cover
Contact Name
Tole Sutikno
Contact Email
ijece@iaesjournal.com
Phone
-
Journal Mail Official
ijece@iaesjournal.com
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
International Journal of Electrical and Computer Engineering
ISSN : 20888708     EISSN : 27222578     DOI : -
International Journal of Electrical and Computer Engineering (IJECE, ISSN: 2088-8708, a SCOPUS indexed Journal, SNIP: 1.001; SJR: 0.296; CiteScore: 0.99; SJR & CiteScore Q2 on both of the Electrical & Electronics Engineering, and Computer Science) is the official publication of the Institute of Advanced Engineering and Science (IAES). The journal is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication and computer engineering from the global world.
Articles 6,301 Documents
Biometric iris templates security based on secret image sharing and chaotic maps Marwa Fadhel Jassim; Wafaa mohammed Saeed Hamzah; Abeer Fadhil Shimal
International Journal of Electrical and Computer Engineering (IJECE) Vol 12, No 1: February 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v12i1.pp339-348

Abstract

Biometric technique includes of uniquely identifying person based on their physical or behavioural characteristics. It is mainly used for authentication. Storing the template in the database is not a safe approach, because it can be stolen or be tampered with. Due to its importance the template needs to be protected. To treat this safety issue, the suggested system employed a method for securely storing the iris template in the database which is a merging approach for secret image sharing and hiding to enhance security and protect the privacy by decomposing the template into two independent host (public) iris images. The original template can be reconstructed only when both host images are available. Either host image does not expose the identity of the original biometric image. The security and privacy in biometrics-based authentication system is augmented by storing the data in the form of shadows at separated places instead of whole data at one. The proposed biometric recognition system includes iris segmentation algorithms, feature extraction algorithms, a (2, 2) secret sharing and hiding. The experimental results are conducted on standard colour UBIRIS v1 data set. The results indicate that the biometric template protection methods are capable of offering a solution for vulnerability that threatens the biometric template.
A multi-objective evolutionary scheme for control points deployment in intelligent transportation systems Martin Luther Mfenjou; Ado Adamou Abba Ari; Arouna Ndam Njoya; Kolyang Kolyang; Wahabou Abdou; Abdelhak Mourad Gueroui
International Journal of Electrical and Computer Engineering (IJECE) Vol 11, No 2: April 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v11i2.pp1641-1655

Abstract

One of the problems that hinder emergency in developing countries is the problem of monitoring a number of activities on inter-urban roadway networks. In the literature, the use of control points is proposed in the context of these countries in order to ensure efficient monitoring, by ensuring a good coverage while minimizing the installation costs as well as the number of accidents across these road networks. In this work, we propose an optimal deployment of these control points from several optimization methods based on some evolutionary multi-objective algorithms: the non-dominated sorting genetic algorithm-II (NSGA-II); the multi-objective particle swarm optimization (MOPSO); the strength Pareto evolutionary algorithm -II (SPEA-II); and the Pareto envelope based selection algorithm-II (PESA-II). We performed the tests and compared these deployments using Pareto front and performance indicators like the spread and hypervolume and the inverted generational distance (IGD). The results obtained show that the NSGA-II method is the most adequate in the deployment of these control points.
Security aware information classification in health care big data Snehalata K. Funde; Gandharba Swain
International Journal of Electrical and Computer Engineering (IJECE) Vol 11, No 5: October 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v11i5.pp4439-4448

Abstract

These days e-medical services frameworks are getting famous for taking care of patients from far-off spots, so a lot of medical services information like the patient’s name, area, contact number, states of being are gathered distantly to treat the patients. A lot of information gathered from the different assets is named big data. The enormous sensitive information about the patient contains delicate data like systolic BP, pulse, temperature, the current state of being, and contact number of patients that should be recognized and sorted appropriately to shield it from abuse. This article presents a weightbased similarity (WBS) strategy to characterize the enormous information of health care data into two classifications like sensitive information and normal information. In the proposed method, the training dataset is utilized to sort information and it comprises of three fundamental advances like information extraction, mapping of information with the assistance of the training dataset, evaluation of the weight of input data with the threshold value to classify the data. The proposed strategy produces better outcomes with various assessment boundaries like precision, recall, F1 score, and accuracy value 92% to categorize the big data. Weka tool is utilized for examination among WBS and different existing order procedures.
Tangible user interface design for learners with different multiple intelligence Salintip Sudsanguan; Sakchai Tangwannawit; Thippaya Chintakovid
International Journal of Electrical and Computer Engineering (IJECE) Vol 11, No 4: August 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v11i4.pp3381-3392

Abstract

The creation of learning activities responsive to learners with different basic skills has been limited due to a classroom environment and applied technologies. The goals of this research were to develop Tang-MI, a game with a tangible user interface supporting primary school learners’ analytical skills based on the theory of multiple intelligences (MI), and to present design guidelines for a tangible user interface suitable for learners in different MI groups. In this research, the Tangible user interface for multiple intelligence (Tang-MI) was tested with thirty students initially evaluated for their multiple intelligences. The learners’ usage behavior was observed and recorded while the students performed the assigned tasks. The behavioral data were analyzed and grouped into behaviors occurring before performing the tasks, during the tasks, and after completing the tasks. Based on the learners’ usage behavior, the tangible user interface design guidelines for learners in different MI groups were proposed concerning physical equipment design, question design, interactive program design, audio design, and animated visual feedback design. These guidelines would help educators build learning games that respond to the learners’ intelligence styles and enhance students’ motivation to learn.
All-terrain mobile robot desinfectant sprayer to decrease the spread of COVID-19 in open area Prisma Megantoro; Herlambang Setiadi; Brahmantya Aji Pramudita
International Journal of Electrical and Computer Engineering (IJECE) Vol 11, No 3: June 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v11i3.pp2090-2100

Abstract

The application of disinfection is becoming popular in recent months due to the COVID-19. Usually, the disinfection is used by spraying the liquid into an object. However, the disinfection process for humans and objects in the human environment is still done manually and takes time and increases exposure to viruses. Robotic technology can be a solution to handle that problem. Following that problem, robot design is proposed with many abilities and features. The robot can operate in remote conditions and full function for approximately 56 minutes and spray the liquid for more than 1 meter. This research can effectively be applied in COVID-19 handlings.
Reconfigurable of current-mode differentiator and integrator based-on current conveyor transconductance amplifiers Soontorn Srisoontorn; Angkana Charoenmee; Suphaphorn Panikhom; Thitiporn Janda; Suttipong Fungdetch; Khunpan Patimaprakorn; Adirek Jantakun
International Journal of Electrical and Computer Engineering (IJECE) Vol 12, No 1: February 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v12i1.pp208-218

Abstract

The reconfigurable of the differentiator and integrator based on current conveyor transconductance amplifiers (CCTAs) have been presented in this paper. The proposed configurations are provided with two CCTAs and grounded elements. The configurations can be operated in the differentiator and integrator by selecting external passive elements. The input and output currents have low and high impedances, respectively; therefore, the configurations can be cascaded without additional current buffer. The proposed configurations can be electronically tuned by external direct current (DC) bias currents, and it also has slight fluctuation with temperature. An application of universal filter is demonstrated to confirm the ability of the proposed configurations. The results of simulation with Pspice program are accordance with the theoretical analysis.
A trust-based authentication framework for security of WPAN using network slicing Sazia Parvin; Amjad Gawanmeh; Sitalakshmi Venkatraman; Ali Alwadi; Jamal N. Al-Karaki; Paul D. Yoo
International Journal of Electrical and Computer Engineering (IJECE) Vol 11, No 2: April 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v11i2.pp1375-1387

Abstract

New technologies bring along many challenges including security and privacy. Wireless personal area networks (WPANs) are characterized by limited energy resources and computing power that calls for lightweight security mechanisms in these networks as a mandatory requirement. In this paper, a lightweight trust-based framework for node authentication in WPAN is proposed. Our main objective is to minimise the effort in distinguishing valid requests of trustworthy nodes from invalid requests of malicious nodes that can result in network compromises. We achieve this through network slicing which divides the network into virtually primary and secondary networks. The proposed framework has three-fold benefits. First, it authenticates nodes’ requests based on a novel method of trust value calculation. Second, the framework maintains energy efficiency while authenticating nodes’ requests to access WPAN resources. Finally, the framework provides a solution for biasing problem that can arise due to unexpected behaviour of malicious users in WPANs. The framework efficacy is illustrated on a case study to shown how it can accurately capture trust relations among nodes while preventing malicious behavior.
Impact analysis of actuator torque degradation on the IRB 120 robot performance using simscape-based model Le Ngoc Truc; Nguyen Phung Quang; Nguyen Hong Quang
International Journal of Electrical and Computer Engineering (IJECE) Vol 11, No 6: December 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v11i6.pp4850-4864

Abstract

Actuators in a robot system may become faulty during their life cycle. Locked joints, free-moving joints, and the loss of actuator torque are common faulty types of robot joints where the actuators fail. Locked and free-moving joint issues are addressed by many published articles, whereas the actuator torque loss still opens attractive investigation challenges. The objectives of this study are to classify the loss of robot actuator torque, named actuator torque degradation, into three different cases: Boundary degradation of torque, boundary degradation of torque rate, and proportional degradation of torque, and to analyze their impact on the performance of a typical 6-DOF robot (i.e., the IRB 120 robot). Typically, controllers of robots are not pre-designed specifically for anticipating these faults. To isolate and focus on the impact of only actuator torque degradation faults, all robot parameters are assumed to be known precisely, and a popular closed-loop controller is used to investigate the robot’s responses under these faults. By exploiting MATLAB-the reliable simulation environment, a simscape-based quasi-physical model of the robot is built and utilized instead of an actual expensive prototype. The simulation results indicate that the robot responses cannot follow the desired path properly in most fault cases.
Reliability assessment for electrical power generation system based on advanced Markov process combined with blocks diagram A. A. Tawfiq; M. Osama abed el-Raouf; A. A. El-Gawad; M. A. Farahat
International Journal of Electrical and Computer Engineering (IJECE) Vol 11, No 5: October 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v11i5.pp3647-3659

Abstract

This paper presents the power generation system reliability assessment using an advanced Markov process combined with blocks diagram technique. The effectiveness of the suggested methodology is based on HL-I of IEEE_EPS_24_bus. The proposed method achieved the generation reliability and availability of an electrical power system using the Markov chain which based on the operational transition from state to state which represented in matrix. The proposed methodology has been presented for reliability performance evaluation of IEEE_EPS_24_bus. MATLAB code is developed using Markov chain construction. The transition between probability states is represented using changing the failure and repair rates. The reduced number of generation system are used with Markov process to assess the availability, unavailability, and reliability for the generation system. Additionally, the proposed technique calculates the frequency, time duration of states, the probability of generation capacity state which get out of service or remained in service for each state of failure, and reliability indices. A considerable improvement in reliability indices is found with using blocks diagram technique which is used to reduce the infinity number of transition states and assess the system reliability. The proposed technique succeeded at achieving accurate and faster reliability for the power system.
Design of type-1 servo controller for grid voltage modulated direct-power control of single-phase grid-connected PV inverter Eyad Radwan; Mutasim Nour; Ali Baniyounes; Khalid S. Al Olimat
International Journal of Electrical and Computer Engineering (IJECE) Vol 11, No 3: June 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v11i3.pp1912-1923

Abstract

This paper presents direct control of active and reactive power using grid voltage modulation for single-phase grid-connected photovoltaic inverter. A design of type-1 servo system based on pole-placement method is proposed to control the power flow using a simplified multiple-input multiple-output (MIMO) model of the system. Phase-locked loop (PLL) with a quarter cycle time delay is used to estimate the grid phase angle for the purpose of performing the stationary and synchronous reference frame transformation. Unipolar pulse width modulation (PWM) technique is used to control a single-phase inverter with 2.7 KVA capacity connected to the photovoltaic system. The proposed controller can simply be tuned using minimum number of controller gains to achieve the transient and steady-state performance requirements. The proposed system, was capable of operating for a wide range of solar irradiance levels with a power factor in the range of 0.95 (leading/lagging), for the reactive power compensation purposes.

Filter by Year

2011 2026


Filter By Issues
All Issue Vol 16, No 1: February 2026 Vol 15, No 6: December 2025 Vol 15, No 5: October 2025 Vol 15, No 4: August 2025 Vol 15, No 3: June 2025 Vol 15, No 2: April 2025 Vol 15, No 1: February 2025 Vol 14, No 6: December 2024 Vol 14, No 5: October 2024 Vol 14, No 4: August 2024 Vol 14, No 3: June 2024 Vol 14, No 2: April 2024 Vol 14, No 1: February 2024 Vol 13, No 6: December 2023 Vol 13, No 5: October 2023 Vol 13, No 4: August 2023 Vol 13, No 3: June 2023 Vol 13, No 2: April 2023 Vol 13, No 1: February 2023 Vol 12, No 6: December 2022 Vol 12, No 5: October 2022 Vol 12, No 4: August 2022 Vol 12, No 3: June 2022 Vol 12, No 2: April 2022 Vol 12, No 1: February 2022 Vol 11, No 6: December 2021 Vol 11, No 5: October 2021 Vol 11, No 4: August 2021 Vol 11, No 3: June 2021 Vol 11, No 2: April 2021 Vol 11, No 1: February 2021 Vol 10, No 6: December 2020 Vol 10, No 5: October 2020 Vol 10, No 4: August 2020 Vol 10, No 3: June 2020 Vol 10, No 2: April 2020 Vol 10, No 1: February 2020 Vol 9, No 6: December 2019 Vol 9, No 5: October 2019 Vol 9, No 4: August 2019 Vol 9, No 3: June 2019 Vol 9, No 2: April 2019 Vol 9, No 1: February 2019 Vol 8, No 6: December 2018 Vol 8, No 5: October 2018 Vol 8, No 4: August 2018 Vol 8, No 3: June 2018 Vol 8, No 2: April 2018 Vol 8, No 1: February 2018 Vol 7, No 6: December 2017 Vol 7, No 5: October 2017 Vol 7, No 4: August 2017 Vol 7, No 3: June 2017 Vol 7, No 2: April 2017 Vol 7, No 1: February 2017 Vol 6, No 6: December 2016 Vol 6, No 5: October 2016 Vol 6, No 4: August 2016 Vol 6, No 3: June 2016 Vol 6, No 2: April 2016 Vol 6, No 1: February 2016 Vol 5, No 6: December 2015 Vol 5, No 5: October 2015 Vol 5, No 4: August 2015 Vol 5, No 3: June 2015 Vol 5, No 2: April 2015 Vol 5, No 1: February 2015 Vol 4, No 6: December 2014 Vol 4, No 5: October 2014 Vol 4, No 4: August 2014 Vol 4, No 3: June 2014 Vol 4, No 2: April 2014 Vol 4, No 1: February 2014 Vol 3, No 6: December 2013 Vol 3, No 5: October 2013 Vol 3, No 4: August 2013 Vol 3, No 3: June 2013 Vol 3, No 2: April 2013 Vol 3, No 1: February 2013 Vol 2, No 6: December 2012 Vol 2, No 5: October 2012 Vol 2, No 4: August 2012 Vol 2, No 3: June 2012 Vol 2, No 2: April 2012 Vol 2, No 1: February 2012 Vol 1, No 2: December 2011 Vol 1, No 1: September 2011 More Issue