cover
Contact Name
Tole Sutikno
Contact Email
ijece@iaesjournal.com
Phone
-
Journal Mail Official
ijece@iaesjournal.com
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
International Journal of Electrical and Computer Engineering
ISSN : 20888708     EISSN : 27222578     DOI : -
International Journal of Electrical and Computer Engineering (IJECE, ISSN: 2088-8708, a SCOPUS indexed Journal, SNIP: 1.001; SJR: 0.296; CiteScore: 0.99; SJR & CiteScore Q2 on both of the Electrical & Electronics Engineering, and Computer Science) is the official publication of the Institute of Advanced Engineering and Science (IAES). The journal is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication and computer engineering from the global world.
Articles 39 Documents
Search results for , issue "Vol 5, No 5: October 2015" : 39 Documents clear
An Interleaved Boost Converter Based PFC Control Strategy for BLDC motor V. Ramesh; Y. Kusuma Latha
International Journal of Electrical and Computer Engineering (IJECE) Vol 5, No 5: October 2015
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (249.972 KB) | DOI: 10.11591/ijece.v5i5.pp957-966

Abstract

In this paper, interleaved power factor correction (PFC) boost converter based control strategy for BLDC motor has been Proposed. The converter exhibits the characteristics of voltage doublers for duty greater than 0.5. The switching losses and losses during reverse recovery operation are considerably reduced in this proposed topology. This is due reduction in switching voltages due to voltage doubler mode. The proposed topology has high efficiency compared to conventional counterpart due to slight increase in conduction losses. In this paper, the proposed PFC control Strategy has been applied to a six switch and four switch VSI fed BLDC Motor drive for effective torque ripple minimization. A comparison is also made between the six switch and Four Switch VSI fed PMBLDC Motor drive.
An Empirical Critique of On-Demand Routing Protocols against Rushing Attack in MANET S. Ashok Kumar; E. Suresh Babu; C. Nagaraju; A. Peda Gopi
International Journal of Electrical and Computer Engineering (IJECE) Vol 5, No 5: October 2015
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (800.82 KB) | DOI: 10.11591/ijece.v5i5.pp1102-1110

Abstract

Over the last decade, researchers had  proposed numerous  mobile ad hoc routing protocols for which are operate in an on-demand way, as standard on-demand routing protocols such as AODV, DSR and TORA, etc., have been shown to often have faster reaction time and  lower overhead than proactive protocols. However, the openness of the routing environment and the absence of centralized system and infrastructure make them exposed to security attacks in large extent.  In particular, one such kind of attacks is rushing attack, which is mostly hard to detect due to their inherited properties, that alters the network statistics radically. In this paper, we modeled a rushing attack which is a powerful attack that exploits the weaknesses of the secure routing protocols. Moreover, to know the weakness and strength of these protocols, it is necessary to test their performance in hostile environments. Subsequently, the performance is measured with the various metrics, some ot them are average throughput, packet delivery ratio, average end-to-end delay and etc., to compare and evaluate their performance.
Segmentation of Fingerprint Image Based on Gradient Magnitude and Coherence Saparudin Saparudin; Ghazali Sulong
International Journal of Electrical and Computer Engineering (IJECE) Vol 5, No 5: October 2015
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1602.699 KB) | DOI: 10.11591/ijece.v5i5.pp1202-1215

Abstract

Fingerprint image segmentation is an important pre-processing step in automatic fingerprint recognition system. A well-designed fingerprint segmentation technique can improve the accuracy in collecting clear fingerprint area and mark noise areas. The traditional grey variance segmentation method is widely and easily used, but it can hardly segment fingerprints with low contrast of high noise. To overcome the low image contrast, combining two-block feature; mean of gradient magnitude and coherence, where the fingerprint image is segmented into background, foreground or noisy regions,  has been done. Except for the noisy regions in the foreground, there are still such noises existed in the background whose coherences are low, and are mistakenly assigned as foreground. A novel segmentation method based on combination local mean of grey-scale and local variance of gradient magnitude is presented in this paper. The proposed extraction begins with normalization of the fingerprint. Then, it is followed by foreground region separation from the background. Finally, the gradient coherence approach is used to detect the noise regions existed in the foreground. Experimental results on NIST-Database14 fingerprint images indicate that the proposed method gives the impressive results.
Model Predictive Control System Design for Boiler Turbine Process Sandeep Kumar Sunori; Pradeep Kumar Juneja; Anamika Bhatia Jain
International Journal of Electrical and Computer Engineering (IJECE) Vol 5, No 5: October 2015
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1485.007 KB) | DOI: 10.11591/ijece.v5i5.pp1054-1061

Abstract

MPC is a computer based technique that requires the process model to anticipate the future outputs of that process. An optimal control action is taken by MPC based on this prediction. The MPC is so popular since its control performance has been reported to be best among other conventional techniques to control the multivariable dynamical plants with various inputs and outputs constraints. In the present work the control of boiler turbine process with three manipulated variables namely fuel flow valve position, steam control valve position and feed water flow valve position and three controlled variables namely drum pressure, output power and drum water level deviation [8] has been attempted using MPC technique. Boiler turbine process is very complex and nonlinear multivariable process. A linearized model obtained using Taylor series expansion around operating point has been used.
Dependability Evaluation and Supervision in Thermal Power Plants Marwa Ben Hamouda; Mohamed Najeh Lakhoua; Lilia El Amraoui
International Journal of Electrical and Computer Engineering (IJECE) Vol 5, No 5: October 2015
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (466.335 KB) | DOI: 10.11591/ijece.v5i5.pp905-917

Abstract

In order to improve the productivity and the consistency of its maintenance strategies, the industrial world is based on different techniques and tools developed to ensure safe operation and the supervision of production systems. In fact, dependability evaluation is crucial to controlling the risks associated with system failure, and for this reason, it is one of the fundamental steps in automated system design. In this paper, we present firstly the basic concepts for the study of dependability as well as functional systems analysis. Thus, we present the method SADT (Structured Analysis Design technique). Given the ineffectiveness of methods that are currently exploited are not appropriate because the level of complexity of such industrial systems, we propose in the first the Safe-SADT method which allows the explicit formalization of functional interaction, the identification of the characteristic values affecting complex system dependability, the quantification of RAMS parameters (Reliability, Availability, Maintainability, and Safety) for the system’s operational architecture. Secondly, a methodology for designing supervisory production systems has been presented and has been applied on an example of a SCADA (supervisory control and data acquisition) system of a thermal power plant. Finally, a model of operating safety and supervision of a production system is proposed.
Complementary Split Ring Resonator based Sensor for Crack Detection Rajni Rajni; Amanpreet Kaur; Anupma Marwaha
International Journal of Electrical and Computer Engineering (IJECE) Vol 5, No 5: October 2015
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (547.755 KB) | DOI: 10.11591/ijece.v5i5.pp1012-1017

Abstract

In this paper, the performance of Complementary Split Ring Resonator(CSRR) based sensor is explored by varying the geometrical parameters of asub millimeter crack. Behavior analysis of the CSRR based sensor isperformed by variation in the parameters of crack. Variation in resonantfrequency of sensor is observed in every case and is noteworthy for ourpurpose. This signifies the sensor’s ability to detect crack of differentgeometrical parameters on a metal surface.The effectiveness of the sensor isbeing contemplated through this approach which is appreciable. Anillustrious performance of the crack detection sensor has been discovered inthis analysis. Simulated results show the feasibility of detecting very smallcracks upto 25 ????m width, in the metallic surfaces.
A User- Based Recommendation with a Scalable Machine Learning Tool Ch. Veena; B. Vijaya Babu
International Journal of Electrical and Computer Engineering (IJECE) Vol 5, No 5: October 2015
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (247.584 KB) | DOI: 10.11591/ijece.v5i5.pp1153-1157

Abstract

Recommender Systems have proven to be valuable way for online users to recommend information items like books, videos, songs etc.colloborative filtering methods are used to make all predictions from historical data. In this paper we introduce Apache mahout which is an open source and provides a rich set of components to construct a customized recommender system from a selection of machine learning algorithms.[12] This paper also focuses on addressing the challenges in collaborative filtering like scalability and data sparsity. To deal with scalability problems, we go with a distributed frame work like hadoop. We then present a customized user based recommender system.
Investigation of Rectifier Circuit Configurations for Microwave Power Transmission System Operating at S Band Chuc Huu Doan; Duong Gia Bach
International Journal of Electrical and Computer Engineering (IJECE) Vol 5, No 5: October 2015
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (690.545 KB) | DOI: 10.11591/ijece.v5i5.pp967-974

Abstract

The purpose of this work is to propose rectifier circuit topologies for microwave power transmission system operating at ISM band. This paper particularly presents in detail the proposed rectifier circuit configurations including series diode half wave rectifier and voltage doubler rectifier. The maximum conversion efficiency of rectifier using series diode half wave rectifier is 40.17 % with 220 W load resistance whereas it is 70.06 % with 330 W load resistance for voltage doubler rectifier. Compared to the series rectifier circuit, it is significant to note that the voltage doubler rectifier circuit has higher efficiency. The circuits presented are tuned for a center frequency of 2.45 GHz. The rectifiers were fabricated using microstrip technology. The design, fabrication and measurement results were obtained using a well-known professional design software for microwave engineering, Advanced Design System 2009 (ADS 2009). All design and measurement results will be reported.
Designing an Adversarial Model Against Reactive and Proactive Routing Protocols in MANETS: A Comparative Performance Study A. Peda Gopi; E. Suresh Babu; C. Naga Raju; S. Ashok Kumar
International Journal of Electrical and Computer Engineering (IJECE) Vol 5, No 5: October 2015
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1452.796 KB) | DOI: 10.11591/ijece.v5i5.pp1111-1118

Abstract

Mobile ad-hoc networks are self-organized infrastructure less networks that consists of mobile nodes, which are capable of maintaining and forming the network by themselves. Recently, researchers are designed several routing protocols on these networks. However, these routing protocols are more vulnerable to attacks from the intruders, which can easily paralyze the operation of the network due to its inherited characteristics of MANETS. One such type of attack is wormhole attack. Because of its severity, the wormhole attack has attracted a great deal of attention in the research community. This paper compares reactive and proactive routing protocols in adversarial environment. Specifically, wormhole attack is applied to these routing protocols to evaluate its performance through simulation. Comprehensively the results shows the comparative performance of these protocols against wormhole attack is hard to detect and easy to implement.
Remote Control of Mobile Robot using the Virtual Reality Ibari Benaoumeur; Ahmed-Foitih Zoubir; Hanifi Elhachimi Amar Reda
International Journal of Electrical and Computer Engineering (IJECE) Vol 5, No 5: October 2015
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (260.935 KB) | DOI: 10.11591/ijece.v5i5.pp1062-1074

Abstract

In this paper we present the simulation and manipulation of  teleoperation system for remote control of mobile robot using the Virtual Reality (VR). The objective of this work is to allow the operator to control and supervise a unicycle type mobile robot. In this research we followed three ways: The use of articulated robotic mobile on the Web, the design of remote environment for the experimentation using the network for the mobile robot and the  architecture of control is proposed to facilitate the piloting of the robot. This work proposes a hardware and software architecture based on communication and information technologies to control the virtual robot to improve the control towards the remote robot. A path planning method is integrated to the remote control system. Results show the real possibilities offered by this manipulation, in order to follow a trajectory of the robot and to create applications with a distance access to facilities through networks like the Internet and wireless.

Page 1 of 4 | Total Record : 39


Filter by Year

2015 2015


Filter By Issues
All Issue Vol 15, No 5: October 2025 Vol 15, No 4: August 2025 Vol 15, No 3: June 2025 Vol 15, No 2: April 2025 Vol 15, No 1: February 2025 Vol 14, No 6: December 2024 Vol 14, No 5: October 2024 Vol 14, No 4: August 2024 Vol 14, No 3: June 2024 Vol 14, No 2: April 2024 Vol 14, No 1: February 2024 Vol 13, No 6: December 2023 Vol 13, No 5: October 2023 Vol 13, No 4: August 2023 Vol 13, No 3: June 2023 Vol 13, No 2: April 2023 Vol 13, No 1: February 2023 Vol 12, No 6: December 2022 Vol 12, No 5: October 2022 Vol 12, No 4: August 2022 Vol 12, No 3: June 2022 Vol 12, No 2: April 2022 Vol 12, No 1: February 2022 Vol 11, No 6: December 2021 Vol 11, No 5: October 2021 Vol 11, No 4: August 2021 Vol 11, No 3: June 2021 Vol 11, No 2: April 2021 Vol 11, No 1: February 2021 Vol 10, No 6: December 2020 Vol 10, No 5: October 2020 Vol 10, No 4: August 2020 Vol 10, No 3: June 2020 Vol 10, No 2: April 2020 Vol 10, No 1: February 2020 Vol 9, No 6: December 2019 Vol 9, No 5: October 2019 Vol 9, No 4: August 2019 Vol 9, No 3: June 2019 Vol 9, No 2: April 2019 Vol 9, No 1: February 2019 Vol 8, No 6: December 2018 Vol 8, No 5: October 2018 Vol 8, No 4: August 2018 Vol 8, No 3: June 2018 Vol 8, No 2: April 2018 Vol 8, No 1: February 2018 Vol 7, No 6: December 2017 Vol 7, No 5: October 2017 Vol 7, No 4: August 2017 Vol 7, No 3: June 2017 Vol 7, No 2: April 2017 Vol 7, No 1: February 2017 Vol 6, No 6: December 2016 Vol 6, No 5: October 2016 Vol 6, No 4: August 2016 Vol 6, No 3: June 2016 Vol 6, No 2: April 2016 Vol 6, No 1: February 2016 Vol 5, No 6: December 2015 Vol 5, No 5: October 2015 Vol 5, No 4: August 2015 Vol 5, No 3: June 2015 Vol 5, No 2: April 2015 Vol 5, No 1: February 2015 Vol 4, No 6: December 2014 Vol 4, No 5: October 2014 Vol 4, No 4: August 2014 Vol 4, No 3: June 2014 Vol 4, No 2: April 2014 Vol 4, No 1: February 2014 Vol 3, No 6: December 2013 Vol 3, No 5: October 2013 Vol 3, No 4: August 2013 Vol 3, No 3: June 2013 Vol 3, No 2: April 2013 Vol 3, No 1: February 2013 Vol 2, No 6: December 2012 Vol 2, No 5: October 2012 Vol 2, No 4: August 2012 Vol 2, No 3: June 2012 Vol 2, No 2: April 2012 Vol 2, No 1: February 2012 Vol 1, No 2: December 2011 Vol 1, No 1: September 2011 More Issue