International Journal of Electrical and Computer Engineering
International Journal of Electrical and Computer Engineering (IJECE, ISSN: 2088-8708, a SCOPUS indexed Journal, SNIP: 1.001; SJR: 0.296; CiteScore: 0.99; SJR & CiteScore Q2 on both of the Electrical & Electronics Engineering, and Computer Science) is the official publication of the Institute of Advanced Engineering and Science (IAES). The journal is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication and computer engineering from the global world.
Articles
112 Documents
Search results for
, issue
"Vol 10, No 1: February 2020"
:
112 Documents
clear
A comparative study of three validities computation methods for multimodel approach
Samia Talmoudi Ben Aoun;
Abdennacer Ben Messaoud;
Moufida Lahmari Ksouri
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 1: February 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (505.292 KB)
|
DOI: 10.11591/ijece.v10i1.pp881-890
The multimodel approach offers a very satisfactory results in modelling, diagnose and control of complex systems. In the modelling case, this approach passes by three steps: the determination of the model’s library, the validities computation and the establishment of the final model. In this context, this paper focuses on the elaboration of a comparative study between three recent methods of validities computation. Thus, it highlight the method that offers the best performances in term of precision. To achieve this goal, we apply, these three methods on two simulation examples in order to compare their performances.
Optimal design of adaptive power scheduling using modified ant colony optimization algorithm
Vijo M Joy;
S. Krishnakumar
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 1: February 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (542.505 KB)
|
DOI: 10.11591/ijece.v10i1.pp738-745
For generating and distributing an economic load scheduling approach, artificial neural network (ANN) has been introduced, because power generation and power consumption are economically non-identical. An efficient load scheduling method is suggested in this paper. Normally the power generation system fails due to its instability at peak load time. Traditionally, load shedding process is used in which low priority loads are disconnected from sources. The proposed method handles this problem by scheduling the load based on the power requirements. In many countries the power systems are facing limitations of energy. An efficient optimization algorithm is used to periodically schedule the load demand and the generation. Ant colony optimization (ACO) based ANN is used for this optimal load scheduling process. The present work analyse the technical economical and time-dependent limitations. Also the works meets the demanded load with minimum cost of energy. Inorder to train ANN back propagation (BP) technics is used. A hybrid training process is described in this work. Global optimization algorithms are used to provide back propagation with good initial connection weights.
Voltage collapse point evaluation considering the load dependence in a power system stability problem
Zaid Garcia Sanchez;
Jose Antonio González;
Gustavo Crespo;
Hernan Hernandez Herrera;
Jorge Iván Silva
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 1: February 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (621.696 KB)
|
DOI: 10.11591/ijece.v10i1.pp61-71
Voltage Stability has emerged in recent decades as one of the most common phenomena, occurrence in Electrical Power Systems. Prior researches focused on the development of algorithm indices to solve the stability problem and in the determination of factors with most influence in voltage collapse to solve the stability problem. This paper evaluates the influence that the load dependence has with the voltage on the phenomenon of the voltage stability and especially on the characteristics the collapse point or instability point. Load modeling used is detailed and comparisons of the results obtained are made with those described in the bibliography and those obtained with commercial software. The results of the load margin are also compared when a constant load or a voltage-dependent load is considered as well as the values obtained at the maximum load point and the point of voltage instability.
IoT–smart contracts in data trusted exchange supplied chain based on block chain
S. Ganesh Kumar;
A. Murugan;
B. Muruganantham;
B. Sriman
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 1: February 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (456.991 KB)
|
DOI: 10.11591/ijece.v10i1.pp438-446
Internet of Things (IoT) assumes a critical part in the advancement of different fields. The IoT data trusted exchange in recent year extend of uses influence an awesome request and increasing scale. In such a platform, exchange the data sets that they require and specialist organization can search. However, the enough trust as the third-party mediators for data exchange in centralized infrastructure cannot provide. This paper proposes a blockchain for IoT data trusted exchange based on decentralized solution. In particular, the fundamental standards of blockchain in verify manner, individuals can communicate with each other without a confided in mediator intermediary. Blockchain enable us to have a distributed, digital ledger. IoT (Internet of Things) sensor devices (zigbee) utilizing blockchain technology to assert public availability of temperature records, tracking location shipment, humidity, preventing damage, data immutability. The sensor devices looking the temperature, location, damage of each parcel during the shipment to completely guarantee directions. In blockchain all data is got moved from one position to another, where a smart contract assesses against the product attributes. Ethereum blockchain and smart contracts atlast it gets through knowledge a design to be copied and presents its decentralized distributed digital ledger, auditable, transparent, features visually.
Analysis and implementation of the impact of change: application to heterogeneity algorithms in enterprise architecture
Jihane Lakhrouit;
Karim Baïna
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 1: February 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (996.413 KB)
|
DOI: 10.11591/ijece.v10i1.pp377-386
Measurements play an important role in many scientific fields in general and intheanalysisofenterprisearchitectureinparticular.In software engineering, the measures are used to control the quality of the software product and better manage development projects to control the cost of production.In this article we proposed firstly models and measures to evaluate and analyze the complexity of the enterprise architecture and especially the heterogeneity of components and relationships, and secondely we developed a model to automatically detect the change of measures and their impact on enterprise architecture.
A survey of big data and machine learning
Surender Reddy Salkuti
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 1: February 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (204.908 KB)
|
DOI: 10.11591/ijece.v10i1.pp575-580
This paper presents a detailed analysis of big data and machine learning (ML) in the electrical power and energy sector. Big data analytics for smart energy operations, applications, impact, measurement and control, and challenges are presented in this paper. Big data and machine learning approaches need to be applied after analyzing the power system problem carefully. Determining the match between the strengths of big data and machine learning for solving the power system problem is of utmost important. They can be of great help to plan and operate the traditional grid/smart grid (SG). The basics of big data and machine learning are described in detailed manner along with their applications in various fields such as electrical power and energy, health care and life sciences, government, telecommunications, web and digital media, retailers, finance, e-commerce and customer service, etc. Finally, the challenges and opportunities of big data and machine learning are presented in this paper.
Parameter estimation of three-phase linear induction motor by a DSP-based electric-drives system
Nicolás Toro García;
Yeison Alberto Garcés Gómez;
Fredy Edimer Hoyos Velasco
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 1: February 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (971.922 KB)
|
DOI: 10.11591/ijece.v10i1.pp626-636
This work describes a method to characterize a three-phase linear induction motor in order to determine the various parameters used in its per-phase equivalent circuit by a DSP-based electric-drives system. In LIM (Linear Induction Motor), the air gap is very large compared with the RIMs (Rotary Induction Motors). Further, the secondary part normally does not have slotted structure. It is just made of aluminum and steel plates. Therefore, the effective air gap is larger than the physical air gap. High air gap makes a larger leakage inductance. It leads to lower efficiency and lower power factor. DC resistance test will be done to determine the value of Rs. The primary Inductance Ls will be calculated by running the LIM at synchronous speed. The secondary parameters i.e. Llr and Rr′ will be calculated by blocked-mover test. The experiment for no load test is shown and include a DC motor coupled to the LIM under test. Two methods to calculate the secondary parameters are described.
The conceptual model of information confrontation of virtual communities in social networking services
Kateryna Molodetska;
Yuriy Tymonin;
Ihor Melnychuk
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 1: February 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (677.886 KB)
|
DOI: 10.11591/ijece.v10i1.pp1043-1052
Social networking services are one of the most popular mass media and are used as an effective tool for information confrontation due to their functional characteristics. Existing models of information confrontation take into account the redistribution between conflict parties of only one kind of resource, although in the social networking services there is a need to consider additional factors that determine the effectiveness of virtual communities’ opposition. A conceptual model of information confrontation of virtual communities in social networking services has been developed, and it includes three-layer dynamics of the number of actors, growth of information resources of virtual communities and dynamics of spending resources for the confrontation conduct. The model also takes into account the peculiarities of the antagonistic conflict of virtual communities’ actors through the choice of a differential equation that corresponds to the type of its dynamics. The offered conceptual model formalizes the behavior of virtual communities’ actors in the conditions of antagonistic conflict. At the same time, it allows to investigate the peculiarities of using different strategies to carry out the information fight of virtual communities in social networking services, to choose optimal strategies, to predict the development of conflicts in the information space and to develop effective measures to counter threats to the state’s information security.
Security framework for cloud based electronic health record (EHR) system
Raghavendra Ganiga;
Radhika M. Pai;
Manohara Pai M. M.;
Rajesh Kumar Sinha
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 1: February 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (662.468 KB)
|
DOI: 10.11591/ijece.v10i1.pp455-466
Health records are an integral aspect of any Hospital Management System. With newer innovations in technology, there has been a shift in the way of recording health information. Medical records which used to be managed using various paper charts have now become easier to organize and maintain, thereby increasing the efficiency of medical staff. The Electronic Health Records (EHR) System is becoming a high-tech medical management technology developed for the economic or emerging economic countries like India. In a national health system, the EHR integrates the Electronic Medical Records (EMR) in all collaborating hospitals through different networks. EHR gives healthcare professionals a way to share and manage patient data quickly and effectively. Due to the mass storage of confidential patient data, healthcare organizations are considered as one of the most targeted sectors by intruders. This paper proposes a security framework for EHR system, which takes into consideration the integrity, availability, and confidentiality of health records. The threats posed to the EHR system are modeled by STRIDE modeling tool, and the amount of risk is calculated using DREAD. The paper also suggests the security mechanism and countermeasures based on security standards, which can be utilized in an EHR environment. The paper shows that the utilization of the proposed methods effectively addresses security concerns such as breach of sensitive medical information.
Node clone detection using a stable overlay network
Balika J. Chelliah;
M. S. Antony Vigil;
M. S. Bennet Praba
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 1: February 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (453.113 KB)
|
DOI: 10.11591/ijece.v10i1.pp316-322
Wireless sensor networks consist of number of sensor nodes widely distributed in particular region to communicate and sharing the environmental information and also these data’s are stored in central location for further data prediction. Such nodes are susceptible to cloning attack where the adversary captures a node, replicates with the same identity as that of the captured node and deploys the clone back into the network, causing severe harm to the network. Hence to thwart such attacks, a distributed detection protocol is used with initiator-observer-inspector roles assigned randomly for the nodes to witness the clone and thereby broadcast the evidence through a balanced overlay network. Use of such balanced network provides high security level and reduces the communication cost when compared to other overlay networks with a reasonably less storage consumption.