cover
Contact Name
Tole Sutikno
Contact Email
ijece@iaesjournal.com
Phone
-
Journal Mail Official
ijece@iaesjournal.com
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
International Journal of Electrical and Computer Engineering
ISSN : 20888708     EISSN : 27222578     DOI : -
International Journal of Electrical and Computer Engineering (IJECE, ISSN: 2088-8708, a SCOPUS indexed Journal, SNIP: 1.001; SJR: 0.296; CiteScore: 0.99; SJR & CiteScore Q2 on both of the Electrical & Electronics Engineering, and Computer Science) is the official publication of the Institute of Advanced Engineering and Science (IAES). The journal is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication and computer engineering from the global world.
Articles 6,301 Documents
Implementing data-driven decision support system based on independent educational data mart Alaa Khalaf Hamoud; Marwah Kamil Hussein; Zahraa Alhilfi; Rabab Hassan Sabr
International Journal of Electrical and Computer Engineering (IJECE) Vol 11, No 6: December 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v11i6.pp5301-5314

Abstract

Decision makers in the educational field always seek new technologies and tools, which provide solid, fast answers that can support decision-making process. They need a platform that utilize the students’ academic data and turn them into knowledge to make the right strategic decisions. In this paper, a roadmap for implementing a data driven decision support system (DSS) is presented based on an educational data mart. The independent data mart is implemented on the students’ degrees in 8 subjects in a private school (Al-Iskandaria Primary School in Basrah province, Iraq). The DSS implementation roadmap is started from pre-processing paper-based data source and ended with providing three categories of online analytical processing (OLAP) queries (multidimensional OLAP, desktop OLAP and web OLAP). Key performance indicator (KPI) is implemented as an essential part of educational DSS to measure school performance. The static evaluation method shows that the proposed DSS follows the privacy, security and performance aspects with no errors after inspecting the DSS knowledge base. The evaluation shows that the data driven DSS based on independent data mart with KPI, OLAP is one of the best platforms to support short-to-long term academic decisions.
State regulation of the IoT in the Russian Federation: Fundamentals and challenges Zharova Anna; Elin Vladimir
International Journal of Electrical and Computer Engineering (IJECE) Vol 11, No 5: October 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v11i5.pp4542-4549

Abstract

The purpose of this section is to study the problems with implementing technical and legal regulations for the development of public administration functions in the Russian Federation when using the internet of things (IoT). The introduction is based on an analysis of regulatory legal acts and presents the main strategic directions for the development of public administration functions in the Russian federation when using IoT. State reports, scientific literature, a system of technical and legal regulation are analyzed, and the main problems of implementing the IoT that impede the achievement of effective public administration are studied. The Russian practice of using IoT in various economic areas is investigated. Based on an analysis of the mechanisms for ensuring data safety of information technology users in the Russian federation, problems were investigated, such as the collecting data through IoT, including publicly available personal data in order to profile human activities, and creating of a digital twin of a person. The social constraints for introducing distributed registry technologies are users' distrust in the field of data privacy protection and mathematical algorithms that are used to establish trust in a digital environment instead of trusted centralized intermediaries; these problems were also analyzed. The Russian approach was analyzed in comparison to European experience in this field. To ensure information security and the possibility of its distribution, the IoT is revealed.
Methods and instruments for stray current verification in DC rapid transit and railway systems Andrea Mariscotti
International Journal of Electrical and Computer Engineering (IJECE) Vol 11, No 5: October 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v11i5.pp3727-3735

Abstract

Modern electrified transportation systems feature increasing installed power and performance and correspondingly stray current phenomena and corrosion are receiving more attention in terms of contractual specifications and request of final validation of proposed solutions, as well as a maintenance program that can actively tackle stray current issues. The problem is complex for the system physical extension, difficult measurement conditions and variability of electrical parameters. This work considers validation of stray current protection performance, in terms of track voltage, track leakage and collected current, and impressed potential on structures along the right-ofway. The exemplification of the specifications of a hypothetical instrument and setup support the discussion.
Performance of symmetric and asymmetric links in wireless networks Yaesr Khamayseh; Rabiah Al-qudah
International Journal of Electrical and Computer Engineering (IJECE) Vol 12, No 1: February 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v12i1.pp605-619

Abstract

Wireless networks are designed to provide the enabling infrastructure for emerging technological advancements. The main characteristics of wireless networks are: Mobility, power constraints, high packet loss, and lower bandwidth. Nodes’ mobility is a crucial consideration for wireless networks, as nodes are moving all the time, and this may result in loss of connectivity in the network. The goal of this work is to explore the effect of replacing the generally held assumption of symmetric radii for wireless networks with asymmetric radii. This replacement may have a direct impact on the connectivity, throughput, and collision avoidance mechanism of mobile networks. The proposed replacement may also impact other mobile protocol’s functionality. In this work, we are mainly concerned with building and maintaining fully connected wireless network with the asymmetric assumption. For this extent, we propose to study the effect of the asymmetric links assumption on the network performance using extensive simulation experiments. Extensive simulation experiments were performed to measure the impact of these parameters. Finally, a resource allocation scheme for wireless networks is proposed for the dual rate scenario. The performance of the proposed framework is evaluated using simulation.
New adaptation method based on cross layer and TCP over protocols to improve QoS in mobile ad hoc network Moulay Hicham Hanin; Mohamed Amnai; Youssef Fakhri
International Journal of Electrical and Computer Engineering (IJECE) Vol 11, No 3: June 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v11i3.pp2134-2142

Abstract

Due to rapid growth of multimedia traffic used over the mobile ad-hoc networks (MANETs), to keep up with the progress of this constraints MANETs protocols becoming increasingly concerned with the quality of service. In view of the random mobility nodes in MANET, TCP becomes more unreliability in case of higher energy consumption and packet loss. In this paper we proposed a new optimization approach to enhance decision making of TCP based on some changes of IEEE 802.11 MAC uses cross layer approach. The aim is to minimize the impact of retransmissions of packet lost and energy consumption in order to analysed and chose the appropriate routing protocol for TCP that can be enhance QoS MANET. Our simulation results based QoS study using NS3 show that, our proposed achieves better performance of TCP in MANETs significantly, and also improved the throughput, energy consumption and facilitates the traffic transmission over routing protocol.
Local information pattern descriptor for corneal diseases diagnosis Samer Kais Jameel; Sezgin Aydin; Nebras H. Ghaeb
International Journal of Electrical and Computer Engineering (IJECE) Vol 11, No 6: December 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v11i6.pp4972-4981

Abstract

Light penetrates the human eye through the cornea, which is the outer part of the eye, and then the cornea directs it to the pupil to determine the amount of light that reaches the lens of the eye. Accordingly, the human cornea must not be exposed to any damage or disease that may lead to human vision disturbances. Such damages can be revealed by topographic images used by ophthalmologists. Consequently, an important priority is the early and accurate diagnosis of diseases that may affect corneal integrity through the use of machine learning algorithms, particularly, use of local feature extractions for the image. Accordingly, we suggest a new algorithm called local information pattern (LIP) descriptor to overcome the lack of local binary patterns that loss of information from the image and solve the problem of image rotation. The LIP based on utilizing the sub-image center intensity for estimating neighbors' weights that can use to calculate what so-called contrast based centre (CBC). On the other hand, calculating local pattern (LP) for each block image, to distinguish between two sub-images having the same CBC. LP is the sum of transitions of neighbors' weights, from sub-image center value to one and vice versa. Finally, creating histograms for both CBC and LP, then blending them to represent a robust local feature vector. Which can use for diagnosing, detecting.
Outage performance analysis of non-orthogonal multiple access systems with RF energy harvesting Hoang Thien Van; Vo Tien Anh; Danh Hong Le; Ma Quoc Phu; Hoang-Sy Nguyen
International Journal of Electrical and Computer Engineering (IJECE) Vol 11, No 5: October 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v11i5.pp4135-4142

Abstract

Non-orthogonal multiple access (NOMA) has drawn enormous attention from the research community as a promising technology for future wireless communications with increasing demands of capacity and throughput. Especially, in the light of fifth-generation (5G) communication where multiple internet-of-things (IoT) devices are connected, the application of NOMA to indoor wireless networks has become more interesting to study. In view of this, we investigate the NOMA technique in energy harvesting (EH) half-duplex (HD) decode-and-forward (DF) power-splitting relaying (PSR) networks over indoor scenarios which are characterized by log-normal fading channels. The system performance of such networks is evaluated in terms of outage probability (OP) and total throughput for delay-limited transmission mode whose expressions are derived herein. In general, we can see in details how different system parameters affect such networks thanks to the results from Monte Carlo simulations. For illustrating the accuracy of our analytical results, we plot them along with the theoretical ones for comparison.
Simulation based comparison of routing protocols in wireless multihop adhoc networks Ali H. Wheeb; Marwa T. Naser
International Journal of Electrical and Computer Engineering (IJECE) Vol 11, No 4: August 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v11i4.pp3186-3192

Abstract

Routing protocols are responsible for providing reliable communication between the source and destination nodes. The performance of these protocols in the ad hoc network family is influenced by several factors such as mobility model, traffic load, transmission range, and the number of mobile nodes which represents a great issue. Several simulation studies have explored routing protocol with performance parameters, but few relate to various protocols concerning routing and Quality of Service (QoS) metrics. This paper presents a simulation-based comparison of proactive, reactive, and multipath routing protocols in mobile ad hoc networks (MANETs). Specifically, the performance of AODV, DSDV, and AOMDV protocols are evaluated and analyzed in the presence of varying the number of mobile nodes, pause time, and traffic connection numbers. Moreover, Routing and QoS performance metrics such as normalized routing load, routing packet, packet delivery ratio, packet drop, end-to-end delay, and throughput are measured to conduct a performance comparison between three routing protocols. Simulation results indicate that AODV outperforms the DSDV and AOMDV protocols in most of the metrics. AOMDV is better than DSDV in terms of end-to-end delay. DSDV provides lower throughput performance results. Network topology parameters have a slight impact on AODV Performance.
A hierarchical RCNN for vehicle and vehicle license plate detection and recognition Chunling Tu; Shengzhi Du
International Journal of Electrical and Computer Engineering (IJECE) Vol 12, No 1: February 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v12i1.pp731-737

Abstract

Vehicle and vehicle license detection obtained incredible achievements during recent years that are also popularly used in real traffic scenarios, such as intelligent traffic monitoring systems, auto parking systems, and vehicle services. Computer vision attracted much attention in vehicle and vehicle license detection, benefit from image processing and machine learning technologies. However, the existing methods still have some issues with vehicle and vehicle license plate recognition, especially in a complex environment. In this paper, we propose a multivehicle detection and license plate recognition system based on a hierarchical region convolutional neural network (RCNN). Firstly, a higher level of RCNN is employed to extract vehicles from the original images or video frames. Secondly, the regions of the detected vehicles are input to a lower level (smaller) RCNN to detect the license plate. Thirdly, the detected license plate is split into single numbers. Finally, the individual numbers are recognized by an even smaller RCNN. The experiments on the real traffic database validated the proposed method. Compared with the commonly used all-in-one deep learning structure, the proposed hierarchical method deals with the license plate recognition task in multiple levels for sub-tasks, which enables the modification of network size and structure according to the complexity of sub-tasks. Therefore, the computation load is reduced.
Chaos and bifurcation in time delayed third order phase-locked loop Bassam Harb; Mohammad Qudah; Ibrahim Ghareeb; Ahmad Harb
International Journal of Electrical and Computer Engineering (IJECE) Vol 11, No 2: April 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v11i2.pp1431-1438

Abstract

In this paper, the modern nonlinear theory is applied to a third order phase locked loop (PLL) with a feedback time delay. Due to this delay, different behaviors that are not accounted for in a conventional PLL model are identified, namely, oscillatory instability, periodic doubling and chaos. Firstly, a Pade approximation is used to model the time delay where it is utilized in deriving the state space representation of the PLL under investigation. The PLL under consideration is simulated with and without time delay. It is shown that for certain loop gain (control parameter) and time delay values, the system changes its stability and becomes chaotic. Simulations show that the PLL with time delay becomes chaotic for control parameter value less than the one without time delay, i.e, the stable region becomes narrower. Moreover, the chaotic region becomes wider as time delay increases.

Filter by Year

2011 2026


Filter By Issues
All Issue Vol 16, No 1: February 2026 Vol 15, No 6: December 2025 Vol 15, No 5: October 2025 Vol 15, No 4: August 2025 Vol 15, No 3: June 2025 Vol 15, No 2: April 2025 Vol 15, No 1: February 2025 Vol 14, No 6: December 2024 Vol 14, No 5: October 2024 Vol 14, No 4: August 2024 Vol 14, No 3: June 2024 Vol 14, No 2: April 2024 Vol 14, No 1: February 2024 Vol 13, No 6: December 2023 Vol 13, No 5: October 2023 Vol 13, No 4: August 2023 Vol 13, No 3: June 2023 Vol 13, No 2: April 2023 Vol 13, No 1: February 2023 Vol 12, No 6: December 2022 Vol 12, No 5: October 2022 Vol 12, No 4: August 2022 Vol 12, No 3: June 2022 Vol 12, No 2: April 2022 Vol 12, No 1: February 2022 Vol 11, No 6: December 2021 Vol 11, No 5: October 2021 Vol 11, No 4: August 2021 Vol 11, No 3: June 2021 Vol 11, No 2: April 2021 Vol 11, No 1: February 2021 Vol 10, No 6: December 2020 Vol 10, No 5: October 2020 Vol 10, No 4: August 2020 Vol 10, No 3: June 2020 Vol 10, No 2: April 2020 Vol 10, No 1: February 2020 Vol 9, No 6: December 2019 Vol 9, No 5: October 2019 Vol 9, No 4: August 2019 Vol 9, No 3: June 2019 Vol 9, No 2: April 2019 Vol 9, No 1: February 2019 Vol 8, No 6: December 2018 Vol 8, No 5: October 2018 Vol 8, No 4: August 2018 Vol 8, No 3: June 2018 Vol 8, No 2: April 2018 Vol 8, No 1: February 2018 Vol 7, No 6: December 2017 Vol 7, No 5: October 2017 Vol 7, No 4: August 2017 Vol 7, No 3: June 2017 Vol 7, No 2: April 2017 Vol 7, No 1: February 2017 Vol 6, No 6: December 2016 Vol 6, No 5: October 2016 Vol 6, No 4: August 2016 Vol 6, No 3: June 2016 Vol 6, No 2: April 2016 Vol 6, No 1: February 2016 Vol 5, No 6: December 2015 Vol 5, No 5: October 2015 Vol 5, No 4: August 2015 Vol 5, No 3: June 2015 Vol 5, No 2: April 2015 Vol 5, No 1: February 2015 Vol 4, No 6: December 2014 Vol 4, No 5: October 2014 Vol 4, No 4: August 2014 Vol 4, No 3: June 2014 Vol 4, No 2: April 2014 Vol 4, No 1: February 2014 Vol 3, No 6: December 2013 Vol 3, No 5: October 2013 Vol 3, No 4: August 2013 Vol 3, No 3: June 2013 Vol 3, No 2: April 2013 Vol 3, No 1: February 2013 Vol 2, No 6: December 2012 Vol 2, No 5: October 2012 Vol 2, No 4: August 2012 Vol 2, No 3: June 2012 Vol 2, No 2: April 2012 Vol 2, No 1: February 2012 Vol 1, No 2: December 2011 Vol 1, No 1: September 2011 More Issue