International Journal of Electrical and Computer Engineering
International Journal of Electrical and Computer Engineering (IJECE, ISSN: 2088-8708, a SCOPUS indexed Journal, SNIP: 1.001; SJR: 0.296; CiteScore: 0.99; SJR & CiteScore Q2 on both of the Electrical & Electronics Engineering, and Computer Science) is the official publication of the Institute of Advanced Engineering and Science (IAES). The journal is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication and computer engineering from the global world.
Articles
128 Documents
Search results for
, issue
"Vol 9, No 6: December 2019"
:
128 Documents
clear
A comparitive study on handover probability analysis for future HetNets
Neeraja Sajja;
A. Abhishiktha
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 6: December 2019
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (493.448 KB)
|
DOI: 10.11591/ijece.v9i6.pp5351-5359
The need of wireless services increasing day by day due to the advancements in the field of wireless technology towards 5G for instant transferring the mails, messages and video calling without any interruption. In LTE and 5G wireless networks, major task is to provide seamless connection anywhere, anytime when the user may roam among Heterogeneous Wireless Networks (HetNets). To achieve proper mobility management among HetNets, handoff or hadover is required. Handover Probability is one of the metric to estimate the handover performance, which is a probability of Mobile Node to handover the present connection from the current base station to another base station or enode B. In this paper, handoff probability analysis is done for multiple HetNets based on Handover Algorithm. To estimate this algorithm, bandwidth is considered as one of the key parameter. A comparative analysis of handover probability for two, three, four and five HetNets has been performed. The results can demonstrate that the variation of handover probability with respect to traffic load, threshold and bandwidth. It is observed that, as the number of wireless networks increases handover probability slightly increases with traffic load. These results are more significant to estimate further wrong decision handovers based on that Quality of Service (QoS) is evaluated in practical HetNets such as integration of LTE, Wi-Fi and WiMAX etc.
A performance of comparative study for semi-structured web data extraction model
Ily Amalina Ahmad Sabri;
Mustafa Man
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 6: December 2019
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (663.643 KB)
|
DOI: 10.11591/ijece.v9i6.pp5463-5470
The extraction of information from multi-sources of web is an essential yet complicated step for data analysis in multiple domains. In this paper, we present a data extraction model based on visual segmentation, DOM tree and JSON approach which is known as Wrapper Extraction of Image using DOM and JSON (WEIDJ) for extracting semi-structured data from biodiversity web. The large number of information from multiple sources of web which is image’s information will be extracted using three different approach; Document Object Model (DOM), Wrapper image using Hybrid DOM and JSON (WHDJ) and Wrapper Extraction of Image using DOM and JSON (WEIDJ). Experiments were conducted on several biodiversity website. The experiment results show that WEIDJ approach promising results with respect to time analysis values. WEIDJ wrapper has successfully extracted greater than 100 images of data from the multi-source web biodiversity of over 15 different websites.
A computational analysis of short sentences based on ensemble similarity model
Arifah Che Alhadi;
Aziz Deraman;
Masita Masila Abdul Jalil;
Wan Nural Jawahir Wan Yussof;
Rosmayati Mohemad
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 6: December 2019
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (268.997 KB)
|
DOI: 10.11591/ijece.v9i6.pp5386-5394
The rapid development of Internet along with the wide use of social media applications produce huge volume of unstructured data in short text form such as tweets, text snippets and instant messages. This form of data rarely contains repeated word. It presents challenge in sentences similarity analysis as the standard text similarity models merely rely on the number of word occurrence, often resulting unreliable similarity value. Besides, the use of abbreviation, acronyms, slang, smiley, jargon, symbol or non-standard short form also contributes to the difficulty in similarity analysis. Thus, an extended ensemble similarity model approach is proposed. An experimental study has been conducted using datasets of English short sentences. The findings are very encouraging in improving the similarity value for short sentences.
Automatic segmentation of wrist bone fracture area by K-means pixel clustering from X-ray image
Kwang Baek Kim;
Doo Heon Song;
Sang-Seok Yun
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 6: December 2019
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (351.027 KB)
|
DOI: 10.11591/ijece.v9i6.pp5205-5210
Early detection of subtle fracture is important particularly for the senior citizens’ quality of life. Naked eye examination from X-ray image may cause false negatives due to operator subjectivity thus computer vision based automatic detection software is much needed in practice. In this paper, we propose an automatic extraction method for suspisious wrist fracture regions. We apply K-means in pixel clustering to form the candidate part of possible fracture from wrist X-ray image automatically. This method can recover previously detected patterned false cases with edge detection method after fuzzy stretching. The proposed method is successful in 16 out of 20 tested cases in experiment.
Transformer based NPC multilevel inverter using reduced number of components
R. Palanisamy;
K. Selvakumar;
K. Vijayakumar;
D. Karthikeyan;
S. Vidyasagar;
V. Kalyanasundaram
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 6: December 2019
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (14.56 KB)
|
DOI: 10.11591/ijece.v9i6.pp5150-5158
This paper revolves around the reduction of a number of switches and the sources for a multilevel inverter, for this, we have proposed a transformer-based topology which has helped us in reducing the number of switches from twenty-four to sixteen and also in the reduction of sources from eight to one. The circuit consists of two H-Bridges which are coupled by a single-phase transformer, the topology gives us a liberty of changing the number of levels in accordance to the number of turns in the secondary side of the transformer for example if our ratio is 1:1 the number of levels will be five subsequently if it is changed to 1:2 the number of levels will be changed to seven. As the number of switches is reduced the size and complexity of the circuit is also decreased. In order to improve on the part of switching efficiency, we have used space vector pulse width modulation which is a better method as compared to its counterpart switching methods such as sinusoidal pulse width modulation and multiple pulse width modulation techniques.
Multi-dimensional parametric assessment with IoT in acquaintance of digital pipeline
N. Suresh Kumar;
Mallikharjuna Rao K;
Mahesh Kothuru;
Y. Narasimha Rao
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 6: December 2019
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (347.008 KB)
|
DOI: 10.11591/ijece.v9i6.pp4649-4656
In IoT researches are found millions of devices are connected in global digital infrastructure framed in network fashion. Most of the things on the network use cloud or central database to share their data and control signals to control and manage the devices on the IoT network. Devices on the network need fast traversing paths, to take correct decision in right time. The data synchronization between source and destination is very important in real time parameter maintenance. The multidimensional parametric evaluation of the environment or the surrounding area is facing problems with data synchronization and congestion in the sensor network. This will lead arrival of fault data at the destination. The fault data also leads a misconception at user end. In the present work pipeline integration is proposed to overcome the misconception and synchronization failures. The pipeline and Arduino UNO processor are integrated on Proteus simulation tool. Transducer nodes and the functionalities are analysed with pipeline.
Road flood warning system with information dissemination via social media
Ertie Cusipag Abana;
Cindy Verli Dayag;
Vanessa Mae Valencia;
Princess Hipolito Talosig;
John Paulo Ratilla;
Gladys Galat
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 6: December 2019
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (688.358 KB)
|
DOI: 10.11591/ijece.v9i6.pp4979-4987
Flooding is one of the most devastating natural disasters in the world. It occurs when water from heavy rains exceeds the capacity of the river banks into which it runs. Some roads are also being affected when this natural phenomenon happens which lead to closure of roads. This closure, however, are often dissiminated late to the people that are passing through the closed roads. For this purpose, a Road Flood Warning System with Information Dissemination via Social Media has been developed to provide timely flood alert information to the public. The system determines the depth of the water through an ultrasonic sensor and disseminates the data gathered to the Internet through the use of social media sites specifically Twitter and Facebook. Moreover, the system has a LED matrix and light emitting diode to display whether the roads are passable during the occurrence of floods. The test results on the performance of ultrasonic sensor showed an accuracy of 98.69% while dissemination of information was 90% successful.
Modeling and simulation of graphene field effect transistor (GFET)
Nanda B. S.;
Puttaswamy P. S.
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 6: December 2019
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1120.554 KB)
|
DOI: 10.11591/ijece.v9i6.pp4826-4835
Graphene based top-gated Field effect transistor (GFET) is designed and simulated using the device simulator packages. The paper describes fabrication process and the device simulation aspects of the GFET device. Two devices with different gate lengths of 200nm and 350nm are simulated. Device simulations are carried out in open source TCAD software package. The results indicate a depletion FET type operation in which ON/OFF current ratio of 2.25 is obtained.
Ensuring telecommunication network security through cryptology: a case of 4G and 5G LTE cellular network providers
Adnan Manasreh;
Ahmed A. M. Sharadqh;
Jawdat S. Alkasassbeh;
Aws Al-Qaisi
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 6: December 2019
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (438.337 KB)
|
DOI: 10.11591/ijece.v9i6.pp4860-4865
This paper aims to present the details regarding telecommunication network security through cryptology protocols. The data was based on scientific data collection and the quantitative method was adopted. The questionnaire was developed and the primary respondents were approached who were working in 4 telecommunication networking companies namely Huawei, Ericsson, SK Telecom and Telefonica. The sample size of the research was 60 participants and the statistical analysis was used to analyze research. The finding shows that cryptology protocol such as SSH, SSL, Kerberos PGP and SET are implemented within the companies in order to secure network.
Direct solution of uncertain bratu initial value problem
N. R. Anakira;
A. H. Shather;
A. F. Jameel;
A. K. Alomari;
A. Saaban
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 6: December 2019
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (622.56 KB)
|
DOI: 10.11591/ijece.v9i6.pp5075-5083
In this paper, an approximate analytical solution for solving the fuzzy Bratu equation based on variation iteration method (VIM) is analyzed and modified without needed of any discretization by taking the benefits of fuzzy set theory. VIM is applied directly, without being reduced to a first order system, to obtain an approximate solution of the uncertain Bratu equation. An example in this regard have been solved to show the capacity and convenience of VIM.