cover
Contact Name
Tole Sutikno
Contact Email
ijece@iaesjournal.com
Phone
-
Journal Mail Official
ijece@iaesjournal.com
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
International Journal of Electrical and Computer Engineering
ISSN : 20888708     EISSN : 27222578     DOI : -
International Journal of Electrical and Computer Engineering (IJECE, ISSN: 2088-8708, a SCOPUS indexed Journal, SNIP: 1.001; SJR: 0.296; CiteScore: 0.99; SJR & CiteScore Q2 on both of the Electrical & Electronics Engineering, and Computer Science) is the official publication of the Institute of Advanced Engineering and Science (IAES). The journal is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication and computer engineering from the global world.
Articles 6,301 Documents
Personal data protection and liability of internet service provider: a comparative approach Ni Ketut Supasti Dharmawan; Desak Putu Dewi Kasih; Deris Stiawan
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 4: August 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (428.654 KB) | DOI: 10.11591/ijece.v9i4.pp3175-3184

Abstract

The users of electronic service provider often suffered losses caused by internet services did not work properly including losses due to leakage of personal data protection stored in cloud computing.  The study aims to examine electronic service provider liability upon their failure performing internet services properly and security attacks on cloud computing. This study was normative legal research by examining national and international legal materials. The finding shows that the electronic provider shall be responsible based on right and obligation agreed under the agreement.  Related to cloud computing, providing adequate security to avoid security attacks and misuse of private data that caused losses to the users becoming the liability of service provider. Based on the Federal Trade Commission Act, the liability arises on the grounds of deceptive and unfair trade practices.  Under the General Data Protection Regulation of the European Union, the liability arises on the basis as the controller then provider liable for compensation for user’s suffered damage. In Indonesia, based on the Electronic Information and Transaction Law Amendment, the liability to the owner of personal data whose rights are violated and suffered losses arises due to a failure of ISP protect the data security. For better protection in Indonesia, the protection of big data and clear territorial scope of protection become necessary to consider.
The End User Requirement for Project Management Software Accuracy Fachrurrazi Fachrurrazi
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 2: April 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (996.199 KB) | DOI: 10.11591/ijece.v8i2.pp1112-1121

Abstract

This research explains the relationship between the end user requirement and accuracy of PMS (Project Management Software). The research aims are to analyze the PMS accuracy and measuring the probability of PMS accuracy in achieving ±1% of the end user requirement. The bias statistical method will be used to prove the PMS accuracy that based on the hypothesis testing. The result indicates the PMS is still accurate to be implemented in Aceh-Indonesia area projects that using the SNI (National Indonesia Standard as current method) with the accuracy index of ±7.5%. The achievement probability of reaching the end user requirement is still low of ±21.77%. In case of the PMS, the low achievement of the end user requirement is not only caused by the low accuracy of the PMS but also caused by the amount of variability error, which is influenced by the amount of variation of the project activity. In this study, we confirm that it is necessary to reconcile both conditions between the PMS accuracy and the end user requirements.
Performance Enhancement of MIMO-OFDM using Redundant Residue Number System M. I. Youssef; A. E. Emam; M. Abd Elghany
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 5: October 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (885.595 KB) | DOI: 10.11591/ijece.v8i5.pp3902-3912

Abstract

Telecommunication industry requires high capacity networks with high data rates which are achieved through utilization of Multiple-Input-Multiple-Output (MIMO) communication along with Orthogonal Frequency Division Multiplexing (OFDM) system. Still, the communication channel suffers from noise, interference or distortion due to hardware design limitations, and channel environment, and to combat these challenges, and achieve enhanced performance; various error control techniques are implemented to enable the receiver to detect any possible received errors and correct it and thus; for a certain transmitted signal power the system would have lower Bit Error Rate (BER). The provided research focuses on Redundant Residue Number System (RRNS) coding as a Forward Error Correction (FEC) scheme that improves the performance of MIMO-OFDM based wireless communications in comparison with current methods as Low-Density Parity Check (LDPC) coders at the transmitter side or equalizers at receiver side. The Bit Error Rate (BER) performance over the system was measured using MATLAB tool for different simulated channel conditions, including the effect of signal amplitude reduction and multipath delay spreading. Simulation results had shown that RRNS coding scheme provides an enhancement in system performance over conventional error detection and correction coding schemes by utilizing the distinct features of Residue Number System (RNS).
Nonlinear Compensation Empyoing Matrix Converter with DTC Controller Khalaf S. Gaied; Ziad H. Salih; Ahmed R. Ajel; Mehdi J. Marie
International Journal of Electrical and Computer Engineering (IJECE) Vol 7, No 1: February 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (2261.58 KB) | DOI: 10.11591/ijece.v7i1.pp107-124

Abstract

This paper describes a nonlinear harmful speed and torque controller for fourth order induction motor model. The investigation of optimality and cost function for that base on estimation of Hammerstein-Wiener model with the compensated mathematical model. The matrix converter with direct torque control combination is efficient way to get better performance specifications in the industry.The MC and the DTC advantages are combined together.The reduction of complexity and cost of DC link in the DTC since it has no capacitors in the circuit. However, the controlling torque is a big problem it in DTC because of high ripple torque production which results in vibrations response in the operation of the IM as it has no PID to control the torque directly. The combination of MC with DTC is applied to reduce the fluctuation in the output torque and minimize the steady state error. This paper presents the simulation analysis of induction machine drives using Maltlab/Simulink toolbox R2012a. Design of constant switching frequency MCDTC drive,stability investigation and fault protection as well as controllability and observability with minimum steady state error has been carried out which  proved the effectiveness of the proposed technique.
Sinc collocation linked with finite differences for Korteweg-de Vries Fractional Equation Kamel Al-Khaled
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 1: February 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1017.185 KB) | DOI: 10.11591/ijece.v10i1.pp512-520

Abstract

A novel numerical method is proposed for Korteweg-de Vries Fractional Equation. The fractional derivatives are described based on the Caputo sense. We construct the solution using different approach, that is based on using collocation techniques. The method combining a finite difference approach in the time-fractional direction, and the Sinc-Collocation in the space direction, where the derivatives are replaced by the necessary matrices, and a system of algebraic equations is obtained to approximate solution of the problem. The numerical results are shown to demonstrate the efficiency of the newly proposed method. Easy and economical implementation is the strength of this method.
Adaptive Antenna Selection and Power Allocation in Downlink Massive MIMO Systems Adeeb Salh; Lukman Audah; Nor Shahida M Shah; Shipun A Hamzah
International Journal of Electrical and Computer Engineering (IJECE) Vol 7, No 6: December 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (14.4 KB) | DOI: 10.11591/ijece.v7i6.pp3521-3528

Abstract

Massive multi-input, multi-output (MIMO) systems are an exciting area of study and an important technique for fifth-generation (5G) wireless networks that support high data rate traffic. An increased number of antenna arrays at the base station (BS) consumes more power due to a higher number of radio frequency (RF) chains, which cannot be neglected and becomes a technical challenge. In this paper, we investigated how to obtain the maximal data rate by deriving the optimal number of RF chains from a large number of available antenna arrays at the BS when there is equal power allocation among users. Meanwhile, to mitigate inter-user-interference and to compute transmit power allocation, we used the precoding scheme zero forcing beamforming (ZFBF). The achievable data rate is increased because the algorithm of ZFBF enables the choosing of the maximum power in relation to the optimal antenna selection. We conclude that the transmit power allocation  allows the use of less number of RF chains which provides the maximum achievable data rate depending on the optimal RF chain at the BS.
Text hiding in text using invisible character Nada Abdul Aziz Mustafa
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 4: August 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (640.298 KB) | DOI: 10.11591/ijece.v10i4.pp3550-3557

Abstract

Steganography can be defined as the art and science of hiding information in the data that could be read by computer. This science cannot recognize stego-cover and the original one whether by eye or by computer when seeing the statistical samples. This paper presents a new method to hide text in text characters. The systematic method uses the structure of invisible character to hide and extract secret texts. The creation of secret message comprises four main stages such using the letter from the original message, selecting the suitable cover text, dividing the cover text into blocks, hiding the secret text using the invisible character and comparing the cover-text and stego-object. This study uses an invisible character (white space) position of in the cover text that used to hide the the secrete sender masseges. The experiments results show that the suggested method presents highly secret due to use the multi-level of complexity to avoid the attackers.
Radio Frequency Propagation Mechanisms and Empirical Models for Hilly Areas Famoriji John O; Olasoji Yekeen O
International Journal of Electrical and Computer Engineering (IJECE) Vol 3, No 3: June 2013
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (302.227 KB)

Abstract

Achieving better network performance is a paramount concern in wireless networks. This paper provides a survey of the basic mechanisms which influence the propagation of electromagnetic waves in hilly areas. Three empirical models: COST231-Hata, Okumura-Hata and Egli which are suitable for path loss prediction for such area are presented. By using these propagation models the broadcast signal strength are predicted for this type of environment. Measurement results of signal strength in UHF band obtained in Idanre Town of Ondo State Nigeria are presented and compared with the results predicted by using the propagation models. A modified COST231-Hata radiowave propagation model was developed and implemented with Matlab GUI (Graphical User Interface) for simulation. The model developed has 93.8% accuracy.DOI:http://dx.doi.org/10.11591/ijece.v3i3.2519
Crosstalk in misaligned free space optical interconnects: modelling and simulation Nedal Al-Ababneh
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 3: June 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (946.506 KB) | DOI: 10.11591/ijece.v9i3.pp1620-1629

Abstract

We introduce convenient model and an optimization scheme to optimize the signal-to-crosstalk ratio (SCR) in a free space optical interconnects (FSOIs) system that uses microlenses with finite circular apertures. In this model, we consider both the stray light crosstalk and the crosstalk due to the diffraction at the microlens apertures to evaluate the SCR. Using cylindrical form of Collins diffraction integral and the Laguerre–Gaussian (LG) beam model, we derive an approximate closed form formula for the optical field of a multimode LG beam propagating through circular apertured FSOIs by expanding the hard edge circular aperture function of the microlens in terms of complex Gaussian functions. The analyses indicate that the size of the detector is an important factor to optimize the SCR for both the apertured and the unapertured misaligned FSOIs system. The effect of higher order mode of the laser source on the SCR is also considered. 
Improved Denoising Method for Ultrasonic Echo with Mother Wavelet Optimization and Best-Basis Selection Mohammad Hossein Doost Mohammadi
International Journal of Electrical and Computer Engineering (IJECE) Vol 6, No 6: December 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1008.343 KB) | DOI: 10.11591/ijece.v6i6.pp2742-2754

Abstract

Weak features of ultrasonicnondestructive test signals are usually immersed in noisy signals. So, in this paper, we proposed an improved scheme for noise reduction and feature extraction based on discrete wavelet transform. The basis of the mother wavelet was selected to be matched to a given signal. Three different constraints were presented to minimize the error between the denoised and the given signal. It should be mentioned that such an optimum wavelet can represent the signal more compactly with a few large coefficients which can be considered as the signal features. Standard signals and simulated ultrasonic echo were used to evaluate the performance of the presented algorithms. Signal to error ratio was used to compare the designed wavelet performance with that of standard wavelets. Simulation results revealed that the proposed method outperformed the other presented methods and even standard wavelets. The results also has shown that the signal-based noise reduction algorithms make the feature extraction more reliable. Finally, the performance of the proposed algorithm was compared with other methods from different literatures.

Page 70 of 631 | Total Record : 6301


Filter by Year

2011 2026


Filter By Issues
All Issue Vol 16, No 1: February 2026 Vol 15, No 6: December 2025 Vol 15, No 5: October 2025 Vol 15, No 4: August 2025 Vol 15, No 3: June 2025 Vol 15, No 2: April 2025 Vol 15, No 1: February 2025 Vol 14, No 6: December 2024 Vol 14, No 5: October 2024 Vol 14, No 4: August 2024 Vol 14, No 3: June 2024 Vol 14, No 2: April 2024 Vol 14, No 1: February 2024 Vol 13, No 6: December 2023 Vol 13, No 5: October 2023 Vol 13, No 4: August 2023 Vol 13, No 3: June 2023 Vol 13, No 2: April 2023 Vol 13, No 1: February 2023 Vol 12, No 6: December 2022 Vol 12, No 5: October 2022 Vol 12, No 4: August 2022 Vol 12, No 3: June 2022 Vol 12, No 2: April 2022 Vol 12, No 1: February 2022 Vol 11, No 6: December 2021 Vol 11, No 5: October 2021 Vol 11, No 4: August 2021 Vol 11, No 3: June 2021 Vol 11, No 2: April 2021 Vol 11, No 1: February 2021 Vol 10, No 6: December 2020 Vol 10, No 5: October 2020 Vol 10, No 4: August 2020 Vol 10, No 3: June 2020 Vol 10, No 2: April 2020 Vol 10, No 1: February 2020 Vol 9, No 6: December 2019 Vol 9, No 5: October 2019 Vol 9, No 4: August 2019 Vol 9, No 3: June 2019 Vol 9, No 2: April 2019 Vol 9, No 1: February 2019 Vol 8, No 6: December 2018 Vol 8, No 5: October 2018 Vol 8, No 4: August 2018 Vol 8, No 3: June 2018 Vol 8, No 2: April 2018 Vol 8, No 1: February 2018 Vol 7, No 6: December 2017 Vol 7, No 5: October 2017 Vol 7, No 4: August 2017 Vol 7, No 3: June 2017 Vol 7, No 2: April 2017 Vol 7, No 1: February 2017 Vol 6, No 6: December 2016 Vol 6, No 5: October 2016 Vol 6, No 4: August 2016 Vol 6, No 3: June 2016 Vol 6, No 2: April 2016 Vol 6, No 1: February 2016 Vol 5, No 6: December 2015 Vol 5, No 5: October 2015 Vol 5, No 4: August 2015 Vol 5, No 3: June 2015 Vol 5, No 2: April 2015 Vol 5, No 1: February 2015 Vol 4, No 6: December 2014 Vol 4, No 5: October 2014 Vol 4, No 4: August 2014 Vol 4, No 3: June 2014 Vol 4, No 2: April 2014 Vol 4, No 1: February 2014 Vol 3, No 6: December 2013 Vol 3, No 5: October 2013 Vol 3, No 4: August 2013 Vol 3, No 3: June 2013 Vol 3, No 2: April 2013 Vol 3, No 1: February 2013 Vol 2, No 6: December 2012 Vol 2, No 5: October 2012 Vol 2, No 4: August 2012 Vol 2, No 3: June 2012 Vol 2, No 2: April 2012 Vol 2, No 1: February 2012 Vol 1, No 2: December 2011 Vol 1, No 1: September 2011 More Issue