International Journal of Electrical and Computer Engineering
International Journal of Electrical and Computer Engineering (IJECE, ISSN: 2088-8708, a SCOPUS indexed Journal, SNIP: 1.001; SJR: 0.296; CiteScore: 0.99; SJR & CiteScore Q2 on both of the Electrical & Electronics Engineering, and Computer Science) is the official publication of the Institute of Advanced Engineering and Science (IAES). The journal is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication and computer engineering from the global world.
Articles
41 Documents
Search results for
, issue
"Vol 5, No 6: December 2015"
:
41 Documents
clear
De-Identified Personal Health Care System Using Hadoop
Dasari Madhavi;
B.V. Ramana
International Journal of Electrical and Computer Engineering (IJECE) Vol 5, No 6: December 2015
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (907.418 KB)
|
DOI: 10.11591/ijece.v5i6.pp1492-1499
Hadoop technology plays a vital role in improving the quality of healthcare by delivering right information to right people at right time and reduces its cost and time. Most properly health care functions like admission, discharge, and transfer patient data maintained in Computer based Patient Records (CPR), Personal Health Information (PHI), and Electronic Health Records (EHR). The use of medical Big Data is increasingly popular in health care services and clinical research. The biggest challenges in health care centers are the huge amount of data flows into the systems daily. Crunching this Big Data and de-identifying it in a traditional data mining tools had problems. Therefore to provide solution to the de-identifying personal health information, Map Reduce application uses jar files which contain a combination of MR code and PIG queries. This application also uses advanced mechanism of using UDF (User Data File) which is used to protect the health care dataset. De-identified personal health care system is using Map Reduce, Pig Queries which are needed to be executed on the health care dataset. The application input dataset that contains the information of patients and de-identifies their personal health care. De-identification using Hadoop is also suitable for social and demographic data.
The Transient Stability Study of a Synchronous Generator Based on the Rotor Angle Stability
Selwa Fetissi;
Djamel Labed;
Imen Labed
International Journal of Electrical and Computer Engineering (IJECE) Vol 5, No 6: December 2015
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (178.282 KB)
|
DOI: 10.11591/ijece.v5i6.pp1319-1327
Transient stability is an important aspect in the operation of electrical power system. In case of fault occurs in the system, the determining of fault clearing time of circuit breaker is considered one of the main factors to ensure power transfer of the system. This paper is aim to study the transient stability of single machine infinite bus system (SMIB), based on the rotor angle stability. The study is performed to determine the influence of the critical clearing time of the circuit breakers on the rotor angle stability of the generator in the case of three phase fault. For obtaining and determining numerically the nature of the rotor angle of machine, we applied the Step-by-step method for different values of fault clearing time. The results of simulation indicate that determine of critical clearing time is a major evaluation in stability studies. The system model is created in MATLAB/ SIMULINK software.
Password Authentication for multicast host using zero knowledge Proof
Seetha Ranganathan;
R. Saravanan
International Journal of Electrical and Computer Engineering (IJECE) Vol 5, No 6: December 2015
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (123.699 KB)
|
DOI: 10.11591/ijece.v5i6.pp1468-1471
The password which is a more secure and valuable data should be highly protected from eavesdropper. This paper presents how password required for authentication of members of group communication is securely delivered by the source or initiator of the group. The password delivery uses zero knowledge proof and sent to the group member in an encrypted format using cipher block mode encryption. The password delivered is a One Time Password which can be used for certain amount of time in order to ensure a highly secure communication environment among the group.
A Novel Method for Vector Control of Faulty Three-Phase IM Drives Based on FOC Method
Mohammad Jannati;
Nik Rumzi Nik Idris;
Mohd Junaidi Abdul Aziz;
Tole Sutikno
International Journal of Electrical and Computer Engineering (IJECE) Vol 5, No 6: December 2015
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1946.523 KB)
|
DOI: 10.11591/ijece.v5i6.pp1284-1291
This paper proposes a novel method for vector control of faulty three-phase Induction Motor (IM) drives based on Field-Oriented Control (FOC) method. The performance characteristics of the presented drive system are investigated at healthy and open-phase fault conditions. The simulation of the case study is carried out by using the Matlab/M-File software for a star-connected three-phase IM. The results show the better performance of the proposed drive system especially in reduction of motor speed and torque oscillations during open-phase fault operating.
Test Case Reduction Using Ant Colony Optimization for Object Oriented Program
Sudhir Kumar Mohapatra;
Srinivas Prasad
International Journal of Electrical and Computer Engineering (IJECE) Vol 5, No 6: December 2015
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (282.982 KB)
|
DOI: 10.11591/ijece.v5i6.pp1424-1432
Software testing is one in all the vital stages of system development. In software development, developers continually depend upon testing to reveal bugs. Within the maintenance stage test suite size grow due to integration of new functionalities. Addition of latest technique force to make new test case which increase the cost of test suite. In regression testing new test case could also be added to the test suite throughout the entire testing process. These additions of test cases produce risk of presence of redundant test cases. Because of limitation of time and resource, reduction techniques should be accustomed determine and take away. Analysis shows that a set of the test case in a suit should satisfy all the test objectives that is named as representative set. Redundant test case increase the execution price of the test suite, in spite of NP-completeness of the problem there are few sensible reduction techniques are available. During this paper the previous GA primarily based technique proposed is improved to search out cost optimum representative set using ant colony optimization.
Novel Approach for Control Data Theft Attack in Cloud Computing
K. Narasimha Sastry;
B. Thirumala Rao;
T Gunasekhar
International Journal of Electrical and Computer Engineering (IJECE) Vol 5, No 6: December 2015
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (500.057 KB)
|
DOI: 10.11591/ijece.v5i6.pp1545-1552
Information security is a major problem faced by cloud computing around the world. Because of their adverse effects on organizational information systems, viruses, hackers, and attackers insiders can jeopardize organizations capabilities to pursue their undertaken effectively. Although technology based solutions help to mitigate some of the many problems of information security, even the preeminent technology can’t work successfully unless effective human computer communication occurs.IT experts, users and administrators all play crucial role to determine the behavior that occurs as people interact with information technology will support the maintenance of effective security or threaten it. In the present paper we try to apply behavioral science concepts and techniques to understanding problems of information security in organizations.
Numerical and Experimental Investigation of Bridge Currents of an Induction Machine Equipped with Bridge Configured Winding
Sivaramakrishnan Natesan;
Karuna Kalita;
Venkatesu Samala
International Journal of Electrical and Computer Engineering (IJECE) Vol 5, No 6: December 2015
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1191.77 KB)
|
DOI: 10.11591/ijece.v5i6.pp1262-1274
An eccentric rotor motion imbalances the magnetic field distribution in the air-gap region. Due to this uneven flux density distribution, a net radial force called Unbalanced Magnetic Pull (UMP) is in action towards the shortest air-gap. This UMP can degrade the machine’s performance. UMP can be controlled by a special kind of winding called Bridge Configured Winding (BCW). The BCW winding is a single set of winding which is used to produce the torque as well as the controllable force. The main contribution of this paper is to inspect the flow of bridge currents in the bridges when the machine is having rotor eccentricity or unbalance. The bridge currents in the presence of rotor eccentricity with the stator of an Induction machine model has been analyzed by using an Electromagnetic Finite Element (FE) solver called Opera 2D/RM solver (Rotation Motion Analysis). The bridge currents have been measured for two different cases., (i) Induction machine model with zero eccentricity, (ii) Induction machine model with 10% static eccentricity of the air gap. Experimental results are presented for the validation of Opera 2D/RM results. A modified 37kW Induction machine has been used for this study. A known mass unbalance is introduced in the perforated disc in order to create the unbalance in the system purposefully. The bridge currents have been measured and compared with and without unbalance present in the system. The comparison of measured bridge currents for all the cases are given in the frequency domain.
Optimized PID Controller with Bacterial Foraging Algorithm
Seiyed Mohammad Mirzaei;
Mohammad Hossein Moattar
International Journal of Electrical and Computer Engineering (IJECE) Vol 5, No 6: December 2015
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (537.725 KB)
|
DOI: 10.11591/ijece.v5i6.pp1372-1380
Fish robot precision depends on a variety of factors including the precision of motion sensors, mobility of links, elasticity of fish robot actuators system, and the precision of controllers. Among these factors, precision and efficiency of controllers play a key role in fish robot precision. In the present paper, a robot fish has been designed with dynamics and swimming mechanism of a real fish. According to equations of motion, this fish robot is designed with 3 hinged links. Subsequently, its control system was defined based on the same equations. In this paper, an approach is suggested to control fish robot trajectory using optimized PID controller through Bacterial Foraging algorithm, so as to adjust the gains. Then, this controller is compared to the powerful Fuzzy controller and optimized PID controller through PSO algorithm when applying step and sine inputs. The research findings revealed that optimized PID controller through Bacterial Foraging Algorithm had better performance than other approaches in terms of decreasing of the settling time, reduction of the maximum overshoot and desired steady state error in response to step input. Efficiency of the suggested method has been analyzed by MATLAB software.
Sociopsychotechnological Predictors of Individual’s Social Loafing in Virtual Team
Juneman Abraham;
Melina Trimutiasari
International Journal of Electrical and Computer Engineering (IJECE) Vol 5, No 6: December 2015
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (198.656 KB)
|
DOI: 10.11591/ijece.v5i6.pp1500-1510
The rapid development of technology and the demands of the workers to be productive have made efficiency and effectiveness of virtual team collaboration is becoming increasingly urgent lately. Therefore, it is important to identify the variables undermining the efficiency and effectiveness. This study aimed to investigate the role of perceived usefulness, perceived ease of use, and perceived playfulness of online collaboration tool (as elements of technology acceptance) and xenophobia in predicting social loafing (at the individual level)─a social psychological phenomenon that shows the declining performance of the individual when working in the group. The contribution of this research is its attempt to combine social psychological and technological factors in explaining human performance in the context of the group when interacting with technology. The research design was correlational predictive, with multiple linear regression data analysis technique. Participants of this study were 80 students and employees (43 males, 37 females; mean of age = 25.58 years of old, standard deviation of age = 4.92 years) who work using online collaboration tool in a virtual team. The results showed that the perceived playfulness, perceived ease of use, and xenophobia were able to predict an individual’s social loafing, but the perceived usefulness is not able to predict it. Implications of the results of research in order to prevent social loafing are stated in the Discussion section.
Evaluation of PV, Wind, Diesel Hybrid Energy Potential for GSM Tower in Myanmar
Zin Mar Nyo
International Journal of Electrical and Computer Engineering (IJECE) Vol 5, No 6: December 2015
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (158.053 KB)
|
DOI: 10.11591/ijece.v5i6.pp1245-1251
Not only GSM, WCDMA but also CDMA technology can be used in Myanmar but GSM pre-dominates in the market. There are over million unique subscribers across the country in 2013. Power supply for telecom becomes main challenges in Myanmar where the electricity can not access in rural area. To minimize deficit of power, the government has set a target to covert some of tower sites to renewable solutions by 2015. This paper proposes the use of a PV, wind and diesel generator hybrid system with storage element in order to determine the optimal configuration of renewable energy in Myanmar. This paper discusses the development of a renewable energy sources (RES) that can be used for electric power supply of GSM base station site at any given time and considers the feasibility of developing Solar (photovoltaic)-Wind-Diesel hybrid power systems for supplying electricity to off-grid rural telecommunication. The Hybrid Optimization Model for Electric Renewables (HOMER) was used to simulate and generate feasible solution through combinations of photovoltaic, Wind Turbines and Diesel Generator with a minimum levelised cost of electricity supply and to determine the technical feasibility of the system.