cover
Contact Name
Tole Sutikno
Contact Email
ijece@iaesjournal.com
Phone
-
Journal Mail Official
ijece@iaesjournal.com
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
International Journal of Electrical and Computer Engineering
ISSN : 20888708     EISSN : 27222578     DOI : -
International Journal of Electrical and Computer Engineering (IJECE, ISSN: 2088-8708, a SCOPUS indexed Journal, SNIP: 1.001; SJR: 0.296; CiteScore: 0.99; SJR & CiteScore Q2 on both of the Electrical & Electronics Engineering, and Computer Science) is the official publication of the Institute of Advanced Engineering and Science (IAES). The journal is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication and computer engineering from the global world.
Articles 6,301 Documents
Techniques for predicting dark web events focused on the delivery of illicit products and ordered crime Romil Rawat; Olukayode Ayodele Oki; Sakthidasan Sankaran; Hector Florez; Sunday Adeola Ajagbe
International Journal of Electrical and Computer Engineering (IJECE) Vol 13, No 5: October 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v13i5.pp5354-5365

Abstract

Malicious actors, specially trained professionals operating anonymously on the dark web (DW) platform to conduct cyber fraud, illegal drug supply, online kidnapping orders, CryptoLocker induction, contract hacking, terrorist recruitment portals on the online social network (OSN) platform, and financing are always a possibility in the hyperspace. The amount and variety of unlawful actions are increasing, which has prompted law enforcement (LE) agencies to develop efficient prevention tactics. In the current atmosphere of rapidly expanding cybercrime, conventional crime-solving methods are unable to produce results due to their slowness and inefficiency. The methods for accurately predicting crime before it happens "automated machine" to help police officers ease the burden on personnel while also assisting in preventing offense. To achieve and explain the results of a few cases in which such approaches were applied, we advise combining machine learning (ML) with computer vision (CV) strategies. This study's objective is to present dark web crime statistics and a forecasting model for generating alerts of illegal operations like drug supply, people smuggling, terrorist staffing and radicalization, and deceitful activities that are connected to gangs or organizations showing online presence using ML and CV to help law enforcement organizations identify, and accumulate proactive tactics for solving crimes.
A deep reinforcement learning strategy for autonomous robot flocking Fredy Martinez; Holman Montiel; Luis Wanumen
International Journal of Electrical and Computer Engineering (IJECE) Vol 13, No 5: October 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v13i5.pp5707-5716

Abstract

Social behaviors in animals such as bees, ants, and birds have shown high levels of intelligence from a multi-agent system perspective. They present viable solutions to real-world problems, particularly in navigating constrained environments with simple robotic platforms. Among these behaviors is swarm flocking, which has been extensively studied for this purpose. Flocking algorithms have been developed from basic behavioral rules, which often require parameter tuning for specific applications. However, the lack of a general formulation for tuning has made these strategies difficult to implement in various real conditions, and even to replicate laboratory behaviors. In this paper, we propose a flocking scheme for small autonomous robots that can self-learn in dynamic environments, derived from a deep reinforcement learning process. Our approach achieves flocking independently of population size and environmental characteristics, with minimal external intervention. Our multi-agent system model considers each agent’s action as a linear function dynamically adjusting the motion according to interactions with other agents and the environment. Our strategy is an important contribution toward real-world flocking implementation. We demonstrate that our approach allows for autonomous flocking in the system without requiring specific parameter tuning, making it ideal for applications where there is a need for simple robotic platforms to navigate in dynamic environments.
Visual and melanopic performance of a tropical daylight-mimicking lighting: a case study in Thailand Somyod Santimalai; Thavatchai Tayjasanant
International Journal of Electrical and Computer Engineering (IJECE) Vol 13, No 5: October 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v13i5.pp4886-4900

Abstract

This paper designed and developed a tropical daylight-mimicking lighting system based on photometric, radiometric, and International Commission on Illumination (CIE) standard melanopic performances from natural lighting cycles in Thailand. Spectral power distribution (SPD) during daylight in summer and winter were recorded to create a dynamic artificial lighting system that best matches the natural daylight characteristics. Two set-ups light emitting diode (LED) (LED-A and LED-B) were screened, developed, validated, and compared with different chromaticity layouts of the correlated color temperatures (CCTs) allocated on Planckian locus and later converted to x-y co-ordinates in a chromaticity diagram. Based on CCT and Duv deviations between two developed setups, LED-A could mimick circadian points on the chromaticity diagram better than LED-B did. CCT and Duv values of LED-A (dCCT=3.75% and dDuv=17.36%) can match closer to the daylight than those of LED-B (dCCT=5.0% and dDuv=56.84%). For CIE-standard melanopic performances (melanopic efficacy of luminous radiation (mELR), melanopic equivalent daylight (D65) illuminance (mEDI) and melanopic daylight efficacy ratio (mDER)), LED-A is suitable to use indoor with averages of 1.16 W×lm-1, 236 lx and 0.84, respectively, while LED-B is good to use outdoor with averages of 1.53 W×lm-1, 266 lx and 1.06, respectively. The proposed design can be used as a guideline to establish a daylight-mimicking LED lighting system from actual measurement data.
Optimal tuning proportional integral derivative controller on direct current motor using reptile search algorithm Widi Aribowo; Bambang Suprianto; Unit Three Kartini; Ayusta Lukita Wardani
International Journal of Electrical and Computer Engineering (IJECE) Vol 13, No 5: October 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v13i5.pp4901-4908

Abstract

This paper presents the reptile search algorithm (RSA) method to optimize the proportional integral derivative (PID) parameters on direct current (DC) motors. RSA was adopted from crocodile hunting behavior. Crocodile behavior is modeled in two important steps: surrounding and attacking prey. The RSA method was applied using twenty-three classical test functions. The search method of the proposed RSA method with other existing algorithms such as particle swarm optimization (PSO), and differential evolution (DE). Integral multiplied by absolute error (ITAE) and integral of time multiplied squared error (ITSE) were used as comparisons in measuring the performance of the RSA method. The results show that the proposed method, namely RSA, has better efficiency. Optimization of PID parameters with RSA on DC motor control shows superior performance. From the experiment, the ITSE average value of the RSA method is 4.17% better than the conventional PID method.
Analysis of the learning object-oriented programming factors Qais Ali Batiha; Nazatul Aini Abd Majid; Noraidah Sahari; Noorazean Mohd Ali
International Journal of Electrical and Computer Engineering (IJECE) Vol 13, No 5: October 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v13i5.pp5599-5606

Abstract

Students often feel overwhelmed by object-oriented programming courses. They find it difficult and complex to learn, requiring a high cognitive load to use the concepts in coding. These issues lead to demotivation in learning programming. This research aims to identify and verify factors that contribute to learning object-oriented programming from two perspectives: interviews and surveys. A literature review was conducted to identify these factors, followed by interviews with five experts who have been teaching object-oriented programming for over ten years to confirm them. Based on the interview results, a questionnaire was developed and administered to 31 bachelor students and 19 lecturers with master’s or doctorate degrees in computer science. The responses indicated that the identified factors were acceptable, with scores ranging from 3.74 to 4.65. The outcomes of this study are a set of factors that should be considered in a programming environment to improve the teaching and learning of object-oriented programming and make it more accessible and engaging for students.
Fuzzy logic-based controller of the bidirectional direct current to direct current converter in microgrid Younes Boujoudar; Mohamed Azeroual; Lahcen Eliysaouy; Fatima Zahra Bassine; Aiman J. Albarakati; Ayman Aljarbouh; Alexey Knyazkov; Hassan El Moussaoui; Tijani Lamhamdi
International Journal of Electrical and Computer Engineering (IJECE) Vol 13, No 5: October 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v13i5.pp4789-4797

Abstract

Microgrids are small-scale power networks that include renewable energy sources, load, energy storage systems, and energy management systems (EMS). Lithium-ion batteries are the most used battery for energy storage in microgrids due to their advantages over other types of batteries. However, to protect the battery from the explosion and to manage to charge and discharge based on state-of-charge (SoC) value, this type of battery requires the use of an energy management system. The main objective of this paper is to propose an intelligent control strategy for energy management in the microgrid to control the charge and discharge of Li-ion batteries to stabilize the system and reduce the cost of electricity due to the high cost of grid electricity. The proposed technique is based on a fuzzy logic controller (FLC) for voltage control. The FLC is based on the measured voltage of the direct current (DC) bus and the fixed reference voltage to generate buck/boost converter signal control. The proposed technique has been simulated and tested using MATLAB/Simulink software which illustrates the tracking of desired power and DC bus voltage regulation. The simulation results confirm that the proposed systems can diminish the deviations of the system's voltage.
Web server load prediction and anomaly detection from hypertext transfer protocol logs Lenka Benova; Ladislav Hudec
International Journal of Electrical and Computer Engineering (IJECE) Vol 13, No 5: October 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v13i5.pp5165-5178

Abstract

As network traffic increases and new intrusions occur, anomaly detection solutions based on machine learning are necessary to detect previously unknown intrusion patterns. Most of the developed models require a labelled dataset, which can be challenging owing to a shortage of publicly available datasets. These datasets are often too small to effectively train machine learning models, which further motivates the use of real unlabeled traffic. By using real traffic, it is possible to more accurately simulate the types of anomalies that might occur in a real-world network and improve the performance of the detection model. We present a method able to predict and categorize anomalies without the aid of a labelled dataset, demonstrating the model’s usability while also gathering a dataset from real noisy network traffic. The proposed long short-term memory (LTSM) based intrusion detection system was tested in a real-world setting of an antivirus company and was successful in detecting various intrusions using 5-minute windowing over both the predicted and real update curves thereby demonstrating its usefulness. Our contribution was the development of a robust model generally applicable to any hypertext transfer protocol (HTTP) traffic with almost real-time anomaly detection, while also outperforming earlier studies in terms of prediction accuracy.
Comparative study of proactive and reactive routing protocols in vehicular ad-hoc network Oussama Sbayti; Khalid Housni; Moulay Hicham Hanin; Adil El Makrani
International Journal of Electrical and Computer Engineering (IJECE) Vol 13, No 5: October 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v13i5.pp5374-5387

Abstract

In recent years, the vehicular ad-hoc network (VANET), which is an ad-hoc network used by connected autonomous vehicles (CAV) for information processing, has attracted the interest of researchers in order to meet the needs created by the accelerating development of autonomous vehicle technology. The enormous amount of information and the high speed of the vehicles require us to have a very reliable communication protocol. The objective of this paper is to determine a topology-based routing protocol that improves network performance and guarantees information traffic over VANET. This comparative study was carried out using the simulation of urban mobility (SUMO) and network simulator (NS-3). Through the results obtained, we will show that the choice of the type of protocol to use depends on the size of the network and also on the metrics to be optimized.
Fifth-generation small cell backhaul capacity enhancement and large-scale parameter effect Olabode Idowu-Bismark; Francis Idachaba; Aderemi A. Atayero
International Journal of Electrical and Computer Engineering (IJECE) Vol 13, No 5: October 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v13i5.pp5198-5208

Abstract

The proliferation of handheld devices has continued to push the demand for higher data rates. Network providers will use small cells as an overlay to macrocell in fifth-generation (5G) for network capacity enhancement. The current cellular wireless backhauls suffer from the problem of insufficient backhaul capacity to cater to the new small cell deployment scenarios. Using the 3D digital map of Lagos Island in the Wireless InSite, small cells are deployed on a street canyon and in high-rise scenarios to simulate the backhaul links to the small cells at 28 GHz center frequency and 100 MHz bandwidth. Using a user-defined signal to interference plus noise ratio-throughput (SINR-throughput) table based on an adaptive modulation and coding scheme (MCS), the throughput values were generated based on the equation specified by 3GPP TS 38.306 V15.2.0 0, which estimates the peak data rate based on the modulation order and coding rate for each data stream calculated by the propagation model. Finding shows achieved channel capacity is comparable with gigabit passive optical networks (GPON) used in fiber to the ‘X’ (FTTX) for backhauling small cells. The effect of channel parameters such as root mean squared (RMS) delay spread and RMS angular spread on channel capacity are also investigated and explained.
PithaNet: a transfer learning-based approach for traditional pitha classification Shahriar Shakil; Atik Asif Khan Akash; Nusrat Nabi; Mahmudul Hassan; Aminul Haque
International Journal of Electrical and Computer Engineering (IJECE) Vol 13, No 5: October 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v13i5.pp5431-5443

Abstract

Pitha, pithe, or peetha are all Bangla words referring to a native and traditional food of Bangladesh as well as some areas of India, especially the parts of India where Bangla is the primary language. Numerous types of pithas exist in the culture and heritage of the Bengali and Bangladeshi people. Pithas are traditionally prepared and offered on important occasions in Bangladesh, such as welcoming a bride grooms, or bride, entertaining guests, or planning a special gathering of family, relatives, or friends. The traditional pitha celebration and pitha culture are no longer widely practiced in modern civilization. Consequently, the younger generation is unfamiliar with our traditional pitha culture. In this study, an effective pitha image classification system is introduced. convolutional neural network (CNN) pre-trained models EfficientNetB6, ResNet50, and VGG16 are used to classify the images of pitha. The dataset of traditional popular pithas is collected from different parts of Bangladesh. In this experiment, EfficientNetB6 and ResNet50 show nearly 90% accuracy. The best classification result was obtained using VGG16 with 92% accuracy. The main motive of this study is to revive the Bengali pitha tradition among young people and people worldwide, which will encourage many other researchers to pursue research in this domain.

Filter by Year

2011 2026


Filter By Issues
All Issue Vol 16, No 1: February 2026 Vol 15, No 6: December 2025 Vol 15, No 5: October 2025 Vol 15, No 4: August 2025 Vol 15, No 3: June 2025 Vol 15, No 2: April 2025 Vol 15, No 1: February 2025 Vol 14, No 6: December 2024 Vol 14, No 5: October 2024 Vol 14, No 4: August 2024 Vol 14, No 3: June 2024 Vol 14, No 2: April 2024 Vol 14, No 1: February 2024 Vol 13, No 6: December 2023 Vol 13, No 5: October 2023 Vol 13, No 4: August 2023 Vol 13, No 3: June 2023 Vol 13, No 2: April 2023 Vol 13, No 1: February 2023 Vol 12, No 6: December 2022 Vol 12, No 5: October 2022 Vol 12, No 4: August 2022 Vol 12, No 3: June 2022 Vol 12, No 2: April 2022 Vol 12, No 1: February 2022 Vol 11, No 6: December 2021 Vol 11, No 5: October 2021 Vol 11, No 4: August 2021 Vol 11, No 3: June 2021 Vol 11, No 2: April 2021 Vol 11, No 1: February 2021 Vol 10, No 6: December 2020 Vol 10, No 5: October 2020 Vol 10, No 4: August 2020 Vol 10, No 3: June 2020 Vol 10, No 2: April 2020 Vol 10, No 1: February 2020 Vol 9, No 6: December 2019 Vol 9, No 5: October 2019 Vol 9, No 4: August 2019 Vol 9, No 3: June 2019 Vol 9, No 2: April 2019 Vol 9, No 1: February 2019 Vol 8, No 6: December 2018 Vol 8, No 5: October 2018 Vol 8, No 4: August 2018 Vol 8, No 3: June 2018 Vol 8, No 2: April 2018 Vol 8, No 1: February 2018 Vol 7, No 6: December 2017 Vol 7, No 5: October 2017 Vol 7, No 4: August 2017 Vol 7, No 3: June 2017 Vol 7, No 2: April 2017 Vol 7, No 1: February 2017 Vol 6, No 6: December 2016 Vol 6, No 5: October 2016 Vol 6, No 4: August 2016 Vol 6, No 3: June 2016 Vol 6, No 2: April 2016 Vol 6, No 1: February 2016 Vol 5, No 6: December 2015 Vol 5, No 5: October 2015 Vol 5, No 4: August 2015 Vol 5, No 3: June 2015 Vol 5, No 2: April 2015 Vol 5, No 1: February 2015 Vol 4, No 6: December 2014 Vol 4, No 5: October 2014 Vol 4, No 4: August 2014 Vol 4, No 3: June 2014 Vol 4, No 2: April 2014 Vol 4, No 1: February 2014 Vol 3, No 6: December 2013 Vol 3, No 5: October 2013 Vol 3, No 4: August 2013 Vol 3, No 3: June 2013 Vol 3, No 2: April 2013 Vol 3, No 1: February 2013 Vol 2, No 6: December 2012 Vol 2, No 5: October 2012 Vol 2, No 4: August 2012 Vol 2, No 3: June 2012 Vol 2, No 2: April 2012 Vol 2, No 1: February 2012 Vol 1, No 2: December 2011 Vol 1, No 1: September 2011 More Issue