cover
Contact Name
Tole Sutikno
Contact Email
ijece@iaesjournal.com
Phone
-
Journal Mail Official
ijece@iaesjournal.com
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
International Journal of Electrical and Computer Engineering
ISSN : 20888708     EISSN : 27222578     DOI : -
International Journal of Electrical and Computer Engineering (IJECE, ISSN: 2088-8708, a SCOPUS indexed Journal, SNIP: 1.001; SJR: 0.296; CiteScore: 0.99; SJR & CiteScore Q2 on both of the Electrical & Electronics Engineering, and Computer Science) is the official publication of the Institute of Advanced Engineering and Science (IAES). The journal is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication and computer engineering from the global world.
Articles 6,301 Documents
Homomorphic encryption, privacy-preserving feature extraction, and decentralized architecture for enhancing privacy in voice authentication Murugesan, Kathiresh; Subbarayalu Ramamurthy, Lavanya; Palanisamy, Boopathi; Chandrasekar, Yamini; Shanmugam, Kavitha Masagoundanpudhur; Nithya, Balluru Thammaiahshetty Adishankar; Thiyagaraja, Velumani; Muniappan, Ramaraj
International Journal of Electrical and Computer Engineering (IJECE) Vol 15, No 2: April 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v15i2.pp2150-2160

Abstract

This paper introduces a novel framework designed to bolster privacy protections within automated voice authentication systems, addressing mounting concerns as voice-based authentication grows in prominence. The widespread adoption of these systems has underscored apprehensions regarding the storage and processing of sensitive voice biometric data without adequate safeguards. To mitigate these risks, a modified framework is proposed, aiming to enhance privacy without compromising authentication accuracy and efficiency. Three key techniques are implemented to address these challenges. Firstly, advanced encryption methods are employed for secure voice data storage and transmission, through the homomorphic encryption to enable authentication processing on encrypted data. Secondly, a privacy-preserving feature extraction method is introduced, transforming raw voice inputs into irreversible representations to shield original biometric information. Additionally, the framework incorporates differential privacy mechanisms, adding controlled noise to aggregated voice data to prevent individual identification within large datasets. A user-centric consent and control model is proposed, empowering individuals to manage their voice profiles and authentication settings. Experimental findings demonstrate that the framework achieves enhanced authentication accuracy while markedly reducing privacy risks compared to conventional systems. This contribution addresses the ongoing challenge of balancing security and privacy in biometric authentication technologies.
Optimized control and simulation of a grid-integrated photovoltaic and fuel cell hybrid power system Satif, Amal; Hlou, Laamari; Elgouri, Rachid
International Journal of Electrical and Computer Engineering (IJECE) Vol 15, No 2: April 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v15i2.pp1411-1423

Abstract

In this study, we propose an advanced power control strategy tailored for a grid-connected photovoltaic-hydrogen hybrid system aimed at ensuring reliable energy supply to consumers. This hybrid system integrates photovoltaic (PV) panels as the primary energy source supplemented by hydrogen fuel production through electrolysis of surplus PV-generated electricity. To optimize system flexibility and efficiency, we employ several advanced control techniques. A novel maximum power point tracking (MPPT) method, enhanced with a proportional-integral (PI) controller, surpasses conventional perturb and observe (P&O) techniques to maximize PV power output. For precise control of the three-phase photovoltaic inverter, we utilize a space vector pulse width modulation (SVPWM) algorithm. Synchronization with the utility grid is ensured by a phase-locked loop (PLL), maintaining phase coherence between the inverter output and grid supply. The primary goal is to develop a comprehensive and efficient control strategy for grid-connected hybrid systems, addressing both energy generation and storage challenges. MATLAB simulations validate the system's performance, demonstrating high energy conversion efficiency and robust control across varying conditions. This study underscores the potential of hybrid PV-hydrogen systems to provide sustainable and resilient energy solutions for future grid integration.
Modeling and enhancing inverse kinematics algorithms for real-time target tracking in inertial stabilization systems Kriouile, Abderahman; Hamida, Soufiane; Moussa, Abdoul Latif Abdou
International Journal of Electrical and Computer Engineering (IJECE) Vol 15, No 2: April 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v15i2.pp1544-1556

Abstract

This study develops a two-axis gimbal system designed to maintain a target within its field of view by compensating for motion of either the target or the platform. The focus is on inertial stabilization platforms (ISPs), where accurate, real-time tracking is essential for applications such as surveillance, navigation, and scientific observation. The research prioritizes the design and optimization of inverse kinematics algorithms to enhance system performance. A detailed analysis of mathematical models underpins the development, addressing challenges in real-time processing with advanced optimization techniques to minimize latency and maximize accuracy. The proposed algorithms achieve a mean tracking error of 0.002 m and a mean convergence time of 2.12 seconds, surpassing traditional methods in precision and efficiency. Performance is evaluated within a simulation framework using Simscape Multibody, testing the algorithms under various conditions. Validation extends to real-world scenarios to ensure robustness and practical applicability. The results demonstrate significant improvements in tracking accuracy and responsiveness, offering a reliable solution for dynamic environments. This work paves the way for more efficient gimbal systems, contributing to advancements in technologies requiring stable and precise tracking in dynamic and challenging settings.
Privacy-aware enhanced homomorphic mechanism for group data sharing Karemallaiah, Jayalakshmi; Revaiah, Prabha
International Journal of Electrical and Computer Engineering (IJECE) Vol 15, No 2: April 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v15i2.pp1805-1816

Abstract

Cloud-based group data sharing has gained huge popularity in recent years. Accomplishing the efficacy and security of the data in a cloud-computing framework is challenging. Sharing data in a cloud environment is quite challenging and needs to be resolved. Furthermore, while exchanging data on the cloud, it is challenging to achieve both anonymity and traceability. The main aim of this research work is to make it easier for the same group to share and store anonymous data on the cloud securely and effectively. This research work presents verifiable privacy-aware enhanced homomorphic (VPEH) encryption for multiple participants; moreover, the enhanced homomorphic encryption mechanism provides end-to-end encryption and allows the secure computation of data without revealing any data in the cloud. The proposed algorithm uses homomorphic multiplication to compute the hashes product of challenges blocks that makes it more efficient Furthermore, an additional security model is incorporated to verify the shared data integrity. The VPEH mechanism is evaluated considering parameters such as tag generation, proof generation, and verification; model efficiency is proved by observing the marginal improvisation over the other existing model by varying the number of blocks and several challenge blocks.
Customized dataset-based machine learning approach for black hole attack detection in mobile ad hoc networks Moudni, Houda; Er-rouidi, Mohamed; Lmkaiti, Mansour; Mouncif, Hicham
International Journal of Electrical and Computer Engineering (IJECE) Vol 15, No 2: April 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v15i2.pp2138-2149

Abstract

This article explores the application of machine learning (ML) algorithms to classify the black hole attack in mobile ad hoc networks (MANETs). Black hole attacks threaten MANETs by disrupting communication and data transmission. The primary goal of this study is to develop an intrusion detection system (IDS) to detect and classify this attack. The research process involves feature selection, the creation of a custom dataset tailored to the characteristics of black hole attacks, and the evaluation of four machine learning models: random forest (RF), logistic regression (LR), k-nearest neighbors (k-NN), and decision tree (DT). The evaluation of these models demonstrates promising results, with significant improvements in accuracy, precision, F1-score, and recall metrics. The findings underscore the potential of machine learning in enhancing the security of MANETs by providing an effective means of attack classification.
System level optimization of series hybrid electric vehicle through plug-in charging feature using ADVISOR Hassan, Zain ul; Ahmad, Naseer; Sohaib, Muhammad
International Journal of Electrical and Computer Engineering (IJECE) Vol 15, No 2: April 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v15i2.pp1521-1531

Abstract

This research addresses the optimization of series hybrid electric vehicles (SHEVs) to enhance sustainable transportation by integrating a plug-in charging feature. The primary objective is to extend the range and improve battery management. Using MATLAB Simulink and the advanced vehicle simulator (ADVISOR), three SHEVs scenarios were simulated under the urban dynamometer driving system (UDDS) cycle. The study maintains constant parameters for the fuel converter and generator while optimizing the battery and motor controller. Compared to conventional hybrid electric vehicles (HEVs), this optimized SHEVs demonstrates a 17% improvement in battery thermal management and a 13.5% reduction in power losses. Additionally, the plug-in series hybrid electric vehicle (P-SHEVs) configuration shows a 5.26% increase in power output and a 35.71% improvement in the state of charge (SOC) over standard SHEVs configurations. The P-SHEVs design also achieves a 12.20% increase in the UDDS single-cycle range and an 11.5% reduction in fuel consumption. The integration of the electric vehicle (EV) charging feature further enhances the SHEVs, resulting in an 8.33% boost in motor power input and a 6.35% improvement in motor temperature profile, reaching a peak enhancement of 50% (18 kW). It contributes to the field by demonstrating the effectiveness of optimized configurations and the integration of a plug-in charging feature in SHEVs, thereby advancing the capacity of these vehicles to promote greener transportation solutions.
Object retrieval analysis on plastic bottle waste recycling-based image control using convex hull algorithm and autoregressive integrated moving average prediction method Marisa, Marisa; Azhar Ramli, Azizul; Fudzee, Mohd Farhan Md; Abdullah, Zubaile
International Journal of Electrical and Computer Engineering (IJECE) Vol 15, No 2: April 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v15i2.pp2055-2069

Abstract

In Indonesia, plastic garbage bottles are the most common sort of waste. Given that waste is expected to grow annually, managing plastic waste is a major challenge. The results of the study were achieved by comparing the reference, which was a collection of manually created contour images, with 50 sets of vortex images with different forms and vortex areas as experimental objects. The results indicate that the suggested approach reports a mean error of 2.84%, a correlation coefficient of 0.9965, and a root mean square error of 0.2903 when compared to the manual extraction method. These findings imply that the extract area determined by the procedure outlined in this research is more accurate and nearer to the actual values. The proposed method can therefore be used in place of the traditional process for investigating cooling parameters through manual testing. With measurement values mean absolute percentage error (MAPE)=121,842, mean absolute deviation (MAD)=20,140, and mean squared deviation (MSD)=776,712, the trend analysis of plastic bottles for autoregressive integrated moving average (ARIMA) modeling leads to the conclusion that the waste from plastic bottles will continue to rise annually and that efforts must be made to address this trend with knowledge and waste recycling technology. Plastic that is advantageous to industry and society.
Application of machine learning methods to analysis and evaluation of distance education Mukhiyadin, Ainur; Mukasheva, Manargul; Makhazhanova, Ulzhan; Kassekeyeva, Aislu; Azieva, Gulmira; Kenzhebayeva, Zhanat; Abdrakhmanova, Alfiya
International Journal of Electrical and Computer Engineering (IJECE) Vol 15, No 2: April 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v15i2.pp2172-2180

Abstract

In recent decades, distance learning has become an essential component of the modern educational system, providing students with flexibility and access to knowledge regardless of location. This paper discusses creating a hybrid machine-learning model for assessing the quality of distance learning based on survey data. The model combines two feature extraction methods: Term frequency-inverse document frequency (TF-IDF) and Word2Vec. Combining these methods allows for a more complete and accurate representation of text data, improving the quality of machine learning models. The study aims to develop and evaluate the effectiveness of the proposed hybrid model for analyzing survey data and assessing the quality of distance learning. The paper considers the tasks of collecting and preprocessing text data, experimentally comparing various feature extraction methods and their combinations, training and evaluating a machine learning model based on a combination of TF-IDF and Word2Vec features, as well as analyzing the results and assessing the effectiveness of the proposed model using various metrics. In conclusion, the prospects for further development and application of the proposed model in educational institutions to improve the quality of distance learning are discussed.
Design of low power complementary metal-oxide semiconductor static random-access memory cell for embedded memories at three different technology nodes Venkatesh, Seerapu; Sahukara, Krishna Veni
International Journal of Electrical and Computer Engineering (IJECE) Vol 15, No 2: April 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v15i2.pp1424-1433

Abstract

In this work, the complementary metal-oxide semiconductor (CMOS) static random-access memory (SRAM) cell is proposed using a hybrid model. It is designed by combining two different methods and simulated at different technologies which are 180, 90, and 45 nm. The proposed hybrid model SRAM cell has less power consumption. The power consumption results of the hybrid model SRAM cell are contrasted with the 6T CMOS SRAM, Stacked SRAM cell, and 8T SRAM cell at 180, 90, and 45 nm. Tanner tool was used for designing and simulating these different SRAM cell topologies at 180, 90, and 45 nm technology nodes. S-edit is used for designing circuit diagrams, T-edit is used for simulating spice net lists and W-edit is used for observing waveforms in Tanner tool. The hybrid SRAM cell at 45 nm got better power consumption results than other SRAM cell topologies at different technology nodes.
Buffers balancing of buffer-aided relays in 5G non-orthogonal multiple access transmission internet of things networks Alkhwatrah, Mohammad; Qasem, Nidal
International Journal of Electrical and Computer Engineering (IJECE) Vol 15, No 2: April 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v15i2.pp1774-1782

Abstract

Buffer-aided cooperative non-orthogonal multiple access (NOMA) enhances the efficiency of utilizing the spectral by allowing more users to share the same re- sources to establish massive connectivity. This is remarkably attractive in the fifth generation (5G) and beyond systems, where a massive number of links is essential like in the internet of things (IoT). However, the capability of buffer co-operation in reducing the outage is limited due to empty and full buffers, where empty buffers can not transmit and full buffers can not receive data packets. Therefore, in this paper, we propose balancing the buffer content of the inter-connected relays, so the buffers that are more full send packets to the emptier buffers, hence all buffers are more balanced and farther from being empty or full. The simulations show that the proposed balancing technique has improved the network outage probability. The results show that the impact of the balancing is more effective as the number of relays in the network is increased. Further- more, utilizing the balancing with a lower number of relays may lead to better performance than that of more relays without balancing. In addition, giving the balancing different levels of priorities gives different levels of enhancement.

Filter by Year

2011 2026


Filter By Issues
All Issue Vol 16, No 1: February 2026 Vol 15, No 6: December 2025 Vol 15, No 5: October 2025 Vol 15, No 4: August 2025 Vol 15, No 3: June 2025 Vol 15, No 2: April 2025 Vol 15, No 1: February 2025 Vol 14, No 6: December 2024 Vol 14, No 5: October 2024 Vol 14, No 4: August 2024 Vol 14, No 3: June 2024 Vol 14, No 2: April 2024 Vol 14, No 1: February 2024 Vol 13, No 6: December 2023 Vol 13, No 5: October 2023 Vol 13, No 4: August 2023 Vol 13, No 3: June 2023 Vol 13, No 2: April 2023 Vol 13, No 1: February 2023 Vol 12, No 6: December 2022 Vol 12, No 5: October 2022 Vol 12, No 4: August 2022 Vol 12, No 3: June 2022 Vol 12, No 2: April 2022 Vol 12, No 1: February 2022 Vol 11, No 6: December 2021 Vol 11, No 5: October 2021 Vol 11, No 4: August 2021 Vol 11, No 3: June 2021 Vol 11, No 2: April 2021 Vol 11, No 1: February 2021 Vol 10, No 6: December 2020 Vol 10, No 5: October 2020 Vol 10, No 4: August 2020 Vol 10, No 3: June 2020 Vol 10, No 2: April 2020 Vol 10, No 1: February 2020 Vol 9, No 6: December 2019 Vol 9, No 5: October 2019 Vol 9, No 4: August 2019 Vol 9, No 3: June 2019 Vol 9, No 2: April 2019 Vol 9, No 1: February 2019 Vol 8, No 6: December 2018 Vol 8, No 5: October 2018 Vol 8, No 4: August 2018 Vol 8, No 3: June 2018 Vol 8, No 2: April 2018 Vol 8, No 1: February 2018 Vol 7, No 6: December 2017 Vol 7, No 5: October 2017 Vol 7, No 4: August 2017 Vol 7, No 3: June 2017 Vol 7, No 2: April 2017 Vol 7, No 1: February 2017 Vol 6, No 6: December 2016 Vol 6, No 5: October 2016 Vol 6, No 4: August 2016 Vol 6, No 3: June 2016 Vol 6, No 2: April 2016 Vol 6, No 1: February 2016 Vol 5, No 6: December 2015 Vol 5, No 5: October 2015 Vol 5, No 4: August 2015 Vol 5, No 3: June 2015 Vol 5, No 2: April 2015 Vol 5, No 1: February 2015 Vol 4, No 6: December 2014 Vol 4, No 5: October 2014 Vol 4, No 4: August 2014 Vol 4, No 3: June 2014 Vol 4, No 2: April 2014 Vol 4, No 1: February 2014 Vol 3, No 6: December 2013 Vol 3, No 5: October 2013 Vol 3, No 4: August 2013 Vol 3, No 3: June 2013 Vol 3, No 2: April 2013 Vol 3, No 1: February 2013 Vol 2, No 6: December 2012 Vol 2, No 5: October 2012 Vol 2, No 4: August 2012 Vol 2, No 3: June 2012 Vol 2, No 2: April 2012 Vol 2, No 1: February 2012 Vol 1, No 2: December 2011 Vol 1, No 1: September 2011 More Issue