International Journal of Electrical and Computer Engineering
International Journal of Electrical and Computer Engineering (IJECE, ISSN: 2088-8708, a SCOPUS indexed Journal, SNIP: 1.001; SJR: 0.296; CiteScore: 0.99; SJR & CiteScore Q2 on both of the Electrical & Electronics Engineering, and Computer Science) is the official publication of the Institute of Advanced Engineering and Science (IAES). The journal is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication and computer engineering from the global world.
Articles
150 Documents
Search results for
, issue
"Vol 8, No 5: October 2018"
:
150 Documents
clear
Enhanced Transmission and Receiver Diversity in Orthogonal Frequency Division Multiplex Systems using Blind Channel Estimation
Vivek Kumar Gupta;
Sandip Vijay
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 5: October 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (375.772 KB)
|
DOI: 10.11591/ijece.v8i5.pp2738-2743
This paper deals with the blind channel estimation technique in OFDM system with receiver diversity to analyze the bit error rate with respect to the number of symbols. The paper clearly brings out the advantage that is being offered by the use of Blind channel estimation technique in terms of SNR requirements. Also a comparative study has been made for the analysis of BER variation with the amount i.e. number of symbols being transmitted. The work also explores the possibility of obtaining an optimum value of number of receivers that may lead to desired BER for threshold value of SNR in an OFDM system.
An Efficient Filtering Technique for Denoising Colour Images
K. Arun Sai;
K. Ravi
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 5: October 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (350.611 KB)
|
DOI: 10.11591/ijece.v8i5.pp3604-3608
Single-sensor digital cameras capture image with the aid of masking the sensor surface along a colour filter array(CFA) such that every sensor pixel solely samples certain of three primary colour values i.e., R (red),G (green) and B (blue). To get a full-colour image, an interpolation method commonly referred in conformity with CFA demosaicking is required to estimate the other two contributions for producing a full-colour image. But, the clutter in imaging sensors not only corrupts the colour filter array but also introduces artifacts at some stage in the colour interpolation step and affects the characteristics of image. To acquire high quality full-colour image, a kind of viable and effective interpolation algorithm based over gradient is used. This technique can remove the noise effectively by retaining image border and detail data clearly.
Motorcycle Movement Model Based on Markov Chain Process in Mixed Traffic
Rina Mardiati;
Bambang R Trilaksono;
Yudi S Gondokaryono;
Sony S Wibowo
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 5: October 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1440.886 KB)
|
DOI: 10.11591/ijece.v8i5.pp3149-3157
Mixed traffic systems are dynamically complex since there are many parameters and variables that influence the interactions between the different kinds of vehicles. Modeling the behavior of vehicles, especially motorcycle which has erratic behavior is still being developed continuously, especially in developing countries which have heterogeneous traffic. To get a better understanding of motorcycle behavior, one can look at maneuvers performed by drivers. In this research, we tried to build a model of motorcycle movement which only focused on maneuver action to avoid the obstacle along with the trajectories using a Markov Chain approach. In Markov Chain, the maneuver of motorcycle will described by state transition. The state transition model is depend on probability function which will use for determine what action will be executed next. The maneuver of motorcycle using Markov Chain model was validated by comparing the analytical result with the naturalistic data, with similarity is calculated using MSE. In order to know how good our proposed method can describe the maneuver of motorcycle, we try to compare the MSE of the trajectory based on Markov Chain model with those using polynomial approach. The MSE results showed the performance of Markov Chain Model give the smallest MSE which 0.7666 about 0.24 better than 4th order polynomial.
A Novel Configuration of A Microstrip Power Amplifier based on GaAs-FET for ISM Applications
Amine Rachakh;
Larbi El Abdellaoui;
Jamal Zbitou;
Ahmed Errkik;
Abdelali Tajmouati;
Mohamed Latrach
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 5: October 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (473.889 KB)
|
DOI: 10.11591/ijece.v8i5.pp3882-3889
Power Amplifiers (PA) are very indispensable components in the design of numerous types of communication transmitters employed in microwave technology. The methodology is exemplified through the design of a 2.45GHz microwave power Amplifier (PA) for the industrial, scientific and medical (ISM) applications using microstrip technology. The main design target is to get a maximum power gain while simultaneously achieving a maximum output power through presenting the optimum impedance which is characteristically carried out per adding a matching circuit between the source and the input of the power amplifier and between the load and the output of the power amplifier. A "T" matching technique is used at the input and the output sides of transistor for assure in band desired that this circuit without reflections and to obtain a maximum power gain. The proposed power amplifier for microwave ISM applications is designed, simulated and optimized by employing Advanced Design System (ADS) software by Agilent. The PA shows good performances in terms of return loss, output power, power gain and stability; the circuit has an input return loss of -38dB and an output return loss of -33.5dB. The 1-dB compression point is 8.69dBm and power gain of the PA is 19.4dBm. The Rollet's Stability measure B1 and the stability factor K of the amplifier is greater than 0 and 1 respectively, which shows that the circuit is unconditionally stable. The total chip size of the PA is 73.5× 36 mm2.
Towards Benchmarking User Stories Estimation with COSMIC Function Points-A Case Example of Participant Observatio
Jayasri Angara;
Srinivas Prasad;
Gutta Sridevi
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 5: October 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (127.467 KB)
|
DOI: 10.11591/ijece.v8i5.pp3076-3083
Shorter time-to-market and unstable requirements is leading to introduction of Agile and DevOps practices. Story point estimation is becoming handier in Agile/DevOps setting. However, developing user stories and defining sizing unit in terms of story point is subjective process. It lacks benchmarking/standardization in terms of sizing measure and productivity of historical data. COSMIC has been considered as FSM (Functional Size Method). It has flexibility to receive requirements as User stories (popular Agile/Devops method) and derive COSMIC functional units using parametric approach. COSMIC method reduces the subjectivity and populates the productivity parameter for benchmarking. It standardizes the estimation process and can be easily deployed in Agile or DevOps setting. This paper presents the related work on linkages between User stories, COSMIC methods and traditional function point methods. It also presents the outcome of the industry survey conducted on 49 practitioners working in 10 different domains with respective to parametric estimation process adoption and presents 9 real-time case studies developed to demonstrate the usage of COSMIC method in various domains. This paper also attempts to derive mapping process of COSMIC functional process with User Stories with the help of 2 real-time industry case studies.
Analysis of Blackhole Attack in AODV and DS
Niranjan Panda;
Binod Kumar Pattanayak
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 5: October 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (454.898 KB)
|
DOI: 10.11591/ijece.v8i5.pp3092-3102
Mobile Ad-Hoc Networks (MANETs) are supreme ruler and demoralization wireless scheme. MANETs are infrastructure less i.e. their structure is not fixed, and the nodes be able to move about and can leave the network whenever they want. The nodes are to perform as more over router and host. In MANETs, the node can be in contact with every node as their configuration is not fixed and the nodes starts transmitting the packets to each other for the establishment of the connection. To hitch the link, the nodes make use of some routing protocols like Ad-Hoc On Demand Distance Vector (AODV), Dynamic Source Routing (DSR), and DestinationSequenced Distance Vector (DSDV). Security in MANET is the key matter meant for the fundamental utility of network. There are many attacks caused in MANET. Blackhole attack is one that occurs in MANET. A Black hole attack is an attack where the node, which is malicious advertise itself as having the optimal route to the destination and drops all the packets instead of forwarding further to the destination. Here, we have shown the blackhole attack in AODV and DSR. Through simulation we evaluate the performance of the two above protocols under blackhole attack.
Hexa-band MIMO CPW Bow-tie Aperture Antenna Using Particle Swarm Optimization
A.K. hamid;
W. Obaid
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 5: October 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (569.905 KB)
|
DOI: 10.11591/ijece.v8i5.pp3118-3128
A MIMO hexa-band Bowtie Antenna for Wi-Fi is proposed. The MIMO antenna can operate at six frequency bands: 2.4, 4.4, 6.1, 8.5, 10.25 and 12.8 GHz. The MIMO antenna consists of four loaded bowtie hexa-band antennas having the same structure. Each single antenna element is loaded with six metallic strips as well as interconnected parasitic rectangular components. The presented HFSS simulations will show that the MIMO loaded antenna can operate at six frequency bands including 2.4 GHz by obtaining the return loss results, radiation patterns, and other antenna parameters. It will be shown also that the MIMO bowtie antenna has a very low mutual coupling at all the operating frequencies for the specific loaded metallic strips width which was obtained using Particle Swarm Optimization technique.
Information System Success Framework based on Interpersonal Conflict Factors
Mohammed Aboaoga;
Mohd Juzaiddin Ab Aziz;
Ibrahim Mohamed
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 5: October 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (434.486 KB)
|
DOI: 10.11591/ijece.v8i5.pp3740-3746
Information system success (ISS) has received considerable attention from researchers as it plays an important role in improving the efficiency and productivity of an organization. Several researchers have conducted empirical studies using numerous factors (e.g. organizational, technological, and individual factors) which affect the information system success. However, there are several factors which are related to interpersonal conflict which may affect information system success. The interpersonal conflict is a critical dimension which can greatly influence information system success in a competitive environment such as the financial sector. Therefore, this study introduces a framework to investigate the influence of interpersonal conflict factors on information system success in the Ministry of Finance, Yemen. The study employed a quantitative method which consists of the following steps: survey design, data collection and data analysis. A sample size comprising 130 employees were distributed in the Ministry of Finance, Yemen. Questionnaires were used to collect data from this sample. Data analysis (reliability, validity, correlation and factor analysis) has been carried out using SPSS. In addition, structural equation modelling (SEM) has been used for evaluation the research model. Based on the experimental results, the findings in this study revealed that the interpersonal factors (interference, disagreement and instability) significantly negatively (at 0.05 level of significance) influence user satisfaction of information system success.
Markovian Queueing Model for Throughput Maximization in D2D-Enabled Cellular Networks
Abiodun Gbenga-ilori;
Olufunmilayo Sanusi
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 5: October 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (2494.681 KB)
|
DOI: 10.11591/ijece.v8i5.pp3767-3777
Device-to-Device (D2D) communication has been considered a key enabling technology that can facilitate spectrum sharing in 4G and 5G cellular networks. In order to meet the high data rate demands of these new generation cellular networks, this paper considers the optimization of available spectrum resource through dynamic spectrum access. The utilization of continuous-time Markov chain (CTMC) model for efficient spectrum access in D2D-enabled cellular networks is investigated for the purpose of determining the impact of this model on the capacity improvement of cellular networks. The paper considers the use of CTMC model with both queueing and non-queueing cases called 13-Q CTMC and 6-NQ CTMC respectively with the aim of improving the overall capacity of the cellular network under a fairness constraint among all users. The proposed strategy consequently ensures that spectrum access for cellular and D2D users is optimally coordinated by designing optimal spectrum access probabilities. Numerical simulations are performed to observe the impact of the proposed Markovian queueing model on spectrum access and consequently on the capacity of D2D-enabled cellular networks. Results showed that the proposed 13-Q CTMC provide a more spectrum-efficient sharing scheme, thereby enabling better network performances and larger capabilities to accommodate more users.
Sensing and Sharing Schemes for Spectral Efficiency of Cognitive Radios
M. K. Kaushik;
Y. Yoganandam;
SK Sahoo
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 5: October 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (502.945 KB)
|
DOI: 10.11591/ijece.v8i5.pp2934-2941
Increase in data traffic, number of users and their requirements laid to a necessity of more bandwidth. Cognitive radio is one of the emerging technology which addresses the spectrum scarcity issue. In this work we study the advantage of having collaboration between cognitive enabled small cell network and primary macrocell. Different from the existing works at spectrum sensing stage we are applying enhanced spectrum sensing to avoid probability of false alarms and missed detections which has impact on spectral efficiency. Later power control optimization for secondary users known as Hybrid spectrum sharing is used for further improvement of spectral efficiency. Furthermore, the failed packets of Primary users are taken care by high ranked relays which in turn decreases the average Primary user packet delay by 20% when compared between assisted Secondary user method and non-assisted Secondary user method.