cover
Contact Name
Tole Sutikno
Contact Email
ijece@iaesjournal.com
Phone
-
Journal Mail Official
ijece@iaesjournal.com
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
International Journal of Electrical and Computer Engineering
ISSN : 20888708     EISSN : 27222578     DOI : -
International Journal of Electrical and Computer Engineering (IJECE, ISSN: 2088-8708, a SCOPUS indexed Journal, SNIP: 1.001; SJR: 0.296; CiteScore: 0.99; SJR & CiteScore Q2 on both of the Electrical & Electronics Engineering, and Computer Science) is the official publication of the Institute of Advanced Engineering and Science (IAES). The journal is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication and computer engineering from the global world.
Articles 90 Documents
Search results for , issue "Vol 6, No 6: December 2016" : 90 Documents clear
Location Based Services with Location Centric Profiles M.Ferni Ukrit; B. Venkatesh; Swetabh Suman
International Journal of Electrical and Computer Engineering (IJECE) Vol 6, No 6: December 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (273.21 KB) | DOI: 10.11591/ijece.v6i6.pp3001-3005

Abstract

In the advancing world of technology, Mobile applications are a rapidly growing segment of the global mobile market. Mobile applications are evolving at a meteor pace to give users a rich and fast user experience. Android operating system supports most applications in today’s technical world. It is an open source operating system which highly satisfies the user’s needs. In this paper, the applications that are location based i.e. the applications that make use of the Global Positioning System (GPS) is discussed. It is a space based satellite navigation system which provides details of time and location in all weather conditions anywhere on or near earth. We introduce PROFILER, a framework for constructing location centric profiles (LCPs), aggregates built over the profiles of users that have visited discrete locations. In addition to a venue centric approach, we propose a decentralized solution for computing real time LCP snapshots over the profiles of collocated users. In our System we find the corresponding location using Global Positioning and Service Provider also. This is to change the profile mode automatically and alarm notification enable automatically when you are going to reach corresponding location or Regular Location.
EEG Based Eye State Classification using Deep Belief Network and Stacked AutoEncoder Sanam Narejo; Eros Pasero; Farzana Kulsoom
International Journal of Electrical and Computer Engineering (IJECE) Vol 6, No 6: December 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (780.041 KB) | DOI: 10.11591/ijece.v6i6.pp3131-3141

Abstract

A Brain-Computer Interface (BCI) provides an alternative communication interface between the human brain and a computer. The Electroencephalogram (EEG) signals are acquired, processed and machine learning algorithms are further applied to extract useful information.  During  EEG acquisition,   artifacts  are induced due to involuntary eye movements or eye blink, casting adverse effects  on system performance. The aim of this research is to predict eye states from EEG signals using Deep learning architectures and present improved classifier models. Recent studies reflect that Deep Neural Networks are trending state of the art Machine learning approaches. Therefore, the current work presents the implementation of  Deep Belief Network (DBN) and Stacked AutoEncoders (SAE) as Classifiers with encouraging performance accuracy.  One of the designed  SAE models outperforms the  performance of DBN and the models presented in existing research by an impressive error rate of 1.1% on the test set bearing accuracy of 98.9%. The findings in this study,  may provide a contribution towards the state of  the  art performance on the problem of  EEG based eye state classification.
Convergence Evaluation of a Load Flow Method based on Cespedes' Approach to Distribution System Analysis Diego Issicaba; Jorge Coelho
International Journal of Electrical and Computer Engineering (IJECE) Vol 6, No 6: December 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (4819.538 KB) | DOI: 10.11591/ijece.v6i6.pp3276-3282

Abstract

This paper evaluates the convergence of a load flow method based on Cespedes' formulation to distribution system steady-state analysis. The method is described and the closed-form of its convergence rate is deduced. Furthermore, convergence dependence of loading and the consequences of choosing particular initial estimates are verified mathematically. All mathematical results have been tested in numerical simulations, some of them presented in the paper.
Optimal Location of SVC using Particle Swarm Optimization and Voltage Stability Indexes M.N. Dazahra; F. Elmariami; A. Belfqih; J. Boukherouaa
International Journal of Electrical and Computer Engineering (IJECE) Vol 6, No 6: December 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (505.657 KB) | DOI: 10.11591/ijece.v6i6.pp2581-2588

Abstract

Flexible AC transmission system are widley used in power sytems to ensure voltage stability, in virtue of their high cost the choise of the best location in electrical network is essential. The porpose of this paper is to present a new method for finding the optimal location, size and number of Static Var Compensator in order to enhace the voltage stability of electrical network. The optimal solution has been found by using the evolutionary programming algorithm, particle swarm optimization, combined with voltage stability indexes used for the estimation of the voltage collapse in power systems.The proposed algorithm has been validated by application on both simulation network model IEEE 30-Buses under different load cases and the electric network model of Casablanca region in Morocco.The results of the application have been analysed and compared in each case in order to get the optimal number of Static Var Compensator to be used.
Improved Capacity Image Steganography Algorithm using 16-Pixel Differencing with n-bit LSB Substitution for RGB Images Meenakshi S Arya; Meenu Rani; Charndeep Singh Bedi
International Journal of Electrical and Computer Engineering (IJECE) Vol 6, No 6: December 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (700.366 KB) | DOI: 10.11591/ijece.v6i6.pp2735-2741

Abstract

With the intrusion of internet into the lives of every household and terabytes of data being transmitted over the internet on daily basis, the protection of content being transmitted over the internet has become an extremely serious concern. Various measures and methods are being researched and devised everyday to ensure content protection of digital media. To address this issue of content protection, this paper proposes an RGB image steganography based on sixteen-pixel differencing with n-bit Least Significant Bit (LSB) substitution. The proposed technique provides higher embedding capacity without sacrificing the imperceptibility of the host data. The image is divided into 4×4 non overlapping blocks and in each block the average difference value is calculated. Based on this value the block is classified to fall into one of four levels such as, lower, lower-middle, higher-middle and higher. If block belongs to lower level then 2-bit LSB substitution is used in it. Similarly, for lower-middle, higher-middle and higher level blocks 3, 4, and 5 bit LSB substitution is used. In our proposed method there is no need of pixel value readjustment for minimizing distortion. The experimental results show that stego-images are imperceptible and have huge hiding capacity.
Robust Controller for a Vision Feedback Based Telepointer Shah Newaz Mohammad Abdul Kader; Mohd. Marzuki Mustafa; Aini Hussain
International Journal of Electrical and Computer Engineering (IJECE) Vol 6, No 6: December 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (742.45 KB) | DOI: 10.11591/ijece.v6i6.pp2870-2877

Abstract

Telepointer is a very useful tool for teleconsultation and teleproctoring, whereby a telepointer via teleconferencing is a perfect example of computer-supported cooperative work (CSCW) and digital telepresence. To this end, many telepointers are introduced for digital telepresence. However, there are still concerns regarding the speed of response and robustness of the system. It is rather difficult to model the actual system in order to design the controller. This paper described the development of a telepointer and its controller for a real time communication using vision feedback. The main focus of this study was to control the Laser Pointer (LP) with a discrete time PID (proportional–integral–derivative) controller which was tuned using Ziegler-Nichols (ZN) method. The results indicated that the tuned controller bring about fast response with no overshoot and steady state errors at the output response. The controller was shown to be robust against changes in sampling time and external disturbance.
A Hybrid Cryptographic System for Secured Device to Device Communication A. Rama Krishna; A. S. N. Chakravarthy; A. S. C. S. Sastry
International Journal of Electrical and Computer Engineering (IJECE) Vol 6, No 6: December 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (419.367 KB) | DOI: 10.11591/ijece.v6i6.pp2962-2970

Abstract

It is general fact that even after enormous expansion of wireless communication there are still dead regions that hampers the effective communication. With exponential rise in the smart phones, a new layer of communication has evolved that could address the concerns of dead regions and capacity barriers. D2D is the evolving communication technology which focuses on short distance hops between the public devices to reach the destination. The major drawback of this technology is that most of the devices are public hence trustworthiness of the entire channel needs to be addressed in order to make it a viable solution. In this paper, we introduce a novel hybrid cryptographic approach that could address multiple eavesdroppers’ scenario. This approach incorporates both Huffman coding and Binary coding to enhance the crypto benefits for the information transmitted over D2D channel that consists of several public devices. The dual-crypto nature of the proposed algorithm offers higher efficiency, better security and improved key transmission.  Thus, the proposed hybrid cryptographic approach is robust in nature while easy and simple to operate. In addition, the proposed approach could recover the original information without any distortion from the encrypted data making the approach lossless in nature. Further simulation results prove that the proposed offers confidentiality to the transmitted to data while addressing the network capacity crunch.
ISAR Image Classification with Wavelet and Watershed Transforms B. Mamatha; V. Valli Kumar
International Journal of Electrical and Computer Engineering (IJECE) Vol 6, No 6: December 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (502.208 KB) | DOI: 10.11591/ijece.v6i6.pp3087-3093

Abstract

Inverse Synthetic Aperture Radar images are playing a significant role in classification of sea and air targets. First we acquire the ISAR images of targets using a sensor like radar and extract the characteristics of targets from the ISAR images in the form of feature vectors. The computed feature vectors are used for classification of targets. In this work, widely used and efficient segmentation tool Watershed transform and the multi resolution technique wavelet transform are explored to derive the target features. An artificial neural network based classifier is used for classification. The Wavelet analysis divides the information of an image into approximation and detail sub signals. The approximate and three detail sub signal values are taken as feature vectors and given as input to the classifier for ship ISAR image classification. The widely used segmentation technique, Watershed transform is applied to the ISAR images. The wavelet coefficients are computed for the segmented ISAR images and used as feature vectors for classification of the ISAR images. Also, the statistical moments mean and standard deviation are computed for the color ISAR images itself, taken in RGB format. These statistical color moments are used as feature vector.  The classification accuracy is compared for the feature vectors.
Evaluation of the Forward-Backward Sweep Load Flow Method using the Contraction Mapping Principle Diego Issicaba; Jorge Coelho
International Journal of Electrical and Computer Engineering (IJECE) Vol 6, No 6: December 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (4812.261 KB) | DOI: 10.11591/ijece.v6i6.pp3229-3237

Abstract

This paper presents an assessment of the forward-backward sweep load flow method to distribution system analysis. The method is formally assessed using fixed-point concepts and the contraction mapping theorem. The existence and uniqueness of the load flow feasible solution is supported by an alternative argument from those obtained in the literature. Also, the closed-form of the convergence rate of the method is deduced and the convergence dependence of loading is assessed. Finally, boundaries for error values per iteration between iterates and feasible solution are obtained. Theoretical results have been tested in several numerical simulations, some of them presented in this paper, thus fostering discussions about applications and future works.
Protection Coordination and Anti Islanding Protection Solution for Biomass Power Plant Connected on Distribution Network Srete N Nikolovski; Marko Vukobratović; Ljubomir Majdandzic
International Journal of Electrical and Computer Engineering (IJECE) Vol 6, No 6: December 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (632.69 KB) | DOI: 10.11591/ijece.v6i6.pp2526-2537

Abstract

Protection coordination as well as anti-island protection play significant role in the process of biomass power plant connection on the distribution network. Distribution generation island operation in Croatia is unacceptable according to the existing National grid code Paper presents a protection coordination of all passive protections used in the real biomass power plant and connected distriubution network feeder. Short-circuits three phase, two phase and single line to ground faults and generator islanding simulations have been performed and simulated in the time domain at the different network  locations using DIgSILENT Power Factory software. The time-current plots coordination of protective devices are made using Smart PDC module in Easy Power Protector software tool.

Filter by Year

2016 2016


Filter By Issues
All Issue Vol 15, No 6: December 2025 Vol 15, No 5: October 2025 Vol 15, No 4: August 2025 Vol 15, No 3: June 2025 Vol 15, No 2: April 2025 Vol 15, No 1: February 2025 Vol 14, No 6: December 2024 Vol 14, No 5: October 2024 Vol 14, No 4: August 2024 Vol 14, No 3: June 2024 Vol 14, No 2: April 2024 Vol 14, No 1: February 2024 Vol 13, No 6: December 2023 Vol 13, No 5: October 2023 Vol 13, No 4: August 2023 Vol 13, No 3: June 2023 Vol 13, No 2: April 2023 Vol 13, No 1: February 2023 Vol 12, No 6: December 2022 Vol 12, No 5: October 2022 Vol 12, No 4: August 2022 Vol 12, No 3: June 2022 Vol 12, No 2: April 2022 Vol 12, No 1: February 2022 Vol 11, No 6: December 2021 Vol 11, No 5: October 2021 Vol 11, No 4: August 2021 Vol 11, No 3: June 2021 Vol 11, No 2: April 2021 Vol 11, No 1: February 2021 Vol 10, No 6: December 2020 Vol 10, No 5: October 2020 Vol 10, No 4: August 2020 Vol 10, No 3: June 2020 Vol 10, No 2: April 2020 Vol 10, No 1: February 2020 Vol 9, No 6: December 2019 Vol 9, No 5: October 2019 Vol 9, No 4: August 2019 Vol 9, No 3: June 2019 Vol 9, No 2: April 2019 Vol 9, No 1: February 2019 Vol 8, No 6: December 2018 Vol 8, No 5: October 2018 Vol 8, No 4: August 2018 Vol 8, No 3: June 2018 Vol 8, No 2: April 2018 Vol 8, No 1: February 2018 Vol 7, No 6: December 2017 Vol 7, No 5: October 2017 Vol 7, No 4: August 2017 Vol 7, No 3: June 2017 Vol 7, No 2: April 2017 Vol 7, No 1: February 2017 Vol 6, No 6: December 2016 Vol 6, No 5: October 2016 Vol 6, No 4: August 2016 Vol 6, No 3: June 2016 Vol 6, No 2: April 2016 Vol 6, No 1: February 2016 Vol 5, No 6: December 2015 Vol 5, No 5: October 2015 Vol 5, No 4: August 2015 Vol 5, No 3: June 2015 Vol 5, No 2: April 2015 Vol 5, No 1: February 2015 Vol 4, No 6: December 2014 Vol 4, No 5: October 2014 Vol 4, No 4: August 2014 Vol 4, No 3: June 2014 Vol 4, No 2: April 2014 Vol 4, No 1: February 2014 Vol 3, No 6: December 2013 Vol 3, No 5: October 2013 Vol 3, No 4: August 2013 Vol 3, No 3: June 2013 Vol 3, No 2: April 2013 Vol 3, No 1: February 2013 Vol 2, No 6: December 2012 Vol 2, No 5: October 2012 Vol 2, No 4: August 2012 Vol 2, No 3: June 2012 Vol 2, No 2: April 2012 Vol 2, No 1: February 2012 Vol 1, No 2: December 2011 Vol 1, No 1: September 2011 More Issue