International Journal of Electrical and Computer Engineering
International Journal of Electrical and Computer Engineering (IJECE, ISSN: 2088-8708, a SCOPUS indexed Journal, SNIP: 1.001; SJR: 0.296; CiteScore: 0.99; SJR & CiteScore Q2 on both of the Electrical & Electronics Engineering, and Computer Science) is the official publication of the Institute of Advanced Engineering and Science (IAES). The journal is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication and computer engineering from the global world.
Articles
6,301 Documents
Discrete wavelet transform-based RI adaptive algorithm for system identification
Mohammad Shukri Salman;
Alaa Eleyan;
Bahaa Al-Sheikh
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 3: June 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (11.729 KB)
|
DOI: 10.11591/ijece.v10i3.pp2383-2391
In this paper, we propose a new adaptive filtering algorithm for system identification. The algorithm is based on the recursive inverse (RI) adaptive algorithm which suffers from low convergence rates in some applications; i.e., the eigenvalue spread of the autocorrelation matrix is relatively high. The proposed algorithm applies discrete-wavelet transform (DWT) to the input signal which, in turn, helps to overcome the low convergence rate of the RI algorithm with relatively small step-size(s). Different scenarios has been investigated in different noise environments in system identification setting. Experiments demonstrate the advantages of the proposed DWT recursive inverse (DWT-RI) filter in terms of convergence rate and mean-square-error (MSE) compared to the RI, discrete cosine transform LMS (DCTLMS), discrete-wavelet transform LMS (DWT-LMS) and recursive-least-squares (RLS) algorithms under same conditions.
Pre-processing Technique for Wireless Capsule Endoscopy Image Enhancement
Rosdiana Shahril;
Sabariah Baharun;
AKM Muzahidul Islam
International Journal of Electrical and Computer Engineering (IJECE) Vol 6, No 4: August 2016
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1506.96 KB)
|
DOI: 10.11591/ijece.v6i4.pp1617-1626
Wireless capsule endoscopy (WCE) is used to examine human digestive tract in order to detect abnormal area. However, it has been a challenging task to detect abnormal area such as bleeding due to poor quality and dark images of WCE. In this paper, pre-processing technique is introduced to ease classification of the bleeding area. Anisotropic contrast diffusion method is employed in our pre-processing technique as a contrast enhancement of the images. There is a drawback to the method proposed B. Li in which the quality of WCE image is degraded when the number of iteration increases. To solve this problem, variance is employed in our proposed method. To further enhance WCE image, Discrete Cosine Transform is used with anisotropic contrast diffusion. Experimental results show that both proposed contrast enhancement algorithm and sharpening WCE image algorithm provide better performance compared with B. Li’s algorithm since SDME and EBCM value is stable whenever number of iterations increases, and sharpness measurement using gradient and PSNR are both improved by 31.5% and 20.3% respectively.
The Modify Version of Artificial Bee Colony Algorithm to solve Real Optimization problems
B. Asady;
Parvaneh Mansouri;
N. Gupta
International Journal of Electrical and Computer Engineering (IJECE) Vol 2, No 4: August 2012
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (271.946 KB)
The Artificial Bee Colony(ABC) algorithm is one of the best applicableoptimization algorithm. In this work, we make some modifications toimprove the ABC algorithm based on convergence speed of solution. Inorder to, we add some conditions to selected food sources by bees. So, ifsolution have been enough near to optimal solution, then further search existaround the food sources. That, this is near to optimal solution because, wecan replace lower and upper bounds of food sources with smaller valuesrelate to last search. Therefore, the new search is near to optimal solution and after some iteration, optimal solution achieves. Finally, we illustrateconvergence speed of the MABC algorithm that is faster than ABCalgorithm. There are some examples.DOI:http://dx.doi.org/10.11591/ijece.v2i4.423
Instruction Set Extension of a Low-End Reconfigurable Microcontroller in Bit-Sorting Implementation
Sani Irwan Md Salim;
Yewguan Soo;
Sharatul Izah Samsudin
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 4: August 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (399.799 KB)
|
DOI: 10.11591/ijece.v8i4.pp2595-2601
The microcontroller-based system is currently having a tremendous boost with the revelation of platforms such as the Internet of Things. Low-end families of microcontroller architecture are still in demand albeit less technologically advanced due to its better I/O better application and control. However, there is clearly a lack of computational capability of the low-end architecture that will affect the pre-processing stage of the received data. The purpose of this research is to combine the best feature of an 8-bit microcontroller architecture together with the computationally complex operations without incurring extra resources. The modules’ integration is implemented using instruction set architecture (ISA) extension technique and is developed on the Field Programmable Gate Array (FPGA). Extensive simulations were performed with the and a comprehensive methodology is proposed. It was found that the ISA extension from 12-bit to 16-bit has produced a faster execution time with fewer resource utilization when implementing the bit-sorting algorithm. The overall development process used in this research is flexible enough for further investigation either by extending its module to more complex algorithms or evaluating other designs of its components.
Towards a System of Guidance, Assistance and Learning Analytics Based on Multi Agent System Applied on Serious Games
Lotfi Elaachak;
Amine Belahbibe;
Mohammed Bouhorma
International Journal of Electrical and Computer Engineering (IJECE) Vol 5, No 2: April 2015
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (423.375 KB)
|
DOI: 10.11591/ijece.v5i2.pp344-354
With the revolution that the education field has known concerning the methods of learning and especially the integration of new technology, several new tools have appeared to replace the tools already existing, and among them there are serious games, serious games as new tool dedicated to education have occupied an important place, and replaced other tools often used in the learning process. But in the order that serious games reach the intended objectives and help instructors to achieve their perspectives considered, they must be equipped with a guidance and assistance system that will assist the learners during the progression in the sequence of the video game, and in addition, they must be equipped with a system of learning analytics that will help instructors to improve the learning process and teaching methods according to the learning outcomes and feedbacks of their learners. In this perspective of research and development we will establish in this paper a new system of assistance, guidance and learning analytics based on a multi agent system that will work in tandem with a web-based serious game.
Optimizing requirement analysis by the use of meta-heuristic in search based software engineering
Rajesh Kumar;
Rakesh Kumar
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 5: October 2019
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (756.035 KB)
|
DOI: 10.11591/ijece.v9i5.pp4336-4343
Requirements analysis is the first phase of software development process and it is one of the main concerns of software engineers. The selection of requirements is a complex problem caused by the heterogeneity of the users and their varied interests and demands. In this paper, it is justified that their is a strong need of optimization in requirement analysis. The paper argues that requirement selection can be viewed as an application area of Search-Based Software Engineering(SBSE). The aim is to justify the claim that requirement engineering can be re-formulated as search problem to which meta-heuristic technique can be applied.
Short-Term Measurements of Household Electricity Demand During Hot Weather in Kuala Lumpur
Nassir Ranjbar;
Sheikh Ahmad Zaki;
Nelidya Md Yusoff;
Fitri Yakub;
Aya Hagishima
International Journal of Electrical and Computer Engineering (IJECE) Vol 7, No 3: June 2017
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (404.579 KB)
|
DOI: 10.11591/ijece.v7i3.pp1436-1443
The aim of this study was to conduct short-term measurements on household electricity demand under hot weather conditions in a residential area in Kuala Lumpur. The measurements included total and air conditioner (AC) electricity consumption of 10 households in an apartment building as well as outdoor air temperatures, which were collected from March to May 2016. Results indicated that the average AC electricity consumption contributed to a major portion of total household electricity consumption, which ranged from 19.4 to 52.3% during the measurement period. Additionally, 1-minute interval time series data indicated household energy consumption more accurately than 30- or 60-minute interval.
An efficient approach for secured communication in wireless sensor networks
Jyothi R.;
Nagaraj G. Cholli
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 2: April 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (391.083 KB)
|
DOI: 10.11591/ijece.v10i2.pp1641-1647
Wireless sensor network (WSN) have limited bandwidth, low computational functions, energy constraints. Inspite of these constraints, WSN is useful where communication happens without infrastructure support. The main concern of WSN is the security as the sensor nodes may be attacked and information may be hacked. Security of WSN should have the capability to ensure that the message received was sent by the particular sent node and not modified during transmission. WSN applications require lightweight and strong authentication mechanisms for obtaining data from unprivileged users. In wireless sensor networks, authentication is the effective method to stop unauthorized and undisrupted communication service. In order to strengthen the authenticated communication, several researchers have developed mechanisms. Some of the techniques work with identifying the attacked node or detecting injected bogus message in the network. Encryption and decryption are the popular methods of providing the security. These are based on either public-key or symmetric-key cryptosystems Many of the existing solutions have limitations in communication and computational expertise. Also, the existing mechanisms lack in providing strength and scalability of the network. In order address these issues; a polynomial based method was introduced in recent days. Key distribution is a significant aspect in key management in WSNs. The simplest method of distribution of key is by hand which was used in the days of couriers. Now a days, most distribution of keys is done automatically. The automatic distribution of keys is essential and convenient in networks that require two parties to transmit their security keys in the same communication medium. In this work, a new type of key exchange mechanism is proposed. The proposed method for authentication among sensor nodes proves to be promising as per the simulation results. The nodes which are unknown to each other setup a private however arbitrary key for the symmetric key cryptosystem.
A Two Channel Analog Front end Design AFE Design with Continuous Time Σ-Δ Modulator for ECG Signal
Mohammed Abdul Raheem;
K Manjunathachari
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 6: December 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (364.411 KB)
|
DOI: 10.11591/ijece.v8i6.pp5041-5049
In this context, the AFE with 2-channels is described, which has high impedance for low power application of bio-medical electrical activity. The challenge in obtaining accurate recordings of biomedical signals such as EEG/ECG to study the human body in research work. This paper is to propose Multi-Vt in AFE circuit design cascaded with CT modulator. The new architecture is anticipated with two dissimilar input signals filtered from 2-channel to one modulator. In this methodology, the amplifier is low powered multi-VT Analog Front-End which consumes less power by applying dual threshold voltage. Type -I category 2 channel signals of the first mode: 50 and 150 Hz amplified from AFE are given to 2nd CT sigma-delta ADC. Depict the SNR and SNDR as 63dB and 60dB respectively, consuming the power of 11mW. The design was simulated in a 0.18 um standard UMC CMOS process at 1.8V supply. The AFE measured frequency response from 50 Hz to 360 Hz, depict the SNR and SNDR as 63dB and 60dB respectively, consuming the power of 11mW. The design was simulated in 0.18 m standard UMC CMOS process at 1.8V supply. The AFE measured frequency response from 50 Hz to 360 Hz, programmable gains from 52.6 dB to 72 dB, input referred noise of 3.5 μV in the amplifier bandwidth, NEF of 3.
A Hybrid Approach of Fuzzy C-means Clustering and Neural network to make Energy-Efficient heterogeneous Wireless Sensor network
Amit Kumar Kaushik
International Journal of Electrical and Computer Engineering (IJECE) Vol 6, No 2: April 2016
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (222.029 KB)
|
DOI: 10.11591/ijece.v6i2.pp674-681
The Wireless sensor network has been highly focused research area in recent times due to its wide applications and adaptability to different environments. The energy-constrained sensor nodes are always under consideration to increase their lifetime. In this paper we have used the advantages of two approaches i.e. fuzzy c-means clustering and neural network to make an energy efficient network by prolonging the lifetime of network. The cluster formation is done using FCM to form equally sized clusters in network and the decision of choosing cluster head is done using neural network having input distance from basestation, heterogeneity and energy of the node. Our Approach has successfully increased the lifetime and data capacity of the network and outperformed different approaches applied to the network present in literature.