International Journal of Electrical and Computer Engineering
International Journal of Electrical and Computer Engineering (IJECE, ISSN: 2088-8708, a SCOPUS indexed Journal, SNIP: 1.001; SJR: 0.296; CiteScore: 0.99; SJR & CiteScore Q2 on both of the Electrical & Electronics Engineering, and Computer Science) is the official publication of the Institute of Advanced Engineering and Science (IAES). The journal is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication and computer engineering from the global world.
Articles
15 Documents
Search results for
, issue
"Vol 1, No 2: December 2011"
:
15 Documents
clear
An Efficient Approach for Finding Near Duplicate Web pages using Minimum Weight Overlapping Method
Shine N Das;
Midhun Mathew;
Pramod K. Vijayaraghavan
International Journal of Electrical and Computer Engineering (IJECE) Vol 1, No 2: December 2011
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (200.367 KB)
The existence of billions of web data has severely affected the performance and reliability of web search. The presence of near duplicate web pages plays an important role in this performance degradation while integrating data from heterogeneous sources. Web mining faces huge problems due to the existence of such documents. These pages increase the index storage space and thereby increase the serving cost. By introducing efficient methods to detect and remove such documents from the Web not only decreases the computation time but also increases the relevancy of search results. We aim a novel idea for finding near duplicate web pages which can be incorporated in the field of plagiarism detection, spam detection and focused web crawling scenarios. Here we propose an efficient method for finding near duplicates of an input web page, from a huge repository. A TDW matrix based algorithm is proposed with three phases, rendering, filtering and verification, which receives an input web page and a threshold in its first phase, prefix filtering and positional filtering to reduce the size of record set in the second phase and returns an optimal set of near duplicate web pages in the verification phase by using Minimum Weight Overlapping (MWO) method. The experimental results show that our algorithm outperforms in terms of two benchmark measures, precision and recall, and a reduction in the size of competing record set.DOI:http://dx.doi.org/10.11591/ijece.v1i2.77
Optimum Generation Scheduling for Thermal Power Plants using Artificial Neural Network
Nagaraj Mudukpla Shadaksharappa
International Journal of Electrical and Computer Engineering (IJECE) Vol 1, No 2: December 2011
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (201.066 KB)
A simple method to optimize generation scheduling for thermal power plant using artificial neural network is presented. The optimal generation of generators is achieved considering operational and load constraints. The B- Coefficients are used to evaluate transmission loss in the system. The fuel cost of each unit in a plant is computed. The effectiveness of methodology is tested with six thermal power plants. A result of proposed method is compared with classical method. The artificial neural network method is quick. Hence, artificial neural network technique can be used in central load dispatch center.Keywords- Neural network, B-Coefficients, Fuel cost, Power loss, Real powerDOI:http://dx.doi.org/10.11591/ijece.v1i2.83
Improving Bad Data Detection in State Estimation of Power Systems
Mehrdad Tarafdar Hagh;
Seyyed Mehdi Mahaei;
Kazem Zare
International Journal of Electrical and Computer Engineering (IJECE) Vol 1, No 2: December 2011
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (114.334 KB)
In state estimation of power systems, it is possible that measurements include bad data, influencing on state estimations of power system. Several intelligent methods have been proposed to detect bad data which should be trained in various network situations but they are almost impractical because of abound situations of actual network. Some mathematical methods such as Chi-Square Distribution Test, Largest Normalized Residual Test and Hypotheses Testing Identification as the detectors of bad data have been presented, too. Sometimes these mathematical methods are not able to detect bad data. This paper proposes a method which can improve the detection of bad data in mentioned mathematical methods. Case studies have been done with different given errors on measurements of IEEE 14-bus system, and it was shown that this method is effective to improve the bad data detection.DOI:http://dx.doi.org/10.11591/ijece.v1i2.133 Keywords: Bad Data; Chi-Square Distribution; Largest Normalized Residual; Hypotheses Testing Identification
Creation of Digital Elevated Model using lunar images of Chandrayan – 1
Sannidhi K S;
M. Z. Kurian
International Journal of Electrical and Computer Engineering (IJECE) Vol 1, No 2: December 2011
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (89.6 KB)
The present work discusses the technique and methodology of analysing and Terrain Mapping Camera (TMC) Images acquired during India’s first Moon mission, Chandrayaan – 1, launched on October, 2008 for generating Digital Elevated Model (DEM). The Terrain Mapping Camera (TMC) on India’s first satellite for lunar exploration, Chandrayaan-1, is intended for systematic topographic mapping of the entire lunar surface, including the far side and the polar regions. A high resolution imagery of the entire Moon will help detailed study of specific lunar regions of scientific interests and further our understanding of lunar evolution. The swath of the instrument is 20 km. The digital elevation model (DEM) is a computer representation of the moon’s surface. DEMs can be generated by traditional photogrammetry based on aerial photos if they are available and they are created very often more economically by the means of space images. A Digital Terrain Model (DEM) is a continuous representation of a ground surface landform that is commonly used to produce topographic maps. DEMs are created by integrating data obtained from a wide range of techniques including remote sensing and land surveying.DEM's are sampled arrays of elevation values representing ground positions at regularly spaced intervals. Digital Elevation Model (DEM) is the terminology adopted by the USGS to describe terrain elevation data sets in a digital raster form. The normal orientation of data is by columns and rows. In this project work a DEM is created for each of the lunar images retrieved from the space craft using Triangulated Irregular Network (TIN)Key Words : Chandrayaan-1, DEM, Swath, TMC, TINDOI:http://dx.doi.org/10.11591/ijece.v1i2.80
Performance Evaluation of Channel Estimation in OFDM System for Different QAM and PSK Modulations
Surinder Singh;
Hari Ram;
Sandeep Singh Gill
International Journal of Electrical and Computer Engineering (IJECE) Vol 1, No 2: December 2011
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (130.758 KB)
To recover accurate transmitted data at the receiver end, the information regarding channel state derived from channel estimation methods play a very important role in any communication system. In this paper the performance evaluation of different types of QAM and PSK modulations with three different channel estimation methods in OFDM system for wireless communication in frequency domain for slow fading channel is compared. The results must be useful in OFDM based applications like IEEE 802.16(d) and equivalent standards.DOI:http://dx.doi.org/10.11591/ijece.v1i2.148
Smoothing Control of Wind Farm Output Fluctuations by Fuzzy Logic Controlled SMES
Md. Rafiqul Islam Sheikh;
Tamura Junji
International Journal of Electrical and Computer Engineering (IJECE) Vol 1, No 2: December 2011
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1504.055 KB)
Due to random variations of wind speed, the output power and terminal voltage of a fixed speed wind generator fluctuate continuously. These irregularities in power output are affecting both the power quality and reliability. It is reported that STATCOM/SMES (Superconducting Magnetic Energy Storage) system can significantly decrease voltage and output power fluctuations of grid connected fixed speed wind generator. But the main problem in wind generator output power smoothing is the choice of the reference output power, because it corresponds to energy storage capacity. The storage capacity of SMES that is sufficient for the smoothing control but as small as possible is very important, considering cost effectiveness. In this paper, a fuzzy logic controlled STATCOM/SMES system is proposed, in which both SMA (Simple Moving Average) and EMA (Exponential Moving Average) are used to generate output power reference. Real wind speed data are used in the simulation analyses, whichvalidate the effectiveness of the proposed control strategy. Simulation results clearly show that the proposed STATCOM/SMES system can smooth well the wind generator output power and also maintain the terminal voltage at rated level in both cases when SMA or EMA is used to generate output reference power. Finally, it is shown that reference output power generated by EMA provides better performance with reduced SMES storage capacity than that of output power generated by SMA.Keywords: Minimization of fluctuations, fixed speed wind generator, STATCOM/SMES, simple moving average (SMA) and exponential moving average (EMA), and wind farm (WF).DOI:http://dx.doi.org/10.11591/ijece.v1i2.181
Design Simulation Program of Runway Capacity Using Genetic Algorithm at Soekarno-Hatta
Hoga Saragih;
Indra Sulistyo Wibowo;
Wisnu Darjono Tulodo Utomo;
Rusdianto Roestam
International Journal of Electrical and Computer Engineering (IJECE) Vol 1, No 2: December 2011
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (145.247 KB)
The purposes of this research are to calculate the capacity of runway with runway capacity simulation software using Genetic Algorithm, and to analyze the efforts which have more profound effect. To enhance the runway capacity, some strategies are researched, such as reduction of separation to meet criteria set by FAA’s rule, addition of the exit taxiway, addition of the runway according to master plan of Soekamo-Hatta Airport and changing the runway utilization strategies. Out of the four strategies, the most efficient solution is changing the runway utilization strategies and reduction in separation. However, the addition of runway has the highest capacity increase. Keywords: genetic algorithm, simulation, runway capacity.DOI:http://dx.doi.org/10.11591/ijece.v1i2.85
Comparison Analysis Of Recovery Mechanism At Mpls Network
Mohammad Yanuar Hariyawan
International Journal of Electrical and Computer Engineering (IJECE) Vol 1, No 2: December 2011
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (283.273 KB)
Multi-protocol Label Switching (MPLS) has become an attractive technology of choice for Internet backbone service providers. MPLS features the ability to perform traffic engineering and provides support for Quality of Service traffic provisioning. To deliver reliable service, MPLS requires a set of procedures to provide protection for the traffic carried on Label Switched Paths (LSP). In this case Lable Switched Routers (LSRS) supports recovery mechanism when failure happened in the network.This paper studied about performance from usage of different techniques that can be used to reroute traffic faster then the current IP rerouting methods in the case of a failure in a network. Local rerouting, fast reroute one to one backs up, Haskin, PSL oriented path protection and 1+1 path protection recovery mechanism was compared by given of aggregate traffic which has self-similarity character. Packet drop, rejection probability, recovery time, service disruption time and pre-reserved resources backup will be made as comparator parameter with various bitrate and different position of link failure. Packet loss, rejection probability, recovery time and service disruption time at five recovery mechanisms influenced by position of link failure to ingress. 1+1 path protection mechanism has least packet drop, but costliest way to do recovery in the case of usage resources, as traffic is sent simultaneously in two paths which disjoint. Fast reroute one to one backup is quickest way to operate protection switching recovery after 1+1 path protection mechanism. Keywords: MPLS, recovery, rerouting, self-similar traffic, protection switchingDOI:http://dx.doi.org/10.11591/ijece.v1i2.84
GA For Optimal PI in DC Voltage Regulation of D-STATCOM.
Perumandla Sadanandam
International Journal of Electrical and Computer Engineering (IJECE) Vol 1, No 2: December 2011
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (336.054 KB)
The performance of DSTATCOM depends on a DC capacitor voltage regulation.The regulation of DC capacitor voltage based on optimal PI coefficients. The conventional method to determine PI coefficients is trial and error method. In this paper Genetic Alogorithem is applied for exact calculation of optimized PI coefficients can carried out to reduce disturbances in DC link voltage. Optimizations and simulations are worked out in MATLAB environment. DOI:http://dx.doi.org/10.11591/ijece.v1i2.91
A Survey Report On Elliptic Curve Cryptography
Samta Gajbhiye;
Monisha Sharma;
Samir Dashputre
International Journal of Electrical and Computer Engineering (IJECE) Vol 1, No 2: December 2011
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (98.052 KB)
The paper presents an extensive and careful study of elliptic curve cryptography (ECC) and its applications. This paper also discuss the arithmetic involved in elliptic curve and how these curve operations is crucial in determining the performance of cryptographic systems. It also presents different forms of elliptic curve in various coordinate system , specifying which is most widely used and why. It also explains how isogenenies between elliptic curve provides the secure ECC. Exentended form of elliptic curve i.e hyperelliptic curve has been presented here with its pros and cons. Performance of ECC and HEC is also discussed based on scalar multiplication and DLP. Keywords: Elliptic curve cryptography (ECC), isogenies, hyperelliptic curve (HEC) , Discrete Logarithm Problem (DLP), Integer Factorization , Binary Field, Prime FieldDOI:http://dx.doi.org/10.11591/ijece.v1i2.86