International Journal of Electrical and Computer Engineering
International Journal of Electrical and Computer Engineering (IJECE, ISSN: 2088-8708, a SCOPUS indexed Journal, SNIP: 1.001; SJR: 0.296; CiteScore: 0.99; SJR & CiteScore Q2 on both of the Electrical & Electronics Engineering, and Computer Science) is the official publication of the Institute of Advanced Engineering and Science (IAES). The journal is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication and computer engineering from the global world.
Articles
116 Documents
Search results for
, issue
"Vol 10, No 6: December 2020"
:
116 Documents
clear
Improving the initial values of VFactor suitable for balanced modulus
Kritsanapong Somsuk
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 6: December 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijece.v10i6.pp6446-6452
The aim of this study is to estimate the new initial values of VFactor. In general, this algorithm is one of the members in a group of special proposed integer factorization algorithm. It has very high performance whenever the result of the difference between two prime factors of the modulus is a little, it is also called as balanced modulus. In fact, if this situation is occurred, RSA which is a type of public key cryptosystem will be broken easily. In addition, the main process of VFactor is to increase and decrease two odd integers in order to compute the multiplication until the targets are found. However, the initial values are far from the targets especially that the large value of the difference between two prime factors that is not suitable for VFactor. Therefore, the new initial values which are closer to the targets than the traditional values are proposed to decrease loops of the computation. In experimental results, it is shown that the loops can be decreased about 26% for the example of 256 bits-length of modulus that is from the small result of the difference between prime factors.
Model predictive control of magnetic levitation system
Lafta E. Jumaa Alkurawy;
Khalid G. Mohammed
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 6: December 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (678.736 KB)
|
DOI: 10.11591/ijece.v10i6.pp5802-5812
In this work, we suggest a technique of controller design that applied to systems based on nonlinear. We inform the sufficient conditions for the stability of closed loop system. The asymptotic stability of equilibrium and the nonlinear controller can be applied to improvement the stability of Magnetic Levitation system(MagLev). The MagLev nonlinear nodel can be obtained by state equation based on Lagrange function and Model Predictive Control has been used for MagLev system.
Preliminary process in blast cell morphology identification based on image segmentation methods
Retno Supriyanti;
Pangestu F. Wibowo;
Fibra R. Firmanda;
Yogi Ramadhani;
Wahyu Siswandari
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 6: December 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1269.138 KB)
|
DOI: 10.11591/ijece.v10i6.pp5714-5725
The diagnosis of blood disorders in developing countries usually uses the diagnostic procedure Complete Blood Count (CBC). This is due to the limitations of existing health facilities so that examinations use standard microscopes as required in CBC examinations. However, the CBC process still poses a problem, namely that the procedure for manually counting blood cells with a microscope requires a lot of energy and time, and is expensive. This paper will discuss alternative uses of image processing technology in blast cell identification by using microscope images. In this paper, we will discuss in detail the morphological measurements which include the diameter, circumference and area of blast cell cells based on watershed segmentation methods and active contour. As a basis for further development, we compare the performance between the uses of both methods. The results show that the active contour method has an error percentage of 5.15% while the watershed method has an error percentage of 8.25%.
Time-domain harmonic extraction algorithms for three-level inverter-based shunt active power filter under steady-state and dynamic-state conditions-an evaluation study
Ali Saadon Al-Ogaili;
Agileswari Ramasamy;
Yap Hoon;
Renuga Verayiah;
Marayati Marsadek;
Tengku Juhana;
Nur Azzammudin Rahmat
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 6: December 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1242.887 KB)
|
DOI: 10.11591/ijece.v10i6.pp5609-5620
Power quality is a major consideration in all office equipment, manufacturies and residential home appliances. Harmonic distortion is one of the crucial power quality issues. In order to mitigate the harmonic distortion, the performance of shunt active power filter (SAPF) is judged in terms of the accuracy and response time of its designed controller. In this context, the controller consists of three parts: harmonic extraction, switching control, and DC-link capacitor. The harmonic extraction technique serves the major role of deriving the required reference current to ensure successful mitigation of current harmonics by SAPF. Among the existing techniques, harmonic extraction algorithms based on time-domain approaches are most widely applied as they offer simple implementation features with increased speed and reduced computational burden. This paper presents detailed investigation and analysis regarding the performance of two famous time-domain harmonic extraction techniques namely, synchronous reference frame (SRF) and instantaneous power (PQ) theory. Extensive simulation work is conducted in MATLAB-Simulink platform under two conditions, which are, steady-state conditions and dynamic-state conditions, considering various highly nonlinear loads. For evaluation purposes, each control algorithm is incorporated into the controller of a three-phase SAPF, developed using a three-level neutral-point-clamped (NPC) inverter. Comprehensive results are provided to confirm mitigation performance of the SAPF utilizing each harmonic extraction algorithm.
Ontology-based context-sensitive software security knowledge management modeling
Mamdouh Alenezi
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 6: December 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (581.414 KB)
|
DOI: 10.11591/ijece.v10i6.pp6507-6520
The disconcerting increase in the number of security attacks on software calls for an imminent need for including secure development practices within the software development life cycle. The software security management system has received considerable attention lately and various efforts have been made in this direction. However, security is usually only considered in the early stages of the development of software. Thus, this leads to stating other vulnerabilities from a security perspective. Moreover, despite the abundance of security knowledge available online and in books, the systems that are being developed are seldom sufficiently secure. In this paper, we have highlighted the need for including application context sensitive modeling within a case-based software security management system. Furthermore, we have taken the context-driven and ontology-based frameworks and prioritized their attributes according to their weights which were achieved by using the Fuzzy AHP methodology.
Design and optimization of cost-effective coldproof portable enclosures for polar environment
Behzad Parsi;
Lihong Zhang
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 6: December 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijece.v10i6.pp6251-6259
Based on the International Electrotechnical Commission standards, the electronic devices in the industrial class (e.g., integrated circuits or batteries) can only operate at the ambient temperature between -40°C and 85°C. For the human-involved regions in Alaska, Northern Canada, and Antarctica, extreme cold condition as low as -55°C might affect sensing electronic devices utilized in the scientific or industrial applications. In this paper, we propose a design and optimization methodology for the self-heating portable enclosures, which can warm up the inner space from -55°C for encasing the low-cost industrial-class electronic devices instead of expensive military-class ones to work reliably within their allowed operating temperature limit. Among the other options, ceramic thermal resistors are selected as the heating elements inside the enclosure. The placement of the thermal resistors is studied with the aid of thermal modelling for the single heating device by using the curve fitting technique to achieve uniform temperature distribution within the enclosure. To maintain the inner temperature above -40°C but with the least power consumption from the thermal resistors, we have developed a control system based on the fuzzy logic controller. For validation, we have utilized COMSOL Multiphysics software and then one prototyped enclosure along with the fuzzy control system. Our experimental measurement exhibits its efficacy compared to the other design options.
Authentication and password storing improvement using SXR algorithm with a hash function
Jakkapong Polpong;
Pongpisit Wuttidittachotti
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 6: December 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijece.v10i6.pp6582-6591
Secure password storing is essential in systems working based on password authentication. In this paper, SXR algorithm (Split, Exclusive OR, and Replace) was proposed to improve secure password storing and could also be applied to current authentication systems. SXR algorithm consisted of four steps. First, the received password from users was hashed through a general hash function. Second, the ratio and the number of iterations from the secret key (username and password) were calculated. Third, the hashed password and ratio were computed, and the hashed password was divided based on the ratio (Split) into two values. Both the values were applied to XOR equation according to the number of iterations, resulting in two new values. Last, the obtained values were concatenated and stored in the database (Replace). On evaluating, complexity analyses and comparisons has shown that SXR algorithm could provide attack resistance with a stronger hashed password against the aforementioned attacks. Consequently, even if the hackers hacked the hashed password, it would be challenging and would consume more time to decrypt the actual one, because the pattern of the stored password is the same as the one that has been hashed through the general hash function.
Improving the delivered power quality from WECS to the grid based on PMSG control model
Shimaa A. Hussien;
M. A. Deab;
N. S. Hosny
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 6: December 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijece.v10i6.pp6349-6360
Renewable energy has become one of the most energy resources nowadays, especially, wind energy. It is important to implement more analysis and develop new control algorithms due to the rapid changes in the wind generators size and the power electronics development in wind energy applications. This paper proposes a grid-connected wind energy conversion system (WECS) control scheme using permanent magnet synchronous generator (PMSG). The model works to improve the delivered power quality and maximize its value. The system contained one controller on the grid side converter (GSC) and two simulation packages used to simulate this model, which were PSIM software package for simulating power circuit and power electronics converters, and MATLAB software package for simulating the controller on Simulink. It employed a meta-heuristic technique to fulfil this target effectively. Mine-blast algorithm (MBA) and harmony search optimization technique (HSO) were applied to the proposed method to get the best controller coefficient to ensure maximum power to the grid and minimize the overshoot and the steady state error for the different control signals. The comparison between the results of the MBA and the HSO showed that the MBA gave better results with the proposed system.
Power losses reduction of power transmission network using optimal location of low-level generation
Marwa M. Marei;
Manal H. Nawer
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 6: December 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (757.22 KB)
|
DOI: 10.11591/ijece.v10i6.pp5586-5591
Due to the growth of demand for electric power, electric power loss reduction takes great attention for the power utility. In this paper, a low-level generation or Distributed Generation (DG) has been used for transmission power losses reduction. Karbala city transmission network (which is the case study) has been represented by using MATLAB m-file to study the load flow and the power loss for it. The paper proposed the Particle Swarm Optimization (PSO) technique in order to find the optimal number and allocation of DG with the objective to decrease power losses as possible. The results show the effect of the optimal allocation of DG on power loss reduction.
Color image encryption based on chaotic shit keying with lossless compression
Ashwaq T. Hashim;
Bahaa D. Jalil
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 6: December 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1436.014 KB)
|
DOI: 10.11591/ijece.v10i6.pp5736-5748
In order to protect valuable data from undesirable readers or against illegal reproduction and modifications, there have been various data encryption techniques. Many methods are developed to perform image encryption. The use of chaotic map for image encryption is very effective, since it increase the security, due to its random behavior. The most attractive feature of deterministic chaotic systems is he extremely unexpected and random-look nature of chaotic signals that may lead to novel applications. A novel image encryption algorithm based on compression and hyper chaotic map techniques is proposed. Firstly the image is decomposed into three subbands R, G, and B then each band is compressed using lossless technique. The generated chaotic sequences from the 3D chaotic system are employed to code the compressed results by employing the idea of chaotic shift encoding (CSK) modulation to encode the three bands to generate the encrypted image. The experiments show that the proposed method give good results in term of security, feasibility, and robustness.