International Journal of Electrical and Computer Engineering
International Journal of Electrical and Computer Engineering (IJECE, ISSN: 2088-8708, a SCOPUS indexed Journal, SNIP: 1.001; SJR: 0.296; CiteScore: 0.99; SJR & CiteScore Q2 on both of the Electrical & Electronics Engineering, and Computer Science) is the official publication of the Institute of Advanced Engineering and Science (IAES). The journal is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication and computer engineering from the global world.
Articles
6,301 Documents
Harmonic Distortion Evaluation Generated by PWM Motor Drives in Electrical Industrial Systems
Vladimir Sousa;
Hernán Hernández Herrera;
Enrique C Quispe;
Percy R Viego;
Julio R Gómez
International Journal of Electrical and Computer Engineering (IJECE) Vol 7, No 6: December 2017
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (547.533 KB)
|
DOI: 10.11591/ijece.v7i6.pp3207-3216
This paper evaluates the harmonic distortion generated by PWM motor drives in an electrical industrial system of a wheat flour mill company. For this, a comparative study between two industrial circuits connected at the same point of common coupling (PCC) with similar characteristics of load and transformers is presented. The difference is that one circuit has PWM motor drives and the other does not have them. In the study, a practical method based on the statistical characterization of the total harmonic distortion of voltage (THDV) and current (THDI), individual voltage distortion (IVD), individual current distortion (ICD) and K-Factor is applied. As result, it was observed that PWM motor drives generated voltage harmonics mainly of fifth and seventh order with values that exceed limits established by standards in both circuits. With these values, the operation of elements such as capacitors, motors and transformers can be affected. In the work is also demonstrated that in the analysis of harmonics is necessary to consider various parameters and not only one.
Data loss prevention (DLP) by using MRSH-v2 algorithm
Basheer Husham Ali;
Ahmed Adeeb Jalal;
Wasseem N. Ibrahem Al-Obaydy Al-Obaydy
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 4: August 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (362.378 KB)
|
DOI: 10.11591/ijece.v10i4.pp3615-3622
Sensitive data may be stored in different forms. Not only legal owners but also malicious people are interesting of getting sensitive data. Exposing valuable data to others leads to severe Consequences. Customers, organizations, and /or companies lose their money and reputation due to data breaches. There are many reasons for data leakages. Internal threats such as human mistakes and external threats such as DDoS attacks are two main reasons for data loss. In general, data may be categorized based into three kinds: data in use, data at rest, and data in motion. Data Loss Prevention (DLP) are good tools to identify important data. DLP can do analysis for data content and send feedback to administrators to make decision such as filtering, deleting, or encryption. Data Loss Prevention (DLP) tools are not a final solution for data breaches, but they consider good security tools to eliminate malicious activities and protect sensitive information. There are many kinds of DLP techniques, and approximation matching is one of them. Mrsh-v2 is one type of approximation matching. It is implemented and evaluated by using TS dataset and confusion matrix. Finally, Mrsh-v2 has high score of true positive and sensitivity, and it has low score of false negative.
Risk assessment for ancillary services
Omer Hadzic;
Smajo Bisanovic
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 3: June 2019
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1263.685 KB)
|
DOI: 10.11591/ijece.v9i3.pp1561-1568
The power trading and ancillary services provision comprise technical and financial risks and therefore require a structured risk management. Focus in this paper is on financial risk management that is important for the system operator faces when providing and using ancillary services for balancing of power system. Risk on ancillary services portfolio is modeled through value at risk and conditional value at risk measures. The application of these risk measures in power system is given in detail to show how to using the risk concept in practice. Conditional value at risk optimization is analysed in the context of portfolio selection and how to apply this optimization for hedging a portfolio consisting of different types of ancillary services.
Design and Analysis of Tripple Band Koch Fractal Yagi Uda Antenna
Satyandra Singh Lodhi;
P.K. Singhal;
V.V. Thakare
International Journal of Electrical and Computer Engineering (IJECE) Vol 3, No 4: August 2013
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (282.645 KB)
The proposed antenna is Koch fractal printed Yagi-Uda antenna fed by SMA connector. The radiation characteristics of the antenna are simulated by CST Microwave Studio and analysed with the help of simulated results. The antenna's currents distribution becomes more uniform after being fractal, which is conducive to increase the antenna’s radiation directivity. The proposed Koch fractal Yagi-Uda antenna resonance at frequency of 7.81 GHz, 8.54 GHz and 9.42 GHz with gain of 9.67 dB, 10.4 dB and 10.61dB respectively. Parameter of antenna such as return loss, input impedance, smith chart, radiation pattern is analyzed for performance evaluation of Koch fractal Yagi-Uda antenna.DOI:http://dx.doi.org/10.11591/ijece.v3i4.2572
Novel Approach for Control Data Theft Attack in Cloud Computing
K. Narasimha Sastry;
B. Thirumala Rao;
T Gunasekhar
International Journal of Electrical and Computer Engineering (IJECE) Vol 5, No 6: December 2015
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (500.057 KB)
|
DOI: 10.11591/ijece.v5i6.pp1545-1552
Information security is a major problem faced by cloud computing around the world. Because of their adverse effects on organizational information systems, viruses, hackers, and attackers insiders can jeopardize organizations capabilities to pursue their undertaken effectively. Although technology based solutions help to mitigate some of the many problems of information security, even the preeminent technology can’t work successfully unless effective human computer communication occurs.IT experts, users and administrators all play crucial role to determine the behavior that occurs as people interact with information technology will support the maintenance of effective security or threaten it. In the present paper we try to apply behavioral science concepts and techniques to understanding problems of information security in organizations.
An adaptive distributed Intrusion detection system architecture using multi agents
Riyad A. M.;
M. S. Irfan Ahmed;
R. L. Raheemaa Khan
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 6: December 2019
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (575.937 KB)
|
DOI: 10.11591/ijece.v9i6.pp4951-4960
Intrusion detection systems are used for monitoring the network data, analyze them and find the intrusions if any. The major issues with these systems are the time taken for analysis, transfer of bulk data from one part of the network to another, high false positives and adaptability to the future threats. These issues are addressed here by devising a framework for intrusion detection. Here, various types of co-operating agents are distributed in the network for monitoring, analyzing, detecting and reporting. Analysis and detection agents are the mobile agents which are the primary detection modules for detecting intrusions. Their mobility eliminates the transfer of bulk data for processing. An algorithm named territory is proposed to avoid interference of one analysis agent with another one. A communication layout of the analysis and detection module with other modules is depicted. The inter-agent communication reduces the false positives significantly. It also facilitates the identification of distributed types of attacks. The co-ordinator agents log various events and summarize the activities in its network. It also communicates with co-ordinator agents of other networks. The system is highly scalable by increasing the number of various agents if needed. Centralized processing is avoided here to evade single point of failure. We created a prototype and the experiments done gave very promising results showing the effectiveness of the system.
A Statistical Approach to Adaptive Playout Scheduling in Voice Over Internet Protocol Communication
Priya Chandran;
Chelpa Lingam
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 5: October 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (282.771 KB)
|
DOI: 10.11591/ijece.v8i5.pp2926-2933
Factors like network delay, latency and bandwidth significantly affect the quality of communication using Voice over Internet Protocol. The use of jitter buffer at the receiving end compensates the effect of varying network delay up to some extent. But the extra buffer delay given for each packet plays a major role in playing late packets and thereby improving voice quality. As the buffer delay increases packet loss rate decreases, which in general is a very good sign. However, an increase of buffer delay beyond a certain limit affects the interactive quality of voice communication. In this paper, we propose a statistical framework for adaptive playout scheduling of voice packets based on network statistics, packet loss rate and availability of packets in the buffer. Experimental results show that the proposed model allocates optimal buffer delay with the lowest packet loss rate when compared with other algorithms.
A review on various optimization techniques of resource provisioning in cloud computing
K. Sumalatha;
M. S. Anbarasi
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 1: February 2019
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (828.422 KB)
|
DOI: 10.11591/ijece.v9i1.pp629-634
Cloud computing is the provision of IT resources (IaaS) on-demand using a pay as you go model over the internet.It is a broad and deep platform that helps customers builds sophisticated, scalable applications. To get the full benefits, research on a wide range of topics is needed. While resource over-provisioning can cost users more than necessary, resource under provisioning hurts the application performance. The cost effectiveness of cloud computing highly depends on how well the customer can optimize the cost of renting resources (VMs) from cloud providers. The issue of resource provisioning optimization from cloud-consumer potential is a complicated optimization issue, which includes much uncertainty parameters. There is a much research avenue available for solving this problem as it is in the real-world. Here, in this paper we provide details about various optimization techniques for resource provisioning.
A hybrid artificial neural network - genetic algorithm for load shedding
Le Trong Nghia;
Quyen Huy Anh;
Phung Trieu Tan;
N Thai An
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 3: June 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (900.441 KB)
|
DOI: 10.11591/ijece.v10i3.pp2250-2258
This paper proposes the method of applying Artificial Neural Network (ANN) with Back Propagation (BP) algorithm in combination or hybrid with Genetic Algorithm (GA) to propose load shedding strategies in the power system. The Genetic Algorithm is used to support the training of Back Propagation Neural Networks (BPNN) to improve regression ability, minimize errors and reduce the training time. Besides, the Relief algorithm is used to reduce the number of input variables of the neural network. The minimum load shedding with consideration of the primary and secondary control is calculated to restore the frequency of the electrical system. The distribution of power load shedding at each load bus of the system based on the phase electrical distance between the outage generator and the load buses. The simulation results have been verified through using MATLAB and PowerWorld software systems. The results show that the Hybrid Gen-Bayesian algorithm (GA-Trainbr) has a remarkable superiority in accuracy as well as training time. The effectiveness of the proposed method is tested on the IEEE 37 bus 9 generators standard system diagram showing the effectiveness of the proposed method.
Software Reliability Prediction using Fuzzy Min-Max Algorithm and Recurrent Neural Network Approach
Manmath Kumar Bhuyan;
Durga Prasad Mohapatra;
Srinivas Sethi
International Journal of Electrical and Computer Engineering (IJECE) Vol 6, No 4: August 2016
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (428.451 KB)
|
DOI: 10.11591/ijece.v6i4.pp1929-1938
Fuzzy Logic (FL) together with Recurrent Neural Network (RNN) is used to predict the software reliability. Fuzzy Min-Max algorithm is used to optimize the number of the kgaussian nodes in the hidden layer and delayed input neurons. The optimized recurrentneural network is used to dynamically reconfigure in real-time as actual software failure. In this work, an enhanced fuzzy min-max algorithm together with recurrent neural network based machine learning technique is explored and a comparative analysis is performed for the modeling of reliability prediction in software systems. The model has been applied on data sets collected across several standard software projects during system testing phase with fault removal. The performance of our proposed approach has been tested using distributed system application failure data set.