International Journal of Electrical and Computer Engineering
International Journal of Electrical and Computer Engineering (IJECE, ISSN: 2088-8708, a SCOPUS indexed Journal, SNIP: 1.001; SJR: 0.296; CiteScore: 0.99; SJR & CiteScore Q2 on both of the Electrical & Electronics Engineering, and Computer Science) is the official publication of the Institute of Advanced Engineering and Science (IAES). The journal is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication and computer engineering from the global world.
Articles
50 Documents
Search results for
, issue
"Vol 6, No 1: February 2016"
:
50 Documents
clear
3LRM-3 Layer Risk Mitigation Modelling of ICT Software Development Projects
Salma Firdose;
L. Manjunath Rao
International Journal of Electrical and Computer Engineering (IJECE) Vol 6, No 1: February 2016
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (407.951 KB)
|
DOI: 10.11591/ijece.v6i1.pp349-356
With the adoption of new technology and quality standards, the software development firms are still encountering the critical issues of risk modelling. With the changing dynamics of customer needs, potential competition has being mushrooming in the global IT markets to relay a new standard of software engineering which has higher capability of sustaining risk. However, till date, it is still theoretical to large extent from research viewpoint. Hence, this paper presents a mathematical model called as 3LRM that is designed with the simple approach keeping in mind the real-time issues of risk factors in software engineering for ICT software development project. The study has also identified requirement volatility as one of the prominent source of risk and hence, the framework intends to identify a risk as well as mitigating the risk to a large extent. The paper is illustrated with some of the simple statistical approaches of random probability.
Projected Range Dependent Tunneling Current of Asymmetric Double Gate MOSFET
Hak Kee Jung
International Journal of Electrical and Computer Engineering (IJECE) Vol 6, No 1: February 2016
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (139.227 KB)
|
DOI: 10.11591/ijece.v6i1.pp113-119
This study is to analyze the changes of tunneling current according to projected range, a variable of Gaussian function of channel doping function of Asymmetric Double Gate; ADG MOSFET. In MOSFET with channel length below 10 nm, tunneling current occupies a large percentage among off-currents. The increase of tunneling current has a large effect on the characteristics of subthreshold such as threshold voltage movement and the decline of subthreshold swing value, so the accurate analysis of this is being required. To analyze this, potential distribution of series form was obtained using Gaussian distribution function, and using this hermeneutic potential distribution, thermionic emission current and tunneling current making up off-current were obtained. At this point, the effect that the changes of projected range, a variable of Gaussian distribution function, have on the ratio of tunneling current among off-currents was analyzed. As a result, the smaller projected range was, the lower the ratio of tunneling current was. When projected range increased, tunneling current increased largely. Also, it was observed that the value of projected range which the ratio of tunneling current increased changed according to maximum channel doping value, channel length, and channel width.
The Selection of Useful Visual Words for Class-Imbalanced Data in Image Classification
Sutasinee Chimlek;
Part Pramokchon;
Punpiti Piamsa-nga
International Journal of Electrical and Computer Engineering (IJECE) Vol 6, No 1: February 2016
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1433.551 KB)
|
DOI: 10.11591/ijece.v6i1.pp307-319
The bag of visual words (BOVW) has recently been used for image classification in large datasets. A major problem of image classification using BOVW is high dimensionality, with most features usually being irrelevant and different BOVW for multi-view images in each class. Therefore, the selection of significant visual words for multi-view images in each class is an essential method to reduce the size of BOVW while retaining the high performance of image classification. Many feature scores for ranking produce low classification performance for class imbalanced distributions and multi-views in each class. We propose a feature score based on the statistical t-test technique, which is a statistical evaluation of the difference between two sample means, to assess the discriminating power of each individual feature. The multi-class image classification performance of the proposed feature score is compared with four modern feature scores, such as Document Frequency (DF), Mutual information (MI), Pointwise Mutual information (PMI) and Chi-square statistics (CHI). The results show that the average F1-measure performance on the Paris dataset and the SUN397 dataset using the proposed feature score are 92% and 94%, respectively, while all other feature scores do not exceed 80%.
Threshold Computation to Discover Cluster Structure: A New Approach
Preeti Mulay
International Journal of Electrical and Computer Engineering (IJECE) Vol 6, No 1: February 2016
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (250.405 KB)
|
DOI: 10.11591/ijece.v6i1.pp275-282
Cluster members are decided based on how close they are with each other. Compactness of cluster plays an important role in forming better quality clusters. ICNBCF incremental clustering algorithm computes closeness factor between every two data series. To decide members of cluster, it is necessary to know one more decisive factor to compare, threshold. Internal evaluation measure of cluster like variance and dunn index provide required decisive factor. in intial phase of ICNBCF, this decisive factor was given manually by investigative formed closeness factors. With values generated by internal evaluation measure formule, this process can be automated. This paper shows the detailed study of various evaluation measuress to work with new incremental clustreing algorithm ICNBCF.
Defect Detection in Ceramic Images Using Sigma Edge Information and Contour Tracking Method
Kwang-Baek Kim;
Young Woon Woo
International Journal of Electrical and Computer Engineering (IJECE) Vol 6, No 1: February 2016
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1366.601 KB)
|
DOI: 10.11591/ijece.v6i1.pp160-166
In this paper, we suggest a method of detecting defects by applying Hough transform and least squares on ceramic images obtained from non-destructive testing. In the ceramic images obtained from non-destructive testing, the background area, where the defect does not exist, commonly shows gradual change of luminosity in vertical direction. In order to extract the background area which is going to be used in the detection of defects, Hough transform is performed to rotate the ceramic image in a way that the direction of overall luminosity change lies in the vertical direction as much as possible. Least squares is then applied on the rotated image to approximate the contrast value of the background area. The extracted background area is used for extracting defects from the ceramic images. In this paper we applied this method on ceramic images acquired from non-destructive testing. It was confirmed that extracted background area could be effectively applied for searching the section where the defect exists and detecting the defect.
Three Dimensional Space Vector Modulation Theory: Practices without Proofs
Bhaskar Bhattacharya;
Ajoy Kumar Chakraborty
International Journal of Electrical and Computer Engineering (IJECE) Vol 6, No 1: February 2016
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (223.627 KB)
|
DOI: 10.11591/ijece.v6i1.pp21-25
In three dimensional (3D) space vector modulation (SVM) theory with α-β-γ frame there are some issues which are well known and are widely practiced being quite obvious but without any proof so far. In this paper necessary scientific foundations to those issues have been provided. The foremost of these issues has been with the frame of reference to be considered in 3D SVM applications for unbalanced three phase systems. Although for balanced three phase systems there has been no controversy with α-β frame as the frame of reference but in 3D it has not yet been established which one, α-β-γ frame or the a-b-c frame, is mathematically correct. Another significant issue addressed in this work has been to ascertain the exact reason when a three phase system has to be represented in 2D or 3D space to apply SVM. It has been presented for the first time in this work that the key factor that determines whether 3D or 2D SVM has to be applied depends on the presence of time independent symmetrical components in a three phase ac system. Also it has been proved that the third axis, the Y–axis, represents the time independent quantity and that it must be directed perpendicular to the α-β plane passing through the origin.
Augmented Reality Navigation System on Android
Chee Oh Chung;
Yilun He;
Hoe Kyung Jung
International Journal of Electrical and Computer Engineering (IJECE) Vol 6, No 1: February 2016
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (194.017 KB)
|
DOI: 10.11591/ijece.v6i1.pp406-412
With the advent of the Android system, smart phones are rapidly developing and through the conveniency of accessing internet on the smart phones, a user’s location information can be accessed anywhere and anytime easily. Augmented Reality Based Technology enables the provision of variety information such as pictures and location of buildings in the navigation field. Most of the augmented reality program used to Visual Trace Method (Marker method and Markerless Method). For the Visual Trace Method, the marker installation and digital information should be assigned while the Non-visual Trace Method requires the use of hardware (G.P.S, sensors etc). Most navigation systems can only show the path from a user’s current location to their destination. In this paper, the design and implementation of an augmented reality program is discussed. It will use the smart phone’s inbuilt camera and GPS to display a user’s surround information in real time on the smart phone. The proposed system will combine the G.P.S location-based technology and virtual trace technology to provide the user with basic information about a building they are looking for or one in their immediate surrounding.
QoS Design Consideration for Enterprise and Provider’s Network at Ingress and Egress Router for VoIP protocols
Manjur Kolhar;
Mosleh M Abualhaj;
Faiza Rizwan
International Journal of Electrical and Computer Engineering (IJECE) Vol 6, No 1: February 2016
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (411.428 KB)
|
DOI: 10.11591/ijece.v6i1.pp235-241
Compliance with the Service Level Agreement (SLA) metric is a major challenge in a Multiprotocol Label Switching Virtual Private Network (MPLS VPN) because mandatory models must be maintained on both sides of the MPLS VPN in order to achieve end-to-end service levels. The end-to-end service of an MPLS VPN can be degraded owing to various issues such as distributed denial of service (DDoS), and Random Early Detection (RED) that prevents congestion and differentiates between legitimate and illegitimate user traffic. In this study, we propose a centralized solution that uses a SLA Violation Detector (SLAVD) and intrusion detection to prevent SLA violation.
Application of Component Criticality Importance Measures in Design Scheme of Power Plants
Smajo Bisanovic;
Mersiha Samardzic;
Damir Aganovic
International Journal of Electrical and Computer Engineering (IJECE) Vol 6, No 1: February 2016
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (110.803 KB)
|
DOI: 10.11591/ijece.v6i1.pp63-70
This paper presents application of component criticality importance measures in phase of preparation and design of power plants. These measures provide a numerical rank to determine which components are more important for power plant reliability improvement or more critical for power plant failure. Identifying critical components for power plant reliability provides an important input for decision-making and guidance throughout the development project. The study on several schematic design options of conventional thermal power plant show that the importance measures can be used as an effective tool to assess component criticality in the project phase of new production capacities.
Sentimental Analysis of Twitter Data using Classifier Algorithms
Sharvil Shah;
Kannan Kumar;
Ra. K. Sarvananguru
International Journal of Electrical and Computer Engineering (IJECE) Vol 6, No 1: February 2016
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (288.681 KB)
|
DOI: 10.11591/ijece.v6i1.pp357-366
Microblogging has become a daily routine for most of the people in this world. With the help of Microblogging people get opinions about several things going on, not only around the nation but also worldwide. Twitter is one such online social networking website where people can post their views regarding something. It is a huge platform having over 316 Million users registered from all over the world. It enables users to send and read short messages with over 140 characters for compatibility with SMS messaging. A good sentimental analysis of data of this huge platform can lead to achieve many new applications like – Movie reviews, Product reviews, Spam detection, Knowing consumer needs, etc. In this paper, we have devised a new algorithm with which the above needs can be achieved. Our algorithm uses three specific techniques for sentimental analysis and can be called a hybrid algorithm – (1) Hash Tag Classification for topic modeling; (2) Naïve Bayes Classifier Algorithm for polarity classification; (3) Emoticon Analysis for Neutral polar data. These techniques individually have some limitations for sentimental analysis.