cover
Contact Name
Tole Sutikno
Contact Email
ijece@iaesjournal.com
Phone
-
Journal Mail Official
ijece@iaesjournal.com
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
International Journal of Electrical and Computer Engineering
ISSN : 20888708     EISSN : 27222578     DOI : -
International Journal of Electrical and Computer Engineering (IJECE, ISSN: 2088-8708, a SCOPUS indexed Journal, SNIP: 1.001; SJR: 0.296; CiteScore: 0.99; SJR & CiteScore Q2 on both of the Electrical & Electronics Engineering, and Computer Science) is the official publication of the Institute of Advanced Engineering and Science (IAES). The journal is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication and computer engineering from the global world.
Articles 6,301 Documents
High Efficient Module of Boost Converter in PV Module S.Daison KumarStallon; K.Vinoth Kumar; S.Suresh Kumar
International Journal of Electrical and Computer Engineering (IJECE) Vol 2, No 6: December 2012
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (452.397 KB)

Abstract

Within the photovoltaic (PV) power-generation market, the  PV module has shown obvious growth. However, a high voltage gain converter is essential for the module’s grid connection through a dc–ac inverter. This paper proposes a converter that employs a floating active switch to isolate energy from the PV panel when the ac module is OFF; this particular design protects installers and users from electrical hazards. Without extreme duty ratios and the numerous turns-ratios of a coupled inductor, this converter achieves a high step-up voltage-conversion ratio; the leakage inductor energy of the coupled inductor is efficiently recycled to the load. These features explain the module’s high-efficiency performance. The detailed operating principles and steady-state analyses of continuous, discontinuous, and boundary conduction modes are described. A 15V input voltage, 200V output voltage, and 100W output power prototype circuit of the proposed converter has been implemented; its maximum efficiency is up to 95.3% and full-load efficiency is 92.3%.DOI:http://dx.doi.org/10.11591/ijece.v2i6.1586
Toward Content-Aware Video Partitioning Methods for Distributed HEVC Video Encoding Myunghoon Jeon; Byoung-Dai Lee
International Journal of Electrical and Computer Engineering (IJECE) Vol 5, No 3: June 2015
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (550.562 KB) | DOI: 10.11591/ijece.v5i3.pp569-578

Abstract

Recently, cloud computing has emerged as a potential platform for distributed video encoding due to its advantages in terms of costs as well as performance. For distributed video encoding, the input video must be partitioned into several segments, each of which is processed over distributed resources. This paper describes the effect of different video partitioning schemes on overall encoding performance in the distributed encoding of High-Efficiency Video Coding (HEVC). In addition, we explored performances of video partitioning schemes on the basis of the types of the content to be encoded
Design and Implementation of a Secure Communication Protocol M. K. Viswanath; M. Ranjith Kumar
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 3: June 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (545.071 KB) | DOI: 10.11591/ijece.v8i3.pp1814-1821

Abstract

The main object of this paper is to present a mutual authentication protocol that guarantees security, integrity and authenticity of messages, transferred over a network system. In this paper a symmetric key cryptosystem, that satisfies all the above requirements, is developed using theorems of J.R. Chen, I.M. Vinogradov and Fermat and the decimal expansion of an irrational number.
Outage probability analysis of EH relay-assisted non-orthogonal multiple access (NOMA) systems over Block Rayleigh Fading Channel Tan N. Nguyen; Minh Tran; Van-Duc Phan; Hoang-Nam Nguyen; Thanh-Long Nguyen
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 5: October 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (648.472 KB) | DOI: 10.11591/ijece.v9i5.pp3607-3614

Abstract

Non-orthogonal multiple access (NOMA) has been identified as a promising multiple access technique for the fifth generation (5G) mobile networks due to its superior spectral efficiency. In this paper, we propose and investigate a Non-Orthogonal Multiple Access (NOMA) of energy harvesting (EH) relay assisted system over Block Rayleigh Fading Channel. In order to evaluate the performance of the proposed system, the integral expression of the outage probability is analyzed and derived. Numerical results confirm that our derived analytical results match well with the Monte Carlo simulations in connection with all possible system parameter.
DARE Algorithm: A New Security Protocol by Integration of Different Cryptographic Techniques John Mark Espalmado; Edwin Arboleda
International Journal of Electrical and Computer Engineering (IJECE) Vol 7, No 2: April 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (477.835 KB) | DOI: 10.11591/ijece.v7i2.pp1032-1041

Abstract

Exchange of information between computer networks requires a secure communications channel to prevent and monitor unauthorized access, modification and denial of the computer network. To address this growing problem, security experts sought ways to advance the integrity of data transmission. Security Attacks compromises the security and hence hybrid cryptographic algorithms have been proposed to achieve safe service in the proper manner, such as user authentication and data confidentiality. Data security and authenticity are achieved using these algorithms. Moreover, to improve the strength and cover each algorithm’s weaknesses, a new security algorithm can be designed using the combination of different cryptographic techniques. This design uses Digital Signature Algorithm (DSA) for authentic key generation, Data Encryption Standard (DES) for key scheduling, and Advanced Encryption Standard (AES) and Rivest–Schamir–Adleman Algorithm (RSA) in encrypting data. This new security algorithm has been proposed for improved security and integrity by integration of these cryptographic techniques.
The development of a wireless LCP-based intracranial pressure sensor for traumatic brain injury patients Preedipat Sattayasoonthorn; Jackrit Suthakorn; Sorayouth Chamnanvej M.D
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 2: April 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (15.2 KB) | DOI: 10.11591/ijece.v10i2.pp1229-1238

Abstract

Raised intracranial pressure (ICP) in traumatic brain injury (TBI) patients can lead to death. ICP measurement is required to monitor the condition of a patient and to inform TBI treatment. This work presents a new wireless liquid crystal polymer (LCP) based ICP sensor. The sensor is designed with the purpose of measuring ICP and wirelessly transmitting the signal to an external monitoring unit. The sensor is minimally invasive and biocompatible due to the mechanical design and the use of LCP. A prototype sensor and associated wireless module are fabricated and tested to demonstrate the functionality and performance of the wireless LCP-based ICP sensor. Experimental results show that the wireless LCP-based ICP sensor can operate in the pressure range of 0 - 60.12 mmHg. Based on repeated measurements, the sensitivity of the sensor is found to be 25.62 µVmmHg-1, with a standard deviation of ± 1.16 µVmmHg-1. This work represents a significant step towards achieving a wireless, implantable, minimally invasive ICP monitoring strategy for TBI patients.
A Polynomial Digital Pre-Distortion Technique Based on Iterative Architecture Kwang-Pyo Lee; Soon-Il Hong; Eui-Rim Jeong
International Journal of Electrical and Computer Engineering (IJECE) Vol 6, No 1: February 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (294.519 KB) | DOI: 10.11591/ijece.v6i1.pp106-112

Abstract

A digital predistortion (DPD) technique based on an iterative adaptation structure is proposed for linearizing power amplifiers (PAs). To obtain proper DPD parameters, a feedback path that converts the PA’s output to a baseband signal is required, and memory is also needed to store the baseband feedback signals. DPD parameters are usually found by an adaptive algorithm by using the transmitted signals and the corresponding feedback signals. However, for the adaptive algorithm to converge to a reliable solution, long feedback samples are required, which increases hardware complexity and cost. Considering that the convergence time of the adaptive algorithm highly depends on the initial condition, we propose a DPD technique that requires relatively shorter feedback samples. Specifically, the proposed DPD iteratively utilizes the short feedback samples in memory while keeping and using the DPD parameters found at the former iteration as the initial condition at the next iteration. Computer simulation shows that the proposed technique performs better than the conventional technique, as the former requires much shorter feedback memory than the latter.
Preferences based Customized Trust Model for Assessment of Cloud Services Shilpa Deshpande; Rajesh Ingle
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 1: February 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (2310.773 KB) | DOI: 10.11591/ijece.v8i1.pp304-325

Abstract

In cloud environment, many functionally similar cloud services are available. But, the services differ in Quality of Service (QoS) levels, offered by them. There is a diversity in user requirements about the expected qualities of cloud services. Trust is a measure to understand whether a cloud service can adequately meet the user requirements. Consequently, trust assessment plays a significant role in selecting the suitable cloud service. This paper proposes preferences based customized trust model (PBCTM) for trust assessment of cloud services. PBCTM takes into account user requirements about the expected quality of services in the form of preferences. Accordingly, it performs customized trust assessment based on the evidences of various attributes of cloud service. PBCTM enables elastic trust computation, which is responsive to dynamically changing user preferences with time. The model facilitates dynamic trust based periodic selection of cloud services according to varying user preferences. Experimental results demonstrate that the proposed preferences based customized trust model outperforms the other model in respect of accuracy and degree of satisfaction.
An Adaptive Steganography Scheme Based on Visual Quality and Embedding Capacity Improvement Mojtaba Bahmanzadegan Jahromi; Karim Faez
International Journal of Electrical and Computer Engineering (IJECE) Vol 4, No 4: August 2014
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (406.59 KB)

Abstract

In this paper, a steganography technique using LSB substitution and PVD method is presented as an adaptive scheme in the spatial domain. Our method partitions the grayscale image into several non-overlapping blocks with three consecutive pixels. The embedding algorithm can both replace the secret data with the LSBs of the middle pixel and embed it in the difference values between the middle pixel and its two neighboring pixels of the cover-block. The number of secret bits is determined adaptively based on the range divisions for embedding in the difference value. We define a new range division on gray level which takes into account a larger embedding capacity for bits. After the embedding, the proposed method detects the pixels which are sensitive to hyper distortion. Then, the embedding process will be repeated to produce insignificant visual distortion in those pixels. Our experimental results demonstrate that this iterative steganography scheme prevents significant visual distortion into stego-image. The generated PSNR values are higher than the corresponding values of the most commonly used methods, discussed in this study. Furthermore, the experimental results show that the hiding capacity increased enormously when the proposed range division is used. Finally, we illustrate that the method can pass RS and steganalysis detector attacks.DOI:http://dx.doi.org/10.11591/ijece.v4i4.6307
Classification of Palm Oil Fresh Fruit Bunch using Multiband Optical Sensors Agung Wahyu Setiawan; Richard Mengko; Ayu Paranitha H. Putri; Donny Danudirdjo; Alfie Rizky Ananda
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 4: August 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (664.376 KB) | DOI: 10.11591/ijece.v9i4.pp2386-2393

Abstract

This study investigated optical sensor system consist of sixteen light emitting diode (LED) in visible/near infrared region to detect palm oil fresh fruit bunch (FFB) quality. Practically, experience grader assessed FFB quality by its ripeness based on external features such as colour and number of detached fruitlets. However, different seed and plantation management resulting in FFB quality variation. Same external features not linearly correlate with FFB oil content that corresponding with industrial needs. The 660 nm LED is choosen to be used to estimate the oil content of FFB. Using linear discriminant analysis (LDA) with Mahalanobis distance, the accuracy of the systems is 79.8% and 88.2%. From 33 FFB oil content measurement, grader misclassified 4 out of 17 FFB as ripe FFB but with low oil content (<17.5%) and misclassified 7 out of 16 FFB as unripe but with high oil content (>=17.5%). Classifying model build from FFB from main plantation then tested to evaluate FFB from smallholder. Classification model generated from FFB oil content data showed more accurate result compared to model generated from visual inspection 66.7% compared to 52.1%. Model accuracies attained by Discriminant Analysis (DA) and k-Nearest Neighbors (k-NN) were 79.8% and 80.7%, respectively based on grader evaluation. Model accuracies based on FFB oil content was 88.2% for both classifying algorithms.

Filter by Year

2011 2026


Filter By Issues
All Issue Vol 16, No 1: February 2026 Vol 15, No 6: December 2025 Vol 15, No 5: October 2025 Vol 15, No 4: August 2025 Vol 15, No 3: June 2025 Vol 15, No 2: April 2025 Vol 15, No 1: February 2025 Vol 14, No 6: December 2024 Vol 14, No 5: October 2024 Vol 14, No 4: August 2024 Vol 14, No 3: June 2024 Vol 14, No 2: April 2024 Vol 14, No 1: February 2024 Vol 13, No 6: December 2023 Vol 13, No 5: October 2023 Vol 13, No 4: August 2023 Vol 13, No 3: June 2023 Vol 13, No 2: April 2023 Vol 13, No 1: February 2023 Vol 12, No 6: December 2022 Vol 12, No 5: October 2022 Vol 12, No 4: August 2022 Vol 12, No 3: June 2022 Vol 12, No 2: April 2022 Vol 12, No 1: February 2022 Vol 11, No 6: December 2021 Vol 11, No 5: October 2021 Vol 11, No 4: August 2021 Vol 11, No 3: June 2021 Vol 11, No 2: April 2021 Vol 11, No 1: February 2021 Vol 10, No 6: December 2020 Vol 10, No 5: October 2020 Vol 10, No 4: August 2020 Vol 10, No 3: June 2020 Vol 10, No 2: April 2020 Vol 10, No 1: February 2020 Vol 9, No 6: December 2019 Vol 9, No 5: October 2019 Vol 9, No 4: August 2019 Vol 9, No 3: June 2019 Vol 9, No 2: April 2019 Vol 9, No 1: February 2019 Vol 8, No 6: December 2018 Vol 8, No 5: October 2018 Vol 8, No 4: August 2018 Vol 8, No 3: June 2018 Vol 8, No 2: April 2018 Vol 8, No 1: February 2018 Vol 7, No 6: December 2017 Vol 7, No 5: October 2017 Vol 7, No 4: August 2017 Vol 7, No 3: June 2017 Vol 7, No 2: April 2017 Vol 7, No 1: February 2017 Vol 6, No 6: December 2016 Vol 6, No 5: October 2016 Vol 6, No 4: August 2016 Vol 6, No 3: June 2016 Vol 6, No 2: April 2016 Vol 6, No 1: February 2016 Vol 5, No 6: December 2015 Vol 5, No 5: October 2015 Vol 5, No 4: August 2015 Vol 5, No 3: June 2015 Vol 5, No 2: April 2015 Vol 5, No 1: February 2015 Vol 4, No 6: December 2014 Vol 4, No 5: October 2014 Vol 4, No 4: August 2014 Vol 4, No 3: June 2014 Vol 4, No 2: April 2014 Vol 4, No 1: February 2014 Vol 3, No 6: December 2013 Vol 3, No 5: October 2013 Vol 3, No 4: August 2013 Vol 3, No 3: June 2013 Vol 3, No 2: April 2013 Vol 3, No 1: February 2013 Vol 2, No 6: December 2012 Vol 2, No 5: October 2012 Vol 2, No 4: August 2012 Vol 2, No 3: June 2012 Vol 2, No 2: April 2012 Vol 2, No 1: February 2012 Vol 1, No 2: December 2011 Vol 1, No 1: September 2011 More Issue