International Journal of Electrical and Computer Engineering
International Journal of Electrical and Computer Engineering (IJECE, ISSN: 2088-8708, a SCOPUS indexed Journal, SNIP: 1.001; SJR: 0.296; CiteScore: 0.99; SJR & CiteScore Q2 on both of the Electrical & Electronics Engineering, and Computer Science) is the official publication of the Institute of Advanced Engineering and Science (IAES). The journal is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication and computer engineering from the global world.
Articles
90 Documents
Search results for
, issue
"Vol 6, No 6: December 2016"
:
90 Documents
clear
A Novel Human STR Similarity Method using Cascade Statistical Fuzzy Rules with Tribal Information Inference
M. Rahmat Widyanto;
Reggio N. Hartono;
Nurtami Soedarsono
International Journal of Electrical and Computer Engineering (IJECE) Vol 6, No 6: December 2016
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (903.876 KB)
|
DOI: 10.11591/ijece.v6i6.pp3103-3111
A novel human STR (Short Tandem Repeat) similarity method using cascade statistical fuzzy rules with tribal information inference is proposed. The proposed method consists of two cascade Fuzzy Inference Systems (FIS). The first FIS is to discriminate the tribal similarity, and the second FIS is to calculate the STR similarity. By using the allele marker’s statistical distribution probability density function as the membership function in the Fuzzy Rules of the first FIS, the new method makes it possible to tell the tribal similarity between two STR profiles. A 727 data acquired from tribal groups of Indonesia is used to examine the method produced promising result, being able to indicate higher tribal similarity score within a tribal group and lower similarity between tribal groups. In the light of Indonesia’s diverse tribal groups, these properties are able to be leveraged as a new way to improve the versatility of existing DNA matching algorithm.
Low Common-Mode Gain Instrumentation Amplifier Architecture Insensitive to Resistor Mismatches
Zainul Abidin;
Koichi Tanno;
Shota Mago;
Hiroki Tamura
International Journal of Electrical and Computer Engineering (IJECE) Vol 6, No 6: December 2016
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (397.404 KB)
|
DOI: 10.11591/ijece.v6i6.pp3247-3254
In this paper, an instrumentation amplifier architecture for biological signal is proposed. First stage of conventional IA architecture was modified by using fully balanced differential difference amplifier and evaluated by using 1P 2M 0.6μm CMOS process. From HSPICE simulation result, lower common-mode voltage can be achieved by proposed IA architecture. Actual fabrication was done and six chips were evaluated. From the evaluation result, average common-mode gain of proposed IA architecture is 10.84 dB lower than that of conventional one without requiring well-matched resistors. Therefore, the proposed IA architecture is suitable for biological signal processing.
Overvoltage Effects on Ground Grid Systems of Single and Two Neighboring High Voltage Substations
Krung Luewattana;
Aphibal Pruksanubal
International Journal of Electrical and Computer Engineering (IJECE) Vol 6, No 6: December 2016
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1757.629 KB)
|
DOI: 10.11591/ijece.v6i6.pp2545-2556
The power networks with reliable transmission and distribution systems require high voltage substations with effective ground grid systems. Therefore, this study aimed to analyze the effects of overvoltage on ground grid systems within high voltage substations in two cases, including a single substation and the two neighboring substations, by using ATP/EMTP and ANSYS softwares. The simulations were performed to show both graphs and 3D results when the fault current flowed into the ground grids of substations at various positions. In case of the single high voltage substation, the overvoltage was highest when the fault current was injected at the corner of ground grid. However, in case of two neighboring high voltage substations, the levels of overvoltage were similar between that caused by injecting the fault current at the center and at the corner of ground grid. The simulation showed that overvoltage which occurring at the ground grid of high voltage substation A could permeate to the ground grid of nearby high voltage substation B, which nevertheless depending on the how the fault current was injected at different spots. The data from these simulations and analysis can be useful for future designs of ground grid systems with high reliability.
Optical Interconnect Waveguide in Electronic Circuit
Siti Sarah Binti Md Sallah;
Sawal Hamid Md Ali;
Nurjuliana Binti Juhari;
P. Sushitha Menon;
Md Shabiul Islam
International Journal of Electrical and Computer Engineering (IJECE) Vol 6, No 6: December 2016
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijece.v6i6.pp2708-2715
The increasing demand in silicon nano-photonics has encouraged many researchers to put more efforts to explore the feasibility of using optics in the communication medium in order to replace the conventional electrical interconnects (EIs). In this paper, we proposed a SOI- based waveguide in the optical interconnect (OI) link at an operating frequency of 1550nm to work as an interconnection path in a circuit. The performance capability of the OI link was tested using a two-stage CE amplifier to work as the interconnection path from the 1st stage to the 2nd stage amplifier. In term of optical performances, the optical waveguide interconnect managed to achieve a single mode condition for a TE mode and fulfill the receiver sensitivity of a photodiode. While, in term of electrical performance, a two-stage CE amplifier is able to produce a high gain, a wide bandwidth and high slew rate. The proposed implementation of the OIs waveguide is succesfully enhance the performance of the two-stage CE amplifier as well as the analog electronic circuit applications.
Evaluation of Various Digital Controllers for Forward Converter with Active Clamp
Ravindra Janga;
Sushama Malaji
International Journal of Electrical and Computer Engineering (IJECE) Vol 6, No 6: December 2016
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (791.185 KB)
|
DOI: 10.11591/ijece.v6i6.pp2846-2854
This research paper presents the design issues of digital Controllers for Forward Converter with Active Clamp circuit (ACFC). Brief review of Working Principle and mathematical modelling of the converter is first given. The importance of Digital Controllers for forward converter and design procedure is described in detail. And the validity of designed controllers and achievement of desired compensation is verified by the results of implemented digital controllers to Active clamp forward Converter (ACFC). Finallly results are analyzed by applying disturbances at both supply end and Load ends of the converter. And the conclusions are made based on obtained results of Voltage Mode Controller (VMC) by comparing with the results of the Current Mode Controller (CMC).
Evaluation of Recognition-Based Graphical Password Schemes in Terms of Usability and Security Attributes
Touraj Khodadadi;
A.K.M. Muzahidul Islam;
Sabariah Baharun;
Shozo Komaki
International Journal of Electrical and Computer Engineering (IJECE) Vol 6, No 6: December 2016
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (415.339 KB)
|
DOI: 10.11591/ijece.v6i6.pp2939-2948
User Authentication is a critical component in information security. Several widely used mechanisms for security to protect services from illegal access include alphanumerical usernames passwords. However, there are several drawbacks attached in this method. For instance, the users themselves usually those passwords that are easy to guess. As difficult passwords are difficult to recall. A new alternative is the graphic-based password and there has been a growing trend in the use of such a password. The human psychology study reveals that humans find it easier to remember pictures as opposed to words. There are two main aspects to the graphical password scheme, namely security and usability. This study comprises of a comprehensive research in the current Recognition-Based graphical password schemes. The common usability attributes and possible attacks on the Recognition-Based graphical password are reviewed, identified and examined in detail. There are several previous surveys on the graphical passwords. The latest research review and summarize graphical password systems concisely and at the same time, analyze usability features for every design. However it was found that there is not a single method that has the most resounding usability attributes. Therefore, this research suggests a set of usability attributes that can be applied into a single Recognition-Based graphical password system. In addition, this study examines and compares success rates on login, login time and memorability of existing systems which are the usability measures most often reported in user studies of graphical passwords. Lastly, a comparison table is revealed to put forth the limitations and strengths of each approach in terms of security and usability.
Using the Fuzzy Logic to Find Optimal Centers of Clusters of K-means
Wed Kadhim Oleiwi
International Journal of Electrical and Computer Engineering (IJECE) Vol 6, No 6: December 2016
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (345.706 KB)
|
DOI: 10.11591/ijece.v6i6.pp3068-3072
Techniques of data mining that used in the medical diagnosis a number of diseases like cancer, diabetes, stroke, and heart disease. The great importance emerging fields for providing diagnosis and a profounder understanding of medical data, its coms from Data mining in medical field .researcher attempts to solve real world health problems in the prognosis and treatment of diseases, by using Healthcare data mining. In this research, the algorithm of k-means is used for grouping medical data, the problem of k-means is to find optimal centers of clusters so, and fuzzy logic is used to get optimal centers of clusters.
Fibonary Spray and Wait Routing in Delay Tolerant Networks
Priyanka Das;
Prosenjit Chowdhury;
Bikash Poudel;
Tanmay De
International Journal of Electrical and Computer Engineering (IJECE) Vol 6, No 6: December 2016
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1235.825 KB)
|
DOI: 10.11591/ijece.v6i6.pp3205-3216
Although there has been a tremendous rise in places being connected through the Internet or any other network protocol, there still lie areas, which remain out of reach due to various reasons. For all such places the answer is a Delay Tolerant Network (DTN). A DTN is such a network where there is no fixed or predefined route for messages and no such guarantee whatsoever of all messages being correctly routed. DTN can be considered as a superset of networks wherein other networks such as adhoc, mobile, vehicular etc. form the subset. Therefore routing in DTN is a very chancy affair where one has to maximize on the present network scenarios to get any fruitful result other than depending on past information. Also protocols here need to be less complex and not increase the already high nodal overhead. In this paper we propose a new approach, the Fibonary Spray and Wait, which does exactly this. It forwards copies of a message in a modified Binary Spray and Wait manner so that it performs well even in non independent and identically distributed node structure. We have supported our statements with mathematical as well as simulation analysis.
Transient Phenomena during the Three-Phase 300MVA Transformer Energization on the Transmission Network
Emir Alibašić;
Predrag Marić;
Srete N Nikolovski
International Journal of Electrical and Computer Engineering (IJECE) Vol 6, No 6: December 2016
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (894.499 KB)
|
DOI: 10.11591/ijece.v6i6.pp2499-2505
Connecting the transformer to the network may incur inrush current, which is significantly higher than the rated current of the transformer. The main cause of this phenomenon lies in the nonlinearity of the magnetic circuit. The value of the inrush current depends of the time moment of the energization and the residual magnetism in the transformer core. While connecting, the operating point of the magnetization characteristic can be found deep in the saturation region resulting in occurrence of large transformer currents that can trigger the transformer protection. Tripping of protection immediately after the transformer energization raises doubts about the transformer health. Inrush current can cause a number of other disadvantages such as the negative impact on other transformers connected on the same busbar; the increase of the transformer noise due to the large current value, the increase of the voltage drops in the network. The paper presents a simulation of the 300 MVA transformer energization using the MATLAB/Simulink software.
Signature Verification using Normalized Static Features and Neural Network Classification
Manish Trikha;
Manas Singhal;
Maitreyee Dutta
International Journal of Electrical and Computer Engineering (IJECE) Vol 6, No 6: December 2016
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (621.747 KB)
|
DOI: 10.11591/ijece.v6i6.pp2665-2673
Signature verification is very widely used in verification of the identity of any person. Now a days other biometric verification system has been evolved very widely like figure print, iris etc., but signature verification through computer system is still in development phase. The verification system is either through offline mode or online mode in online systems the dynamic information of a signature captured at the time the signature is made while in offline systems based on the scanned image of a signature. In this paper, a method is presented for Offline signatures Verification, for this verification system signature image is first pre-processed and converted into binary image of same size with 200x200 Pixels and then different features are extracted from the image like Eccentricity, Kurtosis, Skewness etc. and that features are used to train the neural network using back-propagation technique. For this verification system 6 different user signatures are taken to make database of the feature and results are analysed. The result demonstrate the efficiency of the proposed methodology when compared with other existing studies. The proposed algorithm gives False Acceptance Rate (FAR) as 5.05% and False Rejection rate (FRR) as 4.25%.