International Journal of Electrical and Computer Engineering
International Journal of Electrical and Computer Engineering (IJECE, ISSN: 2088-8708, a SCOPUS indexed Journal, SNIP: 1.001; SJR: 0.296; CiteScore: 0.99; SJR & CiteScore Q2 on both of the Electrical & Electronics Engineering, and Computer Science) is the official publication of the Institute of Advanced Engineering and Science (IAES). The journal is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication and computer engineering from the global world.
Articles
150 Documents
Search results for
, issue
"Vol 8, No 5: October 2018"
:
150 Documents
clear
Initial Optimal Parameters of Artificial Neural Network and Support Vector Regression
Edy Fradinata;
Sakesun Suthummanon;
Wannarat Suntiamorntut
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 5: October 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (52.32 KB)
|
DOI: 10.11591/ijece.v8i5.pp3341-3348
This paper presents architecture of backpropagation Artificial Neural Network (ANN) and Support Vector Regression (SVR) models in supervised learning process for cement demand dataset. This study aims to identify the effectiveness of each parameter of mean square error (MSE) indicators for time series dataset. The study varies different random sample in each demand parameter in the network of ANN and support vector function as well. The variations of percent datasets from activation function, learning rate of sigmoid and purelin, hidden layer, neurons, and training function should be applied for ANN. Furthermore, SVR is varied in kernel function, lost function and insensitivity to obtain the best result from its simulation. The best results of this study for ANN activation function is Sigmoid. The amount of data input is 100% or 96 of data, 150 learning rates, one hidden layer, trinlm training function, 15 neurons and 3 total layers. The best results for SVR are six variables that run in optimal condition, kernel function is linear, loss function is ౬-insensitive, and insensitivity was 1. The better results for both methods are six variables. The contribution of this study is to obtain the optimal parameters for specific variables of ANN and SVR.
Permanent Fault Location in Distribution System Using Phasor Measurement Units (PMU) in Phase Domain
Ali Khaleghi;
Mahmoud oukati Sadegh;
Mahdi Ghazizadeh Ahsaee
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 5: October 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1037.167 KB)
|
DOI: 10.11591/ijece.v8i5.pp2709-2720
This paper proposes a new method for locating high impedance fault in distribution systems using phasor measurement units (PMUs) installed at certain locations of the system. To implement this algorithm, at first a new method is suggested for the placement of PMUs. Taking information from the units, voltage and current of the entire distribution system are calculated. Then, the two buses in which the fault has been occurred is determined, and location and type of the fault are identified. The main characteristics of the proposed method are: the use of distributed parameter line model in phase domain, considering the presence of literals, and high precision in calculating the high impedance fault location. The results obtained from simulations in EMTP-RV and MATLAB software indicate high accuracy and independence of the proposed method from the fault type, fault location and fault resistance compared to previous methods, so that the maximum observed error was less than 0.15%
Adaptive Neuro-Fuzzy Control Approach for a Single Inverted Pendulum System
Mohammed A. A. Al-Mekhlafi;
Herman Wahid;
Azian Abd Aziz
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 5: October 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (630.398 KB)
|
DOI: 10.11591/ijece.v8i5.pp3657-3665
The inverted pendulum is an under-actuated and nonlinear system, which is also unstable. It is a single-input double-output system, where only one output is directly actuated. This paper investigates a single intelligent control system using an adaptive neuro-fuzzy inference system (ANFIS) to stabilize the inverted pendulum system while tracking the desired position. The non-linear inverted pendulum system was modelled and built using MATLAB Simulink. An adaptive neuro-fuzzy logic controller was implemented and its performance was compared with a Sugeno-fuzzy inference system in both simulation and real experiment. The ANFIS controller could reach its desired new destination in 1.5 s and could stabilize the entire system in 2.2 s in the simulation, while in the experiment it took 1.7 s to reach stability. Results from the simulation and experiment showed that ANFIS had better performance compared to the Sugeno-fuzzy controller as it provided faster and smoother response and much less steady-state error.
Steganographic Scheme based on Message-Cover matching
Youssef Taouil;
El Bachir Ameur
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 5: October 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (2387.15 KB)
|
DOI: 10.11591/ijece.v8i5.pp3594-3603
Steganography is one of the techniques that enter into the field of information security, it is the art of dissimulating data into digital files in an imperceptible way that does not arise the suspicion. In this paper, a steganographic method based on the Faber-Schauder discrete wavelet transform is proposed. The embedding of the secret data is performed in Least Significant Bit (LSB) of the integer part of the wavelet coefficients. The secret message is decomposed into pairs of bits, then each pair is transformed into another pair based on a permutation that allows to obtain the most matches possible between the message and the LSB of the coefficients. To assess the performance of the proposed method, experiments were carried out on a large set of images, and a comparison to prior works is accomplished. Results show a good level of imperceptibility and a good trade-off imperceptibility-capacity compared to literature.
Effect of Feature Selection on Gene Expression Datasets Classification Accurac
Hicham Omara;
Mohamed Lazaar;
Youness Tabii
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 5: October 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (245.739 KB)
|
DOI: 10.11591/ijece.v8i5.pp3194-3203
Feature selection attracts researchers who deal with machine learning and data mining. It consists of selecting the variables that have the greatest impact on the dataset classification, and discarding the rest. This dimentionality reduction allows classifiers to be fast and more accurate. This paper traits the effect of feature selection on the accuracy of widely used classifiers in literature. These classifiers are compared with three real datasets which are pre-processed with feature selection methods. More than 9% amelioration in classification accuracy is observed, and k-means appears to be the most sensitive classifier to feature selection.
The Proposed Development of Prototype with Secret Messages Model in Whatsapp Chat
Hamdani Hamdani;
Heru Ismanto;
Agus Qomaruddin Munir;
Budi Rahmani;
Andri Syafrianto;
Didit Suprihanto;
Anindita Septiarini
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 5: October 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (8688.548 KB)
|
DOI: 10.11591/ijece.v8i5.pp3843-3851
Development of prototype at data security through secret messages is needed for disguising the messages sent in smartphone chatting application, WhatsApp (WA) Chat. We propose a model to disguise a plaintext message which is first encrypted by cryptosystem to change the plaintext message to ciphertext. Plaintext or plainimage entering the smartphone system is changed into encrypted text; receiver then can read the message by using similar key with the sender. The weakness of this proposal is the message random system is not planted directly in the chatting application; therefore message removing process from cryptosystem to WA application is still needed. The strength of using this model is the messages sent will not be easily re-encrypted by hacker and can be used at client computing section.
Experimental Analysis of Web Browser Sessions Using Live Forensics Method
Rusydi Umar;
Anton Yudhana;
Muhammad Nur Faiz
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 5: October 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (352.436 KB)
|
DOI: 10.11591/ijece.v8i5.pp2951-2958
In today's digital era almost every aspect of life requires the internet, one way to access the internet is through a web browser. For security reasons, one developed is private mode. Unfortunately, some users using this feature do it for cybercrime. The use of this feature is to minimize the discovery of digital evidence. The standard investigative techniques of NIST need to be developed to uncover an ever-varied cybercrime. Live Forensics is an investigative development model for obtaining evidence of computer usage. This research provides a solution in forensic investigation effectively and efficiently by using live forensics. This paper proposes a framework for web browser analysis. Live Forensics allows investigators to obtain data from RAM that contains computer usage sessions.
Performance Comparison of Multi Input Capacitor Converter Circuits
Sreejith S;
Karthik Balasubramanian
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 5: October 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (590.165 KB)
|
DOI: 10.11591/ijece.v8i5.pp3471-3483
This paper analyze the operation of a multi input switched capacitor (MIC) converters using a couple of switches, diodes and capacitors for several levels. With two input sources it is possible to obtain 8 output voltage levels. Here, 5 topologies of switched capacitor circuits namely summation, subtraction, inverting, double and half circuits are simulated and their performances are analyzed. Multi Input Converters have a high regard for multiple renewable energy sources used in smart grid systems, especially for distributed generators. The effects on output voltage with variation in load for different frequencies are also analyzed. Hardware implementation of summation and subtraction circuit is carried out and the results are compared with the simulated results
BB84 with Both Several Cloning and Intercept-resend Attacks
Mustapha Dehmani;
El Mehdi Salmani;
Hamid Ez-Zahraouy;
Abdelilah Benyoussef
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 5: October 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (217.799 KB)
|
DOI: 10.11591/ijece.v8i5.pp2988-2993
The goal of the protocol QKD BB84 is to allow a transmitter and a receiver which uses a quantum channel to exchange their keys and to detect the presence of eavesdropping attacks. In the present research, we investigate the effect of several eavesdroppers with both intercept-resend and cloning attacks. We will propose the different possible cases of the positioning of the eavesdroppers and their strategies of attacks; also we will calculate the mutual information for each case. The explicit expressions of the mutual information and quantum error clearly show that the security of the exchanged information depends on the numbers of the eavesdroppers and their attacks parameters on the quantum channel.
Enhancement of On-grid PV System under Irradiance and Temperature Variations Using New Optimized Adaptive Controller
Othman A. M Omar;
Niveen M. Badra;
Mahmoud A. Attia
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 5: October 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1164.197 KB)
|
DOI: 10.11591/ijece.v8i5.pp2650-2660
Solar Energy is one of the key solutions to future electrical power generation. Photovoltaic Plants (PV) are fast growing to satisfy electrical power demand. Different maximum power point tracking techniques (MPPT) are used to maximize PV systems generated power. In this paper, on grid PV system model in MATLAB SIMULINK is tested under sudden irradiance and cell temperature variations. Incremental Conductance MPPT is used to maximize generated power from the PV system with the help of new adaptive controller to withstand these heavy disturbances. The new adaptive controller is tuned for optimal operation using two different optimization techniques (Invasive weed and Harmony search).Optimization results for the two techniques are compared. .A robustness test is made to check system stability to withstand different random irradiance and cell temperature patterns without failure to track the maximum power point.Finally, a brief comparison is made with a previous literature and the new adaptive controller gives better results.