International Journal of Electrical and Computer Engineering
International Journal of Electrical and Computer Engineering (IJECE, ISSN: 2088-8708, a SCOPUS indexed Journal, SNIP: 1.001; SJR: 0.296; CiteScore: 0.99; SJR & CiteScore Q2 on both of the Electrical & Electronics Engineering, and Computer Science) is the official publication of the Institute of Advanced Engineering and Science (IAES). The journal is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication and computer engineering from the global world.
Articles
110 Documents
Search results for
, issue
"Vol 12, No 1: February 2022"
:
110 Documents
clear
Effect of optimal filtering parameters for autoregressive model AR(p) on motor unit action potential signal
Ayad Asaad lbrahim;
Mohammed Ehsan Safi;
Eyad Ibrahim Abbas
International Journal of Electrical and Computer Engineering (IJECE) Vol 12, No 1: February 2022
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijece.v12i1.pp229-238
Error is one element of the autoregressive (AR) model, which is supposed to be white noise. Correspondingly assumption that white noise error is a normal distribution in electromyography (EMG) estimation is one of the common causes for error maximization. This paper presents the effect of a suitable choice of filtering function based on the non-invasive analysis properties of motor unit action potential signal, extracted from a non-invasive method-the high spatial resolution (HSR) electromyography (EMG), recorded during low-level isometric muscle contractions. The final prediction error procedure is used to find the number of parameters in the model. The error signal parameter, the simulated deviation from the actual signals, is suitably filtered to obtain optimally appropriate estimates of the parameters of the automatic regression model. It is filtered to acquire optimally appropriate estimates of the parameters of the automatic regression model. Then appropriate estimates of spectral power shapes are obtained with a high degree of efficiency compared with the robust method under investigation. Extensive experiment results for the proposed technique have shown that it provides a robust and reliable calculation of model parameters. Moreover, estimates of power spectral profiles were evaluated efficiently.
Behavioral biometric based personal authentication in feature phones
Amitabh Thapliyal;
Om Prakash Verma;
Amioy Kumar
International Journal of Electrical and Computer Engineering (IJECE) Vol 12, No 1: February 2022
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijece.v12i1.pp802-815
The usage of mobile phones has increased multifold in the recent decades mostly because of its utility in most of the aspects of daily life, such as communications, entertainment, and financial transactions. Feature phones are generally the keyboard based or lower version of touch based mobile phones, mostly targeted for efficient calling and messaging. In comparison to smart phones, feature phones have no provision of a biometrics system for the user access. The literature, have shown very less attempts in designing a biometrics system which could be most suitable to the low-cost feature phones. A biometric system utilizes the features and attributes based on the physiological or behavioral properties of the individual. In this research, we explore the usefulness of keystroke dynamics for feature phones which offers an efficient and versatile biometric framework. In our research, we have suggested an approach to incorporate the user’s typing patterns to enhance the security in the feature phone. We have applied k-nearest neighbors (k-NN) with fuzzy logic and achieved the equal error rate (EER) 1.88% to get the better accuracy. The experiments are performed with 25 users on Samsung On7 Pro C3590. On comparison, our proposed technique is competitive with almost all the other techniques available in the literature.
Arabic open information extraction system using dependency parsing
Sally Mohamed Ali El-Morsy;
Mahmoud Hussein;
Hamdy M. Mousa
International Journal of Electrical and Computer Engineering (IJECE) Vol 12, No 1: February 2022
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijece.v12i1.pp541-551
Arabic is a Semitic language and one of the most natural languages distinguished by the richness in morphological enunciation and derivation. This special and complex nature makes extracting information from the Arabic language difficult and always needs improvement. Open information extraction systems (OIE) have been emerged and used in different languages, especially in English. However, it has almost not been used for the Arabic language. Accordingly, this paper aims to introduce an OIE system that extracts the relation tuple from Arabic web text, exploiting Arabic dependency parsing and thinking carefully about all possible text relations. Based on clause types' propositions as extractable relations and constituents' grammatical functions, the identities of corresponding clause types are established. The proposed system named Arabic open information extraction(AOIE) can extract highly scalable Arabic text relations while being domain independent. Implementing the proposed system handles the problem using supervised strategies while the system relies on unsupervised extraction strategies. Also, the system has been implemented in several domains to avoid information extraction in a specific field. The results prove that the system achieves high efficiency in extracting clauses from large amounts of text.
Biometric iris templates security based on secret image sharing and chaotic maps
Marwa Fadhel Jassim;
Wafaa mohammed Saeed Hamzah;
Abeer Fadhil Shimal
International Journal of Electrical and Computer Engineering (IJECE) Vol 12, No 1: February 2022
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijece.v12i1.pp339-348
Biometric technique includes of uniquely identifying person based on their physical or behavioural characteristics. It is mainly used for authentication. Storing the template in the database is not a safe approach, because it can be stolen or be tampered with. Due to its importance the template needs to be protected. To treat this safety issue, the suggested system employed a method for securely storing the iris template in the database which is a merging approach for secret image sharing and hiding to enhance security and protect the privacy by decomposing the template into two independent host (public) iris images. The original template can be reconstructed only when both host images are available. Either host image does not expose the identity of the original biometric image. The security and privacy in biometrics-based authentication system is augmented by storing the data in the form of shadows at separated places instead of whole data at one. The proposed biometric recognition system includes iris segmentation algorithms, feature extraction algorithms, a (2, 2) secret sharing and hiding. The experimental results are conducted on standard colour UBIRIS v1 data set. The results indicate that the biometric template protection methods are capable of offering a solution for vulnerability that threatens the biometric template.
Reconfigurable of current-mode differentiator and integrator based-on current conveyor transconductance amplifiers
Soontorn Srisoontorn;
Angkana Charoenmee;
Suphaphorn Panikhom;
Thitiporn Janda;
Suttipong Fungdetch;
Khunpan Patimaprakorn;
Adirek Jantakun
International Journal of Electrical and Computer Engineering (IJECE) Vol 12, No 1: February 2022
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijece.v12i1.pp208-218
The reconfigurable of the differentiator and integrator based on current conveyor transconductance amplifiers (CCTAs) have been presented in this paper. The proposed configurations are provided with two CCTAs and grounded elements. The configurations can be operated in the differentiator and integrator by selecting external passive elements. The input and output currents have low and high impedances, respectively; therefore, the configurations can be cascaded without additional current buffer. The proposed configurations can be electronically tuned by external direct current (DC) bias currents, and it also has slight fluctuation with temperature. An application of universal filter is demonstrated to confirm the ability of the proposed configurations. The results of simulation with Pspice program are accordance with the theoretical analysis.
Optimizing of the installed capacity of hybrid renewable energy with a modified MPPT model
Sukarno Budi Utomo;
Iwan Setiawan;
Berkah Fajar;
Sonny Hady Winoto;
Arief Marwanto
International Journal of Electrical and Computer Engineering (IJECE) Vol 12, No 1: February 2022
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijece.v12i1.pp73-81
The lack of wind speed capacity and the emission of photons from sunlight are the problem in a hybrid system of photovoltaic (PV) panels and wind turbines. To overcome this shortcoming, the incremental conductance (IC) algorithm is applied that could control the converter work cycle and the switching of the buck boost therefore maximum efficiency of maximum power point tracking (MPPT) is reached. The operation of the PV-wind hybrid system, consisting of a 100 W PV array device and a 400 W wind subsystem, 12 V/100 Ah battery energy storage and LED, the PV-wind system requires a hybrid controller for battery charging and usage and load lamp and it’s conducted in experimental setup. The experimental has shown that an average increase in power generated was 38.8% compared to a single system of PV panels or a single wind turbine sub-system. Therefore, the potential opportunities for increasing power production in the tropics wheather could be carried out and applied with this model.
Audio steganography based on least significant bits algorithm with 4D grid multi-wing hyper-chaotic system
Hussein Abdulameer Abdulkadhim;
Jinan Nsaif Shehab
International Journal of Electrical and Computer Engineering (IJECE) Vol 12, No 1: February 2022
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijece.v12i1.pp320-330
Although variety in hiding methods used to protect data and information transmitted via channels but still need more robustness and difficulty to improve protection level of the secret messages from hacking or attacking. Moreover, hiding several medias in one media to reduce the transmission time and band of channel is the important task and define as a gain channel. This calls to find other ways to be more complexity in detecting the secret message. Therefore, this paper proposes cryptography/steganography method to hide an audio/voice message (secret message) in two different cover medias: audio and video. This method is use least significant bits (LSB) algorithm combined with 4D grid multi-wing hyper-chaotic (GMWH) system. Shuffling of an audio using key generated by GMWH system and then hiding message using LSB algorithm will provide more difficulty of extracting the original audio by hackers or attackers. According to analyses of obtained results in the receiver using peak signal-to-noise ratio (PSNR)/mean square error (MSE) and sensitivity of encryption key, the proposed method has more security level and robustness. Finally, this work will provide extra security to the mixture base of crypto-steganographic methods.
Comparative analysis of Dimensions and Scopus bibliographic data sources: an approach to university research productivity
Pachisa Kulkanjanapiban;
Tipawan Silwattananusarn
International Journal of Electrical and Computer Engineering (IJECE) Vol 12, No 1: February 2022
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijece.v12i1.pp706-720
This paper shows a significant comparison of two primary bibliographic data sources at the document level of Scopus and Dimensions. The emphasis is on the differences in their document coverage by institution level of aggregation. The main objective is to assess whether Dimensions offers at the institutional level good new possibilities for bibliometric analysis as at the global level. The results of a comparative study of the citation count profiles of articles published by faculty members of Prince of Songkla University (PSU) in Dimensions and Scopus from the year the databases first included PSU-authored papers (1970 and 1978, respectively) through the end of June 2020. Descriptive statistics and correlation analysis of 19,846 articles indexed in Dimensions and 13,577 indexed in Scopus. The main finding was that the number of citations received by Dimensions was highly correlated with citation counts in Scopus. Spearman’s correlation between citation counts in Dimensions and Scopus was a high and mighty relationship. The findings mainly affect Dimensions’ possibilities as instruments for carrying out bibliometric analysis of university members’ research productivity. University researchers can use Dimensions to retrieve information, and the design policies can be used to evaluate research using scientific databases.
Hybrid power control and contention window adaptation for channel congestion problem in internet of vehicles network
Hayder M. Amer;
Ethar Abduljabbar Hadi;
Lamyaa Ghaleb Shihab;
Hawraa H. Al Mohammed;
Mohammed J. Khami
International Journal of Electrical and Computer Engineering (IJECE) Vol 12, No 1: February 2022
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijece.v12i1.pp497-505
Technology such as vehicular ad hoc networks can be used to enhance the convenience and safety of passenger and drivers. The vehicular ad hoc networks safety applications suffer from performance degradation due to channel congestion in high-density situations. In order to improve vehicular ad hoc networks reliability, performance, and safety, wireless channel congestion should be examined. Features of vehicular networks such as high transmission frequency, fast topology change, high mobility, high disconnection make the congestion control is a challenging task. In this paper, a new congestion control approach is proposed based on the concept of hybrid power control and contention window to ensure a reliable and safe communications architecture within the internet of vehicles network. The proposed approach performance is investigated using an urban scenario. Simulation results show that the network performance has been enhanced by using the hybrid developed strategy in terms of received messages, delay time, messages loss, data collision and congestion ratio.
Comparative study to realize an automatic speaker recognition system
Fadwa Abakarim;
Abdenbi Abenaou
International Journal of Electrical and Computer Engineering (IJECE) Vol 12, No 1: February 2022
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijece.v12i1.pp376-382
In this research, we present an automatic speaker recognition system based on adaptive orthogonal transformations. To obtain the informative features with a minimum dimension from the input signals, we created an adaptive operator, which helped to identify the speaker’s voice in a fast and efficient manner. We test the efficiency and the performance of our method by comparing it with another approach, mel-frequency cepstral coefficients (MFCCs), which is widely used by researchers as their feature extraction method. The experimental results show the importance of creating the adaptive operator, which gives added value to the proposed approach. The performance of the system achieved 96.8% accuracy using Fourier transform as a compression method and 98.1% using Correlation as a compression method.