International Journal of Electrical and Computer Engineering
International Journal of Electrical and Computer Engineering (IJECE, ISSN: 2088-8708, a SCOPUS indexed Journal, SNIP: 1.001; SJR: 0.296; CiteScore: 0.99; SJR & CiteScore Q2 on both of the Electrical & Electronics Engineering, and Computer Science) is the official publication of the Institute of Advanced Engineering and Science (IAES). The journal is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication and computer engineering from the global world.
Articles
128 Documents
Search results for
, issue
"Vol 9, No 5: October 2019"
:
128 Documents
clear
Prediction the data consumption for power demands by elman neural network
Lafta Ismael;
Ammar Issa Ismael
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 5: October 2019
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (525.022 KB)
|
DOI: 10.11591/ijece.v9i5.pp4003-4009
The load forecasting consider as part important in power system operation. The exact prediction for power demand is important for planning how much need extra power generation to cover extra load to keep without happen shutdown. Neural networks stay frequently designed for modeling dynamic processes. The Multi-Layer Perceptron (MLP) with Radial Basis Functions (RBF) network is static approximations used fewer frequently in the discrete-time domain. In this paper proposed predict method for daily peak load by Elman Neural Network (ENN) with using data power demand for 2 years collected from National Control Center (NCC) and comparing the result. The result show the proposal is evaluated and followed the power demand.
An algorithm for IoT based vehicle verification system using RFID
Alen Joseph Samuel;
Shoney Sebastian
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 5: October 2019
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (282.661 KB)
|
DOI: 10.11591/ijece.v9i5.pp3751-3758
The verification of vehicle documents is an important role of transport department which is rising day by day due to the mass registration of the vehicles. An automated vehicle verification system can improve the efficiency of this process. In this paper, we propose an IOT based vehicle verification system using RFID technology. As a result, the vehicle checking which is done now manually can be replaced by automation. There is a loss of a significant amount of time when the normal vehicle checking is done manually. The proposed system will make this process automated. The present verification process is using inductive loops that are placed in a roadbed for detecting vehicles as they pass through the loop of the magnetic field. Similarly, the sensing devices spread along the road can detect passing vehicles through the Bluetooth mechanism. The fixed audio detection devices that can be used to identify the type of vehicles on the road. Other measurements are fixed cameras installed in specific points of roads for categorising the vehicles. But all these mechanisms cannot verify the documents and certificates of the vehicles. In our work, we have suggested an algorithm using RFID technology to automate the documentation verification process of the vehicles like Pollution, Insurance, Rc book etc with the help of RFID reader placed at road checking areas. This documents will be updated by the motor vehicle department at specific periods.
A simplified machine learning approach for recognizing human activity
Abdul Lateef Haroon P.S;
U. Eranna
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 5: October 2019
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (392.736 KB)
|
DOI: 10.11591/ijece.v9i5.pp3465-3473
With the wide ranges of real-time event feed capturing devices, there has been significant progress in the area of digital image processing towards activity detection and recognition. Irrespective of the presence of various such devices, they are not adequate to meet dynamic monitoring demands of the visual surveillance system, and their features are highly limited towards complex human activity recognition system. Review of existing system confirms that still there is a large scope of enhancement as they lack applicability to real-life events and also doesn't offer optimal system performance. Therefore, the proposed manuscript presents a model for activity recognition system where the accuracy of recognition operation and system performance are retained with good balance. The study presents a simplified feature extraction process from spatial and temporal traits of the event feeds that is further subjected to the machine learning mechanism for boosting recognition performance
Recommender system for surplus stock clearance
Vipul Agarwal;
Vijayalakshmi A
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 5: October 2019
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (634.78 KB)
|
DOI: 10.11591/ijece.v9i5.pp3813-3821
Accumulation of the stock had been a major concern for retail shop owners. Surplus stock could be minimized if the system could continuously monitor the accumulated stock and recommend the stock which requires clearance. Recommender Systems computes the data, shadowing the manual work and give efficient recommendations to overcome stock accumulation, creating space for new stock for sale to enhance the profit in business. An intelligent recommender system was built that could work with the data and help the shop owners to overcome the issue of surplus stock in a remarkable way. An item-item collaborative filtering technique with Pearson similarity metric was used to draw the similarity between the items and accordingly give recommendations. The results obtained on the dataset highlighted the top-N items using the Pearson similarity and the Cosine similarity. The items having the highest rank had the highest accumulation and required attention to be cleared. The comparison is drawn for the precision and recall obtained by the similarity metrics used. The evaluation of the existing work was done using precision and recall, where the precision obtained was remarkable, while the recall has the scope of increment but in turn, it would reduce the value of precision. Thus, there lies a scope of reducing the stock accumulation with the help of a recommender system and overcome losses to maximize profit
Performance comparison between 802.11 and 802.11p for high speed vehicle in VANET
Mohammed Hasan Alwan;
Khairun N. Ramli;
Yasir Amer Al-Jawher;
Aws Zuhair Sameen;
Hussain Falih Mahdi
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 5: October 2019
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (755.067 KB)
|
DOI: 10.11591/ijece.v9i5.pp3687-3694
Vehicular ad-hoc networks (VANETs) technology has been emerged as a critical research area. Being ad-hoc in nature, VANET is a type of networks that is created from the concept of establishing a network of cars for a specific need or situation. Communication via routing packets over the high-speed vehicles is a challenging task. Vehicles mobility, speed can vary depending on the road specification. However, on highway, the speed can be increase up to 120 – 200 Km/H. Moving at high speed can affect the efficiency of data delivery. In particular V2I traffic where moving car trying to deliver data to fixed space units which are designed to collect and process data from vehicles. Different protocols have been proposed to be implemented for VANET infrastructure, including 802.11 and 802.11p. In this paper, the performance of the most widely deployed MAC protocols for handling wireless communication which is 802.11 and the 802.11p have been compared, which is a customized version for high speed modes. Performance is investigated in term of data delivery evaluation metrics including network throughput, delay and packet delivery ration. Results show that 802.11p has efficiently enhanced the network performance where network throughput is increased, delay is decreased, and packet delivery ratio is increased as well.
A new framework to alleviate DDoS vulnerabilities in cloud computing
A. Saravanan;
S. SathyaBama;
Seifedine Kadry;
Lakshmana Kumar Ramasamy
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 5: October 2019
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (767.371 KB)
|
DOI: 10.11591/ijece.v9i5.pp4163-4175
In the communication age, the Internet has growing very fast and most industries rely on it. An essential part of Internet, Web applications like online booking, e-banking, online shopping, and e-learning plays a vital role in everyday life. Enhancements have been made in this domain, in which the web servers depend on cloud location for resources. Many organizations around the world change their operations and data storage from local to cloud platforms for many reasons especially the availability factor. Even though cloud computing is considered a renowned technology, it has many challenges, the most important one is security. One of the major issue in the cloud security is Distributed Denial of Service attack (DDoS), which results in serious loss if the attack is successful and left unnoticed. This paper focuses on preventing and detecting DDoS attacks in distributed and cloud environment. A new framework has been suggested to alleviate the DDoS attack and to provide availability of cloud resources to its users. The framework introduces three screening tests VISUALCOM, IMGCOM, and AD-IMGCOM to prevent the attack and two queues with certain constraints to detect the attack. The result of our framework shows an improvement and better outcomes and provides a recovered from attack detection with high availability rate. Also, the performance of the queuing model has been analysed.
Hybrid controller strategy for optimization of cumulated thermal stresses, induced in X-rays tube for medical use
Rachedi Mohamed;
Bouanane Abdelkrim
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 5: October 2019
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (544.968 KB)
|
DOI: 10.11591/ijece.v9i5.pp3944-3955
This work presents a new control strategy of the power supply, in favor of equipment intended for the medical use. Several research investigations have been reserved for the service of this supply type, but there are still some disadvantages, which have challenged their high performance in the practical side, in particular the problems which concern the weight, the size and especially, the efficiency of these installations and this, on the cost side, energy balance, and lifetime of this equipment. A control technique is presented to overcome these constraints; its principle is based on the deduction of a hybrid control of which two controllers are simultaneously used for the same radiological dose, known by the fuzzy logic and the PID which have already been tested [1], [3]. This hybrid control has been greatly enhanced and developed, thanks to its robustness against the various intolerable dynamic states applied to the system and also to the unpredictable external disturbances.
Identifying learning style through eye tracking technology in adaptive learning systems
Inssaf El Guabassi;
Zakaria Bousalem;
Mohammed Al Achhab;
Ismail Jellouli;
Badr Eddine EL Mohajir
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 5: October 2019
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (666.159 KB)
|
DOI: 10.11591/ijece.v9i5.pp4408-4416
Learner learning style represents a key principle and core value of the adaptive learning systems (ALS). Moreover, understanding individual learner learning styles is a very good condition for having the best services of resource adaptation. However, the majority of the ALS, which consider learning styles, use questionnaires in order to detect it, whereas this method has a various disadvantages, For example, it is unsuitable for some kinds of respondents, time-consuming to complete, it may be misunderstood by respondent, etc. In the present paper, we propose an approach for automatically detecting learning styles in ALS based on eye tracking technology, because it represents one of the most informative characteristics of gaze behavior. The experimental results showed a high relationship among the Felder-Silverman Learning Style and the eye movements recorded whilst learning.
Unmanned and autonomous ground vehicle
S. George Fernandez;
K. Vijayakumar;
R Palanisamy;
K. Selvakumar;
D. Karthikeyan;
D. Selvabharathi;
S. Vidyasagar;
V. Kalyanasundhram
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 5: October 2019
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (682.89 KB)
|
DOI: 10.11591/ijece.v9i5.pp4466-4472
Unmanned and Autonomous Ground Vehicle (UAGV) is a smart vehicle that capable of doing tasks without the need of human operator. The automated vehicle can work during off and on road navigation and also used in military operation such as detecting bombs, border patrol, carrying cargos, search, rescue etc reducing soldier’s exposure to danger, freeing them to perform other duties. This type of vehicle mainly uses sensors to observe the environment and automatically take decisions on its own in unpredictable situation and with unknown information or pass this information to the operator who control the UAGV through various communication when it requires support. This UAGV can send visual feedbacks to the operator at the ground station. An onboard sensor gives the complete environment of the vehicle as signals to the operator.
Modeling and analysis of IEEE 1609.4 MAC in the presence of error-prone channels
Akram A. Almohammedi;
Nor K. Noordin;
A. Sali;
Fazirulhisyam Hashim;
Waheb A. Jabbar;
Sabri Saeed
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 5: October 2019
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1148.826 KB)
|
DOI: 10.11591/ijece.v9i5.pp3531-3541
Vehicular Ad Hoc Networks (VANETs) have been developed to improve the safety, comfort and efficiency of driving on the road. The IEEE 1609.4 is a standard intended to support multi-channel in VANETs. These channels include one control channel for safety applications and six service channels for service applications. However, there is still no comprehensive analysis for the average delay and system throughput of IEEE 1609.4 MAC in VANETs considering error-prone channel under non-saturated conditions. In this paper, we propose an analytical models based on 1-D and 2-D Markov chain to evaluate the performance analysis of IEEE 1609.4 MAC in the presence of error-prone channels. Besides, freezing of the back-off timer is taken into consideration to provide an accurate estimation of access to the channel. The simulation results have been carried out to validate the analytical results of our model. The results show that the performance of our model outperforms the existing model in terms of packet delivery ratio and average delay of safety packets over CCH, and system throughput of service packets over SCHs.