International Journal of Electrical and Computer Engineering
International Journal of Electrical and Computer Engineering (IJECE, ISSN: 2088-8708, a SCOPUS indexed Journal, SNIP: 1.001; SJR: 0.296; CiteScore: 0.99; SJR & CiteScore Q2 on both of the Electrical & Electronics Engineering, and Computer Science) is the official publication of the Institute of Advanced Engineering and Science (IAES). The journal is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication and computer engineering from the global world.
Articles
67 Documents
Search results for
, issue
"Vol 8, No 1: February 2018"
:
67 Documents
clear
Power Quality Compensation in Distribution System based on Instantaneous Power Theory and Recursive Fuzzy Proportional-Integral Controller
Mehrdad Ahmadi Kamarposhti
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 1: February 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (689.012 KB)
In this paper, the power quality compensation problems such as current harmonics and system load's reactive power are considered. In this context, we use static distribution synchronous compensator to inject compensation current into the system, which its reference current signals have been derived from the instantaneous power theory. To improve the current control operation and fast tracking of reference signals, a PI recursive controller has been used which is able to reduce to zero tracking error compared to its conventional type. The performance of the controller is delayed for a period; to overcome this problem, the phase rules have been used to adjust the controller parameters to increase the control performance speed. Finally, in simulation we used Matlab / Simulink software, which has been proven to be better than conventional PI controller-based compensation for power quality.
Feature Selection Mammogram based on Breast Cancer Mining
Shofwatul Uyun;
Lina Choridah
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 1: February 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (621.742 KB)
|
DOI: 10.11591/ijece.v8i1.pp60-69
The very dense breast of mammogram image makes the Radiologists often have difficulties in interpreting the mammography objectively and accurately. One of the key success factors of computer-aided diagnosis (CADx) system is the use of the right features. Therefore, this research emphasizes on the feature selection process by performing the data mining on the results of mammogram image feature extraction. There are two algorithms used to perform the mining, the decision tree and the rule induction. Furthermore, the selected features produced by the algorithms are tested using classification algorithms: k-nearest neighbors, decision tree, and naive bayesian with the scheme of 10-fold cross validation using stratified sampling way. There are five descriptors that are the best features and have contributed in determining the classification of benign and malignant lesions as follows: slice, integrated density, area fraction, model gray value, and center of mass. The best classification results based on the five features are generated by the decision tree algorithm with accuracy, sensitivity, specificity, FPR, and TPR of 93.18%; 87.5%; 3.89%; 6.33% and 92.11% respectively.
Migration of Virtual Machine to improve the Security of Cloud Computing
N. Chandrakala;
B. Thirumala Rao
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 1: February 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (478.467 KB)
|
DOI: 10.11591/ijece.v8i1.pp210-219
Cloud services help individuals and organization to use data that are managed by third parties or another person at remote locations. With the increase in the development of cloud computing environment, the security has become the major concern that has been raised more consistently in order to move data and applications to the cloud as individuals do not trust the third party cloud computing providers with their private and most sensitive data and information. This paper presents, the migration of virtual machine to improve the security in cloud computing. Virtual machine (VM) is an emulation of a particular computer system. In cloud computing, virtual machine migration is a useful tool for migrating operating system instances across multiple physical machines. It is used to load balancing, fault management, low-level system maintenance and reduce energy consumption. Virtual machine (VM) migration is a powerful management technique that gives data center operators the ability to adapt the placement of VMs in order to better satisfy performance objectives, improve resource utilization and communication locality, achieve fault tolerance, reduce energy consumption, and facilitate system maintenance activities. In the migration based security approach, proposed the placement of VMs can make enormous difference in terms of security levels. On the bases of survivability analysis of VMs and Discrete Time Markov Chain (DTMC) analysis, we design an algorithm that generates a secure placement arrangement that the guest VMs can moves before succeeds the attack.
Design and Implementation Intelligent Adaptive Front-lighting System of Automobile using Digital Technology on Arduino Board
H. Dahou;
R. El Gouri;
Mohammed Alareqi;
K. Mateur;
A. Mezouari;
A. Zemmouri;
L. Hlou
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 1: February 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (735.949 KB)
|
DOI: 10.11591/ijece.v8i1.pp521-529
The automatic light AFS (Adaptive Front - Lighting System) is added to the capabilities of modern vehicles that will improve the safety of vehicle drivers and passengers traveling at night. A new architecture of the AFS has proposed in this paper. This architecture is powerful and intelligent using the PWM technique on ARDUINO Board replaces the old mechanical system based on stepper motors.
Concept Drift Identification using Classifier Ensemble Approach
Leena Deshpande;
M. Narsing Rao
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 1: February 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (284.24 KB)
|
DOI: 10.11591/ijece.v8i1.pp19-25
Abstract:-In Internetworking system, the huge amount of data is scattered, generated and processed over the network. The data mining techniques are used to discover the unknown pattern from the underlying data. A traditional classification model is used to classify the data based on past labelled data. However in many current applications, data is increasing in size with fluctuating patterns. Due to this new feature may arrive in the data. It is present in many applications like sensornetwork, banking and telecommunication systems, financial domain, Electricity usage and prices based on its demand and supplyetc .Thus change in data distribution reduces the accuracy of classifying the data. It may discover some patterns as frequent while other patterns tend to disappear and wrongly classify. To mine such data distribution, traditionalclassification techniques may not be suitable as the distribution generating the items can change over time so data from the past may become irrelevant or even false for the current prediction. For handlingsuch varying pattern of data, concept drift mining approach is used to improve the accuracy of classification techniques. In this paper we have proposed ensemble approach for improving the accuracy of classifier. The ensemble classifier is applied on 3 different data sets. We investigated different features for the different chunk of data which is further given to ensemble classifier. We observed the proposed approach improves the accuracy of classifier for different chunks of data.
Noise Analysis of Trans-impedance Amplifier (TIA) in Variety Op Amp for use in Visible Light Communication (VLC) System
Syifaul Fuada;
Angga Pratama Putra;
Yulian Aska;
Trio Adiono
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 1: February 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1032.288 KB)
|
DOI: 10.11591/ijece.v8i1.pp159-171
VLC is a complex system with lots of challenges in its implementation. One of its problems is noise that originated from internal and external sources (sunlight, artificial light, etc). Internal noise is originated from active components of analog front-end (AFE) circuit, which will be discussed in this paper, especially on the trans-impedance amplifier (TIA) domain. The noise characteristics of AFE circuit in VLC system has been analyzed using the variety of available commercial Op Amp and different types of the photodiode (Si, Si-PIN, Si APD). The approach of this research is based on analytical calculus and simulation using MATLAB®. The results of this research show that the main factor that affecting the noise is en, the feedback resistor (Rf), and junction capacitor in the photodiode (Cj). Besides that, the design concept of multi channel TIA (8 channel) using IC Op Amp, with consideration of pin number of each Op Amp, supply needs, the initial value of Rf, converter to 8-DIP and feedback capacitor (Cf) channel, also discussed in this paper.
Hybrid Microstrip Diplexer Design for Multi-band WiMAX Application in 2.3 and 3.5 GHz Bands
M. A. Sazali;
N. A. Shairi;
Z. Zakaria
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 1: February 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1018.574 KB)
|
DOI: 10.11591/ijece.v8i1.pp576-584
In this paper, a design of hybrid microstrip diplexer is proposed for multi-band Worldwide Interoperability for Microwave Access (WiMAX) application in 2.3 and 3.5 GHz bands. The diplexer consists of a combination of two different filter designs. These filters were designed based on microstripline coupling techniques in order to obtain minimum insertion losses and achieve the desired frequency bandwidth. Therefore, a coupled open loop ring resonator was chosen for the filter design in 2.3 GHz band and a folded coupled line resonator was chosen for the filter design in 3.5 GHz band. Then, these filters were combined with a ring manifold matching network to be a hybrid microstrip diplexer. Based on the results, good agreements were achieved between the simulation and measurement results in terms of insertion loss, return loss and bandwidth in the 2.3 and 3.5 GHz bands.
Optimized Kernel Extreme Learning Machine for Myoelectric Pattern Recognition
Khairul Anam;
Adel Al-Jumaily
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 1: February 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1121.149 KB)
|
DOI: 10.11591/ijece.v8i1.pp483-496
Myoelectric pattern recognition (MPR) is used to detect user’s intention to achieve a smooth interaction between human and machine. The performance of MPR is influenced by the features extracted and the classifier employed. A kernel extreme learning machine especially radial basis function extreme learning machine (RBF-ELM) has emerged as one of the potential classifiers for MPR. However, RBF-ELM should be optimized to work efficiently. This paper proposed an optimization of RBF-ELM parameters using hybridization of particle swarm optimization (PSO) and a wavelet function. These proposed systems are employed to classify finger movements on the amputees and able-bodied subjects using electromyography signals. The experimental results show that the accuracy of the optimized RBF-ELM is 95.71% and 94.27% in the healthy subjects and the amputees, respectively. Meanwhile, the optimization using PSO only attained the average accuracy of 95.53 %, and 92.55 %, on the healthy subjects and the amputees, respectively. The experimental results also show that SW-RBF-ELM achieved the accuracy that is better than other well-known classifiers such as support vector machine (SVM), linear discriminant analysis (LDA) and k-nearest neighbor (kNN).
UDP Pervasive Protocol Implementation for Smart Home Environment on MyRIO using LabVIEW
Wijaya Kurniawan;
Mochammad Hannats Hanafi Ichsan;
Sabriansyah Rizqika Akbar
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 1: February 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (444.379 KB)
|
DOI: 10.11591/ijece.v8i1.pp113-123
Smart Home concept is to connect several devices to perform control and the device to be controlled to help any human needs. So it should have one device being Host and several devices being Client. The environment in this case is a home that there is too much technology that planted technologies that has much influence at human activities is called pervasive computing. The device communication should be has a protocol, at the research used UDP protocol because it doesn't need to negotiate before performing communication like a TCP. With UDP behavior did not use to validate at every send or deliver data because at Smart Home environment doesn't need a large or big data being processed. LabView used at this research based on previous research, but MyRIO has used this research to perform Client and Host performed by PC. So it can measure how usable the design that created. This research proves that LabView and MyRIO successfully implemented with the design that created to perform Pervasive Computing for Smart Home environment. Functional testing scenario conducted by every condition that on system environment, based on design all testing scenario successfully and working as well as expected.
Presentation of an Algorithm for Secure Data Transmission based on Optimal Route Selection during Electromagnetic Interference Occurrence
A. H. Poursoltan Mohammadi;
M. Chehel Amirani;
F. Faghihi
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 1: February 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (868.229 KB)
|
DOI: 10.11591/ijece.v8i1.pp259-270
This paper proposes a comprehensive algorithm for secure data transmission via communication conductors considering route optimization, shielding and data authentication. Using of appropriate coding method causes more efficiency for suggested algorithm during electromagnetic field attack occurrence. In this paper, MOM simulation via FIKO software is done for field distribution. Due to critical situation of malfunctioning of data transferring, appropriate shield is designed and examined by shielding effectiveness (SE) criterion resulted of MOM simulation; finally to achieve reliability of data security, MAC hash function is used for space with field attack probability, turbo code is employed.