International Journal of Electrical and Computer Engineering
International Journal of Electrical and Computer Engineering (IJECE, ISSN: 2088-8708, a SCOPUS indexed Journal, SNIP: 1.001; SJR: 0.296; CiteScore: 0.99; SJR & CiteScore Q2 on both of the Electrical & Electronics Engineering, and Computer Science) is the official publication of the Institute of Advanced Engineering and Science (IAES). The journal is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication and computer engineering from the global world.
Articles
115 Documents
Search results for
, issue
"Vol 10, No 4: August 2020"
:
115 Documents
clear
Bacterial foraging optimization based adaptive neuro fuzzy inference system
C. Arul Murugan;
G. Sureshkumaar;
Nithiyananthan Kannan;
Sunil Thomas
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 4: August 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1032.957 KB)
|
DOI: 10.11591/ijece.v10i4.pp3568-3575
Life of human being and animals depend on the environment which is surrounded by plants. Like human beings, plants also suffer from lot of diseases. Plant gets affected by completely including leaf, stem, root, fruit and flower; this affects the normal growth of the plant. Manual identification and diagnosis of plant diseases is very difficult. This method is costly as well as time-consuming so it is inefficient to be highly specific. Plant pathology deals with the progress in developing classification of plant diseases and their identification. This work clarifies the identification of plant diseases using leaf images caused by bacteria, viruses and fungus. By this method it can be identified and control the diseases. To identify the plant leaf disease Adaptive Neuro Fuzzy Inference System (ANFIS) was proposed. The proposed method shows more refined results than the existing works.
Reversible color video watermarking scheme based on hybrid of integer-to-integer wavelet transform and Arnold transform
Fahad Layth Malallah;
Awatif Ali Jafaar;
Nidaa Hasan Abbas;
Mustafa Ghanem Saeed
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 4: August 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (726.156 KB)
|
DOI: 10.11591/ijece.v10i4.pp3519-3527
Unauthorized redistribution and illegal copying of digital contents are serious issues which have affected numerous types of digital contents such as digital video. One of the methods, which have been suggested to support copyright protection, is to hide digital watermark within the digital video. This paper introduces a new video watermarking system which based on a combination of Arnold transform and integer wavelet transforms (IWT). IWT is employed to decompose the cover video frames whereby Arnold transform is used to scramble the watermark which is a grey scale image. Scrambling the watermark before the concealment makes the transmission more secure by disordering the information. The system performance was benchmarked against related video watermarking schemes, in which the evaluation processes consist of testing against several video operations and attacks. Consequently, the scheme has been demonstrated to be perfectly robust.
Adaptive quantization for spectrum exchange information in mobile cognitive radio networks
Arief Marwanto;
Sharifah Kamilah Syed Yusof;
Muhammad Haikal Satria
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 4: August 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (766.396 KB)
|
DOI: 10.11591/ijece.v10i4.pp3605-3614
To reduce the detection failure of the exchanging signal power onto the OFDM subcarrier signal at uniform quantization, dynamic subcarrier mapping is applied. Moreover, to addressing low SNR’s wall-less than pre-determine threshold, non-uniform quantization or adaptive quantization for the signal quantization size parameter is proposed. μ-law is adopted for adaptive quantization subcarrier mapping which is deployed in mobility environment, such as Doppler Effect and Rayleigh Fading propagation. In this works, sensing node received signal power then sampled into a different polarity positive and negative in μ-law quantization and divided into several segmentation levels. Each segmentation levels are divided into several sub-segment has representing one tone signal subcarrier number OFDM which has the number of quantization level and the width power. The results show that by using both methods, a significant difference is obtained around 8 dB compared to those not using the adaptive method.
Smart monitoring system of Najran dam
A. H. M. Almawgani;
M. A. Alshorman;
M. A. Alyami;
H. M. Alhmammi;
D. S. Almahri;
M. A. Alkhuraym;
A. H. Alwasel
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 4: August 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (729.393 KB)
|
DOI: 10.11591/ijece.v10i4.pp3999-4007
Najran city faces the flood situation every year due to intensive rain and climatic disturbances. Flooding also causes loss of money, along with loss of life and property and the destruction of agriculture and livestock. Thus, this project proposes a conceptual framework with three main phases: monitoring the water level inside the dam and level in water stream before and after the dam, controlling the opening and closing of the dam gate and measuring the water pressure at the dam barrier. In the case of high water level dam is monitored through water sensors placed at the top of the dam and then these sensors give a reference to the stepper motor and the flow of the stepper motor is controlled by the dam gate. The experimental results shows that the proposed system has the capability to reliably tackle the flood water. It can accurately measure the water level and control the gate of dam as soon as the level of the water reaches to danger level and water pressure at the barrier is measured by the sensor. The developed real-time monitoring system in Najran dam will help authorities to take preventive actions to deal with flood disaster.
Data loss prevention (DLP) by using MRSH-v2 algorithm
Basheer Husham Ali;
Ahmed Adeeb Jalal;
Wasseem N. Ibrahem Al-Obaydy Al-Obaydy
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 4: August 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (362.378 KB)
|
DOI: 10.11591/ijece.v10i4.pp3615-3622
Sensitive data may be stored in different forms. Not only legal owners but also malicious people are interesting of getting sensitive data. Exposing valuable data to others leads to severe Consequences. Customers, organizations, and /or companies lose their money and reputation due to data breaches. There are many reasons for data leakages. Internal threats such as human mistakes and external threats such as DDoS attacks are two main reasons for data loss. In general, data may be categorized based into three kinds: data in use, data at rest, and data in motion. Data Loss Prevention (DLP) are good tools to identify important data. DLP can do analysis for data content and send feedback to administrators to make decision such as filtering, deleting, or encryption. Data Loss Prevention (DLP) tools are not a final solution for data breaches, but they consider good security tools to eliminate malicious activities and protect sensitive information. There are many kinds of DLP techniques, and approximation matching is one of them. Mrsh-v2 is one type of approximation matching. It is implemented and evaluated by using TS dataset and confusion matrix. Finally, Mrsh-v2 has high score of true positive and sensitivity, and it has low score of false negative.
Analysis of direct power control AC-DC converter under unbalance voltage supply for steady-state and dynamic response
Nor Azizah Mohd Yusoff;
Azziddin M. Razali;
Kasrul Abdul Karim;
Raja Nor Firdaus Kashfi Raja Othman;
Auzani Jidin;
Nor Aishah Md Zuki;
Nurfaezah Abdullah
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 4: August 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (965.145 KB)
|
DOI: 10.11591/ijece.v10i4.pp3333-3342
This paper presents an analysis of Direct Power Control (DPC) technique for the Three-Phase Pulse Width Modulation (PWM) AC-DC converter under unbalanced supply condition. Unbalance condition will cause the presence of unbalanced current and voltages thus produce the negative components on the grid voltage as well as severe performance degradation of a grid connected Voltage Source Inverter (VSI). The input structures for conventional DPC has been modified with a three simpler sequence networks instead of coupled by a detailed Three-Phase system method. The imbalance voltage can be resolved by separating from the individual elements of voltage and current into symmetrical components called Sequence Network. Consequently, the input power relatively improved during unbalanced condition almost 70% through the measurement of Total Harmonic Distortion (THD) from the conventional Direct Power Control (DPC) in individual elements which is higher compared to separate components. Hence, several analyses are performed in order to analyze the steady state and dynamic performance of the converter, particularly during the load and DC voltage output reference variations.
Tactical approach to identify and quarantine spurious node participation request in sensory application
Somu Parande;
Jayashree D. Mallapur
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 4: August 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (435.466 KB)
|
DOI: 10.11591/ijece.v10i4.pp3451-3459
Securing Wireless Sensor Network (WSN) from variable forms of adversary is still an open end challenge. Review of diversified security apprroaches towards such problems that they are highly symptomatic with respect to resiliency strength against attack. Therefore, the proposed system highlights a novel and effective solution that is capable of identify the spurios request for participating in teh network building process from attacker and in return could deviate the route of attacker to some virtual nodes and links. A simple trust based mechanism is constructed for validating the legitimacy of such request generated from adversary node. The proposed system not only presents a security solution but also assists in enhancing the routing process significantly. The simulated outcome of the study shows that proposed system offers significantly good energy conservation, satisfactory data forwarding performance, reduced processing time in contrast to existing standard security practices.
A data estimation for failing nodes using fuzzy logic with integrated microcontroller in wireless sensor networks
Saad Al-Azzam;
Ahmad Sharieh
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 4: August 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1071.43 KB)
|
DOI: 10.11591/ijece.v10i4.pp3623-3634
Continuous data transmission in wireless sensor networks (WSNs) is one of the most important characteristics which makes sensors prone to failure. a backup strategy needs to co-exist with the infrastructure of the network to assure that no data is missing. The proposed system relies on a backup strategy of building a history file that stores all collected data from these nodes. This file is used later on by fuzzy logic to estimate missing data in case of failure. An easily programmable microcontroller unit is equipped with a data storage mechanism used as cost worthy storage media for these data. An error in estimation is calculated constantly and used for updating a reference “optimal table” that is used in the estimation of missing data. The error values also assure that the system doesn’t go into an incremental error state. This paper presents a system integrated of optimal data table, microcontroller, and fuzzy logic to estimate missing data of failing sensors. The adapted approach is guided by the minimum error calculated from previously collected data. Experimental findings show that the system has great potentials of continuing to function with a failing node, with very low processing capabilities and storage requirements.
Policy resolution of shared data in online social networks
Nisha P. Shetty;
Balachandra Muniyal;
Saleh Mowla
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 4: August 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (607.29 KB)
|
DOI: 10.11591/ijece.v10i4.pp3767-3776
Online social networks have practically a go-to source for information divulging, social exchanges and finding new friends. The popularity of such sites is so profound that they are widely used by people belonging to different age groups and various regions. Widespread use of such sites has given rise to privacy and security issues. This paper proposes a set of rules to be incorporated to safeguard the privacy policies of related users while sharing information and other forms of media online. The proposed access control network takes into account the content sensitivity and confidence level of the accessor to resolve the conflicting privacy policies of the co-owners.
An adaptation of Text2Onto for supporting the French language
Morad Hajji;
Mohammed Qbadou;
Khalifa Mansouri
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 4: August 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (605.683 KB)
|
DOI: 10.11591/ijece.v10i4.pp3743-3750
The ontologies are progressively imposing themselves in the field of knowledge management. While the manual construction of an ontology is by far the most reliable, this task has proved to be too tedious and expensive. To assist humans in the process of building an ontology, several tools have emerged proposing the automatic or semi-automatic construction of ontologies. In this context, Text2Onto has become one of the most recognized ontology learning tools. The performance of this tool is confirmed by several research works. However, the development of this tool is based on Princeton WordNet (PWN) for English. As a result, it is limited to the processing of textual resources written in English. In this paper, we present our approach based on JWOLF, a Java API to access the free WordNet for French that we have developed to adapt this tool for the construction of ontologies from corpus in French. To evaluate the usefulness of our approach, we assessed the performance of the improved version of Text2Onto on a simplistic corpus of French language documents. The results of this experiment have shown that the improved version of Text2Onto according to our approach is effective for the construction of an ontology from textual documents in the French language.