cover
Contact Name
Tole Sutikno
Contact Email
ijece@iaesjournal.com
Phone
-
Journal Mail Official
ijece@iaesjournal.com
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
International Journal of Electrical and Computer Engineering
ISSN : 20888708     EISSN : 27222578     DOI : -
International Journal of Electrical and Computer Engineering (IJECE, ISSN: 2088-8708, a SCOPUS indexed Journal, SNIP: 1.001; SJR: 0.296; CiteScore: 0.99; SJR & CiteScore Q2 on both of the Electrical & Electronics Engineering, and Computer Science) is the official publication of the Institute of Advanced Engineering and Science (IAES). The journal is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication and computer engineering from the global world.
Articles 60 Documents
Search results for , issue "Vol 6, No 4: August 2016" : 60 Documents clear
Application of a controlled outside cold airflow by a PID controller to improve the performance of a household refrigerator Emna Aridhi; Mehdi Abbes; Abdelkader Mami
International Journal of Electrical and Computer Engineering (IJECE) Vol 6, No 4: August 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (438.632 KB) | DOI: 10.11591/ijece.v6i4.pp1662-1672

Abstract

The present paper aims to prove the efficiency of using the cold to improve the performance of a household refrigerator. It is produced naturally in countries that are characterized by a severe wintry climate. The cold airflow is spread out inside a cavity covering the side wall of the appliance, which is connected to the inlet and outlet ducts. For that purpose, a Simulink model is proposed to model this installation. The internal air temperature is computed according to the evaporator temperature and the outside cold airflow that is also computed according to the outside temperature and controlled by a PID controller. The simulation results show that when the internal air temperature is higher than the desired one and the outside temperature is low enough, the controlled cold airflow used as a second cooling source allowed to speed-up the cooling inside the refrigerator compartment of about 36.21% and to reach an energy saving of about 36.23% compared with the classical thermostatic control.
A Criterion on Existence and Uniqueness of Behavior in Electric Circuit Takuya Hirata; Eko Setiawan; Kazuya Yamaguchi; Ichijo Hodaka
International Journal of Electrical and Computer Engineering (IJECE) Vol 6, No 4: August 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (632.743 KB) | DOI: 10.11591/ijece.v6i4.pp1529-1533

Abstract

Behavior of electric circuits can be observed by solving circuit equations symbolically as well as numerically. In general, symbolic computation for circuits with certain number of circuit elements needs much more time than numerical computation. It is reasonable to check the existence and uniqueness of the solution to circuit equations beforehand in order to avoid computation for the case of no solution. Indeed, some circuits have no solution; in that case, one should notice it and avoid to wait meaningless computation. This paper proposes a new theorem to check whether given circuit equations have a solution and their voltages and currents of all circuit elements are uniquely determined or not. The theorem is suitable for developing a computer algorithm and helps quick symbolic computation for electric circuits.
Secure Multicast Routing Protocol in Manets Using Efficient ECGDH Algorithm Gopi Arepalli; Suresh Babu Erukula
International Journal of Electrical and Computer Engineering (IJECE) Vol 6, No 4: August 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (341.625 KB) | DOI: 10.11591/ijece.v6i4.pp1857-1865

Abstract

An Ad-hoc Network covers a set of autonomous mobile nodes that communicates through wireless communication in an infrastructure-less environment. Mostly MANETs are used in group communication mechanisms like military applications, emergency search, rescue operations, vehicular ad-hoc communications and mining operations etc. In such type of networks, group communication is takes place by multicasting technique. Communication and collaboration is necessary among the nodes in the groups in multicast protocols. PUMA has the best multicast routing protocol compared to tree and mesh based multicast protocols although it suffers from security issues. PUMA mainly suffers from Man In The middle attack. MITM attack generates traffic flow, drop the packets and miscommunicate the neighbor nodes with false hop count. So defending from MITM attack we designed a new mechanism called Elliptic Curve Group Diffie-Hellman (ECGDH). This paper compares results of PUMA [1] routing protocol with legitimate, under attack and after providing security against attack. Finally we observed ECGDH [2] gives efficient results even attack has happened.
Multiband OFDM for Cognitive Radio – A Way for Cyclostationary Detection and Interference Cancellation Avila J; Thenmozhi K
International Journal of Electrical and Computer Engineering (IJECE) Vol 6, No 4: August 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (880.848 KB) | DOI: 10.11591/ijece.v6i4.pp1702-1709

Abstract

With the tremendous growth in wireless technology there has been a shortage in the spectrum utilized for certain applications while some spectrum remains idle. To overcome this problem and for the efficient utilization of the spectrum cognitive radio is the suitable solution.Multiband OFDM can be easily modeled as cognitive radio, a technology that is employed for utilizing the available spectrum in the most efficient way. Since sensing of the free spectrum for detecting the arrival of the primary users is the foremost job of cognitive, here cyclostationary based spectrum sensing is carried out. Its performance is investigated using universal software defined radio peripheral (USRP) kit which is the hardware test bed for the cognitive radio system. Results are shown using Labview software. Further to mitigate the interference between the primary and cognitive users a modified intrusion elimination (AIC) algorithm had been proposed which in turn ensures the coexistence of both the users in the same wireless environment.
Evaluation of Power Quality Issues in grid Connected PV Systems Gunjan Varshney; D S Chauhan; M P Dave
International Journal of Electrical and Computer Engineering (IJECE) Vol 6, No 4: August 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (616.373 KB) | DOI: 10.11591/ijece.v6i4.pp1412-1420

Abstract

This paper deals with the evaluation of power quality issues in grid connected PV systems. This paper also presents  complete simulation, modeling and control of three phase grid connected solar PV module with Maximum Power Point Tracking. Perturb and Observe (P&O) method has been used for Maximum Power Point Tracking. In the proposed model DC bus voltage control , harmonic mitigation and power factor control are discussed as power quality issues. The simulation results are shown in the graphical waveforms and simulation is performed in MATLAB using SIMULINK environment and PSB toolboxes.  
Implementation of Fuzzy Based Simulation for Clone Detection in Wireless Sensor Networks Manjunatha R C; Rekha K R; Nataraj K R
International Journal of Electrical and Computer Engineering (IJECE) Vol 6, No 4: August 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (162.196 KB) | DOI: 10.11591/ijece.v6i4.pp1570-1576

Abstract

Wireless sensor networks are usually left unattended and serve hostile environment, therefore can easily be compromised. With compromised nodes an attacker can conduct several inside and outside attacks. Node replication attack is one of them which can cause severe damage to wireless sensor network if left undetected. This paper presents fuzzy based simulation framework for detection and revocation of compromised nodes in wireless sensor network. Our proposed scheme uses PDR statistics and neighbor reports to determine the probability of a cluster being compromised. Nodes in compromised cluster are then revoked and software attestation is performed.Simulation is carried out on MATLAB 2010a and performance of proposed scheme is compared with conventional algorithms on the basis of communication and storage overhead. Simulation results show that proposed scheme require less communication and storage overhead than conventional algorithms.
An Optimizing Approach for Multi Constraints Reassignment Problem of Human Resources Tkatek Said; Abdoun Otman; Abouchabaka Jaafar; Rafalia Najat
International Journal of Electrical and Computer Engineering (IJECE) Vol 6, No 4: August 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (495.032 KB) | DOI: 10.11591/ijece.v6i4.pp1907-1919

Abstract

This paper presents an effective approach to optimize the reassignment of Human Resources in the enterprise that is formed by several units of productions to take into consideration the human characteristics. This approach consists of two steps; the first step is to formalize the studied problem that is practically take the form of the generalized assignment problem (GAP) known as NP-hard problem. Additionally, the variables in the formulation of our problem are interlinked by certain constraints. These two proprieties can to justify the important complexity of this problem. The second step is focused to solve this complex problem by using the genetic algorithm. We present the experimentally result for justifying the validity of the proposed approach. So, the solution obtained allowed us to get an optimal assignment of personnel that can lead to improve the average productivity or ratability or at least ensure its equilibration within sites of enterprise.
Parasitic Strip Loaded Dual Band Notch Circular Monopole Antenna with Defected Ground Structure P Syam Sundar; Sarat K Kotamraju; B T P Madhav; M Sreehari; K Raghavendra Rao; L Prathyusha; Y Pravallika
International Journal of Electrical and Computer Engineering (IJECE) Vol 6, No 4: August 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (2352.609 KB) | DOI: 10.11591/ijece.v6i4.pp1742-1750

Abstract

In this article a parasitic strip loaded monopole antennas are designed to notch dual and triple bands. The designed models are constructed on one side of the substrate material and on the other end defected ground structures are implemented. The basic antenna comprises a tuning stub and a ground plane with tapered shape slot as DGS. Another model is constructed with circular monopole radiating element on front side and similar kind of ground structure used in the basic rectangular tuning stub antenna. To create notched bands with tuning stubs, two symmetrical parasitic slits are placed inside the slot of the ground plane. The basic model is of the rectangular stub notching triple band and the circular tuning stub antenna notching dual band. Dual band notched circular tuning stub antenna is prototyped on FR4 substrate and measured results from vector network analyzer are compared with simulation results of HFSS for validation.
A Fuzzy Logic Control Strategy for Buck PFC Converter Based 4- Switch VSI Fed BLDC Motor Drive V. Ramesh; Y. Kusuma Latha
International Journal of Electrical and Computer Engineering (IJECE) Vol 6, No 4: August 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (479.737 KB) | DOI: 10.11591/ijece.v6i4.pp1470-1480

Abstract

In this paper, a new Buck PFC dc–dc converter topology along with fuzzy logic control for a permanent magnet (PM) brushless dc motor (PMBLDCM) has been proposed. The proposed buck-PFC converter topology is on single stage power factor correction converter. A concept of dc link voltage control which is proportional to speed of the PMBLDCM is used in this paper. The stator currents of the PMBLDCM during step change in the reference speed are controlled within the specified limits by an addition of a rate limiter in the reference dc link voltage. The effectives of the proposed control strategy of PMBLDCM drive is validated through simulation results.
Face Recognition with Modular Two Dimensional PCA under Uncontrolled Illumination Variations Venkatramaphanikumar S; K. V. Krishna Kishore
International Journal of Electrical and Computer Engineering (IJECE) Vol 6, No 4: August 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (479.668 KB) | DOI: 10.11591/ijece.v6i4.pp1610-1616

Abstract

Person authenticaton using faces became one of the most popular security approaches for the last three decades.  From the literature it is found that perofrmance of most of the methods used in recognition was limited due to uncontrolled conditions like illumination and pose variations.  In this work, to address the limitations of uncontrolled environment, Modular two-dimensional Principle Component Analysis (M2D-PCA) is proposed.  In this approach, the input image is partitioned into four equal segments and then Histogram Equalization is applied to reduce illumination impact caused due to varying lightening conditions. Then M2D-PCA algorithm is applied parallel on each segment and then all features extracted from the segments are fused with wieghted summation. Experiments are carried out on bench mark datasets like extended Yale database B, ORL and AR database.   Results of the proposed approach produced good recognition rate with low computational time against various illumination environments.

Filter by Year

2016 2016


Filter By Issues
All Issue Vol 16, No 1: February 2026 Vol 15, No 6: December 2025 Vol 15, No 5: October 2025 Vol 15, No 4: August 2025 Vol 15, No 3: June 2025 Vol 15, No 2: April 2025 Vol 15, No 1: February 2025 Vol 14, No 6: December 2024 Vol 14, No 5: October 2024 Vol 14, No 4: August 2024 Vol 14, No 3: June 2024 Vol 14, No 2: April 2024 Vol 14, No 1: February 2024 Vol 13, No 6: December 2023 Vol 13, No 5: October 2023 Vol 13, No 4: August 2023 Vol 13, No 3: June 2023 Vol 13, No 2: April 2023 Vol 13, No 1: February 2023 Vol 12, No 6: December 2022 Vol 12, No 5: October 2022 Vol 12, No 4: August 2022 Vol 12, No 3: June 2022 Vol 12, No 2: April 2022 Vol 12, No 1: February 2022 Vol 11, No 6: December 2021 Vol 11, No 5: October 2021 Vol 11, No 4: August 2021 Vol 11, No 3: June 2021 Vol 11, No 2: April 2021 Vol 11, No 1: February 2021 Vol 10, No 6: December 2020 Vol 10, No 5: October 2020 Vol 10, No 4: August 2020 Vol 10, No 3: June 2020 Vol 10, No 2: April 2020 Vol 10, No 1: February 2020 Vol 9, No 6: December 2019 Vol 9, No 5: October 2019 Vol 9, No 4: August 2019 Vol 9, No 3: June 2019 Vol 9, No 2: April 2019 Vol 9, No 1: February 2019 Vol 8, No 6: December 2018 Vol 8, No 5: October 2018 Vol 8, No 4: August 2018 Vol 8, No 3: June 2018 Vol 8, No 2: April 2018 Vol 8, No 1: February 2018 Vol 7, No 6: December 2017 Vol 7, No 5: October 2017 Vol 7, No 4: August 2017 Vol 7, No 3: June 2017 Vol 7, No 2: April 2017 Vol 7, No 1: February 2017 Vol 6, No 6: December 2016 Vol 6, No 5: October 2016 Vol 6, No 4: August 2016 Vol 6, No 3: June 2016 Vol 6, No 2: April 2016 Vol 6, No 1: February 2016 Vol 5, No 6: December 2015 Vol 5, No 5: October 2015 Vol 5, No 4: August 2015 Vol 5, No 3: June 2015 Vol 5, No 2: April 2015 Vol 5, No 1: February 2015 Vol 4, No 6: December 2014 Vol 4, No 5: October 2014 Vol 4, No 4: August 2014 Vol 4, No 3: June 2014 Vol 4, No 2: April 2014 Vol 4, No 1: February 2014 Vol 3, No 6: December 2013 Vol 3, No 5: October 2013 Vol 3, No 4: August 2013 Vol 3, No 3: June 2013 Vol 3, No 2: April 2013 Vol 3, No 1: February 2013 Vol 2, No 6: December 2012 Vol 2, No 5: October 2012 Vol 2, No 4: August 2012 Vol 2, No 3: June 2012 Vol 2, No 2: April 2012 Vol 2, No 1: February 2012 Vol 1, No 2: December 2011 Vol 1, No 1: September 2011 More Issue