International Journal of Electrical and Computer Engineering
International Journal of Electrical and Computer Engineering (IJECE, ISSN: 2088-8708, a SCOPUS indexed Journal, SNIP: 1.001; SJR: 0.296; CiteScore: 0.99; SJR & CiteScore Q2 on both of the Electrical & Electronics Engineering, and Computer Science) is the official publication of the Institute of Advanced Engineering and Science (IAES). The journal is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication and computer engineering from the global world.
Articles
90 Documents
Search results for
, issue
"Vol 6, No 6: December 2016"
:
90 Documents
clear
Location Based Services with Location Centric Profiles
M.Ferni Ukrit;
B. Venkatesh;
Swetabh Suman
International Journal of Electrical and Computer Engineering (IJECE) Vol 6, No 6: December 2016
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (273.21 KB)
|
DOI: 10.11591/ijece.v6i6.pp3001-3005
In the advancing world of technology, Mobile applications are a rapidly growing segment of the global mobile market. Mobile applications are evolving at a meteor pace to give users a rich and fast user experience. Android operating system supports most applications in today’s technical world. It is an open source operating system which highly satisfies the user’s needs. In this paper, the applications that are location based i.e. the applications that make use of the Global Positioning System (GPS) is discussed. It is a space based satellite navigation system which provides details of time and location in all weather conditions anywhere on or near earth. We introduce PROFILER, a framework for constructing location centric profiles (LCPs), aggregates built over the profiles of users that have visited discrete locations. In addition to a venue centric approach, we propose a decentralized solution for computing real time LCP snapshots over the profiles of collocated users. In our System we find the corresponding location using Global Positioning and Service Provider also. This is to change the profile mode automatically and alarm notification enable automatically when you are going to reach corresponding location or Regular Location.
EEG Based Eye State Classification using Deep Belief Network and Stacked AutoEncoder
Sanam Narejo;
Eros Pasero;
Farzana Kulsoom
International Journal of Electrical and Computer Engineering (IJECE) Vol 6, No 6: December 2016
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (780.041 KB)
|
DOI: 10.11591/ijece.v6i6.pp3131-3141
A Brain-Computer Interface (BCI) provides an alternative communication interface between the human brain and a computer. The Electroencephalogram (EEG) signals are acquired, processed and machine learning algorithms are further applied to extract useful information. During EEG acquisition, artifacts are induced due to involuntary eye movements or eye blink, casting adverse effects on system performance. The aim of this research is to predict eye states from EEG signals using Deep learning architectures and present improved classifier models. Recent studies reflect that Deep Neural Networks are trending state of the art Machine learning approaches. Therefore, the current work presents the implementation of Deep Belief Network (DBN) and Stacked AutoEncoders (SAE) as Classifiers with encouraging performance accuracy. One of the designed SAE models outperforms the performance of DBN and the models presented in existing research by an impressive error rate of 1.1% on the test set bearing accuracy of 98.9%. The findings in this study, may provide a contribution towards the state of the art performance on the problem of EEG based eye state classification.
Convergence Evaluation of a Load Flow Method based on Cespedes' Approach to Distribution System Analysis
Diego Issicaba;
Jorge Coelho
International Journal of Electrical and Computer Engineering (IJECE) Vol 6, No 6: December 2016
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (4819.538 KB)
|
DOI: 10.11591/ijece.v6i6.pp3276-3282
This paper evaluates the convergence of a load flow method based on Cespedes' formulation to distribution system steady-state analysis. The method is described and the closed-form of its convergence rate is deduced. Furthermore, convergence dependence of loading and the consequences of choosing particular initial estimates are verified mathematically. All mathematical results have been tested in numerical simulations, some of them presented in the paper.
Optimal Location of SVC using Particle Swarm Optimization and Voltage Stability Indexes
M.N. Dazahra;
F. Elmariami;
A. Belfqih;
J. Boukherouaa
International Journal of Electrical and Computer Engineering (IJECE) Vol 6, No 6: December 2016
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (505.657 KB)
|
DOI: 10.11591/ijece.v6i6.pp2581-2588
Flexible AC transmission system are widley used in power sytems to ensure voltage stability, in virtue of their high cost the choise of the best location in electrical network is essential. The porpose of this paper is to present a new method for finding the optimal location, size and number of Static Var Compensator in order to enhace the voltage stability of electrical network. The optimal solution has been found by using the evolutionary programming algorithm, particle swarm optimization, combined with voltage stability indexes used for the estimation of the voltage collapse in power systems.The proposed algorithm has been validated by application on both simulation network model IEEE 30-Buses under different load cases and the electric network model of Casablanca region in Morocco.The results of the application have been analysed and compared in each case in order to get the optimal number of Static Var Compensator to be used.
Improved Capacity Image Steganography Algorithm using 16-Pixel Differencing with n-bit LSB Substitution for RGB Images
Meenakshi S Arya;
Meenu Rani;
Charndeep Singh Bedi
International Journal of Electrical and Computer Engineering (IJECE) Vol 6, No 6: December 2016
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (700.366 KB)
|
DOI: 10.11591/ijece.v6i6.pp2735-2741
With the intrusion of internet into the lives of every household and terabytes of data being transmitted over the internet on daily basis, the protection of content being transmitted over the internet has become an extremely serious concern. Various measures and methods are being researched and devised everyday to ensure content protection of digital media. To address this issue of content protection, this paper proposes an RGB image steganography based on sixteen-pixel differencing with n-bit Least Significant Bit (LSB) substitution. The proposed technique provides higher embedding capacity without sacrificing the imperceptibility of the host data. The image is divided into 4×4 non overlapping blocks and in each block the average difference value is calculated. Based on this value the block is classified to fall into one of four levels such as, lower, lower-middle, higher-middle and higher. If block belongs to lower level then 2-bit LSB substitution is used in it. Similarly, for lower-middle, higher-middle and higher level blocks 3, 4, and 5 bit LSB substitution is used. In our proposed method there is no need of pixel value readjustment for minimizing distortion. The experimental results show that stego-images are imperceptible and have huge hiding capacity.
Robust Controller for a Vision Feedback Based Telepointer
Shah Newaz Mohammad Abdul Kader;
Mohd. Marzuki Mustafa;
Aini Hussain
International Journal of Electrical and Computer Engineering (IJECE) Vol 6, No 6: December 2016
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (742.45 KB)
|
DOI: 10.11591/ijece.v6i6.pp2870-2877
Telepointer is a very useful tool for teleconsultation and teleproctoring, whereby a telepointer via teleconferencing is a perfect example of computer-supported cooperative work (CSCW) and digital telepresence. To this end, many telepointers are introduced for digital telepresence. However, there are still concerns regarding the speed of response and robustness of the system. It is rather difficult to model the actual system in order to design the controller. This paper described the development of a telepointer and its controller for a real time communication using vision feedback. The main focus of this study was to control the Laser Pointer (LP) with a discrete time PID (proportional–integral–derivative) controller which was tuned using Ziegler-Nichols (ZN) method. The results indicated that the tuned controller bring about fast response with no overshoot and steady state errors at the output response. The controller was shown to be robust against changes in sampling time and external disturbance.
A Hybrid Cryptographic System for Secured Device to Device Communication
A. Rama Krishna;
A. S. N. Chakravarthy;
A. S. C. S. Sastry
International Journal of Electrical and Computer Engineering (IJECE) Vol 6, No 6: December 2016
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (419.367 KB)
|
DOI: 10.11591/ijece.v6i6.pp2962-2970
It is general fact that even after enormous expansion of wireless communication there are still dead regions that hampers the effective communication. With exponential rise in the smart phones, a new layer of communication has evolved that could address the concerns of dead regions and capacity barriers. D2D is the evolving communication technology which focuses on short distance hops between the public devices to reach the destination. The major drawback of this technology is that most of the devices are public hence trustworthiness of the entire channel needs to be addressed in order to make it a viable solution. In this paper, we introduce a novel hybrid cryptographic approach that could address multiple eavesdroppers’ scenario. This approach incorporates both Huffman coding and Binary coding to enhance the crypto benefits for the information transmitted over D2D channel that consists of several public devices. The dual-crypto nature of the proposed algorithm offers higher efficiency, better security and improved key transmission. Thus, the proposed hybrid cryptographic approach is robust in nature while easy and simple to operate. In addition, the proposed approach could recover the original information without any distortion from the encrypted data making the approach lossless in nature. Further simulation results prove that the proposed offers confidentiality to the transmitted to data while addressing the network capacity crunch.
ISAR Image Classification with Wavelet and Watershed Transforms
B. Mamatha;
V. Valli Kumar
International Journal of Electrical and Computer Engineering (IJECE) Vol 6, No 6: December 2016
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (502.208 KB)
|
DOI: 10.11591/ijece.v6i6.pp3087-3093
Inverse Synthetic Aperture Radar images are playing a significant role in classification of sea and air targets. First we acquire the ISAR images of targets using a sensor like radar and extract the characteristics of targets from the ISAR images in the form of feature vectors. The computed feature vectors are used for classification of targets. In this work, widely used and efficient segmentation tool Watershed transform and the multi resolution technique wavelet transform are explored to derive the target features. An artificial neural network based classifier is used for classification. The Wavelet analysis divides the information of an image into approximation and detail sub signals. The approximate and three detail sub signal values are taken as feature vectors and given as input to the classifier for ship ISAR image classification. The widely used segmentation technique, Watershed transform is applied to the ISAR images. The wavelet coefficients are computed for the segmented ISAR images and used as feature vectors for classification of the ISAR images. Also, the statistical moments mean and standard deviation are computed for the color ISAR images itself, taken in RGB format. These statistical color moments are used as feature vector. The classification accuracy is compared for the feature vectors.
Evaluation of the Forward-Backward Sweep Load Flow Method using the Contraction Mapping Principle
Diego Issicaba;
Jorge Coelho
International Journal of Electrical and Computer Engineering (IJECE) Vol 6, No 6: December 2016
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (4812.261 KB)
|
DOI: 10.11591/ijece.v6i6.pp3229-3237
This paper presents an assessment of the forward-backward sweep load flow method to distribution system analysis. The method is formally assessed using fixed-point concepts and the contraction mapping theorem. The existence and uniqueness of the load flow feasible solution is supported by an alternative argument from those obtained in the literature. Also, the closed-form of the convergence rate of the method is deduced and the convergence dependence of loading is assessed. Finally, boundaries for error values per iteration between iterates and feasible solution are obtained. Theoretical results have been tested in several numerical simulations, some of them presented in this paper, thus fostering discussions about applications and future works.
Protection Coordination and Anti Islanding Protection Solution for Biomass Power Plant Connected on Distribution Network
Srete N Nikolovski;
Marko Vukobratović;
Ljubomir Majdandzic
International Journal of Electrical and Computer Engineering (IJECE) Vol 6, No 6: December 2016
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (632.69 KB)
|
DOI: 10.11591/ijece.v6i6.pp2526-2537
Protection coordination as well as anti-island protection play significant role in the process of biomass power plant connection on the distribution network. Distribution generation island operation in Croatia is unacceptable according to the existing National grid code Paper presents a protection coordination of all passive protections used in the real biomass power plant and connected distriubution network feeder. Short-circuits three phase, two phase and single line to ground faults and generator islanding simulations have been performed and simulated in the time domain at the different network locations using DIgSILENT Power Factory software. The time-current plots coordination of protective devices are made using Smart PDC module in Easy Power Protector software tool.