cover
Contact Name
Tole Sutikno
Contact Email
ijece@iaesjournal.com
Phone
-
Journal Mail Official
ijece@iaesjournal.com
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
International Journal of Electrical and Computer Engineering
ISSN : 20888708     EISSN : 27222578     DOI : -
International Journal of Electrical and Computer Engineering (IJECE, ISSN: 2088-8708, a SCOPUS indexed Journal, SNIP: 1.001; SJR: 0.296; CiteScore: 0.99; SJR & CiteScore Q2 on both of the Electrical & Electronics Engineering, and Computer Science) is the official publication of the Institute of Advanced Engineering and Science (IAES). The journal is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication and computer engineering from the global world.
Articles 6,301 Documents
Exploring the research trends and development of augmented reality and virtual reality in ASEAN countries: a bibliometric study Hariyanto, Didik; Rafiq, Arif Ainur; Gunawan, Teddy Surya; Quynh, Nguyen Vu
International Journal of Electrical and Computer Engineering (IJECE) Vol 14, No 4: August 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v14i4.pp4430-4444

Abstract

This review of Association of Southeast Asian Nations (ASEAN) augmented reality (AR) and virtual reality (VR) studies uses bibliometric analysis and VOSviewer mapping. This study looks at an extensive set of Scopus articles from reliable sources to determine who contributes to ASEAN AR and VR research, the themes, how people work together, and how people cite each other. A study of bibliographies shows that the number of ASEAN AR and VR research articles has grown significantly since 2010. It also talks about important ASEAN study institutions, authors, and countries. The study themes are shown visually on VOSviewer mapping, showing how AR and VR can be used in healthcare, travel, gaming, and business. Co-authorship and reference networks shed light on how people work together on research projects and how ideas move within and outside of ASEAN. This organized review of ASEAN AR and VR research helps researchers, policymakers, and business stakeholders understand the current situation, find research gaps, and work together. The results can change research, resource use, and policy changes to encourage the growth and use of AR and VR technologies in ASEAN. It can lead to more innovation, economic development, and positive social effects.
Association rules forecasting for the foreign exchange market El Mahjouby, Mohamed; bennani, Mohamed Taj; Lamrini, Mohamed; El Far, Mohamed
International Journal of Electrical and Computer Engineering (IJECE) Vol 14, No 3: June 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v14i3.pp3443-3454

Abstract

Several association rule mining algorithms exist, and among them, Apriori is one of the most commonly used methods for extracting frequent item sets from vast databases and generating association rules to gain insights. In this research, we have applied a data mining technique to implement association rules and explore frequent item sets. Our study introduced a model that employs association rules to uncover associations between the foreign exchange market, the gold commodity, and the National Association of Securities Dealers automated quotations (NASDAQ). We suggested a method that used data mining to identify the good points of buying and selling in the foreign exchange market by utilizing technical indicators such as moving average convergence divergence (MACD) and the stochastic indicator to create association rules. The experimental findings indicate that the proposed model successfully generates strong association rules.
A novel secured open standard framework for internet of things applications integrating elliptic curve cryptography and fog computing Ravindra, Krishnapura Srinivasa; Rao, Malode Vishwanatha Panduranga
International Journal of Electrical and Computer Engineering (IJECE) Vol 14, No 6: December 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v14i6.pp7224-7235

Abstract

The internet of things (IoT) has revolutionized various fields by enabling seamless connectivity and data exchange among numerous devices. However, this interconnectivity introduces significant security challenges, particularly in ensuring data confidentiality, integrity, and authenticity. This study proposes a novel secure open standard framework for IoT applications, addressing these challenges through the integration of elliptic curve cryptography (ECC) and fog computing. The framework consists of three core components: secure device registration, data encryption within the fog gateway, and a robust mechanism for detecting man-in-the-middle (MITM) attacks. The unique aspect of the proposed method lies in its comprehensive approach to IoT security. Utilizing ECC, the framework ensures secure communication among resource constrained IoT devices, balancing encryption strength and efficiency. The integration of fog computing reduces latency and enhances processing efficiency by offloading intensive tasks from IoT devices to the fog layer. The MITM attack detection mechanism continuously monitors cryptographic keys and communication patterns, providing an additional layer of security against advanced cyber threats. The system was implemented and evaluated using the NS-3.26 network simulator and Python for data visualization. The experimental setup included 100 IoT devices, 25 users, a fog gateway, a datacenter, and a cloud server. Results demonstrate the framework's scalability and efficiency, with consistent throughput increases and balanced power consumption across varying IoT device numbers.
System call frequency analysis-based generative adversarial network model for zero-day detection on mobile devices Chhaybi, Akram; Lazaar, Saiida
International Journal of Electrical and Computer Engineering (IJECE) Vol 14, No 2: April 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v14i2.pp1969-1978

Abstract

In today's digital age, mobile applications have become essential in connecting people from diverse domains. They play a crucial role in enabling communication, facilitating business transactions, and providing access to a range of services. Mobile communication is widespread due to its portability and ease of use, with an increasing number of mobile devices projected to reach 18.22 billion by the end of 2025. However, this convenience comes at a cost, as cybercriminals are constantly looking for ways to exploit security vulnerabilities in mobile applications. Among the several varieties of malicious applications, zero-day malware is particularly dangerous since it cannot be removed by antivirus software. To detect zero-day Android malware, this paper introduces a novel approach based on generative adversarial networks (GANs), which generates new frequencies of feature vectors from system calls. In the proposed approach, the generator is fed with a mixture of real samples and noise, and then trained to create new samples, while the discriminator model aims to classify these samples as either real or fake. We assess the performance of our model through different measures, including loss functions, the Frechet Inception distance, and the inception score evaluation metrics.
Biometric classification system for dorsal finger creases utilizing multi-block circular shift combination local binary pattern Riaz, Imran; Ali, Ahmad Nazri; Ibrahim, Haidi; Huqqani, Ilyas Ahmad
International Journal of Electrical and Computer Engineering (IJECE) Vol 14, No 5: October 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v14i5.pp5234-5243

Abstract

In recent years, there has been a growing interest in biometric recognition based on finger dorsal patterns, making it a significant area of research. This paper introduces a biometric classification system that utilizes dorsal finger middle creases. The viability of this trait is assessed through the implementation of a new method known as multi block circular shift combination local binary pattern (MBCSC-LBP). The MBCSC-LBP approach involves dividing the image into multiple blocks to enhance robustness and capture both local and global information, thereby extracting discriminative features. These features from each block are then concatenated to form a comprehensive feature vector. To evaluate the accuracy of the proposed MBCSC-LBP feature extractor, a support vector machine (SVM) with a linear kernel is utilized. The classification accuracy achieved by this method is 96.22% indicating a promising performance.
Optimal load management of autonomous power systems in conditions of water shortage Rahimov, Firdavs; Kirgizov, Alifbek; Safaraliev, Murodbek; Zicmane, Inga; Sergeev, Nikita; Matrenin, Pavel
International Journal of Electrical and Computer Engineering (IJECE) Vol 14, No 1: February 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v14i1.pp99-109

Abstract

The issues of optimizing the operation of micro hydropower plants in conditions of water scarcity, performed by additional connection to the grid of an energy storage system and wind power turbine, as well as optimal load management, are considered. It is assumed that the load of the system is a concentrated autonomous power facility that consumes only active power. The paper presents a rigorous mathematical formulation of the problem, the solution of which corresponds to the minimum cost of an energy storage system and a wind turbine, which allows for uninterrupted supply of electricity to power facilities in conditions of water shortage necessary for the operation of micro hydropower plants (under unfavorable hydrological conditions). The problem is formulated as a nonlinear multi-objective optimization problem to apply metaheuristic stochastic algorithms. At the same time, a significant part of the problem is taken out and framed as a subproblem of linear programming which will make it possible to solve it by a deterministic simplex method that guarantees to find the exact global optimum. This approach will significantly increase the efficiency of solving the entire problem by combining metaheuristic algorithms and taking into account expert knowledge about the problem being solved.
Enhancing 5G network performance through effective resource management with network slicing Suganthi, Nagarajan; Narasimhan Ganesh, Enthrakandi; Guruva Reddy, Elangovan; Balakumar, Vijayaraman; Ilakkiya, Thangam; Varadarajan, Mageshkumar Naarayanasamy; Ramesh Babu, Venkatachalam
International Journal of Electrical and Computer Engineering (IJECE) Vol 14, No 4: August 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v14i4.pp4721-4731

Abstract

The immense growth of mobile networks leads to versatile applications and new demands. The improved concert, transferability, flexibility, and performance of innovative network services are applied in diversified fields. More unique networking concepts are incorporated into state-of-the-art mobile technologies to expand these dynamic features further. This paper presents a novel system architecture of slicing and pairing networks with intra-layer and inter-layer functionalities in 5th generation (5G) mobile networks. The radio access network layer slices and the core network layer slices are paired up using the network slicing pairing functionalities. The physical network elements of such network slices will be logically assigned entities called softwarization of the network. Such a novel system architecture called network sliced softwarization of 5G mobile networks (NSS-5G) has shown better performances in terms of end-to-end delay, total throughput, and resource utilization when compared to traditional mobile networks. Thus, effective resource management is achieved using NSS-5G. This study will pave the way for future softwarization of heterogeneous mobile applications.
Approach to automating the construction and completion of ontologies in a scientific subject field Sadirmekova, Zhanna; Murzakhmetov, Aslanbek; Abduvalova, Ainur; Altynbekova, Zhanar; Makhatova, Valentina; Akhmetzhanova, Shynar; Tasbolatuly, Nurbolat; Serikbayeva, Sandugash
International Journal of Electrical and Computer Engineering (IJECE) Vol 14, No 3: June 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v14i3.pp3064-3072

Abstract

Domain ontologies facilitate the organization, sharing, and reuse of subject areas. Building a software ontology is labor-intensive and time-consuming. In the process of obtaining a software ontology, it is required to analyze a huge number of scientific publications relevant to the software being modeled. The process of ontology replenishing with information from a huge number of scientific publications can be facilitated and accelerated through the use of lexical-syntactic patterns of ontological design. In this paper, we consider the possibility of automated construction of scientific subject area ontologies based on a heterogeneous patterns system of ontological design. This system includes ontological design patterns and is intended for ontology developers. System also includes automatically built lexical and syntactic patterns, which help to automatic replenishment of the ontology with information extracted from natural language texts.
Proposal of a similarity measure for unified modeling language class diagram images using convolutional neural network Jebli, Rhaydae; El Bouhdidi, Jaber; Yassin Chkouri, Mohamed
International Journal of Electrical and Computer Engineering (IJECE) Vol 14, No 2: April 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v14i2.pp1979-1986

Abstract

The unified modeling language (UML) represents an essential tool for modeling and visualizing software systems. UML diagrams provide a graphical representation of a system's components. Comparing and processing these diagrams, for instance, can be complicated, especially as software projects grow in size and complexity. In such contexts, deep learning techniques have emerged as a promising solution for solving complex problems. One of these crucial problems is the measurement of similarity between images, making it possible to compare and calculate the differences between two given diagrams. The present work intends to build a method for calculating the degree of similarity between two UML class diagrams. With a goal to provide teachers a helpful tool for assessing students' UML class diagrams.
About one lightweight encryption algorithm ensuring the security of data transmission and communication between internet of things devices Atanov, Sabyrzhan; Seitkulov, Yerzhan; Moldamurat, Khuralay; Yergaliyeva, Banu; Kyzyrkanov, Abzal; Seitbattalov, Zhexen
International Journal of Electrical and Computer Engineering (IJECE) Vol 14, No 6: December 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v14i6.pp6846-6860

Abstract

In this paper, a new encryption algorithm Twine-Mersenne was developed based on the Twine algorithm with the addition of a random number generator for the dynamic generation of S-boxes. Dynamic generation of random numbers based on the Mersenne Twister helps to increase the cryptographic strength of the proposed algorithm. The algorithm we propose solves the issues of optimizing the costs of computing and energy resources of internet of things (IoT) devices, using a combination of lightweight cryptographic principles and fuzzy logic, and also provides reliable security and intelligent authentication of the mobile application user. The paper also considers the practical implementation of the proposed algorithm based on Arduino ESP32, a device with limited computing resources. In addition to this, fuzzy logic has found its practical application in the field of intelligent user authentication in developed mobile applications based on Arduino Studio for mobile cellular applications. As a result, the proposed lightweight encryption algorithm has proven itself to be an effective tool in ensuring the security of data transmission and communication between IoT devices.

Filter by Year

2011 2026


Filter By Issues
All Issue Vol 16, No 1: February 2026 Vol 15, No 6: December 2025 Vol 15, No 5: October 2025 Vol 15, No 4: August 2025 Vol 15, No 3: June 2025 Vol 15, No 2: April 2025 Vol 15, No 1: February 2025 Vol 14, No 6: December 2024 Vol 14, No 5: October 2024 Vol 14, No 4: August 2024 Vol 14, No 3: June 2024 Vol 14, No 2: April 2024 Vol 14, No 1: February 2024 Vol 13, No 6: December 2023 Vol 13, No 5: October 2023 Vol 13, No 4: August 2023 Vol 13, No 3: June 2023 Vol 13, No 2: April 2023 Vol 13, No 1: February 2023 Vol 12, No 6: December 2022 Vol 12, No 5: October 2022 Vol 12, No 4: August 2022 Vol 12, No 3: June 2022 Vol 12, No 2: April 2022 Vol 12, No 1: February 2022 Vol 11, No 6: December 2021 Vol 11, No 5: October 2021 Vol 11, No 4: August 2021 Vol 11, No 3: June 2021 Vol 11, No 2: April 2021 Vol 11, No 1: February 2021 Vol 10, No 6: December 2020 Vol 10, No 5: October 2020 Vol 10, No 4: August 2020 Vol 10, No 3: June 2020 Vol 10, No 2: April 2020 Vol 10, No 1: February 2020 Vol 9, No 6: December 2019 Vol 9, No 5: October 2019 Vol 9, No 4: August 2019 Vol 9, No 3: June 2019 Vol 9, No 2: April 2019 Vol 9, No 1: February 2019 Vol 8, No 6: December 2018 Vol 8, No 5: October 2018 Vol 8, No 4: August 2018 Vol 8, No 3: June 2018 Vol 8, No 2: April 2018 Vol 8, No 1: February 2018 Vol 7, No 6: December 2017 Vol 7, No 5: October 2017 Vol 7, No 4: August 2017 Vol 7, No 3: June 2017 Vol 7, No 2: April 2017 Vol 7, No 1: February 2017 Vol 6, No 6: December 2016 Vol 6, No 5: October 2016 Vol 6, No 4: August 2016 Vol 6, No 3: June 2016 Vol 6, No 2: April 2016 Vol 6, No 1: February 2016 Vol 5, No 6: December 2015 Vol 5, No 5: October 2015 Vol 5, No 4: August 2015 Vol 5, No 3: June 2015 Vol 5, No 2: April 2015 Vol 5, No 1: February 2015 Vol 4, No 6: December 2014 Vol 4, No 5: October 2014 Vol 4, No 4: August 2014 Vol 4, No 3: June 2014 Vol 4, No 2: April 2014 Vol 4, No 1: February 2014 Vol 3, No 6: December 2013 Vol 3, No 5: October 2013 Vol 3, No 4: August 2013 Vol 3, No 3: June 2013 Vol 3, No 2: April 2013 Vol 3, No 1: February 2013 Vol 2, No 6: December 2012 Vol 2, No 5: October 2012 Vol 2, No 4: August 2012 Vol 2, No 3: June 2012 Vol 2, No 2: April 2012 Vol 2, No 1: February 2012 Vol 1, No 2: December 2011 Vol 1, No 1: September 2011 More Issue