.11591/ijece.v8i3.pp1774-1780

Abstract

Contactless payments devised for NFC technology are gaining popularity. Howbeit, with NFC technology permeating concerns about arising security threats and risks to lessen mobile payments is vital. The security analysis of NFC-enabled mobile payment system is precariously imperative due to its widespread ratification. In mobile payments security is a prevalent concern by virtue of the financial value at stave. This paper assays the security of NFC based mobile payment system. It discusses the security requirements, threats and attacks that could occur in mobile payment system and the countermeasures to be taken to secure pursuance suitability.
Smart Microwave Oven with Image Classification and Temperature Recommendation Algorithm Tareq Khan
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 6: December 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (13.995 KB) | DOI: 10.11591/ijece.v8i6.pp4239-4252

Abstract

When food is warmed in a microwave oven, the user guesses the estimated time for the heating. This cognitive process of guessing can be incorrect - resulting the final food temperature to be too hot or still cold. In this research, a novel closed-loop microwave oven is designed which automatically suggests the target temperature of a food by learning from previous experiences and the heating stops automatically when the food temperature reaches the target temperature. The proposed microwave captures and classifies the food image, and recommends the target temperature, thus the user does not need to remember the target food temperature each time the same food is warmed. The algorithm gradually learns the type of foods that are used in that household and becomes smarter in the recommendation. The proposed algorithm can recommend target temperature with an accuracy of 86.31% for solid food and 100% for liquid food. A prototype of the proposed microwave is developed using the embedded system and tested.

Filter by Year

2011 2026


Filter By Issues
All Issue Vol 16, No 1: February 2026 Vol 15, No 6: December 2025 Vol 15, No 5: October 2025 Vol 15, No 4: August 2025 Vol 15, No 3: June 2025 Vol 15, No 2: April 2025 Vol 15, No 1: February 2025 Vol 14, No 6: December 2024 Vol 14, No 5: October 2024 Vol 14, No 4: August 2024 Vol 14, No 3: June 2024 Vol 14, No 2: April 2024 Vol 14, No 1: February 2024 Vol 13, No 6: December 2023 Vol 13, No 5: October 2023 Vol 13, No 4: August 2023 Vol 13, No 3: June 2023 Vol 13, No 2: April 2023 Vol 13, No 1: February 2023 Vol 12, No 6: December 2022 Vol 12, No 5: October 2022 Vol 12, No 4: August 2022 Vol 12, No 3: June 2022 Vol 12, No 2: April 2022 Vol 12, No 1: February 2022 Vol 11, No 6: December 2021 Vol 11, No 5: October 2021 Vol 11, No 4: August 2021 Vol 11, No 3: June 2021 Vol 11, No 2: April 2021 Vol 11, No 1: February 2021 Vol 10, No 6: December 2020 Vol 10, No 5: October 2020 Vol 10, No 4: August 2020 Vol 10, No 3: June 2020 Vol 10, No 2: April 2020 Vol 10, No 1: February 2020 Vol 9, No 6: December 2019 Vol 9, No 5: October 2019 Vol 9, No 4: August 2019 Vol 9, No 3: June 2019 Vol 9, No 2: April 2019 Vol 9, No 1: February 2019 Vol 8, No 6: December 2018 Vol 8, No 5: October 2018 Vol 8, No 4: August 2018 Vol 8, No 3: June 2018 Vol 8, No 2: April 2018 Vol 8, No 1: February 2018 Vol 7, No 6: December 2017 Vol 7, No 5: October 2017 Vol 7, No 4: August 2017 Vol 7, No 3: June 2017 Vol 7, No 2: April 2017 Vol 7, No 1: February 2017 Vol 6, No 6: December 2016 Vol 6, No 5: October 2016 Vol 6, No 4: August 2016 Vol 6, No 3: June 2016 Vol 6, No 2: April 2016 Vol 6, No 1: February 2016 Vol 5, No 6: December 2015 Vol 5, No 5: October 2015 Vol 5, No 4: August 2015 Vol 5, No 3: June 2015 Vol 5, No 2: April 2015 Vol 5, No 1: February 2015 Vol 4, No 6: December 2014 Vol 4, No 5: October 2014 Vol 4, No 4: August 2014 Vol 4, No 3: June 2014 Vol 4, No 2: April 2014 Vol 4, No 1: February 2014 Vol 3, No 6: December 2013 Vol 3, No 5: October 2013 Vol 3, No 4: August 2013 Vol 3, No 3: June 2013 Vol 3, No 2: April 2013 Vol 3, No 1: February 2013 Vol 2, No 6: December 2012 Vol 2, No 5: October 2012 Vol 2, No 4: August 2012 Vol 2, No 3: June 2012 Vol 2, No 2: April 2012 Vol 2, No 1: February 2012 Vol 1, No 2: December 2011 Vol 1, No 1: September 2011 More Issue