cover
Contact Name
Tole Sutikno
Contact Email
ijece@iaesjournal.com
Phone
-
Journal Mail Official
ijece@iaesjournal.com
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
International Journal of Electrical and Computer Engineering
ISSN : 20888708     EISSN : 27222578     DOI : -
International Journal of Electrical and Computer Engineering (IJECE, ISSN: 2088-8708, a SCOPUS indexed Journal, SNIP: 1.001; SJR: 0.296; CiteScore: 0.99; SJR & CiteScore Q2 on both of the Electrical & Electronics Engineering, and Computer Science) is the official publication of the Institute of Advanced Engineering and Science (IAES). The journal is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication and computer engineering from the global world.
Articles 60 Documents
Search results for , issue "Vol 6, No 4: August 2016" : 60 Documents clear
Assessment of Step and Touch Voltages for Different Multilayer Soil Models of Complex Grounding Grid Srete Nikolovski; Goran Knežević; Zoran Baus
International Journal of Electrical and Computer Engineering (IJECE) Vol 6, No 4: August 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1075.2 KB) | DOI: 10.11591/ijece.v6i4.pp1441-1455

Abstract

In this paper the influence of different soil models on step and touch voltages are presented. Soil resistivity is the basic characteristic of soil which affects a number of parameters (temperature, humidity, salt content). Basic methods of measuring soil resistivity presented in this paper are: Wenner method, Schlumberger method, General method, Driven rod (3-probe) method and the Dipole-Dipole method. Soil resistivity measurements are used to obtain an equivalent soil model (uniform model, two-layer horizontal model, multi-layer horizontal model, vertical model and others). The CDEGS software package is used for computing GPR (Ground Potential Rise), touch and step voltage with several different soil models. The resulting effect of soil models on the grounding resistance, GPR at the surface, touch and step voltages are shown. The 3D spatial distribution and 2D presentation of all characteristic values for safety analysis are presented and plotted.
Unusual Event Detection using Mean Feature Point Matching Algorithm Chitra Hegde; Shakti Singh Chundawat; Divya S N
International Journal of Electrical and Computer Engineering (IJECE) Vol 6, No 4: August 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (493.12 KB) | DOI: 10.11591/ijece.v6i4.pp1595-1601

Abstract

Analysis and detection of unusual events in public and private surveillance system is a complex task. Detecting unusual events in surveillance video requires the appropriate definition of similarity between events. The key goal of the proposed system is to detect behaviours or actions that can be considered as anomalies. Since suspicious events differ from domain to domain, it remains a challenge to detect those events in major domains such as airport, super malls, educational institutions etc. The proposed Mean Feature Point Matching (MFPM) algorithm is used for detecting unusual events. The Speeded-Up Robust Features (SURF) method is used for feature extraction. The MFPM algorithm compares the feature points of the input image with the mean feature points of trained dataset. The experimental result shows that the proposed system is efficient and accurate for wide variety of surveillance videos.
Designing a Multi-purpose GSM Based Interactive Embedded Data-Acquisition System Providing Solutions for Fire Accidents P Michael Preetam Raj; Rakesh Tirupathi; P Gopi Krishna; Jasti Sateesh; Vijay Krishna Balachander
International Journal of Electrical and Computer Engineering (IJECE) Vol 6, No 4: August 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (462.819 KB) | DOI: 10.11591/ijece.v6i4.pp1506-1513

Abstract

The Data-Acquisition systems with remote accessibility are greatly demanded in industry and consumer applications. In this paper, a data-acquisition system which can save lives and property, based on GSM communication, accommodating a wide range of electronic devices is presented. The system has the special ability to automatically quench fire by spraying water during fire accidents, simultaneously informing the local fire station and the responsible persons as well, saving loss of life and property. Also the varying status can be instantaneously recorded and uploaded in internet, for failure analysis. By using a GPS receiver it is possible to acquire and display the images of the locations where there are fire accidents by decoding the text SMS data, which helps in continuously tracking the fire accident location using google maps, helping the fire engine to reach instantly. Also the cost-effectiveness of the overall system is proved. The embedded board acts as the main controller of this system which has a SIM card placed in it and thus communicates using GSM, making it accessible from anywhere in the world, providing a faster two-way data transfer between the Embedded system and the client, in real-time.
A Generic Review on Effective Intrusion Detection in Ad hoc Networks G. Gopichand; RA.K. Saravanaguru
International Journal of Electrical and Computer Engineering (IJECE) Vol 6, No 4: August 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (155.261 KB) | DOI: 10.11591/ijece.v6i4.pp1779-1784

Abstract

Ad hoc network is specifically designed for the establishment of a network anywhere and anytime, which does not have any fixed infrastructure in order to support the mobility of the users in the network. The network is established without using any access points or base stations for communication implemented in multi hop schemes. Hence we call an Ad hoc network as a collection of nodes which are mobile in nature with a dynamic network infrastructure and forms a temporary network. Because of dynamic topological changes, these networks are vulnerable at the physical link, and they can easily be manipulated. An intruder can easily attack the Ad hoc network by loading the network resources which are available, such as wireless links and energy (battery) levels of other users, and then starts disturbing all the users. This paper provides a comparative survey on the various existing intrusion detection systems for Ad hoc networks based on the various approaches applied in the intrusion detection systems for providing security to the Ad hoc network.
Accurate Iris Localization Using Edge Map Generation and Adaptive Circular Hough Transform for Less Constrained Iris Images Vineet Kumar; Abhijit Asati; Anu Gupta
International Journal of Electrical and Computer Engineering (IJECE) Vol 6, No 4: August 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (493.446 KB) | DOI: 10.11591/ijece.v6i4.pp1637-1646

Abstract

This paper proposes an accurate iris localization algorithm for the iris images acquired under near infrared (NIR) illuminations and having noise due to eyelids, eyelashes, lighting reflections, non-uniform illumination, eyeglasses and eyebrow hair etc. The two main contributions in the paper are an edge map generation technique for pupil boundary detection and an adaptive circular Hough transform (CHT) algorithm for limbic boundary detection, which not only make the iris localization more accurate but faster also. The edge map for pupil boundary detection is generated on intersection (logical AND) of two binary edge maps obtained using thresholding, morphological operations and Sobel edge detection, which results in minimal false edges caused by the noise. The adaptive CHT algorithm for limbic boundary detection searches for a set of two arcs in an image instead of a full circle that counters iris-occlusions by the eyelids and eyelashes. The proposed CHT and adaptive CHT implementations for pupil and limbic boundary detection respectively use a two-dimensional accumulator array that reduces memory requirements. The proposed algorithm gives the accuracies of 99.7% and 99.38% for the challenging CASIA-Iris-Thousand (version 4.0) and CASIA-Iris-Lamp (version 3.0) databases respectively. The average time cost per image is 905 msec. The proposed algorithm is compared with the previous work and shows better results.
Segmentation of Retail Mobile Market Using HMS Algorithm Koyi Anusha; Yashaswini C; Manishankar S
International Journal of Electrical and Computer Engineering (IJECE) Vol 6, No 4: August 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (293.402 KB) | DOI: 10.11591/ijece.v6i4.pp1818-1827

Abstract

In the modern world of marketing, analyzing the trends in market is a key point towards to scope of improvement of any company. Considering the analysis of a retail market where market trends change very frequently based on customer needs and interest is highly challenging. Market segmentation is one of the approaches included in analysis of market trends which gives a diverse view of the market.  The research here concentrates, especially on a case study based on fast moving consumable goods market and identifying market change patterns by applying a novel data mining approach. Data mining includes a wide variety of techniques and algorithm which can be effectively used in the process of market analysis. The research work carried out coins a new algorithm which combines various association rules and techniques, the HMS (Hybrid market segmentation) algorithm with some specialized criteria is used to support the market segmentation. The primary data needed for the analysis and operation are collected through a questionnaire based survey conducted on people from various demographic regions as well as various age groups. Used a quota based sampling approach for the research, The data mining approach here helps to study the large dataset collected and also to extract the useful information required to model the system. The system here is a learning system which improves the market segmentation functionality as data set improves, The paper implements a hybrid data mining approach which effectively segments the retail mobile market in to various customer and product groups and also provides a prediction and suggestion system for company as well as customer. 
Analysis of Brute Force Attacks with Ylmf-pc Signature Anton Valeryevich Arzhakov; Dmitry Sergeevich Silnov
International Journal of Electrical and Computer Engineering (IJECE) Vol 6, No 4: August 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (168.979 KB) | DOI: 10.11591/ijece.v6i4.pp1681-1684

Abstract

Brute force techniques used in many fields of authentication process. Ftp servers, web servers and mail servers very often got threatened by attackers. Old technique for mail service brute force still working and it can be easily detected by special signature.
A Modular Approach and Simulation of an Asynchronous Machine Zineb Mekrini; Seddik Bri
International Journal of Electrical and Computer Engineering (IJECE) Vol 6, No 4: August 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (181.018 KB) | DOI: 10.11591/ijece.v6i4.pp1385-1394

Abstract

This article presents the modeling and simulation of the asynchronous machine. The aim of this research is the mastery of the electrical, mechanical and magnetic behaviors of this type of machine. The Matlab/Simulink is used for simulation two types of no-load and additional load services in transitional and permanent operation. The Analytical equations describing the two operating systems are evaluated and developed by a generalized model of a three-phase induction motor. The simulation results presented in this article confirms that the proposed model gave a satisfactory response in terms of torque characteristics and speed.
Analysis of the range of acceleration for an accelerometer with extended beams Ramon Cabello; Margarita Tecpoyotl; Jose Gerardo Vera; Alfonso Torres; Pedro Vargas; Svetlana Koshevaya
International Journal of Electrical and Computer Engineering (IJECE) Vol 6, No 4: August 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (436.506 KB) | DOI: 10.11591/ijece.v6i4.pp1541-1550

Abstract

The elastic behaviour of a system can be determined by an analysis of stresses. The stress generated in the element loaded of an accelerometer is of interest here. In these devices, the suspension beams are the elements subjected to greater stresses, as they support the mass. The stress that they can support is limited by the elastic limit of the material. Based on this analysis, the operating conditions to prevent permanent deformations are determined. The analysis is focused on the acceleration applied to the accelerometer because this parameter increases considerably the stresses in the device. A relationship between normal stress and gravity applied is obtained. This equation is used in order to avoid exceeding the elastic limit, during the accelerometer operation. This fact determines the acceleration range supported by the device. In the literature, studies about the physics and modelling of accelerometers are performed. However, about the specific acceleration of operation which they are subjected, information about its determination is not provided. In this paper, the analysis is realized considering a Conventional Capacitive Accelerometer (CCA) and a Capacitive Accelerometer with Extended Beams (CAEB), particularly, on the normal stress. When a range of acceleration values are applied, normal stress occur which must not exceed the elastic limit of the material, as it was mentioned before. The Matlab code used to calculate this relationship is given in Appendix A.
Efficient Feature Subset Selection Algorithm for High Dimensional Data Smita Chormunge; Sudarson Jena
International Journal of Electrical and Computer Engineering (IJECE) Vol 6, No 4: August 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (262.379 KB) | DOI: 10.11591/ijece.v6i4.pp1880-1888

Abstract

Feature selection approach solves the dimensionality problem by removing irrelevant and redundant features. Existing Feature selection algorithms take more time to obtain feature subset for high dimensional data. This paper proposes a feature selection algorithm based on Information gain measures for high dimensional data termed as IFSA (Information gain based Feature Selection Algorithm) to produce optimal feature subset in efficient time and improve the computational performance of learning algorithms. IFSA algorithm works in two folds: First apply filter on dataset. Second produce the small feature subset by using information gain measure. Extensive experiments are carried out to compare proposed algorithm and other methods with respect to two different classifiers (Naive bayes and IBK) on microarray and text data sets. The results demonstrate that IFSA not only produces the most select feature subset in efficient time but also improves the classifier performance.

Filter by Year

2016 2016


Filter By Issues
All Issue Vol 16, No 1: February 2026 Vol 15, No 6: December 2025 Vol 15, No 5: October 2025 Vol 15, No 4: August 2025 Vol 15, No 3: June 2025 Vol 15, No 2: April 2025 Vol 15, No 1: February 2025 Vol 14, No 6: December 2024 Vol 14, No 5: October 2024 Vol 14, No 4: August 2024 Vol 14, No 3: June 2024 Vol 14, No 2: April 2024 Vol 14, No 1: February 2024 Vol 13, No 6: December 2023 Vol 13, No 5: October 2023 Vol 13, No 4: August 2023 Vol 13, No 3: June 2023 Vol 13, No 2: April 2023 Vol 13, No 1: February 2023 Vol 12, No 6: December 2022 Vol 12, No 5: October 2022 Vol 12, No 4: August 2022 Vol 12, No 3: June 2022 Vol 12, No 2: April 2022 Vol 12, No 1: February 2022 Vol 11, No 6: December 2021 Vol 11, No 5: October 2021 Vol 11, No 4: August 2021 Vol 11, No 3: June 2021 Vol 11, No 2: April 2021 Vol 11, No 1: February 2021 Vol 10, No 6: December 2020 Vol 10, No 5: October 2020 Vol 10, No 4: August 2020 Vol 10, No 3: June 2020 Vol 10, No 2: April 2020 Vol 10, No 1: February 2020 Vol 9, No 6: December 2019 Vol 9, No 5: October 2019 Vol 9, No 4: August 2019 Vol 9, No 3: June 2019 Vol 9, No 2: April 2019 Vol 9, No 1: February 2019 Vol 8, No 6: December 2018 Vol 8, No 5: October 2018 Vol 8, No 4: August 2018 Vol 8, No 3: June 2018 Vol 8, No 2: April 2018 Vol 8, No 1: February 2018 Vol 7, No 6: December 2017 Vol 7, No 5: October 2017 Vol 7, No 4: August 2017 Vol 7, No 3: June 2017 Vol 7, No 2: April 2017 Vol 7, No 1: February 2017 Vol 6, No 6: December 2016 Vol 6, No 5: October 2016 Vol 6, No 4: August 2016 Vol 6, No 3: June 2016 Vol 6, No 2: April 2016 Vol 6, No 1: February 2016 Vol 5, No 6: December 2015 Vol 5, No 5: October 2015 Vol 5, No 4: August 2015 Vol 5, No 3: June 2015 Vol 5, No 2: April 2015 Vol 5, No 1: February 2015 Vol 4, No 6: December 2014 Vol 4, No 5: October 2014 Vol 4, No 4: August 2014 Vol 4, No 3: June 2014 Vol 4, No 2: April 2014 Vol 4, No 1: February 2014 Vol 3, No 6: December 2013 Vol 3, No 5: October 2013 Vol 3, No 4: August 2013 Vol 3, No 3: June 2013 Vol 3, No 2: April 2013 Vol 3, No 1: February 2013 Vol 2, No 6: December 2012 Vol 2, No 5: October 2012 Vol 2, No 4: August 2012 Vol 2, No 3: June 2012 Vol 2, No 2: April 2012 Vol 2, No 1: February 2012 Vol 1, No 2: December 2011 Vol 1, No 1: September 2011 More Issue