cover
Contact Name
Tole Sutikno
Contact Email
ijece@iaesjournal.com
Phone
-
Journal Mail Official
ijece@iaesjournal.com
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
International Journal of Electrical and Computer Engineering
ISSN : 20888708     EISSN : 27222578     DOI : -
International Journal of Electrical and Computer Engineering (IJECE, ISSN: 2088-8708, a SCOPUS indexed Journal, SNIP: 1.001; SJR: 0.296; CiteScore: 0.99; SJR & CiteScore Q2 on both of the Electrical & Electronics Engineering, and Computer Science) is the official publication of the Institute of Advanced Engineering and Science (IAES). The journal is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication and computer engineering from the global world.
Articles 6,301 Documents
Hybrid Low Complex near Optimal Detector for Spatial Modulation P. Rajani Kumari; K. Chenna Kesava Reddy; K.S. Ramesh
International Journal of Electrical and Computer Engineering (IJECE) Vol 7, No 2: April 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (472.703 KB) | DOI: 10.11591/ijece.v7i2.pp818-822

Abstract

In our previous work maximum throughput in multi stream MIMO is analyzed by overcoming the inter antenna interference. To mitigate the Inter antenna interference spatial modulation can be used. Spatial Modulation(SM) aided MIMO systems are the emerging MIMO systems which are low complex and energy efficient. These systems additionally use spatial dimensions for transmitting information. In this paper a low complex detector based on matched filter is proposed for spatial modulation to achieve near maximum likelihood performance while avoiding exhaustive ML search since MF based detector exhibits a considerable reduced complexity since activated transmitting antenna and modulated amplitude phase modulation constellation are estimated separately. Simulation results show the performance of the proposed method with optimal ML detector, MRC and conventional matched filter methods.
Enhanced RSA Cryptosystem based on Multiplicity of Public and Private Keys Ahmed Eskander Mezher
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 5: October 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (217.409 KB) | DOI: 10.11591/ijece.v8i5.pp3949-3953

Abstract

Security is one of the most important concern to the information and data sharing for companies, banks, organizations and government facilities. RSA is a public cryptographic algorithm that is designed specifically for authentication and data encryption. One of the most powerful reasons makes RSA more secure is that the avoidance of key exchange in the encryption and decryption processes. Standard RSA algorithm depends on the key length only to protect systems. However, RSA key is broken from time to another due to the development of computers hardware such as high speed processors and advanced technology. RSA developers have increased a key length or size of a key periodically to maintain a high security and privacy to systems that are protected by the RSA. In this paper, a method has been designed and implemented to strengthen the RSA algorithm by using multiple public and private keys. Therefore, in this method the security of RSA not only depends on the key size, but also relies on the multiplicity of public and private keys.
Assessing completeness of a WEB site from quality perspective Sasi Bhanu Jammalamadaka; Kamesh DBK; Jammalamadaka Kodanda Rama Sastry
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 6: December 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (731.908 KB) | DOI: 10.11591/ijece.v9i6.pp5596-5603

Abstract

Assessing quality of a web site is most important especially because people world over are dependent on the content hosted on the WEB site for various purposes. May factors are to be considered for assessing the quality. Quality of every factor must be considered individual and also the total quality of the WEB site must be computed. This paper is primarily focused on the factor called “Completeness” which is one of the factors that can be considered for computing the quality of the WEB sites.  There can be much of the disconnected in the content hosted on the web site such as missing href, columns in the tables and forms. The more of the disconnectedness in the content that is hosted on the WEB site, the less the quality, as the information hosted on the WEB site is incomplete and less readable
Pressurized CF3I-CO2 Gas Mixture under Lightning Impulse and its Solid By-Products M. S. Kamarudin; A. Haddad; B. C. Kok; N. A. M. Jamail
International Journal of Electrical and Computer Engineering (IJECE) Vol 7, No 6: December 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (460.25 KB) | DOI: 10.11591/ijece.v7i6.pp3088-3094

Abstract

This paper describes tests results on the CF3I-CO2 gas mixtures as an alternative for SF6 gas as to be used as insulating medium in high voltage applications. Pressurized CF3I-CO2 gas mixtures are subject under standard lightning impulse voltages at both positive and negative polarities. Under rod-plane configuration, the electrode gap length and gas pressure are varied accordingly. Upon completion of the laboratory tests, SEM and EDX analyses are carried out to assess the solid by-products. It was found that higher gas mixtures provide better insulation strength. In terms of weight, 50% of the solid by-product is found to be iodine.
A comparison of single phase standalone square waveform solar inverter topologies: half bridge and full bridge Aicha Chemseddine; Noureddine Benabadji; Ali Cheknane; Salah Eddine Mankour
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 4: August 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (952.902 KB) | DOI: 10.11591/ijece.v10i4.pp3384-3392

Abstract

In stand-alone photovoltaic installations the photovoltaic inverter allows transforming the DC power produced by the photovoltaic modules into an AC power. Depending on the shape of the AC output voltage generated by the inverter there exist three main types of stand-alone PV inverters: pure sine waveform inverters, modulated sine waveform inverters and square waveform inverters and each type of these inverters is also divided into different topologies. In this paper we will be interested and study the square waveform stand-alone inverter topologies which are the half bridge and the full-bridge inverter topologies.
Operational performance of a PV generator feeding DC shunt and induction motors with MPPT Mohammed I. Abuashour; Tha'er O. Sweidan; Mohammad S. Widyan; Mohammed M. Hattab; Mohammed A. Ma'itah
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 2: April 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (914.886 KB) | DOI: 10.11591/ijece.v9i2.pp771-782

Abstract

This paper presented the transient and operational behavior of a parallel Combination of DC Shunt Motor and IM fed by a photovoltaic generator at different solar irradiance levels. The maximum power point of current/voltage (I/V) characteristic of the PV generator was achieved for different solar intensities, by utilizing an open circuit voltage method. The nonlinear operational behavior of (I/V) characteristics of the PV generator at various solar intensities and the magnetization curve of the ferromagnetic material of the DC shunt motor were both modeled by high order polynomial mathematical expressions. The study investigated the response of the system at different solar irradiance levels and changing the torque loads for both motors and then following step change in solar intensity levels with fixed loading torques for both motors. All numerical simulations were executed using MATLAB software.
Several New Metrics for Evaluation of Expert Systems Based on Service-Oriented Architecture Ali Nayebpour; Hassan Rashidi
International Journal of Electrical and Computer Engineering (IJECE) Vol 3, No 5: October 2013
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (118.823 KB)

Abstract

Modern expert systems have some limitations such as vulnerabilities, the unity of solution strategy, development problems, repair and maintenance. These limitations could be covered by Service-Oriented Architecture (SOA), due to the advantages and various applications of this architecture and its combination to expert systems. The main purpose of this paper is to survey service-oriented architecture to provide solutions for using this style in order to eliminate the short comings and optimize services in expert systems. In this paper, several metrics for evaluating expert systems based on service-oriented architecture are presented. These metrics are in six branches: agility, integrity, usability and reusability, business objectives, accessibility, offering new and applied services. For each metric some properties are presented which the expert systems show more powerful in evaluation.DOI:http://dx.doi.org/10.11591/ijece.v3i5.4032
Automatic Threshold on Current based Anti-pinch Mechanism for Power Windows Wahyu Kunto Wibowo; Seok-Kwon Jeong; Sam-Sang You; Lee Jaemin
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 4: August 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (493.649 KB) | DOI: 10.11591/ijece.v8i4.pp2172-2179

Abstract

In this paper, the automotive power window has been integrated with an advanced safety mechanism called anti-pinch system for good protection. Based on a contact method, a new safety mechanism using a low-cost technology has been proposed to set a threshold value as a limit to decide the pinch condition, or automatic threshold method. The electric current information is easily detected by using current sensor installed on a motor driver without incorporating extra device. Then the pinch condition is quickly reflected and calculated by using current information in the system. Since the automatic threshold is decided by analyzing system behavior in advance, the optimal calculation can be guaranteed and then applied it on the safety mechanism in a cost-effective manner. Through extensive experimental tests, the squeezing forces of the proposed anti-pinch system have been verified to satisfy requirements of the FMVSS 118 regulations.
Transmission protocols in Cognitive Radio Mesh Networks Anusha M; Srikanth Vemuru; T Gunasekhar
International Journal of Electrical and Computer Engineering (IJECE) Vol 5, No 6: December 2015
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (126.245 KB) | DOI: 10.11591/ijece.v5i6.pp1446-1451

Abstract

A Cognitive Radio (CR) is a radio that can adjust its transmission limit based on available spectrum in its operational surroundings. Cognitive Radio Network (CRN) is made up of both the licensed users and unlicensed users with CR enable and disabled radios. CR’S supports to access dynamic spectrum and supports secondary user to access underutilized spectrum efficiently, which was allocated to primary users. In CRN’S most of the research was done on spectrum allocation, spectrum sensing and spectrum sharing. In this literature, we present various Medium Access (MAC) protocols of CRN’S. This study would provide an excellent study of MAC strategies.
Real time implementation of embedded devices as a security system in intelligent vehicles connected via Vanets Senthilnathan Palaniapan; Mohammed Ahsan Kollathodi
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 6: December 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (2739.151 KB) | DOI: 10.11591/ijece.v9i6.pp4788-4797

Abstract

The fast boom of  technology has made our lives easier. The number of computer based functions embedded in cars have multiplied extensively over the past two decades. These days, many embedded sensors allowing localization and verbal exchange are being advanced to enhance reliability, protection and define new exploitation modes in intelligent guided transports. An in-car embedded electronic architecture is a complex setup machine, the improvement of that particular system is related to unique manufacturers and providers. There are several factors required in an efficient and secure system along with protection features, real time monitoring, reliability, robustness, and many other integrated features[1-2]. The appearance of modern era has also expanded the use of vehicles and  its associated dangers. Dangers and the road accidents take place often which causes loss of lives and assets due to the bad emergency centres, lack of safety features and limitations within devices embedded within a vehicle.  A rpm-speed calculating device can be used in a vehicle such that risku situations while driving can be detected. A system with Ultra sonic sensor can be used as a crash detector of the automobile in the course of the event and also after a crash. With indicators from the device,  extreme coincidences also can be recognized. .As the amount of urban automobile grows automobile theft has become a shared difficulty for all citizens. As a solution an antitheft system can be implemented using PIR motion sensors where the system can be attached to the peripheral surface of the vehicle. When these sensors are interfaced with  Arduino microcontroller an efficient and reliable security system can be developed[3].

Page 45 of 631 | Total Record : 6301


Filter by Year

2011 2026


Filter By Issues
All Issue Vol 16, No 1: February 2026 Vol 15, No 6: December 2025 Vol 15, No 5: October 2025 Vol 15, No 4: August 2025 Vol 15, No 3: June 2025 Vol 15, No 2: April 2025 Vol 15, No 1: February 2025 Vol 14, No 6: December 2024 Vol 14, No 5: October 2024 Vol 14, No 4: August 2024 Vol 14, No 3: June 2024 Vol 14, No 2: April 2024 Vol 14, No 1: February 2024 Vol 13, No 6: December 2023 Vol 13, No 5: October 2023 Vol 13, No 4: August 2023 Vol 13, No 3: June 2023 Vol 13, No 2: April 2023 Vol 13, No 1: February 2023 Vol 12, No 6: December 2022 Vol 12, No 5: October 2022 Vol 12, No 4: August 2022 Vol 12, No 3: June 2022 Vol 12, No 2: April 2022 Vol 12, No 1: February 2022 Vol 11, No 6: December 2021 Vol 11, No 5: October 2021 Vol 11, No 4: August 2021 Vol 11, No 3: June 2021 Vol 11, No 2: April 2021 Vol 11, No 1: February 2021 Vol 10, No 6: December 2020 Vol 10, No 5: October 2020 Vol 10, No 4: August 2020 Vol 10, No 3: June 2020 Vol 10, No 2: April 2020 Vol 10, No 1: February 2020 Vol 9, No 6: December 2019 Vol 9, No 5: October 2019 Vol 9, No 4: August 2019 Vol 9, No 3: June 2019 Vol 9, No 2: April 2019 Vol 9, No 1: February 2019 Vol 8, No 6: December 2018 Vol 8, No 5: October 2018 Vol 8, No 4: August 2018 Vol 8, No 3: June 2018 Vol 8, No 2: April 2018 Vol 8, No 1: February 2018 Vol 7, No 6: December 2017 Vol 7, No 5: October 2017 Vol 7, No 4: August 2017 Vol 7, No 3: June 2017 Vol 7, No 2: April 2017 Vol 7, No 1: February 2017 Vol 6, No 6: December 2016 Vol 6, No 5: October 2016 Vol 6, No 4: August 2016 Vol 6, No 3: June 2016 Vol 6, No 2: April 2016 Vol 6, No 1: February 2016 Vol 5, No 6: December 2015 Vol 5, No 5: October 2015 Vol 5, No 4: August 2015 Vol 5, No 3: June 2015 Vol 5, No 2: April 2015 Vol 5, No 1: February 2015 Vol 4, No 6: December 2014 Vol 4, No 5: October 2014 Vol 4, No 4: August 2014 Vol 4, No 3: June 2014 Vol 4, No 2: April 2014 Vol 4, No 1: February 2014 Vol 3, No 6: December 2013 Vol 3, No 5: October 2013 Vol 3, No 4: August 2013 Vol 3, No 3: June 2013 Vol 3, No 2: April 2013 Vol 3, No 1: February 2013 Vol 2, No 6: December 2012 Vol 2, No 5: October 2012 Vol 2, No 4: August 2012 Vol 2, No 3: June 2012 Vol 2, No 2: April 2012 Vol 2, No 1: February 2012 Vol 1, No 2: December 2011 Vol 1, No 1: September 2011 More Issue