cover
Contact Name
Tole Sutikno
Contact Email
ijece@iaesjournal.com
Phone
-
Journal Mail Official
ijece@iaesjournal.com
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
International Journal of Electrical and Computer Engineering
ISSN : 20888708     EISSN : 27222578     DOI : -
International Journal of Electrical and Computer Engineering (IJECE, ISSN: 2088-8708, a SCOPUS indexed Journal, SNIP: 1.001; SJR: 0.296; CiteScore: 0.99; SJR & CiteScore Q2 on both of the Electrical & Electronics Engineering, and Computer Science) is the official publication of the Institute of Advanced Engineering and Science (IAES). The journal is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication and computer engineering from the global world.
Articles 6,301 Documents
Lung sound classification using multiresolution Higuchi fractal dimension measurement Achmad Rizal; Risanuri Hidayat; Hanung Adi Nugroho; Willy Anugrah Cahyadi
International Journal of Electrical and Computer Engineering (IJECE) Vol 13, No 5: October 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v13i5.pp5091-5100

Abstract

Lung sound is one indicator of abnormalities in the lungs and respiratory tract. Research for automatic lung sound classification has become one of the interests for researchers because lung disease is one of the diseases with the most sufferers in the world. The use of lung sounds as a source of information because of the ease in data acquisition and auscultation is a standard method in examining pulmonary function. This study simulated the potential use of Higuchi fractal dimension (HFD) as a feature extraction method for lung sound classification. HFD calculations were run on a series of k values to generate some HFD values as features. According to the simulation results, the proposed method could produce an accuracy of up to 97.98% for five classes of lung sound data. The results also suggested that the shift in HFD values over the selection of a time interval k can be used for lung sound classification.
BaAl1.4Si0.6O3.4N0.6:Eu2+ green phosphors’ application for improving luminous performance My Hanh Nguyen Thi; Nguyen Le Thai; Thuc Minh Bui; Tam Nguyen Kieu
International Journal of Electrical and Computer Engineering (IJECE) Vol 13, No 5: October 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v13i5.pp4958-4965

Abstract

The molten salt synthesis (MSS) method was used to effectively prepare green phosphors BaAl1.4Si0.6O3.4N0.6:Eu2+ (or BSON:Eu2+) via one homogeneous sphere-like morphology utilizing NaNO3 in the form of the reacting agent. The phosphors produced one wide stimulation spectrum between 250 and 460 nm, as well as a significant green emission has a maximum point at 510 nm owing to the 4f65d1-4f7 (8S7/2) shifts for Eu2+ ions. With illumination under 365 as well as 450 nm, the ideal discharge strengths for the specimen prepared utilizing melted salt would receive a boost of 17% and 13%, surpassing the specimen prepared utilizing the traditional solid-state reaction (SSR) approach. The abatement of concentration for the ions of Eu2+ from BSON:Eu2+ is 5 mol%. In addition, the interactivity of dipole-dipole would be the cause of said abatement. Heat abatement would be studied utilizing the formation coordinate method with abatement temperature reaching ∼200 oC. Elemental mapping as well as power-dispersing X-ray spectroscopy (EDS) spectra demonstrated that the expected BaAl1.4Si0.6O3.4N0.6:Eu2+ materials were formed.
Multi-objective distributed generation integration in radial distribution system using modified neural network algorithm Ali Tarraq; Faissal El Mariami; Abdelaziz Belfqih
International Journal of Electrical and Computer Engineering (IJECE) Vol 13, No 5: October 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v13i5.pp4810-4823

Abstract

This paper introduces a new approach based on a chaotic strategy and a neural network algorithm (NNA), called chaotic-based NNA (CNNA), to solve the optimal distributed generation allocation (ODGA), in the radial distribution system (RDS). This consists of determining the optimal locations and sizes of one or several distributed generations (DGs) to be inserted into the RDS to minimize one or multiple objectives while meeting a set of security limits. The robustness of the proposed method is demonstrated by applying it to two different typical RDSs, namely IEEE 33-bus and 69-bus. In this regard, simulations are performed for three DGs in the cases of unity power factor (UPF) and optimal power factor (OPF), considering single and multi-objective optimization, by minimizing the total active losses and improving the voltage profile, voltage deviation (VD) and voltage stability index (VSI). Compared to its original version and recently reported methods, the CNNA solutions are more competitive without increasing the complexity of the optimization algorithm, especially when the RDS size and problem dimension are extended.
High rejection self-oscillating up-conversion mixer for fifth-generation communications Abdelhafid Es-saqy; Maryam Abata; Mohammed Fattah; Said Mazer; Mahmoud Mehdi; Moulhime El Bekkali; Catherine Algani
International Journal of Electrical and Computer Engineering (IJECE) Vol 13, No 5: October 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v13i5.pp4979-4986

Abstract

This paper presents the design of a pseudomorphic high electron mobility transistor (pHEMT) self-oscillating mixer (SOM) for millimeter wave wireless communication systems. The 180° out-of-phase technique is chosen to both improve the desired lower sideband (LSB) signal and to achieve a satisfactory rejection of the unwanted signals (LO, USB and IF). This SOM is designed on the PH15 process of UMS foundry which is based on 0.15 µm GaAs pHEMT. The signal is up-converted from 2 GHz-IF frequency to 26 GHz-LSB frequency, using an autogenerated 28 GHz-LO signal. Simulations were performed using the advanced design system (ADS) workflow. They show 6.4 dB conversion gain and a signal rejection rate of 29.7 dB for the unwanted USB signal. the chip size is 3.6 mm2.
Software defined fog platform Sepideh Sheikhi Nejad; Ahmad Khademzadeh; Amir masoud Rahmani; Ali Broumandnia
International Journal of Electrical and Computer Engineering (IJECE) Vol 13, No 5: October 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v13i5.pp5454-5461

Abstract

In recent years, the number of end users connected to the internet of things (IoT) has increased, and we have witnessed the emergence of the cloud computing paradigm. These users utilize network resources to meet their quality of service (QoS) requirements, but traditional networks are not configured to backing maximum of scalability, real-time data transfer, and dynamism, resulting in numerous challenges. This research presents a new platform of IoT architecture that adds the benefits of two new technologies: software-defined networking and fog paradigm. Software-defined networking (SDN) refers to a centralized control layer of the network that enables sophisticated methods for traffic control and resource allocation. So, fog paradigm allows for data to be analyzed and managed at the edge of the network, making it suitable for tasks that require low and predictable delay. Thus, this research provides an in-depth view of the platform organize and performance of its base ingredients, as well as the potential uses of the suggested platform in various applications.
Analysis and prediction of seed quality using machine learning Raghavendra Srinivasaiah; Meenakshi Meenakshi; Ravikumar Hodikehosalli Chennegowda; Santosh Kumar Jankatti
International Journal of Electrical and Computer Engineering (IJECE) Vol 13, No 5: October 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v13i5.pp5770-5781

Abstract

The mainstay of the economy has always been agriculture, and the majority of tasks are still carried out without the use of modern technology. Currently, the ability of human intelligence to forecast seed quality is used. Because it lacks a validation method, the existing seed prediction analysis is ineffective. Here, we have tried to create a prediction model that uses machine learning algorithms to forecast seed quality, leading to high crop yield and high-quality harvests. For precise seed categorization, this model was created using convolutional neural networks and trained using the seed dataset. Using data that can be used to forecast the future, this model is used to learn about whether the seeds are of premium quality, standard quality, or regular quality. While testing data are employed in the algorithm’s predictive analytics, training data and validation data are used for categorization reasons. Thus, by examining the training accuracy of the convolution neural network (CNN) model and the prediction accuracy of the algorithm, the project’s primary goal is to develop the best method for the more accurate prediction of seed quality.
Automatic optical inspection for detecting keycaps misplacement using Tesseract optical character recognition Anisatul Munawaroh; Eko Rudiawan Jamzuri
International Journal of Electrical and Computer Engineering (IJECE) Vol 13, No 5: October 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v13i5.pp5147-5155

Abstract

This research study aims to develop automatic optical inspection (AOI) for detecting keycaps misplacement on the keyboard. The AOI hardware has been designed using an industrial camera with an additional mechanical jig and lighting system. Optical character recognition (OCR) using the Tesseract OCR engine is the proposed method to detect keycaps misplacement. In addition, captured images were cropped using a predefined region of interest (ROI) during the setup. Subsequently, the cropped ROIs were processed to acquire binary images. Furthermore, Tesseract processed these binary images to recognize the text on the keycaps. Keycaps misplacement could be identified by comparing the predicted text with the actual text on the golden sample. Experiments on 25 defects and 25 non-defected samples provided a classification accuracy of 97.34%, a precision of 100%, and a recall of 90.70%. Meanwhile, the character error rate (CER) obtained from the test on a total of 57 characters provided a performance of 10.53%. This outcome has implications for developing AOI for various keyboard products. In addition, the precision level of 100% signifies that the proposed method always offers correct results in detecting product defects. Such outcomes are critical in industrial applications to prevent defective products from circulating in the market.
Machine and deep learning techniques for detecting internet protocol version six attacks: a review Arkan Hammoodi Hasan Kabla; Mohammed Anbar; Shady Hamouda; Abdullah Ahmed Bahashwan; Taief Alaa Al-Amiedy; Iznan Husainy Hasbullah; Serri Faisal
International Journal of Electrical and Computer Engineering (IJECE) Vol 13, No 5: October 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v13i5.pp5617-5631

Abstract

The rapid development of information and communication technologies has increased the demand for internet-facing devices that require publicly accessible internet protocol (IP) addresses, resulting in the depletion of internet protocol version 4 (IPv4) address space. As a result, internet protocol version 6 (IPv6) was designed to address this issue. However, IPv6 is still not widely used because of security concerns. An intrusion detection system (IDS) is one example of a security mechanism used to secure networks. Lately, the use of machine learning (ML) or deep learning (DL) detection models in IDSs is gaining popularity due to their ability to detect threats on IPv6 networks accurately. However, there is an apparent lack of studies that review ML and DL in IDS. Even the existing reviews of ML and DL fail to compare those techniques. Thus, this paper comprehensively elucidates ML and DL techniques and IPv6-based distributed denial of service (DDoS) attacks. Additionally, this paper includes a qualitative comparison with other related works. Moreover, this work also thoroughly reviews the existing ML and DL-based IDSs for detecting IPv6 and IPv4 attacks. Lastly, researchers could use this review as a guide in the future to improve their work on DL and ML-based IDS.
Performance analysis of perturbation-based privacy preserving techniques: an experimental perspective Ritu Ratra; Preeti Gulia; Nasib Singh Gill
International Journal of Electrical and Computer Engineering (IJECE) Vol 13, No 5: October 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v13i5.pp5273-5281

Abstract

Nowadays, enormous amounts of data are produced every second. These data also contain private information from sources including media platforms, the banking sector, finance, healthcare, and criminal histories. Data mining is a method for looking through and analyzing massive volumes of data to find usable information. Preserving personal data during data mining has become difficult, thus privacy-preserving data mining (PPDM) is used to do so. Data perturbation is one of the several tactics used by the PPDM data privacy protection mechanism. In perturbation, datasets are perturbed in order to preserve personal information. Both data accuracy and data privacy are addressed by it. This paper will explore and compare several hybrid perturbation strategies that may be used to protect data privacy. For this, two perturbation-based techniques named improved random projection perturbation (IRPP) and enhanced principal component analysis-based technique (EPCAT) were used. These methods are employed to assess the precision, run time, and accuracy of the experimental results. This paper provides the impacts of perturbation-based privacy preserving techniques. It is observed that hybrid approaches are more efficient than the traditional approach.
Development of an intelligent information resource model based on modern natural language processing methods Zhanna Sadirmekova; Madina Sambetbayeva; Sandugash Serikbayeva; Gauhar Borankulova; Aigerim Yerimbetova; Aslanbek Murzakhmetov
International Journal of Electrical and Computer Engineering (IJECE) Vol 13, No 5: October 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v13i5.pp5314-5332

Abstract

Currently, there is an avalanche-like increase in the need for automatic text processing, respectively, new effective methods and tools for processing texts in natural language are emerging. Although these methods, tools and resources are mostly presented on the internet, many of them remain inaccessible to developers, since they are not systematized, distributed in various directories or on separate sites of both humanitarian and technical orientation. All this greatly complicates their search and practical use in conducting research in computational linguistics and developing applied systems for natural text processing. This paper is aimed at solving the need described above. The paper goal is to develop model of an intelligent information resource based on modern methods of natural language processing (IIR NLP). The main goal of IIR NLP is to render convenient valuable access for specialists in the field of computational linguistics. The originality of our proposed approach is that the developed ontology of the subject area “NLP” will be used to systematize all the above knowledge, data, information resources and organize meaningful access to them, and semantic web standards and technology tools will be used as a software basis.

Filter by Year

2011 2026


Filter By Issues
All Issue Vol 16, No 1: February 2026 Vol 15, No 6: December 2025 Vol 15, No 5: October 2025 Vol 15, No 4: August 2025 Vol 15, No 3: June 2025 Vol 15, No 2: April 2025 Vol 15, No 1: February 2025 Vol 14, No 6: December 2024 Vol 14, No 5: October 2024 Vol 14, No 4: August 2024 Vol 14, No 3: June 2024 Vol 14, No 2: April 2024 Vol 14, No 1: February 2024 Vol 13, No 6: December 2023 Vol 13, No 5: October 2023 Vol 13, No 4: August 2023 Vol 13, No 3: June 2023 Vol 13, No 2: April 2023 Vol 13, No 1: February 2023 Vol 12, No 6: December 2022 Vol 12, No 5: October 2022 Vol 12, No 4: August 2022 Vol 12, No 3: June 2022 Vol 12, No 2: April 2022 Vol 12, No 1: February 2022 Vol 11, No 6: December 2021 Vol 11, No 5: October 2021 Vol 11, No 4: August 2021 Vol 11, No 3: June 2021 Vol 11, No 2: April 2021 Vol 11, No 1: February 2021 Vol 10, No 6: December 2020 Vol 10, No 5: October 2020 Vol 10, No 4: August 2020 Vol 10, No 3: June 2020 Vol 10, No 2: April 2020 Vol 10, No 1: February 2020 Vol 9, No 6: December 2019 Vol 9, No 5: October 2019 Vol 9, No 4: August 2019 Vol 9, No 3: June 2019 Vol 9, No 2: April 2019 Vol 9, No 1: February 2019 Vol 8, No 6: December 2018 Vol 8, No 5: October 2018 Vol 8, No 4: August 2018 Vol 8, No 3: June 2018 Vol 8, No 2: April 2018 Vol 8, No 1: February 2018 Vol 7, No 6: December 2017 Vol 7, No 5: October 2017 Vol 7, No 4: August 2017 Vol 7, No 3: June 2017 Vol 7, No 2: April 2017 Vol 7, No 1: February 2017 Vol 6, No 6: December 2016 Vol 6, No 5: October 2016 Vol 6, No 4: August 2016 Vol 6, No 3: June 2016 Vol 6, No 2: April 2016 Vol 6, No 1: February 2016 Vol 5, No 6: December 2015 Vol 5, No 5: October 2015 Vol 5, No 4: August 2015 Vol 5, No 3: June 2015 Vol 5, No 2: April 2015 Vol 5, No 1: February 2015 Vol 4, No 6: December 2014 Vol 4, No 5: October 2014 Vol 4, No 4: August 2014 Vol 4, No 3: June 2014 Vol 4, No 2: April 2014 Vol 4, No 1: February 2014 Vol 3, No 6: December 2013 Vol 3, No 5: October 2013 Vol 3, No 4: August 2013 Vol 3, No 3: June 2013 Vol 3, No 2: April 2013 Vol 3, No 1: February 2013 Vol 2, No 6: December 2012 Vol 2, No 5: October 2012 Vol 2, No 4: August 2012 Vol 2, No 3: June 2012 Vol 2, No 2: April 2012 Vol 2, No 1: February 2012 Vol 1, No 2: December 2011 Vol 1, No 1: September 2011 More Issue