International Journal of Electrical and Computer Engineering
International Journal of Electrical and Computer Engineering (IJECE, ISSN: 2088-8708, a SCOPUS indexed Journal, SNIP: 1.001; SJR: 0.296; CiteScore: 0.99; SJR & CiteScore Q2 on both of the Electrical & Electronics Engineering, and Computer Science) is the official publication of the Institute of Advanced Engineering and Science (IAES). The journal is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication and computer engineering from the global world.
Articles
60 Documents
Search results for
, issue
"Vol 6, No 4: August 2016"
:
60 Documents
clear
Application of a controlled outside cold airflow by a PID controller to improve the performance of a household refrigerator
Emna Aridhi;
Mehdi Abbes;
Abdelkader Mami
International Journal of Electrical and Computer Engineering (IJECE) Vol 6, No 4: August 2016
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (438.632 KB)
|
DOI: 10.11591/ijece.v6i4.pp1662-1672
The present paper aims to prove the efficiency of using the cold to improve the performance of a household refrigerator. It is produced naturally in countries that are characterized by a severe wintry climate. The cold airflow is spread out inside a cavity covering the side wall of the appliance, which is connected to the inlet and outlet ducts. For that purpose, a Simulink model is proposed to model this installation. The internal air temperature is computed according to the evaporator temperature and the outside cold airflow that is also computed according to the outside temperature and controlled by a PID controller. The simulation results show that when the internal air temperature is higher than the desired one and the outside temperature is low enough, the controlled cold airflow used as a second cooling source allowed to speed-up the cooling inside the refrigerator compartment of about 36.21% and to reach an energy saving of about 36.23% compared with the classical thermostatic control.
A Criterion on Existence and Uniqueness of Behavior in Electric Circuit
Takuya Hirata;
Eko Setiawan;
Kazuya Yamaguchi;
Ichijo Hodaka
International Journal of Electrical and Computer Engineering (IJECE) Vol 6, No 4: August 2016
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (632.743 KB)
|
DOI: 10.11591/ijece.v6i4.pp1529-1533
Behavior of electric circuits can be observed by solving circuit equations symbolically as well as numerically. In general, symbolic computation for circuits with certain number of circuit elements needs much more time than numerical computation. It is reasonable to check the existence and uniqueness of the solution to circuit equations beforehand in order to avoid computation for the case of no solution. Indeed, some circuits have no solution; in that case, one should notice it and avoid to wait meaningless computation. This paper proposes a new theorem to check whether given circuit equations have a solution and their voltages and currents of all circuit elements are uniquely determined or not. The theorem is suitable for developing a computer algorithm and helps quick symbolic computation for electric circuits.
Secure Multicast Routing Protocol in Manets Using Efficient ECGDH Algorithm
Gopi Arepalli;
Suresh Babu Erukula
International Journal of Electrical and Computer Engineering (IJECE) Vol 6, No 4: August 2016
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (341.625 KB)
|
DOI: 10.11591/ijece.v6i4.pp1857-1865
An Ad-hoc Network covers a set of autonomous mobile nodes that communicates through wireless communication in an infrastructure-less environment. Mostly MANETs are used in group communication mechanisms like military applications, emergency search, rescue operations, vehicular ad-hoc communications and mining operations etc. In such type of networks, group communication is takes place by multicasting technique. Communication and collaboration is necessary among the nodes in the groups in multicast protocols. PUMA has the best multicast routing protocol compared to tree and mesh based multicast protocols although it suffers from security issues. PUMA mainly suffers from Man In The middle attack. MITM attack generates traffic flow, drop the packets and miscommunicate the neighbor nodes with false hop count. So defending from MITM attack we designed a new mechanism called Elliptic Curve Group Diffie-Hellman (ECGDH). This paper compares results of PUMA [1] routing protocol with legitimate, under attack and after providing security against attack. Finally we observed ECGDH [2] gives efficient results even attack has happened.
Multiband OFDM for Cognitive Radio – A Way for Cyclostationary Detection and Interference Cancellation
Avila J;
Thenmozhi K
International Journal of Electrical and Computer Engineering (IJECE) Vol 6, No 4: August 2016
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (880.848 KB)
|
DOI: 10.11591/ijece.v6i4.pp1702-1709
With the tremendous growth in wireless technology there has been a shortage in the spectrum utilized for certain applications while some spectrum remains idle. To overcome this problem and for the efficient utilization of the spectrum cognitive radio is the suitable solution.Multiband OFDM can be easily modeled as cognitive radio, a technology that is employed for utilizing the available spectrum in the most efficient way. Since sensing of the free spectrum for detecting the arrival of the primary users is the foremost job of cognitive, here cyclostationary based spectrum sensing is carried out. Its performance is investigated using universal software defined radio peripheral (USRP) kit which is the hardware test bed for the cognitive radio system. Results are shown using Labview software. Further to mitigate the interference between the primary and cognitive users a modified intrusion elimination (AIC) algorithm had been proposed which in turn ensures the coexistence of both the users in the same wireless environment.
Evaluation of Power Quality Issues in grid Connected PV Systems
Gunjan Varshney;
D S Chauhan;
M P Dave
International Journal of Electrical and Computer Engineering (IJECE) Vol 6, No 4: August 2016
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (616.373 KB)
|
DOI: 10.11591/ijece.v6i4.pp1412-1420
This paper deals with the evaluation of power quality issues in grid connected PV systems. This paper also presents complete simulation, modeling and control of three phase grid connected solar PV module with Maximum Power Point Tracking. Perturb and Observe (P&O) method has been used for Maximum Power Point Tracking. In the proposed model DC bus voltage control , harmonic mitigation and power factor control are discussed as power quality issues. The simulation results are shown in the graphical waveforms and simulation is performed in MATLAB using SIMULINK environment and PSB toolboxes.
Implementation of Fuzzy Based Simulation for Clone Detection in Wireless Sensor Networks
Manjunatha R C;
Rekha K R;
Nataraj K R
International Journal of Electrical and Computer Engineering (IJECE) Vol 6, No 4: August 2016
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (162.196 KB)
|
DOI: 10.11591/ijece.v6i4.pp1570-1576
Wireless sensor networks are usually left unattended and serve hostile environment, therefore can easily be compromised. With compromised nodes an attacker can conduct several inside and outside attacks. Node replication attack is one of them which can cause severe damage to wireless sensor network if left undetected. This paper presents fuzzy based simulation framework for detection and revocation of compromised nodes in wireless sensor network. Our proposed scheme uses PDR statistics and neighbor reports to determine the probability of a cluster being compromised. Nodes in compromised cluster are then revoked and software attestation is performed.Simulation is carried out on MATLAB 2010a and performance of proposed scheme is compared with conventional algorithms on the basis of communication and storage overhead. Simulation results show that proposed scheme require less communication and storage overhead than conventional algorithms.
An Optimizing Approach for Multi Constraints Reassignment Problem of Human Resources
Tkatek Said;
Abdoun Otman;
Abouchabaka Jaafar;
Rafalia Najat
International Journal of Electrical and Computer Engineering (IJECE) Vol 6, No 4: August 2016
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (495.032 KB)
|
DOI: 10.11591/ijece.v6i4.pp1907-1919
This paper presents an effective approach to optimize the reassignment of Human Resources in the enterprise that is formed by several units of productions to take into consideration the human characteristics. This approach consists of two steps; the first step is to formalize the studied problem that is practically take the form of the generalized assignment problem (GAP) known as NP-hard problem. Additionally, the variables in the formulation of our problem are interlinked by certain constraints. These two proprieties can to justify the important complexity of this problem. The second step is focused to solve this complex problem by using the genetic algorithm. We present the experimentally result for justifying the validity of the proposed approach. So, the solution obtained allowed us to get an optimal assignment of personnel that can lead to improve the average productivity or ratability or at least ensure its equilibration within sites of enterprise.
Parasitic Strip Loaded Dual Band Notch Circular Monopole Antenna with Defected Ground Structure
P Syam Sundar;
Sarat K Kotamraju;
B T P Madhav;
M Sreehari;
K Raghavendra Rao;
L Prathyusha;
Y Pravallika
International Journal of Electrical and Computer Engineering (IJECE) Vol 6, No 4: August 2016
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (2352.609 KB)
|
DOI: 10.11591/ijece.v6i4.pp1742-1750
In this article a parasitic strip loaded monopole antennas are designed to notch dual and triple bands. The designed models are constructed on one side of the substrate material and on the other end defected ground structures are implemented. The basic antenna comprises a tuning stub and a ground plane with tapered shape slot as DGS. Another model is constructed with circular monopole radiating element on front side and similar kind of ground structure used in the basic rectangular tuning stub antenna. To create notched bands with tuning stubs, two symmetrical parasitic slits are placed inside the slot of the ground plane. The basic model is of the rectangular stub notching triple band and the circular tuning stub antenna notching dual band. Dual band notched circular tuning stub antenna is prototyped on FR4 substrate and measured results from vector network analyzer are compared with simulation results of HFSS for validation.
A Fuzzy Logic Control Strategy for Buck PFC Converter Based 4- Switch VSI Fed BLDC Motor Drive
V. Ramesh;
Y. Kusuma Latha
International Journal of Electrical and Computer Engineering (IJECE) Vol 6, No 4: August 2016
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (479.737 KB)
|
DOI: 10.11591/ijece.v6i4.pp1470-1480
In this paper, a new Buck PFC dc–dc converter topology along with fuzzy logic control for a permanent magnet (PM) brushless dc motor (PMBLDCM) has been proposed. The proposed buck-PFC converter topology is on single stage power factor correction converter. A concept of dc link voltage control which is proportional to speed of the PMBLDCM is used in this paper. The stator currents of the PMBLDCM during step change in the reference speed are controlled within the specified limits by an addition of a rate limiter in the reference dc link voltage. The effectives of the proposed control strategy of PMBLDCM drive is validated through simulation results.
Face Recognition with Modular Two Dimensional PCA under Uncontrolled Illumination Variations
Venkatramaphanikumar S;
K. V. Krishna Kishore
International Journal of Electrical and Computer Engineering (IJECE) Vol 6, No 4: August 2016
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (479.668 KB)
|
DOI: 10.11591/ijece.v6i4.pp1610-1616
Person authenticaton using faces became one of the most popular security approaches for the last three decades. From the literature it is found that perofrmance of most of the methods used in recognition was limited due to uncontrolled conditions like illumination and pose variations. In this work, to address the limitations of uncontrolled environment, Modular two-dimensional Principle Component Analysis (M2D-PCA) is proposed. In this approach, the input image is partitioned into four equal segments and then Histogram Equalization is applied to reduce illumination impact caused due to varying lightening conditions. Then M2D-PCA algorithm is applied parallel on each segment and then all features extracted from the segments are fused with wieghted summation. Experiments are carried out on bench mark datasets like extended Yale database B, ORL and AR database. Results of the proposed approach produced good recognition rate with low computational time against various illumination environments.