cover
Contact Name
Tole Sutikno
Contact Email
ijece@iaesjournal.com
Phone
-
Journal Mail Official
ijece@iaesjournal.com
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
International Journal of Electrical and Computer Engineering
ISSN : 20888708     EISSN : 27222578     DOI : -
International Journal of Electrical and Computer Engineering (IJECE, ISSN: 2088-8708, a SCOPUS indexed Journal, SNIP: 1.001; SJR: 0.296; CiteScore: 0.99; SJR & CiteScore Q2 on both of the Electrical & Electronics Engineering, and Computer Science) is the official publication of the Institute of Advanced Engineering and Science (IAES). The journal is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication and computer engineering from the global world.
Articles 6,301 Documents
Low-complex Bayesian estimator for imperfect channels in massive muti-input multi-output system Ahmed Hussein Shatti; Ehab AbdulRazzaq Hussein
International Journal of Electrical and Computer Engineering (IJECE) Vol 12, No 6: December 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v12i6.pp6261-6271

Abstract

Motivated by the fact that the complexity of the computations is one of the main challenges in large multiple input multiple output systems, known as massive multiple-input multiple-output (MIMO) systems, this article proposes a low-complex minimum mean squared error (MMSE) Bayesian channel estimator for uplink channels of such systems. First, we have discussed the necessity of the covariance information for the MMSE estimator and how their imperfection knowledge can affect its accuracy. Then, two reduction phases in dimension and floating-point operations have been suggested to reduce its complexity: in phase 1, eigenstructure reduction for channel covariance matrices is implemented based on some truncation rules, while in phase 2, arithmetic operations reduction for matrix multiplications in the MMSE equation is followed. The proposed procedure has significantly reduced the complexity of the MMSE estimator to the first order O(M), which is less than that required for the conventional MMSE with O(M3) in terms of matrix dimension. It has been shown that the estimated channels using our proposed procedure are asymptotically aligned and serve the same quality as the full-rank estimated channels. Our results are validated by averaging the normalized mean squared error (NMSE) over a length of 500 sample realizations through a Monte Carlo simulation using MATLAB R2020a.
A deterministic method of distributed generation hosting capacity calculation: case study of underground distribution grid in Morocco soukaina naciri; Ismail Moufid; Hassan El Moussaoui; Tijani Lamhamdi; Hassane El Markhi
International Journal of Electrical and Computer Engineering (IJECE) Vol 13, No 1: February 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v13i1.pp144-158

Abstract

Global warming has become a significant concern over the past decades. As a result, governments have shifted their policies toward renewable energy sources and environmentally friendly industries. This approach requires a renewal of the electrical networks to accommodate this new intermittent generation (from solar and wind sources) while remaining stable and reliable. In this vision, the notion of hosting capacity has been introduced to define the amount of new distributed generation that an electrical network can host without affecting its stability and reliability. This study proposes a deterministic method based on the π model of cables to estimate the underground feeder's hosting capacity. This method considers reverse power flow, overvoltage, reconfiguration, overloading, and the physical characteristics of lines. It is applied to the Moroccan medium voltage underground radial feeder. Through DIgSILENT power factory software, the power flow analysis is carried out to validate its effectiveness in overcoming overvoltage and cable overload problems. The results validate the relevance of our method, its reliability, its fluidity of application, and its ability to maintain performance indices within the acceptable range.
An improved 2×2 array antenna using both-sided microwave integrated circuit technology for circular polarization Piyas Chowdhury; Nishako Chakma; Abu Hena Murshed; Md. Azad Hossain; Quazi Delwar Hossain
International Journal of Electrical and Computer Engineering (IJECE) Vol 13, No 1: February 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v13i1.pp619-628

Abstract

A circularly polarized microstrip patch array antenna using both-sided microwave integrated circuit (MIC) technology with a triple feed network has been proposed in this article. The antenna elements, feed structure and both-sided MIC technology are used and arranged in such a way to obtain circular polarization alongside high gain without using an external matching circuit. The 50 Ω microstrip line is used to energize the antenna where the antenna’s total feed network is made up of both series and parallel combinations of microstrip and slot line. The antenna was realized using Teflon glass fiber substrate (εr)=2.15 with a thickness of 0.8 mm. The antenna has some splendid parameters including S11 of less than -35 dB, a gain of 12 dBi with an omnidirectional pattern and an axial ratio of 0.7 dB at the operating frequency. The antenna possesses a bandwidth of 430 MHz (4.22%) after operating at X-band in the frequency spectrum. The antenna’s simulated parameters were investigated with the help of advanced design system (ADS) simulation software in microwave momentum mode.
Multi-level encryption for 3D mesh model based on 3D Lorenz chaotic map and random number generator Nashwan Alsalam Ali; Abdul Monem S. Rahma; Shaimaa H. Shaker
International Journal of Electrical and Computer Engineering (IJECE) Vol 12, No 6: December 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v12i6.pp6486-6495

Abstract

The increasing 3D model applications in various areas of life and widespread use like industry leads to 3D models being stolen and attacked by hackers; therefore, 3D model protection is a fundamental matter nowadays. In this paper, the proposed scheme will provide stringent security for the 3D models by implementing multiple levels of security with preserving the original dimensionality of the 3D model using the weight factor (w). The first level of security is achieved by applying a shuffling process for the vertices based on a key from random number generator (RNG), which provides good confusion. The second level is implemented by modifying the vertices values based on 3D keys from 3D Lorenz chaotic map, which provides good diffusion. The proposed scheme was applied on different 3D models varying in the vertices and faces number. The results illustrate that the proposed scheme deforms the entire 3D model based on Hausdorff distance (HD) approximately 100 after the encryption process, making it resist statistical attack. The scheme provides high security against brute force attack because it has a large key space equal to 10,105 and high security against deferential attack through secret key sensitivity using number of pixels change rate (NPCR) near to 99:6% and unified average changing intensity (UACI) near to 33:4%.
A new windings design for improving single-phase induction motor performance Zuriman Anthony; Erhaneli Erhaneli; Yusreni Warmi; Zulkarnaini Zulkarnaini; Anggun Anugrah; Sepannur Bandri
International Journal of Electrical and Computer Engineering (IJECE) Vol 12, No 6: December 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v12i6.pp5789-5798

Abstract

Single-phase induction (asynchronous) motors are widely used at home. These motors have two windings and usually operate at a lower performance than 3-phase asynchronous motors which have three windings. For this reason, this study aims to design a new winding of a single-phase asynchronous motor by increasing the number of phases in the motor windings in order to increase the performance of the motor. This research was focused on 36 slot capacitor-start capacitor-run asynchronous motor. The design used 4 non-identical windings in the motor, where three windings acted as auxiliary windings and one winding acted as main winding. The rated current of the designed motor winding was 2.74 A for the main winding and 3.15 A for the auxiliary winding. The performance of the designed motor compared to the traditional single-phase asynchronous motor with the same structure of stator, rotor, and rated current. A traditional single-phase asynchronous motor had data: 1 HP, 220 V, 8.3 A, 1440 RPM, 50 Hz, and 4 poles. The results of this study indicated that the designed motor operated with power factors almost close to unity and had higher output power, torque, and efficiency than the traditional single-phase asynchronous motors.
Rough set method-cloud internet of things: a two-degree verification scheme for security in cloud-internet of things Sheeba MaryJohn Rukmony; Suganthi Gnanamony
International Journal of Electrical and Computer Engineering (IJECE) Vol 13, No 2: April 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v13i2.pp2233-2239

Abstract

The quick development of innovations and increasing use of the internet of things (IoT) in human life brings numerous challenges. It is because of the absence of adequate capacity resources and tremendous volumes of IoT information. This can be resolved by a cloud-based architecture. Consequently, a progression of challenging security and privacy concerns has emerged in the cloud based IoT context. In this paper, a novel approach to providing security in cloud based IoT environments is proposed. This approach mainly depends on the working of rough set rules for guaranteeing security during data sharing (rough set method-cloud IoT (RSM-CIoTD)). The proposed RSM-CIoTD conspire guarantees secure communication between the user and cloud service provider (CSP) in a cloud based IoT. To manage unauthorized users, an RSM-CIoTD scheme utilizes a registered authority which plays out a two-degree confirmation between the network substances. The security and privacy appraisal techniques utilize minimum and maximum trust benefits of past communication. The experiments show that our proposed system can productively and safely store the cloud service while outperforming other security methods.
A survey of ranging techniques for vehicle localization in intelligence transportation system: challenges and opportunities Yaser Bakhuraisa; Azlan Abd Aziz; Tan Kim Geok; Saifulnizan Jamian; Fajaruddin Mustakim
International Journal of Electrical and Computer Engineering (IJECE) Vol 12, No 6: December 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v12i6.pp6248-6260

Abstract

Observing the vehicles movement becomes an urgent necessity due to exponentially increasing numbers of vehicles in the world. However, to this regard, a good deal of research had been presented to estimate the exact physical position of the vehicle. The major challenges faced vehicle localization systems are large coverage areas required, positioning at diverse environments and positioning during a high-speed movement. However, in this paper, the challenges of employing the vehicle localization techniques, which rely on the propagation signal properties, are discussed. Moreover, a comparison between these techniques, in terms of accuracy, responsiveness, scalability, cost, and complexity, is conducted. The presented positioning technologies are classified into five categories: satellite based, radio frequency based, radio waves based, optical based, and sound based. The discussion shows that, both of satellite-based technology and cellular-based technology are emerge solutions to overcome the challenges of vehicle positioning. Satellite-based can provide a high accurate positioning in open outdoor environment, whereas the cellular-based can provide accurate and reliable vehicle localization in urban environment, it can support non-line of sight (NLOS) positioning and provide large coverage and high data transmission. The paper also shows that, the standalone localization technology still has limitations. Therefore, we discussed how the presented techniques are integrated to improve the positioning performance.
Smart optimization in 802.11p media access control protocol for vehicular ad hoc network Shahirah Mohamed Hatim; Haryani Haron; Shamsul Jamel Elias; Nor Shahniza Kamal Bashah
International Journal of Electrical and Computer Engineering (IJECE) Vol 13, No 2: April 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v13i2.pp2206-2213

Abstract

The innovative idea presented in this research is that advancements in automotive networks and embedded devices can be used to assess the impact of congestion control on throughput and packet delivery ratio (PDR), or so-called multimedia content delivery. Vehicle networking and the distribution of multimedia content have become essential factors in getting packets to their intended recipients due to the availability of bandwidth. Vehicle-to-infrastructure (V2I) communication systems are crucial in vehicular ad hoc networks (VANETs), which permit vehicles to connect by distributing and delivering traffic data and transmission packet schemes. High levels of mobility and changing network topology necessitate dispersed monitoring and execution for congestion control. The amount of traffic congestion for packet transfers could be reduced by enhancing congestion management in terms of throughput and PDR percentages. In a highway setting, the Taguchi approach has been used to optimize the parameters for congestion control. Based on throughput and PDR performance measures, this technique minimizes superfluous traffic information and lowers the likelihood of network congestion. The simulation results have shown that the proposed approach performs better since it increases network performance while effectively utilizing bandwidth. The effectiveness of the suggested technique is evaluated using a typical VANETs scenario for V2I communication while driving on a highway.
Novel reliable and dynamic energy-aware routing protocol for large scale wireless sensor networks Hicham Qabouche; Aicha Sahel; Abdelmajid Badri; Ilham El Mourabit
International Journal of Electrical and Computer Engineering (IJECE) Vol 12, No 6: December 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v12i6.pp6440-6448

Abstract

Wireless sensor networks (WSN) are made up of an important number of sensors, called nodes, distributed in random way in a concerned monitoring area. All sensor nodes in the network are mounted with limited energy sources, which makes energy harvesting on top of the list of issues in WSN. A poor communication architecture can result in excessive consumption, reducing the network lifetime and throughput. Centralizing data collection and the introduction of gateways (GTs), to help cluster heads (CHs), improved WSN life time significantly. However, in vast regions, misplacement and poor distribution of GTs wastes a huge amount of energy and decreases network’s performances. In this work, we describe a reliable and dynamic with energy-awareness routing (RDEAR) protocol that provides a new GT’s election approach taking into consideration CHs density, transmission distance and energy. Applied on 20 different networks, RDEAR reduced the overall energy consumption, increased stability zone and network life time as well as other compared metrics. Our proposed approach increased network’s throughput up to 75.92% , 67.7% and 9.78% compared to the low energy adaptive clustering hierarchy (LEACH), distributed energy efficient clustering (DEEC) and static multihop routing (SMR), protocols, respectively.
Emotion recognition based on the energy distribution of plosive syllables Abdellah Agrima; Ilham Mounir; Abdelmajid Farchi; Laila Elmazouzi; Badia Mounir
International Journal of Electrical and Computer Engineering (IJECE) Vol 12, No 6: December 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v12i6.pp6159-6171

Abstract

We usually encounter two problems during speech emotion recognition (SER): expression and perception problems, which vary considerably between speakers, languages, and sentence pronunciation. In fact, finding an optimal system that characterizes the emotions overcoming all these differences is a promising prospect. In this perspective, we considered two emotional databases: Moroccan Arabic dialect emotional database (MADED), and Ryerson audio-visual database on emotional speech and song (RAVDESS) which present notable differences in terms of type (natural/acted), and language (Arabic/English). We proposed a detection process based on 27 acoustic features extracted from consonant-vowel (CV) syllabic units: \ba, \du, \ki, \ta common to both databases. We tested two classification strategies: multiclass (all emotions combined: joy, sadness, neutral, anger) and binary (neutral vs. others, positive emotions (joy) vs. negative emotions (sadness, anger), sadness vs. anger). These strategies were tested three times: i) on MADED, ii) on RAVDESS, iii) on MADED and RAVDESS. The proposed method gave better recognition accuracy in the case of binary classification. The rates reach an average of 78% for the multi-class classification, 100% for neutral vs. other cases, 100% for the negative emotions (i.e. anger vs. sadness), and 96% for the positive vs. negative emotions.

Filter by Year

2011 2026


Filter By Issues
All Issue Vol 16, No 1: February 2026 Vol 15, No 6: December 2025 Vol 15, No 5: October 2025 Vol 15, No 4: August 2025 Vol 15, No 3: June 2025 Vol 15, No 2: April 2025 Vol 15, No 1: February 2025 Vol 14, No 6: December 2024 Vol 14, No 5: October 2024 Vol 14, No 4: August 2024 Vol 14, No 3: June 2024 Vol 14, No 2: April 2024 Vol 14, No 1: February 2024 Vol 13, No 6: December 2023 Vol 13, No 5: October 2023 Vol 13, No 4: August 2023 Vol 13, No 3: June 2023 Vol 13, No 2: April 2023 Vol 13, No 1: February 2023 Vol 12, No 6: December 2022 Vol 12, No 5: October 2022 Vol 12, No 4: August 2022 Vol 12, No 3: June 2022 Vol 12, No 2: April 2022 Vol 12, No 1: February 2022 Vol 11, No 6: December 2021 Vol 11, No 5: October 2021 Vol 11, No 4: August 2021 Vol 11, No 3: June 2021 Vol 11, No 2: April 2021 Vol 11, No 1: February 2021 Vol 10, No 6: December 2020 Vol 10, No 5: October 2020 Vol 10, No 4: August 2020 Vol 10, No 3: June 2020 Vol 10, No 2: April 2020 Vol 10, No 1: February 2020 Vol 9, No 6: December 2019 Vol 9, No 5: October 2019 Vol 9, No 4: August 2019 Vol 9, No 3: June 2019 Vol 9, No 2: April 2019 Vol 9, No 1: February 2019 Vol 8, No 6: December 2018 Vol 8, No 5: October 2018 Vol 8, No 4: August 2018 Vol 8, No 3: June 2018 Vol 8, No 2: April 2018 Vol 8, No 1: February 2018 Vol 7, No 6: December 2017 Vol 7, No 5: October 2017 Vol 7, No 4: August 2017 Vol 7, No 3: June 2017 Vol 7, No 2: April 2017 Vol 7, No 1: February 2017 Vol 6, No 6: December 2016 Vol 6, No 5: October 2016 Vol 6, No 4: August 2016 Vol 6, No 3: June 2016 Vol 6, No 2: April 2016 Vol 6, No 1: February 2016 Vol 5, No 6: December 2015 Vol 5, No 5: October 2015 Vol 5, No 4: August 2015 Vol 5, No 3: June 2015 Vol 5, No 2: April 2015 Vol 5, No 1: February 2015 Vol 4, No 6: December 2014 Vol 4, No 5: October 2014 Vol 4, No 4: August 2014 Vol 4, No 3: June 2014 Vol 4, No 2: April 2014 Vol 4, No 1: February 2014 Vol 3, No 6: December 2013 Vol 3, No 5: October 2013 Vol 3, No 4: August 2013 Vol 3, No 3: June 2013 Vol 3, No 2: April 2013 Vol 3, No 1: February 2013 Vol 2, No 6: December 2012 Vol 2, No 5: October 2012 Vol 2, No 4: August 2012 Vol 2, No 3: June 2012 Vol 2, No 2: April 2012 Vol 2, No 1: February 2012 Vol 1, No 2: December 2011 Vol 1, No 1: September 2011 More Issue