cover
Contact Name
Tole Sutikno
Contact Email
ijece@iaesjournal.com
Phone
-
Journal Mail Official
ijece@iaesjournal.com
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
International Journal of Electrical and Computer Engineering
ISSN : 20888708     EISSN : 27222578     DOI : -
International Journal of Electrical and Computer Engineering (IJECE, ISSN: 2088-8708, a SCOPUS indexed Journal, SNIP: 1.001; SJR: 0.296; CiteScore: 0.99; SJR & CiteScore Q2 on both of the Electrical & Electronics Engineering, and Computer Science) is the official publication of the Institute of Advanced Engineering and Science (IAES). The journal is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication and computer engineering from the global world.
Articles 6,301 Documents
A novel hybrid deep learning model for price prediction Walid Abdullah; Ahmad Salah
International Journal of Electrical and Computer Engineering (IJECE) Vol 13, No 3: June 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v13i3.pp3420-3431

Abstract

Price prediction has become a major task due to the explosive increase in the number of investors. The price prediction task has various types such as shares, stocks, foreign exchange instruments, and cryptocurrency. The literature includes several models for price prediction that can be classified based on the utilized methods into three main classes, namely, deep learning, machine learning, and statistical. In this context, we proposed several models’ architectures for price prediction. Among them, we proposed a hybrid one that incorporates long short-term memory (LSTM) and Convolution neural network (CNN) architectures, we called it CNN-LSTM. The proposed CNN-LSTM model makes use of the characteristics of the convolution layers for extracting useful features embedded in the time series data and the ability of LSTM architecture to learn long-term dependencies. The proposed architectures are thoroughly evaluated and compared against state-of-the-art methods on three different types of financial product datasets for stocks, foreign exchange instruments, and cryptocurrency. The obtained results show that the proposed CNN-LSTM has the best performance on average for the utilized evaluation metrics. Moreover, the proposed deep learning models were dominant in comparison to the state-of-the-art methods, machine learning models, and statistical models.
Evaluation of the strength and performance of a new hashing algorithm based on a block cipher Kunbolat Algazy; Kairat Sakan; Nursulu Kapalova
International Journal of Electrical and Computer Engineering (IJECE) Vol 13, No 3: June 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v13i3.pp3124-3130

Abstract

The article evaluates the reliability of the new HBC-256 hashing algorithm. To study the cryptographic properties, the algorithm was implemented in software using Python and C programming languages. Also, for the algebraic analysis of the HBC-256 algorithm, a system of Boolean equations was built for one round using the Transalg tool. The program code that implements the hashing algorithm was converted into a software program for generating equations. As a result, one round of the compression function was described as conjunctive normal form (CNF) using 82,533 equations and 16,609 variables. To search for a collision, the satisfiability (SAT) problem solver Lingeling was used, including a version with the possibility of parallel computing. It is shown that each new round doubles the number of equations and variables, and the time to find the solution will grow exponentially. Therefore, it is not possible to find solutions for the full HBC256 hash function.
Low-cost real-time internet of things-based monitoring system for power grid transformers Kaoutar Talbi; Abdelghani El Ougli; Belkassem Tidhaf; Hafida Zrouri
International Journal of Electrical and Computer Engineering (IJECE) Vol 13, No 3: June 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v13i3.pp2579-2588

Abstract

One of the most common causes of blackouts is unexpected failures at power system transformer levels. The purpose of this project is to create a low-cost Internet of things (IoT)-based monitoring system for power grid transformers in order to investigate their working status in real-time. Our monitoring system’s key functions are the gathering and display of many metrics measured at the transformer level (temperature, humidity, oil level, voltage, vibration, and pressure). The data will be collected using various sensors connected to a microcontroller with an embedded Wi-Fi module (DOIT Esp32 DevKit v1), and then supplied to a cloud environment interface with a full display of all the ongoing changes. This technology will provide the power grid maintenance center with a clear image of the transformers’ health, allowing them to intervene at the right time to prevent system breakdown. The method described above would considerably improve the efficiency of a power transformer in a smart grid system by detecting abnormalities before they become critical.
A novel triangular wave quadrature oscillator without passive components for sinusoidal pulse width modulation DC-AC power conversion Dodi Garinto; Theodora Valerie; Harki Apri Yanto; Tole Sutikno; Joni Welman Simatupang
International Journal of Electrical and Computer Engineering (IJECE) Vol 13, No 3: June 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v13i3.pp3572-3584

Abstract

In this study, a low-cost quadrature triangle oscillator using a voltage-controlled closed-loop dual operational amplifier (Op-Amp) architecture is proposed. Unlike other typical designs, this oscillator does not require any passive components. The use of an Op-Amp-based circuit is attractive for a triangle oscillator because it is more cost-effective than a microcontroller-based solution. This is especially true for sinusoidal pulse width modulation (SPWM) DC-AC power conversion applications. The slew-rate restriction of an Op-Amp is a useful characteristic for producing a triangle waveform when seen from the perspective of wave shaping techniques. The MC4558 and the JRC4558D are two examples of dual Op-Amps that are evaluated, contrasted, and described in this article. At supply voltages of +7 V and -7 V, the suggested quadrature triangle oscillator that uses Op-Amps MC4558 and JRC4558D has the same oscillation frequency, which is 63 kHz, as demonstrated by simulation and experimental data. The frequency stability is estimated to be around 0.23%. In addition, the findings from the experiment demonstrate that the proposed oscillator is a practical solution for the SPWM DC-AC power conversion application.
Initial location selection of electric vehicles charging infrastructure in urban city through clustering algorithm Handrea Bernando Tambunan; Ruly Bayu Sitanggang; Muhammad Muslih Mafruddin; Oksa Prasetyawan; Kensianesi Kensianesi; Istiqomah Istiqomah; Nur Cahyo; Fefria Tanbar
International Journal of Electrical and Computer Engineering (IJECE) Vol 13, No 3: June 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v13i3.pp3266-3280

Abstract

Transportation is one of the critical sectors worldwide, mainly based on fossil fuels, especially internal combustion engines. In a developing country, heightened dependence on fossil fuels affected energy sustainability issues, greenhouse gas emissions, and increasing state budget allocation towards fuel subsidies. Moreover, shifting to electric vehicles (EVs) with alternative energy, primely renewable energy sources, is considered a promising alternative to decreasing dependence on fossil fuel consumption. The availability of a sufficient EV charging station infrastructure is determined as an appropriate strategy and rudimentary requirement to optimize the growth of EV users, especially in urban cities. This study aims to utilize the k-mean algorithm’s clustering method to group and select a potential EV charging station location in Jakarta an urban city in Indonesia. This study proposed a method for advancing the layout location’s comprehensive suitability. An iterative procedure determines the most suitable value for K as centroids. The K value is evaluated by cluster silhouette coefficient scores to acquire the optimized numeral of clusters. The results show that 95 potential locations are divided into 19 different groups. The suggested initial EV charging station location was selected and validated by silhouette coefficient scores. This research also presents the maps of the initially selected locations and clustering.
Slum image detection and localization using transfer learning: a case study in Northern Morocco Tarik El Moudden; Rachid Dahmani; Mohamed Amnai; Abderrahmane Aït Fora
International Journal of Electrical and Computer Engineering (IJECE) Vol 13, No 3: June 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v13i3.pp3299-3310

Abstract

Developing countries are faced with social and economic challenges, including the emergence and proliferation of slums. Slum detection and localization methods typically rely on regular topographic surveys or on visual identification of high-resolution spatial satellite images, as well as socio-environmental surveys from land surveys and general population censuses. Yet, they consume so much time and effort. To overcome these problems, this paper exploits well-known seven pretrained models using transfer learning approaches such as MobileNets, InceptionV3, NASNetMobile, Xception, VGG16, EfficientNet, and ResNet50, consecutively, on a smaller dataset of medium-resolution satellite imagery. The accuracies obtained from these experiments, respectively, demonstrate that the top three pretrained models achieve 98.78%, 97.9%, and 97.56%. Besides, MobileNets have the smallest memory sizes of 9.1 Mo and the shortest latency of 17.01 s, which can be implemented as needed. The results show the good performance of the top three pretrained models to be used for detecting and localizing slum housing in northern Morocco.
Research trends on microgrid systems: a bibliometric network analysis Handrea Bernando Tambunan; Nur Widi Priambodo; Joko Hartono; Indra Ardhanayudha Aditya; Meiri Triani; Rasgianti Rasgianti
International Journal of Electrical and Computer Engineering (IJECE) Vol 13, No 3: June 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v13i3.pp2529-2545

Abstract

The numeral of academic publications in the microgrid system field has rapidly grown. A microgrid system is a group of interconnected distributed generation, loads, and energy storage operating as a single controllable entity. Many published articles recently focused on distributed generation, system control, system stability, power quality, architectures, and broader focus areas. This work analyzes microgrid: alternating current (AC), direct current (DC), and hybrid AC/DC microgrid systems with bibliometric network analysis through descriptive analysis, authors analysis, sources analysis, words analysis, and evolutionary path based on the Scopus database between 2010 and 2021. The finding helps find out the top authors and most impact sources, most relevant and frequently used in the research title, abstract, and keyword, graphically mapping the research evolved and identifying trend topic.
Lifetime enhanced energy efficient wireless sensor networks using renewable energy Trupti Shripad Tagare; Rajashree Narendra
International Journal of Electrical and Computer Engineering (IJECE) Vol 13, No 3: June 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v13i3.pp3088-3098

Abstract

In this paper, we consider a remote environment with randomly deployed sensor nodes, with an initial energy of E0 (J) and a solar panel. A hierarchical clustering technique is implemented. At each round, the normal nodes send the sensed data to the nearest cluster head (CH) which is chosen on the probability value. Data after aggregation at CHs is sent to the base station (BS). CH requires more energy than normal nodes. Here, we energize only CHs if their energy is less than 5% of its initial value with the use of solar energy. We evaluate parameters like energy consumption, the lifetime of the network, and data packets sent to CH and BS. The obtained results are compared with existing techniques. The proposed protocol provides better energy efficiency and network lifetime. The results show increased stability with delayed death of the first node. The network lifetime of the proposed protocol is compared to the multi-level hybrid energy efficient distributed (MLHEED) technique and low-energy adaptive clustering hierarchy (LEACH) variants. Network lifetime is enhanced by 13.35%. Energy consumption is reduced with respect to MLHEED-4, 5, and 6 by 7.15%, 12.10%, and 14.975% respectively. The no. of packets transferred to the BS is greater than the MLHEED protocol by 39.03%.
New hybrid ensemble method for anomaly detection in data science Amina Mohamed Elmahalwy; Hayam M. Mousa; Khalid M. Amin
International Journal of Electrical and Computer Engineering (IJECE) Vol 13, No 3: June 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v13i3.pp3498-3508

Abstract

Anomaly detection is a significant research area in data science. Anomaly detection is used to find unusual points or uncommon events in data streams. It is gaining popularity not only in the business world but also in different of other fields, such as cyber security, fraud detection for financial systems, and healthcare. Detecting anomalies could be useful to find new knowledge in the data. This study aims to build an effective model to protect the data from these anomalies. We propose a new hyper ensemble machine learning method that combines the predictions from two methodologies the outcomes of isolation forest-k-means and random forest using a voting majority. Several available datasets, including KDD Cup-99, Credit Card, Wisconsin Prognosis Breast Cancer (WPBC), Forest Cover, and Pima, were used to evaluate the proposed method. The experimental results exhibit that our proposed model gives the highest realization in terms of receiver operating characteristic performance, accuracy, precision, and recall. Our approach is more efficient in detecting anomalies than other approaches. The highest accuracy rate achieved is 99.9%, compared to accuracy without a voting method, which achieves 97%.
Deep learning in phishing mitigation: a uniform resource locator-based predictive model Hamzah Salah; Hiba Zuhair
International Journal of Electrical and Computer Engineering (IJECE) Vol 13, No 3: June 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v13i3.pp3227-3243

Abstract

To mitigate the evolution of phish websites, various phishing prediction8 schemes are being optimized eventually. However, the optimized methods produce gratuitous performance overhead due to the limited exploration of advanced phishing cues. Thus, a phishing uniform resource locator-based predictive model is enhanced by this work to defeat this deficiency using deep learning algorithms. This model’s architecture encompasses pre-processing of the effective feature space that is made up of 60 mutual uniform resource locator (URL) phishing features, and a dual deep learning-based model of convolution neural network with bi-directional long short-term memory (CNN-BiLSTM). The proposed predictive model is trained and tested on a dataset of 14,000 phish URLs and 28,074 legitimate URLs. Experimentally, the performance outputs are remarked with a 0.01% false positive rate (FPR) and 99.27% testing accuracy.

Filter by Year

2011 2026


Filter By Issues
All Issue Vol 16, No 1: February 2026 Vol 15, No 6: December 2025 Vol 15, No 5: October 2025 Vol 15, No 4: August 2025 Vol 15, No 3: June 2025 Vol 15, No 2: April 2025 Vol 15, No 1: February 2025 Vol 14, No 6: December 2024 Vol 14, No 5: October 2024 Vol 14, No 4: August 2024 Vol 14, No 3: June 2024 Vol 14, No 2: April 2024 Vol 14, No 1: February 2024 Vol 13, No 6: December 2023 Vol 13, No 5: October 2023 Vol 13, No 4: August 2023 Vol 13, No 3: June 2023 Vol 13, No 2: April 2023 Vol 13, No 1: February 2023 Vol 12, No 6: December 2022 Vol 12, No 5: October 2022 Vol 12, No 4: August 2022 Vol 12, No 3: June 2022 Vol 12, No 2: April 2022 Vol 12, No 1: February 2022 Vol 11, No 6: December 2021 Vol 11, No 5: October 2021 Vol 11, No 4: August 2021 Vol 11, No 3: June 2021 Vol 11, No 2: April 2021 Vol 11, No 1: February 2021 Vol 10, No 6: December 2020 Vol 10, No 5: October 2020 Vol 10, No 4: August 2020 Vol 10, No 3: June 2020 Vol 10, No 2: April 2020 Vol 10, No 1: February 2020 Vol 9, No 6: December 2019 Vol 9, No 5: October 2019 Vol 9, No 4: August 2019 Vol 9, No 3: June 2019 Vol 9, No 2: April 2019 Vol 9, No 1: February 2019 Vol 8, No 6: December 2018 Vol 8, No 5: October 2018 Vol 8, No 4: August 2018 Vol 8, No 3: June 2018 Vol 8, No 2: April 2018 Vol 8, No 1: February 2018 Vol 7, No 6: December 2017 Vol 7, No 5: October 2017 Vol 7, No 4: August 2017 Vol 7, No 3: June 2017 Vol 7, No 2: April 2017 Vol 7, No 1: February 2017 Vol 6, No 6: December 2016 Vol 6, No 5: October 2016 Vol 6, No 4: August 2016 Vol 6, No 3: June 2016 Vol 6, No 2: April 2016 Vol 6, No 1: February 2016 Vol 5, No 6: December 2015 Vol 5, No 5: October 2015 Vol 5, No 4: August 2015 Vol 5, No 3: June 2015 Vol 5, No 2: April 2015 Vol 5, No 1: February 2015 Vol 4, No 6: December 2014 Vol 4, No 5: October 2014 Vol 4, No 4: August 2014 Vol 4, No 3: June 2014 Vol 4, No 2: April 2014 Vol 4, No 1: February 2014 Vol 3, No 6: December 2013 Vol 3, No 5: October 2013 Vol 3, No 4: August 2013 Vol 3, No 3: June 2013 Vol 3, No 2: April 2013 Vol 3, No 1: February 2013 Vol 2, No 6: December 2012 Vol 2, No 5: October 2012 Vol 2, No 4: August 2012 Vol 2, No 3: June 2012 Vol 2, No 2: April 2012 Vol 2, No 1: February 2012 Vol 1, No 2: December 2011 Vol 1, No 1: September 2011 More Issue