cover
Contact Name
Tole Sutikno
Contact Email
ijece@iaesjournal.com
Phone
-
Journal Mail Official
ijece@iaesjournal.com
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
International Journal of Electrical and Computer Engineering
ISSN : 20888708     EISSN : 27222578     DOI : -
International Journal of Electrical and Computer Engineering (IJECE, ISSN: 2088-8708, a SCOPUS indexed Journal, SNIP: 1.001; SJR: 0.296; CiteScore: 0.99; SJR & CiteScore Q2 on both of the Electrical & Electronics Engineering, and Computer Science) is the official publication of the Institute of Advanced Engineering and Science (IAES). The journal is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication and computer engineering from the global world.
Articles 6,301 Documents
Music fingerprinting based on bhattacharya distance for song and cover song recognition Riyanarto Sarno; Dedy Rahman Wijaya; Muhammad Nezar Mahardika
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 2: April 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (452.327 KB) | DOI: 10.11591/ijece.v9i2.pp1036-1044

Abstract

People often have trouble recognizing a song especially, if the song is sung by a not original artist which is called cover song. Hence, an identification system might be used to help recognize a song or to detect copyright violation. In this study, we try to recognize a song and a cover song by using the fingerprint of the song represented by features extracted from MPEG-7. The fingerprint of the song is represented by Audio Signature Type. Moreover, the fingerprint of the cover song is represented by Audio Spectrum Flatness and Audio Spectrum Projection. Furthermore, we propose a sliding algorithm and k-Nearest Neighbor (k-NN) with Bhattacharyya distance for song recognition and cover song recognition. The results of this experiment show that the proposed fingerprint technique has an accuracy of 100% for song recognition and an accuracy of 85.3% for cover song recognition.
Optimal Path Planning using Equilateral Spaces Oriented Visibility Graph Method Nor Badariyah Abdul Latip; Rosli Omar; Sanjoy Kumar Debnath
International Journal of Electrical and Computer Engineering (IJECE) Vol 7, No 6: December 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (458.339 KB) | DOI: 10.11591/ijece.v7i6.pp3046-3051

Abstract

Path planning has been an important aspect in the development of autonomous cars in which path planning is used to find a collision-free path for the car to traverse from a starting point Sp to a target point Tp. The main criteria for a good path planning algorithm include the capability of producing the shortest path with a low computation time. Low computation time makes the autonomous car able to re-plan a new collision-free path to avoid accident. However, the main problem with most path planning methods is their computation time increases as the number of obstacles in the environment increases. In this paper, an algorithm based on visibility graph (VG) is proposed. In the proposed algorithm, which is called Equilateral Space Oriented Visibility Graph (ESOVG), the number of obstacles considered for path planning is reduced by introducing a space in which the obstacles lie. This means the obstacles located outside the space are ignored for path planning. From simulation, the proposed algorithm has an improvement rate of up to 90% when compared to VG. This makes the algorithm is suitable to be applied in real-time and will greatly accelerate the development of autonomous cars in the near future.
Identity-based threshold group signature scheme based on multiple hard number theoretic problems Nedal Tahat; Ashraf A. Tahat
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 4: August 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (863.463 KB) | DOI: 10.11591/ijece.v10i4.pp3695-3701

Abstract

We introduce in this paper a new identity-based threshold signature (IBTHS) technique, which is based on a pair of intractable problems, residuosity and discrete logarithm. This technique relies on two difficult problems and offers an improved level of security relative to an individual hard problem. The majority of the denoted IBTHS techniques are established on an individual difficult problem. Despite the fact that these methods are secure, however, a prospective solution of this sole problem by an adversary will enable him/her to recover the entire private data together with secret keys and configuration values of the associated scheme. Our technique is immune to the four most familiar attack types in relation to the signature schemes. Enhanced performance of our proposed technique is verified in terms of minimum cost of computations required by both of the signing algorithm and the verifying algorithm in addition to immunity to attacks.
Comparative Study of Electricity Generation Fueled by Gasoline, Liquefied Petroleum Gas and Biogas from Municipal Solid Waste Seno Darmawan Panjaitan; Yandri Yandri; Sukandar Sukandar; Berlian Sitorus
International Journal of Electrical and Computer Engineering (IJECE) Vol 3, No 6: December 2013
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (309.465 KB)

Abstract

This paper presents a comparative study in terms of power quality and fuel consumption in electricity generation using three kinds of fuel: gasoline, liquefied petroleum gas (LPG) and biogas from anaerobic digestion of municipal solid waste. The electrical parameters measured and compared are voltage, current, frequency, active power, apparent power, reactive power, power factor, displacement power factor, current harmonics, voltage harmonics, transient, sags and swell. From the experiment, resistive loads (100 W bulb and 2 x 100 W bulbs) and resistive-inductive load (125 W water pump) were used as loads of generator set. It can be seen that in general, the power quality among those three fuels shows almost the similar performance. The problem on using combustible gases, either LPG or biogas, significantly appears at the frequency with greatly difference to the standard (i.e. 50 Hz).DOI:http://dx.doi.org/10.11591/ijece.v3i6.3942
An Improvised Methodology to Unbar Android Mobile Phone for Forensic Examination V. Balajichandrasekhar M.; T. Srinivasa Rao; G. Srinivas
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 4: August 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (614.2 KB) | DOI: 10.11591/ijece.v8i4.pp2239-2246

Abstract

At the end of 2015, there were 4.7 billion noteworthy mobile subscribers globally, equivalent to 63% of the world’s population. Mobile phones had all the essential components or characteristics neatly fitted into a small space and designed to achieve high speeds, massive storage, and increased functionalities. Smart phones used to carry out imparting or exchanging of information such as calling, texting, Internet browsing, e-mail, photos, videos, and etc. Criminals can use smart phones for a number of activities. Namely, committing a fraud over e-mail, harassment via text messages, drug trafficking, child pornography, etc. In this research paper, We demonstrate, if a mobile phone is identified in a criminal activity and if it is locked by any one of the locking mechanisms such as pattern lock, PIN lock and password lock, then how to unlock the mobile device without data loss for forensic examination. It is a great challenge for forensic experts to extract data from a mobile phone for forensic purpose that can be used as evidence in the court of law. The experimental results show that our approach can break all kinds of pattern locks.
Geographical Forwarding Methods in Vehicular Ad hoc Networks Kashif Naseer Qureshi; Abdul Hanan Abdullah; Anwar Mirza; Raja Waseem Anwar
International Journal of Electrical and Computer Engineering (IJECE) Vol 5, No 6: December 2015
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (688.669 KB) | DOI: 10.11591/ijece.v5i6.pp1407-1416

Abstract

Vehicular ad hoc networks are new and emerging technology and special class of mobile ad hoc networks that provide wireless communication between vehicles without any fixed infrastructure. Geographical routing has appeared as one of the most scalable and competent routing schemes for vehicular networks. A number of strategies have been proposed for forwarding the packets in geographical direction of the destination, where information of direct neighbors is gained through navigational services. Due to dynamically changing topologies and high mobility neighbor information become outdated. To address these common issues in network different types of forwarding strategies have been proposed. In this review paper, we concentrate on beaconless forwarding methods and their forwarding methods in detail.
Variable structure control for an isolated boost converter used in fuel cell applications S. Vijaya Madhavi; G. Tulasi Ram Das
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 6: December 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (810.622 KB) | DOI: 10.11591/ijece.v9i6.pp4493-4506

Abstract

In recent years fuel cells have become prominent as an alternative source of energy to meet the society’s energy requirements. A control strategy derived from variable structure theory known as Sliding Mode Control (SMC) was proposed for an Isolated Boost topology which was mostly used in fuel cell systems. Converter operation and its detailed mathematical modelling are also presented. Then the converter with the control strategy suggested is simulated in MATLAB/SIMULINK and compared with other controllers. The results show that transient response of the converter is very fast and steady state error is reduced throughout the load change period with proposed control topology.
A Novel Algorithm to Estimate Closely Spaced Source DOA Sidi Mohamed Hadj Irid; Samir Kameche; Said Assous
International Journal of Electrical and Computer Engineering (IJECE) Vol 7, No 4: August 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (550.821 KB) | DOI: 10.11591/ijece.v7i4.pp2109-2115

Abstract

In order to improve resolution and direction of arrival (DOA) estimation of two closely spaced sources, in context of array processing, a new algorithm is presented. However, the proposed algorithm combines both spatial sampling technic to widen the resolution and a high resolution method which is the Multiple Signal Classification (MUSIC) to estimate the DOA of two closely spaced sources impinging on the far-field of Uniform Linear Array (ULA). Simulations examples are discussed to demonstrate the performance and the effectiveness of the proposed approach (referred as Spatial sampling MUSIC SS-MUSIC) compared to the classical MUSIC method when it’s used alone in this context.
Obtrusiveness of smartphone applications for sleep health M. Vazquez-Briseno; A. Laflor-Hernandez; Fernanda Murillo-Muñoz; Doreen Mendez-Verdugo
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 1: February 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (291 KB) | DOI: 10.11591/ijece.v9i1.pp676-682

Abstract

Unobtrusiveness is one of the main issues concerning health-related systems. Many developers affirm that their systems do not burden users; however, this is not always achieved. This article evaluates the obtrusiveness of various systems developed to improve sleep quality. The systems analyzed are related to sleep hygiene, since it has become an interesting topic for researchers, physicians and people in general, mainly because it has become part of the methods used to estimate a persons’ health status A set of design elements are presented as keys to achieving unobtrusiveness. We propose a scale to measure the level of unobtrusiveness and use it to evaluate several systems, with a focus on smartphone applications. 
WBSN based safe lifestyle: A case study of heartrate monitoring system Vidhyotma Gandhi; Jaiteg Singh
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 3: June 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1039.45 KB) | DOI: 10.11591/ijece.v10i3.pp2296-2304

Abstract

A Heart is the vital organ of the body. According to the “world health statistics, 2017” by WHO, about 460,000 people die due to fatal heart attacks every year. To reduce the death rate due to fatal heart attacks and malfunctioning of the cardiovascular system, this paper proposed a Wireless Body Sensor Network (WBSN) based, portable, easily affordable, miniatured, accurate “Heartrate Monitoring System (HMS)”. HMS can be used to regularly examine the cardiac condition at home or hospital to avoid or early detection of any serious condition. Heartrate Monitoring Algorithm (HMA) was designed to observe the spread heartbeat spectrum and worked at the backend of HMS. A case study was performed for forty healthy young subjects. Each subject data was computed for (sub) ̅-3S_d

Page 63 of 631 | Total Record : 6301


Filter by Year

2011 2026


Filter By Issues
All Issue Vol 16, No 1: February 2026 Vol 15, No 6: December 2025 Vol 15, No 5: October 2025 Vol 15, No 4: August 2025 Vol 15, No 3: June 2025 Vol 15, No 2: April 2025 Vol 15, No 1: February 2025 Vol 14, No 6: December 2024 Vol 14, No 5: October 2024 Vol 14, No 4: August 2024 Vol 14, No 3: June 2024 Vol 14, No 2: April 2024 Vol 14, No 1: February 2024 Vol 13, No 6: December 2023 Vol 13, No 5: October 2023 Vol 13, No 4: August 2023 Vol 13, No 3: June 2023 Vol 13, No 2: April 2023 Vol 13, No 1: February 2023 Vol 12, No 6: December 2022 Vol 12, No 5: October 2022 Vol 12, No 4: August 2022 Vol 12, No 3: June 2022 Vol 12, No 2: April 2022 Vol 12, No 1: February 2022 Vol 11, No 6: December 2021 Vol 11, No 5: October 2021 Vol 11, No 4: August 2021 Vol 11, No 3: June 2021 Vol 11, No 2: April 2021 Vol 11, No 1: February 2021 Vol 10, No 6: December 2020 Vol 10, No 5: October 2020 Vol 10, No 4: August 2020 Vol 10, No 3: June 2020 Vol 10, No 2: April 2020 Vol 10, No 1: February 2020 Vol 9, No 6: December 2019 Vol 9, No 5: October 2019 Vol 9, No 4: August 2019 Vol 9, No 3: June 2019 Vol 9, No 2: April 2019 Vol 9, No 1: February 2019 Vol 8, No 6: December 2018 Vol 8, No 5: October 2018 Vol 8, No 4: August 2018 Vol 8, No 3: June 2018 Vol 8, No 2: April 2018 Vol 8, No 1: February 2018 Vol 7, No 6: December 2017 Vol 7, No 5: October 2017 Vol 7, No 4: August 2017 Vol 7, No 3: June 2017 Vol 7, No 2: April 2017 Vol 7, No 1: February 2017 Vol 6, No 6: December 2016 Vol 6, No 5: October 2016 Vol 6, No 4: August 2016 Vol 6, No 3: June 2016 Vol 6, No 2: April 2016 Vol 6, No 1: February 2016 Vol 5, No 6: December 2015 Vol 5, No 5: October 2015 Vol 5, No 4: August 2015 Vol 5, No 3: June 2015 Vol 5, No 2: April 2015 Vol 5, No 1: February 2015 Vol 4, No 6: December 2014 Vol 4, No 5: October 2014 Vol 4, No 4: August 2014 Vol 4, No 3: June 2014 Vol 4, No 2: April 2014 Vol 4, No 1: February 2014 Vol 3, No 6: December 2013 Vol 3, No 5: October 2013 Vol 3, No 4: August 2013 Vol 3, No 3: June 2013 Vol 3, No 2: April 2013 Vol 3, No 1: February 2013 Vol 2, No 6: December 2012 Vol 2, No 5: October 2012 Vol 2, No 4: August 2012 Vol 2, No 3: June 2012 Vol 2, No 2: April 2012 Vol 2, No 1: February 2012 Vol 1, No 2: December 2011 Vol 1, No 1: September 2011 More Issue