cover
Contact Name
Tole Sutikno
Contact Email
ijece@iaesjournal.com
Phone
-
Journal Mail Official
ijece@iaesjournal.com
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
International Journal of Electrical and Computer Engineering
ISSN : 20888708     EISSN : 27222578     DOI : -
International Journal of Electrical and Computer Engineering (IJECE, ISSN: 2088-8708, a SCOPUS indexed Journal, SNIP: 1.001; SJR: 0.296; CiteScore: 0.99; SJR & CiteScore Q2 on both of the Electrical & Electronics Engineering, and Computer Science) is the official publication of the Institute of Advanced Engineering and Science (IAES). The journal is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication and computer engineering from the global world.
Articles 6,301 Documents
Modeling of digital converter for GSM signals with MATLAB Metodi Traykov; Radoslav Mavrevski; Ivan Trenchev
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 5: October 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (411.525 KB) | DOI: 10.11591/ijece.v9i5.pp4417-4422

Abstract

In this study will simulate steady state of Digital Down Convertor (DDC) for GSM signal with a narrow frequency range. The MATLAB model that is described in this article simulates the work of the TIGC4016 Quad Digital Down Converter. This converter is used for digital mixing (down conversion) of signals, narrow band low-pass filtering and decimation. To implementation of the model, we use high sample-rate (69,333 MSPS) bandpass signal. The result contains low sample-rate (270.83 KSPS) baseband signal, thus facilitating the demodulation process.
Performance Analysis of 3-Level 5-Phase Multilevel Inverter Topologies B. Jyothi; M. Venu Gopala Rao
International Journal of Electrical and Computer Engineering (IJECE) Vol 7, No 4: August 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (717.771 KB) | DOI: 10.11591/ijece.v7i4.pp1696-1705

Abstract

Now a day’s many industrial applications requires high power. Some other appliances may require intermediate power either more or less depending upon their operation. With these consequences, MULTI LEVEL INVERTERS are introduced in 1975.for above intermediate voltage applications. The name MULTI LEVEL began with the three-level converter.By enormous advancement in power semiconductor switches, in electric drives increasing the phase number greater than the conventional three phase especially in locomotives, naval, aerospace, and electrical vehicles industry has many advantages than three phase. In this view, here five phase VSI has developed. This paper aims at comparing the performance of conventional two level inverter Diode clamped and Capacitor clamped topologies of 5-phase multilevel inverter (3-level) using sinusoidal pulse width modulation. SPWM is highly economical, has more efficiency, controllability. These circuits are analyzed by using simulation software package such as MATLAB.
The best sextic approximation of hyperbola with order twelve Abedallah Rababah; Esra’a Rababah
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 2: April 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (181.196 KB) | DOI: 10.11591/ijece.v10i2.pp2192-2199

Abstract

In this article, the best uniform approximation for the hyperbola of degree 6 that has approximation order 12 is found. The associated error function vanishes 12 times and equioscillates 13 times. For an arc of the hyperbola, the error is bounded by 2:4 x 10-4. We explain the details of the derivation and show how to apply the method. The method is simple and this encourages and motivates people working in CG and CAD to apply it in their works.
A hybrid content based image retrieval system using log-gabor filter banks D. Madhavi; Khwaja Muinuddin Chisti Mohammed; N. Jyothi; M. Ramesh Patnaik
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 1: February 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1176.708 KB) | DOI: 10.11591/ijece.v9i1.pp237-244

Abstract

In this paper, a new efficient image retrieval system using sequential process of three stages with filtering technique for the feature selection is proposed. In the first stage the color features are extracted using color histogram method and in the second stage the texture features are obtained using log-Gabor filters and in the third stage shape features are extracted using shape descriptors using polygonal fitting algorithm. The proposed log-Gabor filter in the second stage has advantages of retrieving images over regular Gabor filter for texture. It provides better representation of the images. Experimental evaluation of the proposed system shows improved performance in retrieval as compared to other existing systems in terms of average precision and average recall.
Automatic Detection of Illegitimate Websites with Mutual Clustering Kanaka Durga; V Rama Krishna
International Journal of Electrical and Computer Engineering (IJECE) Vol 6, No 3: June 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (164.228 KB) | DOI: 10.11591/ijece.v6i3.pp995-1001

Abstract

In the websites the contents will be are similarity when we compared with other search engines. So to check the similar content in the websites and its web contents we created a overhead to the search engine which will severely effect its performance & quality. So to detect the silmilar or same content or web documenattion some techniques are implemented by web crawling research community. So it is one of major factor for the search engines to provide some applicatory data to users in the first page itself. So to avoid such issues we proposed a methodlogy called Automatic Detection of illegitimate websites with Mutual Clustering (ADIWMC) paper we are presenting a peculiar and efficacious path for the detection of similarities in the web pages in web clustering. Detection of same and similar web pages and web content will be done by storing the crawled web pages into depository. Initially the adwords will be extracted from the crawled pages and similarity checking will be done between the two pages based in the usage of adwords. So a threshold value is set for this, if the similarity checking percentage is greater than the threshold then similarity content is reduced and improves the depositary and improves the search engine quality. In the sections of existing analysis and the proposed analysis we are clearly exploring how it works.
Light-weight Routing Protocol in IoT-based Inter-Device Telecommunication Wireless Environment Hayoung Oh; Sangsoon Lim
International Journal of Electrical and Computer Engineering (IJECE) Vol 6, No 5: October 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (519.963 KB) | DOI: 10.11591/ijece.v6i5.pp2352-2361

Abstract

The primary task for IoT-based hyper-connectivity communications lies in the development of direct communications technique among IoT devices in RPL (Routing Protocol for Low-Power and Lossy Networks) environment without the aid from infras such as access points, base stations etc. In a low-power and lossy wireless network, IoT devices and routers cannot keep the original path toward the destination since they have the limited memory, except for a limited number of the default router information.. Different from the previous light-weight routing protocols focusing on the reduction of the control messages, the proposed scheme provides the light-weight IPv6 address auto-configuration, IPv6 neighbor discovery and routing protocol in a IoT capable infra-less wireless networks with the bloom filer and enhanced rank concepts. And for the first time we evaluate our proposed scheme based on the modeling of various probability distributions in the IoT environments with the lossy wireless link. Specifically, the proposed enhanced RPL based light-weight routing protocol improves the robustness with the multi-paths locally established based on the enhanced rank concepts even though lossy wireless links are existed. We showed the improvements of the proposed scheme up to 40% than the RPL based protocol.
Impact of Harmonics on Power Quality and Losses in Power Distribution Systems M. Jawad Ghorbani; Hossein Mokhtari
International Journal of Electrical and Computer Engineering (IJECE) Vol 5, No 1: February 2015
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (335.051 KB) | DOI: 10.11591/ijece.v5i1.pp166-174

Abstract

This paper investigates the harmonic distortion and losses in power distribution systems due to the dramatic increase of nonlinear loads. This paper tries to determine the amount of the harmonics generated by nonlinear loads in residential, commercial and office loads in distribution feeders and estimates the energy losses due to these harmonics. Norton equivalent modeling technique has been used to model the nonlinear loads. The presented harmonic Norton equivalent models of the end user appliances are accurately obtained based on the experimental data taken from the laboratory measurements. A 20 kV/400V distribution feeder is simulated to analyze the impact of nonlinear loads on feeder harmonic distortion level and losses. The model follows a “bottom-up” approach, starting from end users appliances Norton equivalent model and then modeling residential, commercial and office loads. Two new indices are introduced by the authors to quantize the effect of each nonlinear appliance on the power quality of a distribution feeder and loads are ranked based on these new defined indices. The simulation results show that harmonic distortion in distribution systems can increase power losses up to 20%.
Facility maintenance management system based on GIS and indoor map Supattra Puttinaovarat; Suwat Jutapruet; Aekarat Saeliw; Siwipa Pruitikanee; Jinda Kongcharoen; Watchara Jiamsawat; Suchakree Limpasamanon
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 4: August 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1089.004 KB) | DOI: 10.11591/ijece.v9i4.pp3323-3332

Abstract

This research presented a system development approach for facility maintenance management system based on GIS and indoor map in the form of web applications that can be used with all devices and no worries about time limitations. The capabilities of GIS, indoor map, and geospatial data visualization help speeding up facility maintenance management process and create benefits to all concerned parties, i.e., users can notify and follow the data of facility errors at the time; or officers in charge can operate quickly because they can access real-time data. Indoor map display makes it easier to access locations or places of damaged facilities. In addition, the data from the model system presented in this research can also be applied to planning and decision-making of executives.
The Security Challenges of the Rhythmprint Authentication Nakinthorn Wongnarukane; Pramote Kuacharoen
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 3: June 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (646.99 KB) | DOI: 10.11591/ijece.v8i3.pp1281-1287

Abstract

The Rhythmprint authentication combines an advantage of the traditional keystroke authentication and the multi-touch technology based on a touchable device such as touchpad on a laptop, a smartphone and a tablet. With the Rhythmprint authentication, the user is less likely to suffer from shoulder surfing and eavesdropping attacks. This research provides empirical evidence to verify the security performance of the Rhythmprint authentication comparing to the traditional keystroke authentication for shoulder surfing and eavesdropping attacks, when the user tries to login to a website on a laptop for 10 times in a public place while the attacker stands behind. The experimental results show that the Rhythmprint authentication provides higher security than the traditional keystroke authentication in both shoulder surfing and eavesdropping attacks.
Caching on Named Data Network: a Survey and Future Research Leanna Vidya Yovita; Nana Rachmana Syambas
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 6: December 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (576.074 KB) | DOI: 10.11591/ijece.v8i6.pp4456-4466

Abstract

The IP-based system cause inefficient content delivery process. This inefficiency was attempted to be solved with the Content Distribution Network. A replica server is located in a particular location, usually on the edge router that is closest to the user. The user’s request will be served from that replica server. However, caching on Content Distribution Network is inflexible. This system is difficult to support mobility and conditions of dynamic content demand from consumers. We need to shift the paradigm to content-centric. In Named Data Network, data can be placed on the content store on routersthat are closest to the consumer. Caching on Named Data Network must be able to store content dynamically. It should be selectively select content that is eligible to be stored or deleted from the content storage based on certain considerations, e.g. the popularity of content in the local area. This survey paper explains the development of caching techniques on Named Data Network that are classified into main points. The brief explanation of advantages and disadvantages are presented to make it easy to understand. Finally, proposed the open challenge related to the caching mechanism to improve NDN performance.

Filter by Year

2011 2026


Filter By Issues
All Issue Vol 16, No 1: February 2026 Vol 15, No 6: December 2025 Vol 15, No 5: October 2025 Vol 15, No 4: August 2025 Vol 15, No 3: June 2025 Vol 15, No 2: April 2025 Vol 15, No 1: February 2025 Vol 14, No 6: December 2024 Vol 14, No 5: October 2024 Vol 14, No 4: August 2024 Vol 14, No 3: June 2024 Vol 14, No 2: April 2024 Vol 14, No 1: February 2024 Vol 13, No 6: December 2023 Vol 13, No 5: October 2023 Vol 13, No 4: August 2023 Vol 13, No 3: June 2023 Vol 13, No 2: April 2023 Vol 13, No 1: February 2023 Vol 12, No 6: December 2022 Vol 12, No 5: October 2022 Vol 12, No 4: August 2022 Vol 12, No 3: June 2022 Vol 12, No 2: April 2022 Vol 12, No 1: February 2022 Vol 11, No 6: December 2021 Vol 11, No 5: October 2021 Vol 11, No 4: August 2021 Vol 11, No 3: June 2021 Vol 11, No 2: April 2021 Vol 11, No 1: February 2021 Vol 10, No 6: December 2020 Vol 10, No 5: October 2020 Vol 10, No 4: August 2020 Vol 10, No 3: June 2020 Vol 10, No 2: April 2020 Vol 10, No 1: February 2020 Vol 9, No 6: December 2019 Vol 9, No 5: October 2019 Vol 9, No 4: August 2019 Vol 9, No 3: June 2019 Vol 9, No 2: April 2019 Vol 9, No 1: February 2019 Vol 8, No 6: December 2018 Vol 8, No 5: October 2018 Vol 8, No 4: August 2018 Vol 8, No 3: June 2018 Vol 8, No 2: April 2018 Vol 8, No 1: February 2018 Vol 7, No 6: December 2017 Vol 7, No 5: October 2017 Vol 7, No 4: August 2017 Vol 7, No 3: June 2017 Vol 7, No 2: April 2017 Vol 7, No 1: February 2017 Vol 6, No 6: December 2016 Vol 6, No 5: October 2016 Vol 6, No 4: August 2016 Vol 6, No 3: June 2016 Vol 6, No 2: April 2016 Vol 6, No 1: February 2016 Vol 5, No 6: December 2015 Vol 5, No 5: October 2015 Vol 5, No 4: August 2015 Vol 5, No 3: June 2015 Vol 5, No 2: April 2015 Vol 5, No 1: February 2015 Vol 4, No 6: December 2014 Vol 4, No 5: October 2014 Vol 4, No 4: August 2014 Vol 4, No 3: June 2014 Vol 4, No 2: April 2014 Vol 4, No 1: February 2014 Vol 3, No 6: December 2013 Vol 3, No 5: October 2013 Vol 3, No 4: August 2013 Vol 3, No 3: June 2013 Vol 3, No 2: April 2013 Vol 3, No 1: February 2013 Vol 2, No 6: December 2012 Vol 2, No 5: October 2012 Vol 2, No 4: August 2012 Vol 2, No 3: June 2012 Vol 2, No 2: April 2012 Vol 2, No 1: February 2012 Vol 1, No 2: December 2011 Vol 1, No 1: September 2011 More Issue