cover
Contact Name
Tole Sutikno
Contact Email
ijece@iaesjournal.com
Phone
-
Journal Mail Official
ijece@iaesjournal.com
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
International Journal of Electrical and Computer Engineering
ISSN : 20888708     EISSN : 27222578     DOI : -
International Journal of Electrical and Computer Engineering (IJECE, ISSN: 2088-8708, a SCOPUS indexed Journal, SNIP: 1.001; SJR: 0.296; CiteScore: 0.99; SJR & CiteScore Q2 on both of the Electrical & Electronics Engineering, and Computer Science) is the official publication of the Institute of Advanced Engineering and Science (IAES). The journal is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication and computer engineering from the global world.
Articles 6,168 Documents
Theoretical and experimental analysis of electromagnetic coupling into microwave circuit Ilham Zerrouk; Mohamed Amellal; Amine Amharech; Mohamed Ramdani; Hassane Kabbaj
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 1: February 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (999.828 KB) | DOI: 10.11591/ijece.v9i1.pp181-189

Abstract

In this paper, our work is devoted to a time domain analysis of field-to-line coupling model. The latter is designed with a uniform microstrip multiconductor transmission line (MTL), connected with a mixed load which can be linear as a resistance, nonlinear like a diode or complex nonlinear as a Metal Semiconductor Field-Effect Transistor (MESFET). The finite difference time-domain technique (FDTD) is used to compute the expression of voltage and current at the line. The primary advantage of this method over many existing methods is that nonlinear terminations may be readily incorporated into the algorithm and the analysis. The numerical predictions using the proposed method show a good agreement with the GHz Transverse Electro Magnetic (GTEM) measurement.
Edge detection algorithm based on quantum superposition principle and photons arrival probability Ayoub Ezzaki; Lhoussaine Masmoudi; Mohamed El Ansari; Francisco-Angel Moreno; Rachid Zenouhi; Javier Gonzalez Jimenez
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 2: April 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1156.314 KB) | DOI: 10.11591/ijece.v10i2.pp1655-1666

Abstract

The detection of object edges in images is a crucial step employed in a vast amount of computer vision applications, for which a series of different algorithms has been developed in the last decades. This paper proposes a new edge detection method based on quantum information, which is achieved in two main steps: (i) an image enhancement stage that employs the quantum superposition law and (ii) an edge detection stage based on the probability of photon arrival to the camera sensor. The proposed method has been tested on synthetic and real images devoted to agriculture applications, where Fram & Deutsh criterion has been adopted to evaluate its performance. The results show that the proposed method gives better results in terms of detection quality and computation time compared to classical edge detection algorithms such as Sobel, Kayyali, Canny and a more recent algorithm based on Shannon entropy.
Design and analysis of Micro-Cantilever based Biosensor for Swine flu Detection M.G.G. Jithendra Prasad; Shameem Syed
International Journal of Electrical and Computer Engineering (IJECE) Vol 6, No 3: June 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (309.386 KB) | DOI: 10.11591/ijece.v6i3.pp1190-1196

Abstract

Swine flu which comes under the category of influenza is caused by N1H1 virus. This Disease in 2009 was termed as pandemic by WHO (World Health Organisation). It was fast spreading almost all over the world then. It is same as normal Flu and can be prevented by flu shots/vaccines. The real importance of the disease is because , it may cause serious health conditions like Pneumonia, Respiratory asthma, bronchitis different types of mucus line cancers ,unlike normal flu. Sometimes human life can be endangered by post effects of Swine flu. According to a study Infant mortality is because due to lack of detection of diseases. Thus Detection of Swine flu virus, which is cause for infant mortality is important. This can be done using the most trusted form by using MEMS. In this paper the Micro-Cantilever is used as the sensing unit. Using COMSOL 4.3b, we designed rectangular cantilever and also a rectangle with a hole punched forming SCR (Stress Concentration Region) concept, analysed and optimized.
The new method of Extraction and Analysis of Non-linear Features for face recognition Ali Mahdavi Hormat; Karim Faez; Zeynab Shokoohi; Mohammad Zaher Karimi
International Journal of Electrical and Computer Engineering (IJECE) Vol 2, No 6: December 2012
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (258.907 KB)

Abstract

In this paper, we introduce the new method of Extraction and Analysis of Non-linear Features (EANF) for face recognition based on extraction and analysis of nonlinear features i.e. Locality Preserving Analysis. In our proposed algorithm, EANF removes disadvantages such as the length of search space, different sizes and qualities of imagees due to various conditions of imaging time that has led to problems in the previous algorithms and removes the disadvantages of ELPDA methods (local neighborhood separator analysis) using the Scatter matrix in the form of a between-class scatter that this matrix introduces and displayes the nearest neighbors to K of the outer class by the samples. In addition, another advantage of EANF is high-speed in the face recognition through miniaturizing the size of feature matrix by NLPCA (Non-Linear Locality Preserving Analysis). Finally, the results of tests on FERET Dataset show the impact of the proposed method on the face recognition.DOI:http://dx.doi.org/10.11591/ijece.v2i6.1773
Fingerprint Authentication Schemes for Mobile Devices Jinho Han
International Journal of Electrical and Computer Engineering (IJECE) Vol 5, No 3: June 2015
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (332.164 KB) | DOI: 10.11591/ijece.v5i3.pp579-585

Abstract

In certain applications, fingerprint authentication systems require templates to be stored in databases. The possible leakage of these fingerprint templates can lead to serious security and privacy threats. Therefore, with the frequent use of fingerprint authentication on mobile devices, it has become increasingly important to keep fingerprint data safe. Due to rapid developments in optical equipment, biometric systems are now able to gain the same biometric images repeatedly, so strong features can be selected with precision. Strong features refer to high-quality features which can be easily distinguished from other features in biometric raw images. In this paper, we introduce an algorithm that identifies these strong features with certain probability from a given fingerprint image. Once values are extracted from these features, they are used as the authentication data. Using the geometric information of these strong features, a cancelable fingerprint template can be produced, and the process of extracting values and geometric information is further explained. Because this is a light-weight authentication scheme, this template has practical usage for low performance mobile devices. Finally, we demonstrate that our proposed schemes are secure and that the user’s biometric raw data of the fingerprint are safe, even when the mobile device is lost or stolen.
Modeling, Control and Power Management Strategy of a Grid connected Hybrid Energy System Sujit Kumar Bhuyan; Prakash Kumar Hota; Bhagabat Panda
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 3: June 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1141.622 KB) | DOI: 10.11591/ijece.v8i3.pp1345-1356

Abstract

This paper presents the detailed modeling of various components of a grid connected hybrid energy system (HES) consisting of a photovoltaic (PV) system, a solid oxide fuel cell (SOFC), an electrolyzer and a hydrogen storage tank with a power flow controller. Also, a valve controlled by the proposed controller decides how much amount of fuel is consumed by fuel cell according to the load demand. In this paper fuel cell is used instead of battery bank because fuel cell is free from pollution. The control and power management strategies are also developed. When the PV power is sufficient then it can fulfill the load demand as well as feeds the extra power to the electrolyzer. By using the electrolyzer, the hydrogen is generated from the water and stored in storage tank and this hydrogen act as a fuel to SOFC. If the availability of the power from the PV system cannot fulfill the load demand, then the fuel cell fulfills the required load demand. The SOFC takes required amount of hydrogen as fuel, which is controlled by the PID controller through a valve. Effectiveness of this technology is verified by the help of computer simulations in MATLAB/SIMULINK environment under various loading conditions and promising results are obtained.
Performance evaluation of different classification techniques using different datasets Abdulkadir Özdemir; Uğur Yavuz; Fares Abdulhafidh Dael
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 5: October 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (18.033 KB) | DOI: 10.11591/ijece.v9i5.pp3584-3590

Abstract

Nowadays data mining become one of the technologies that paly major effect on business intelligence. However, to be able to use the data mining outcome the user should go through many process such as classified data. Classification of data is processing data and organize them in specific categorize to be use in most effective and efficient use. In data mining one technique is not applicable to be applied to all the datasets. This paper showing the difference result of applying different techniques on the same data. This paper evaluates the performance of different classification techniques using different datasets. In this study four data classification techniques have chosen. They are as follow, BayesNet, NaiveBayes, Multilayer perceptron and J48. The selected data classification techniques performance tested under two parameters, the time taken to build the model of the dataset and the percentage of accuracy to classify the dataset in the correct classification. The experiments are carried out using Weka 3.8 software. The results in the paper demonstrate that the efficiency of Multilayer Perceptron classifier in overall the best accuracy performance to classify the instances, and NaiveBayes classifiers were the worst outcome of accuracy to classifying the instance for each dataset.
A Modified Diagonal Mesh Shuffle Exchange Interconnection Network Akash Punhani; Pardeep Kumar; Nitin Nitin
International Journal of Electrical and Computer Engineering (IJECE) Vol 7, No 2: April 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1035.505 KB) | DOI: 10.11591/ijece.v7i2.pp1042-1050

Abstract

Interconnection network is an important part of the digital system. The interconnection mainly describes the topology of the network along with the routing algorithm and flow control mechanism. The topology of the network plays an important role on the performance of the system. Mesh interconnection network was the simplest topology, but has the limited bisection bandwidth on the other hand torus and diagonal mesh was having long links. The Modified diagonal mesh network tried to replace the torodial links but was having more average path length so in proposed topology we have tried to improve the average distance using shuffle exchange network over the boundary node. In this paper, we propose the architecture of Modified Diagonal Mesh Shuffle Exchange Interconnection Network. This Modified Diagonal Mesh Shuffle Exchange Interconnection network have been compared with four popular topologies that are simple 2D Mesh, 2D Torus, Diagonal Mesh and Modified Diagonal Mesh Interconnection Network on the four traffic patterns such as Bit Complement traffic, Neighbor traffic, Tornado traffic and Uniform traffic are used for comparisonand performance analysis. We have performed the analysis with a 5% and 10% of hotspot on the Uniform Traffic. The simulation results shows that the proposed topology is performed better on bit complement traffic and can also handle the other traffic up to certain level.
Augmentation of a SCADA based firewall against foreign hacking devices Abhishek Mungekar; Yashraj Solanki; R. Swarnalatha
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 2: April 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (2029.142 KB) | DOI: 10.11591/ijece.v10i2.pp1359-1366

Abstract

An Industrial firewall is a system used to supervise and regulate traffic to and from a network for the purpose of securing appliances on a network. It analyzes the data passing through it to an already defined surveillance criteria or protocols, discarding data that does not meet the protocol’s requirements. In effect, it is a filter preventing undesirable network traffic and selectively limiting the type of transmission that occurs between a secured transmission line. In this research paper a SCADA based Firewall is implemented for protection of the data transmission to a PLC, against external hacking devices. This firewall is virtually exposed to several external hackers and the degree of vulnerability is carefully studied, in order to develop an ideal Firewall.
An Analytical Approach for Design of Microstrip Patch (MsP) R. J. Kavitha; H. S. Aravind
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 6: December 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (669.333 KB) | DOI: 10.11591/ijece.v8i6.pp4175-4183

Abstract

A reliable configuration of electromagnetic interactions for antenna design can yield an effective Microstrip patch (MsP) antenna. During its design, the antenna arrays involve issues with parameters (i.e., space, dimension, shape) adjustment. This problem can be tackled with an analytical approach which can help to bring better idea to design the antenna aaray. However, the realistic designs of antenna array are quite expensive while extracting computational accuracy. Thus, to have low cost computational accuracy various meta-heuristic (generic algorithm, partical swarm optimizarion) approaches are used and are considered as effective one in handling the pattern synthesis problems. Howeever, the use of meta-heuristic approaches demands thousands of functions to analyze the antenna design. This manuscript introduces an analytical approach for MsP antenna desing using MATLAB that brings optimization in handling the side lobes and optimizing the reflection as well as radiation responses. The outcomes of the design were analyzed with respect to reflection, radiation coefficients, side lobes and found effective at 10GHz as per computational cost is concern.

Page 9 of 617 | Total Record : 6168


Filter by Year

2011 2025


Filter By Issues
All Issue Vol 15, No 5: October 2025 Vol 15, No 4: August 2025 Vol 15, No 3: June 2025 Vol 15, No 2: April 2025 Vol 15, No 1: February 2025 Vol 14, No 6: December 2024 Vol 14, No 5: October 2024 Vol 14, No 4: August 2024 Vol 14, No 3: June 2024 Vol 14, No 2: April 2024 Vol 14, No 1: February 2024 Vol 13, No 6: December 2023 Vol 13, No 5: October 2023 Vol 13, No 4: August 2023 Vol 13, No 3: June 2023 Vol 13, No 2: April 2023 Vol 13, No 1: February 2023 Vol 12, No 6: December 2022 Vol 12, No 5: October 2022 Vol 12, No 4: August 2022 Vol 12, No 3: June 2022 Vol 12, No 2: April 2022 Vol 12, No 1: February 2022 Vol 11, No 6: December 2021 Vol 11, No 5: October 2021 Vol 11, No 4: August 2021 Vol 11, No 3: June 2021 Vol 11, No 2: April 2021 Vol 11, No 1: February 2021 Vol 10, No 6: December 2020 Vol 10, No 5: October 2020 Vol 10, No 4: August 2020 Vol 10, No 3: June 2020 Vol 10, No 2: April 2020 Vol 10, No 1: February 2020 Vol 9, No 6: December 2019 Vol 9, No 5: October 2019 Vol 9, No 4: August 2019 Vol 9, No 3: June 2019 Vol 9, No 2: April 2019 Vol 9, No 1: February 2019 Vol 8, No 6: December 2018 Vol 8, No 5: October 2018 Vol 8, No 4: August 2018 Vol 8, No 3: June 2018 Vol 8, No 2: April 2018 Vol 8, No 1: February 2018 Vol 7, No 6: December 2017 Vol 7, No 5: October 2017 Vol 7, No 4: August 2017 Vol 7, No 3: June 2017 Vol 7, No 2: April 2017 Vol 7, No 1: February 2017 Vol 6, No 6: December 2016 Vol 6, No 5: October 2016 Vol 6, No 4: August 2016 Vol 6, No 3: June 2016 Vol 6, No 2: April 2016 Vol 6, No 1: February 2016 Vol 5, No 6: December 2015 Vol 5, No 5: October 2015 Vol 5, No 4: August 2015 Vol 5, No 3: June 2015 Vol 5, No 2: April 2015 Vol 5, No 1: February 2015 Vol 4, No 6: December 2014 Vol 4, No 5: October 2014 Vol 4, No 4: August 2014 Vol 4, No 3: June 2014 Vol 4, No 2: April 2014 Vol 4, No 1: February 2014 Vol 3, No 6: December 2013 Vol 3, No 5: October 2013 Vol 3, No 4: August 2013 Vol 3, No 3: June 2013 Vol 3, No 2: April 2013 Vol 3, No 1: February 2013 Vol 2, No 6: December 2012 Vol 2, No 5: October 2012 Vol 2, No 4: August 2012 Vol 2, No 3: June 2012 Vol 2, No 2: April 2012 Vol 2, No 1: February 2012 Vol 1, No 2: December 2011 Vol 1, No 1: September 2011 More Issue