cover
Contact Name
Tole Sutikno
Contact Email
ijece@iaesjournal.com
Phone
-
Journal Mail Official
ijece@iaesjournal.com
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
International Journal of Electrical and Computer Engineering
ISSN : 20888708     EISSN : 27222578     DOI : -
International Journal of Electrical and Computer Engineering (IJECE, ISSN: 2088-8708, a SCOPUS indexed Journal, SNIP: 1.001; SJR: 0.296; CiteScore: 0.99; SJR & CiteScore Q2 on both of the Electrical & Electronics Engineering, and Computer Science) is the official publication of the Institute of Advanced Engineering and Science (IAES). The journal is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication and computer engineering from the global world.
Articles 39 Documents
Search results for , issue "Vol 5, No 5: October 2015" : 39 Documents clear
A Mathematical Model for Minimizing Add-On Operational Cost in Electrical Power Systems Using Design of Experiments Approach Zakaria Al-Omari; A. Hamzeh; Sadeq A. Hamed; A. Sandouk; G. Aldahim
International Journal of Electrical and Computer Engineering (IJECE) Vol 5, No 5: October 2015
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (564.497 KB) | DOI: 10.11591/ijece.v5i5.pp948-956

Abstract

One of the key functions of the Distribution System Operators (DSOs) ofelectrical power systems (EPS) is to minimize the transmission anddistribution power losses and consequently the operational cost. Thisobjective can be reached by operating the system in an optimal mode which is performed by adjusting control parameters such as on-load tap changer (OLTC) settings of transformers, generator excitation levels, and VAR compensators switching. The deviation from operation optimality will result in additional losses and additional operational cost of the power system. Reduction of the operational cost increases the power system efficiency and provides a significant reduction in total energy consumption. This paper proposes a mathematical model for minimizing the additional (add-on) costs based on Design of Experiments (DOE). The relation between add-on operational costs and OLTC settings is established by means of regression statistical analysis. The developed model is applied to a 20-bustest network. The regression curve fitting procedure requires simulation experiments which have been carried out by the DigSilent PowerFactory 13.2 Program for performing network power flow. The results show the effectiveness of the model. The research work raises the importance the power system operation management of the EPS where the Distribution System Operator can avoid the add-on operational costs by continuous correction to get an operation mode close to optimality.
Study of Data Security Algorithms using Verilog HDL M. Sumathi; D. Nirmala; R. Immanuel Rajkumar
International Journal of Electrical and Computer Engineering (IJECE) Vol 5, No 5: October 2015
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (265.13 KB) | DOI: 10.11591/ijece.v5i5.pp1092-1101

Abstract

This paper describes an overview of data security algorithms and its performance evaluation. AES, RC5 and SHA algorithms have been taken under this study. Three different types of security algorithms used to analyze the performance study. The designs were implemented in Quartus-II software. The results obtained for encryption and decryption procedures show a significant improvement on the performance of the three algorithms. In this paper, 128-bit AES, 64-bit of RC5 and 512-bit of SHA256 encryption and Decryption has been made using Verilog Hardware Description Language and simulated using ModelSim.
Computing Subspace Skylines without Dominance Tests Using Set Interaction Approaches T. Vijaya Saradhi; K. Subrahmanyam; Ch.V. Phani Krishna
International Journal of Electrical and Computer Engineering (IJECE) Vol 5, No 5: October 2015
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (199.814 KB) | DOI: 10.11591/ijece.v5i5.pp1188-1193

Abstract

Now a day’s preference answering plays major role in all crucial applications. If user wants to find top k–objects from a set of high dimensional data based on any monotonic function requires huge computation. One of the promising methods to compute preference set is Skyline Technology. Sky line computation returns the set objects that are not overruled by any other objects in n a multi dimensional space. If data is high dimensional, different users requests sky line set based on different dimensions. It requires subspace skyline computation. If objects are d-dimensional we need to compute skyline sets in 2d different subspaces, called as SKYLINE CUBE computation, which incurs lot of computation cost. In this paper we address the problem of finding subspace skyline computation with minimum effort by using simple set interaction methods. By that we can decrease the number of subspace skylines need to be searched to find full sky cube. In this paper we developed one algorithm which uses Boolean algebra rules, skyline lattice to reduce dominance test for preparing sub space skylines.
Multiple Feature Fuzzy c-means Clustering Algorithm for Segmentation of Microarray Images J. Harikiran; P.V. Lakshmi; R. Kiran Kumar
International Journal of Electrical and Computer Engineering (IJECE) Vol 5, No 5: October 2015
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (648.364 KB) | DOI: 10.11591/ijece.v5i5.pp1045-1053

Abstract

Microarray technology allows the simultaneous monitoring of thousands of genes. Based on the gene expression measurements, microarray technology have proven powerful in gene expression profiling for discovering new types of diseases and for predicting the type of a disease. Gridding, segmentation and intensity extraction are the three important steps in microarray image analysis. Clustering algorithms have been used for microarray image segmentation with an advantage that they are not restricted to a particular shape and size for the spots. Instead of using single feature clustering algorithm, this paper presents multiple feature clustering algorithm with three features for each pixel such as pixel intensity, distance from the center of the spot and median of surrounding pixels. In all the traditional clustering algorithms, number of clusters and initial centroids are randomly selected and often specified by the user.  In this paper, a new algorithm based on empirical mode decomposition algorithm for the histogram of the input image will generate the number of clusters and initial centroids required for clustering.   It overcomes the shortage of random initialization in traditional clustering and achieves high computational speed by reducing the number of iterations. The experimental results show that multiple feature Fuzzy C-means has segmented the microarray image more accurately than other algorithms.
Survey on Mutation-based Test Data Generation Hanh Le Thi My; Binh Nguyen Thanh; Tung Khuat Thanh
International Journal of Electrical and Computer Engineering (IJECE) Vol 5, No 5: October 2015
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (134.002 KB) | DOI: 10.11591/ijece.v5i5.pp1164-1173

Abstract

The critical activity of testing is the systematic selection of suitable test cases, which be able to reveal highly the faults. Therefore, mutation coverage is an effective criterion for generating test data. Since the test data generation process is very labor intensive, time-consuming and error-prone when done manually, the automation of this process is highly aspired. The researches about automatic test data generation contributed a set of tools, approaches, development and empirical results. In this paper, we will analyse and conduct a comprehensive survey on generating test data based on mutation. The paper also analyses the trends in this field.
Unbalanced Variable Nonlinear Load Compensation Using Multiple Shunt Active Filters Deepthi Janyavula; Satyendra Nath Saxena
International Journal of Electrical and Computer Engineering (IJECE) Vol 5, No 5: October 2015
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (313.38 KB) | DOI: 10.11591/ijece.v5i5.pp896-904

Abstract

The proposed scheme has considered a three-phase four-wire system, which experienced sag and swell in source voltage for a certain period while feeding an unbalanced and variable non-linear load. The load has unequal resistive and reactive elements in the three phases, forming the unbalanced component. A three-phase silicon controlled rectifier converter with adjustable firing angle connected to the load has formed the variable non-linear component. This has been considered, so as to simulate the unbalanced and variable non-linear  nature of loads in real-time power system. The trends in the total harmonic distortion variation were obtained for the proposed system under power factor correction and voltage regulation mode operation when the load-side converter firing angles of 30°, 60° and 90° were considered using MATLAB/SIMULINK software. Three pulse-width-modulation methods, namely, sinusoidal pulse-width-modulation, space vector modulation and hysteresis pulse-width-modulation have been used to generate pulses for the voltage source converter of the shunt active filter based on the reference currents generated using synchronous reference frame theory.  It has been demonstrated in the proposed paper that power factor correction, voltage regulation, better harmonic reduction and hence load compensation are obtained simultaneously by using two SAFs.
Effect of Device Variables on Surface Potential and Threshold Voltage in DG-GNRFET Baharak Mehrdel; Azlan Abdul Aziz; Mahdiar Hossein Ghadiri
International Journal of Electrical and Computer Engineering (IJECE) Vol 5, No 5: October 2015
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (461.4 KB) | DOI: 10.11591/ijece.v5i5.pp1003-1011

Abstract

In this paper we present four simple analytical threshold voltage model for short- channel and length of saturation velocity region (LVSR) effect that takes into account the built – in potential of the source and drain channel junction, the surface potential and the surface electric field effect on double – gate graphene nanoribbon transistors. Four established models for surface potential, lateral electric field, LVSR and threshold voltage are presented. These models are based on the easy analytical solution of the two dimensional potential distribution in the graphene and Poisson equation which can be used to obtain surface potential, lateral electric field, LVSR and threshold voltage. These models give a closed form solution of the surface potential and electrical field distribution as a function of structural parameters and drain bias. Most of analytical outcomes are shown to correlate with outcomes acquired by Matlab simulation and the end model applicability to the published silicon base devices is demonstrated.
On the Design and Development of a Zigbee-Based Multimodal Input-Output Monitoring-Actuating System Abbas Orand; Y. Tomita; Sayaka Okamoto; Shigeru Sonoda
International Journal of Electrical and Computer Engineering (IJECE) Vol 5, No 5: October 2015
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (526.682 KB) | DOI: 10.11591/ijece.v5i5.pp1143-1152

Abstract

The monitoring of a physically challenged patient’s activities is a crucial and difficult task for the medical professionals. The design and development of a multimodal- input and output wireless system with two sensors and three actuators that can be used for just monitoring or for both monitoring and stimulating are discussed in this research. Touch and tilt sensors at the input part of the system attached to Zigbee modules communicate in a wireless manner with voice, vibration and light actuators connected to Zigbee modules at the output part. The hardware and the software parts are designed and integrated in such a way that a new sensor at the input or a new actuator at the output can be included or excluded based on the needs of the patient. It is shown how to design and develop sensors. In an application programming interface communication mode, 3 XBee series 1 modules send and receive data in a wireless manner. The prototype of the system was tested with promising results in the case of the patients with inattention disorder. This system can be used for monitoring the activities of a patient and also for actuating certain stimulus in the patient side in case of necessity.
Investigating Open Issues in Swarm Intelligence for Mitigating Security Threats in MANET Pradeep Kumar Krishnappa; B R Prasad Babu
International Journal of Electrical and Computer Engineering (IJECE) Vol 5, No 5: October 2015
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (101.304 KB) | DOI: 10.11591/ijece.v5i5.pp1194-1201

Abstract

The area of Mobile Adhoc Network (MANET) has being a demanded topic of research for more than a decade because of its attractive communication features associated with various issues. This paper primarily discusses on the security issues, which has been still unsolved after abundant research work. The paper basically stresses on the potential features of Swarm Intelligence (SI) and its associated techniques to mitigate the security issues. Majority of the previous researches based on SI has used Ant Colony Optimization (ACO) or Particle Swarm Optimization (PSO) extensively. Elaborated discussion on SI with respect to trust management, authentication, and attack models are made with support of some of the recent studies done in same area. The paper finally concludes by discussing the open issues and problem identification of the review.

Page 4 of 4 | Total Record : 39


Filter by Year

2015 2015


Filter By Issues
All Issue Vol 16, No 1: February 2026 Vol 15, No 6: December 2025 Vol 15, No 5: October 2025 Vol 15, No 4: August 2025 Vol 15, No 3: June 2025 Vol 15, No 2: April 2025 Vol 15, No 1: February 2025 Vol 14, No 6: December 2024 Vol 14, No 5: October 2024 Vol 14, No 4: August 2024 Vol 14, No 3: June 2024 Vol 14, No 2: April 2024 Vol 14, No 1: February 2024 Vol 13, No 6: December 2023 Vol 13, No 5: October 2023 Vol 13, No 4: August 2023 Vol 13, No 3: June 2023 Vol 13, No 2: April 2023 Vol 13, No 1: February 2023 Vol 12, No 6: December 2022 Vol 12, No 5: October 2022 Vol 12, No 4: August 2022 Vol 12, No 3: June 2022 Vol 12, No 2: April 2022 Vol 12, No 1: February 2022 Vol 11, No 6: December 2021 Vol 11, No 5: October 2021 Vol 11, No 4: August 2021 Vol 11, No 3: June 2021 Vol 11, No 2: April 2021 Vol 11, No 1: February 2021 Vol 10, No 6: December 2020 Vol 10, No 5: October 2020 Vol 10, No 4: August 2020 Vol 10, No 3: June 2020 Vol 10, No 2: April 2020 Vol 10, No 1: February 2020 Vol 9, No 6: December 2019 Vol 9, No 5: October 2019 Vol 9, No 4: August 2019 Vol 9, No 3: June 2019 Vol 9, No 2: April 2019 Vol 9, No 1: February 2019 Vol 8, No 6: December 2018 Vol 8, No 5: October 2018 Vol 8, No 4: August 2018 Vol 8, No 3: June 2018 Vol 8, No 2: April 2018 Vol 8, No 1: February 2018 Vol 7, No 6: December 2017 Vol 7, No 5: October 2017 Vol 7, No 4: August 2017 Vol 7, No 3: June 2017 Vol 7, No 2: April 2017 Vol 7, No 1: February 2017 Vol 6, No 6: December 2016 Vol 6, No 5: October 2016 Vol 6, No 4: August 2016 Vol 6, No 3: June 2016 Vol 6, No 2: April 2016 Vol 6, No 1: February 2016 Vol 5, No 6: December 2015 Vol 5, No 5: October 2015 Vol 5, No 4: August 2015 Vol 5, No 3: June 2015 Vol 5, No 2: April 2015 Vol 5, No 1: February 2015 Vol 4, No 6: December 2014 Vol 4, No 5: October 2014 Vol 4, No 4: August 2014 Vol 4, No 3: June 2014 Vol 4, No 2: April 2014 Vol 4, No 1: February 2014 Vol 3, No 6: December 2013 Vol 3, No 5: October 2013 Vol 3, No 4: August 2013 Vol 3, No 3: June 2013 Vol 3, No 2: April 2013 Vol 3, No 1: February 2013 Vol 2, No 6: December 2012 Vol 2, No 5: October 2012 Vol 2, No 4: August 2012 Vol 2, No 3: June 2012 Vol 2, No 2: April 2012 Vol 2, No 1: February 2012 Vol 1, No 2: December 2011 Vol 1, No 1: September 2011 More Issue