International Journal of Electrical and Computer Engineering
International Journal of Electrical and Computer Engineering (IJECE, ISSN: 2088-8708, a SCOPUS indexed Journal, SNIP: 1.001; SJR: 0.296; CiteScore: 0.99; SJR & CiteScore Q2 on both of the Electrical & Electronics Engineering, and Computer Science) is the official publication of the Institute of Advanced Engineering and Science (IAES). The journal is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication and computer engineering from the global world.
Articles
6,301 Documents
Power-Flow Development Based on the Modified Backward-Forward for Voltage Profile Improvement of Distribution System
Suyanto Suyanto;
Citra Rahmadhani;
Ontoseno Penangsang;
Adi Soeprijanto
International Journal of Electrical and Computer Engineering (IJECE) Vol 6, No 5: October 2016
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (447.169 KB)
|
DOI: 10.11591/ijece.v6i5.pp2005-2014
Unbalanced three-phase radial distribution system has a complex problem in power system. It has many branches and it is sometimes voltage profile’s not stable at every end branches. For improvement of voltage profile, it can be performed by penetrating of a distributed generation models. Information of voltage profile can be gained by study of power flow. The Modified Backward-Forward is one of the most widely used methods of development of power flow and has been extensively used for voltage profile analysis. In this paper, a study of power flow based on the Modified Backward-Forward method was used to capture the complexities of unbalanced three phase radial distribution system in the 20 kV distribution network in North Surabaya city, East Java, Indonesia within considering distributed generation models. In summary, for the informants in this study, the Modified Backward-Forward method has had quickly convergence and it’s just needed 3 to 5 iteration of power flow simulation which’s compared to other power flow development methods. Distributed Generation models in the modified the modified 34 BUS IEEE system and 20 kV distribution network has gained voltage profile value on limited range. One of the more significant findings to emerge from this development is that the Modified Backward-Forward method has average of error voltage about 0.0017 % to 0.1749%.
An Optimal HSI Image Compression using DWT and CP
D. Narmadha;
K. Gayathri;
K. Thilagavathi;
N.Sardar Basha
International Journal of Electrical and Computer Engineering (IJECE) Vol 4, No 3: June 2014
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (598.375 KB)
The compression of hyperspectral images (HSIs) has recently become a very attractive issue for remote sensing applications because of their volumetric data. An efficient method for hyperspectral image compression is presented. The proposed algorithm, based on Discrete Wavelet Transform and CANDECOM/PARAFAC (DWT-CP), exploits both the spectral and the spatial information in the images. The core idea behind our proposed technique is to apply CP on the DWT coefficients of spectral bands of HSIs. We use DWT to effectively separate HSIs into different sub-images and CP to efficiently compact the energy of sub-images. We evaluate the effect of the proposed method on real HSIs and also compare the results with the well-known compression methods. The obtained results show a better performance when comparing with the existing method PCA with JPEG 2000 and 3D SPECK.DOI:http://dx.doi.org/10.11591/ijece.v4i3.6326
Certificateless and provably-secure digital signature scheme based on elliptic curve
Dhanashree Toradmalle;
Jayabhaskar Muthukuru;
B Sathyanarayana
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 4: August 2019
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (313.797 KB)
|
DOI: 10.11591/ijece.v9i4.pp3228-3231
With the internet today available at the user’s beck, and call data or Information Security plays a vital role. Confidentiality, Integrity, Availability, and Non-repudiation are the pillars of security on which every application on the web is based on. With these basic requirements the users also need the security in low resource constrained environments making it more challenging for the security experts to design secured cryptographic algorithms. Digital Signatures play a pivotal role in Authentication. They help in verifying the integrity of the data being exchanged. Elliptical curves are the strongest contenders in Digital Signatures, and much research is being done to enhance the method in many ways. The paper briefs a secured and improved ECDSA Elliptical Curve Digital Signature Algorithm which is an improved and secured version of the Digital Signature Algorithm.
Gravitational-Search Algorithm for Optimal Controllers Design of Doubly-fed Induction Generator
Saher Albatran;
Muwaffaq I. Alomoush;
Ahmed M. Koran
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 2: April 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (792.893 KB)
|
DOI: 10.11591/ijece.v8i2.pp780-792
Recently, the Gravitational-Search Algorithm (GSA) has been presented as a promising physics-inspired stochastic global optimization technique. It takes its derivation and features from laws of gravitation. This paper applies the GSA to design optimal controllers of a nonlinear system consisting of a doubly-fed induction generator (DFIG) driven by a wind turbine. Both the active and the reactive power are controlled and processed through a back-to-back converter. The active power control loop consists of two cascaded proportional integral (PI) controllers. Another PI controller is used to set the q-component of the rotor voltage by compensating the generated reactive power. The GSA is used to simultaneously tune the parameters of the three PI controllers. A time-weighted absolute error (ITAE) is used in the objective function to stabilize the system and increase its damping when subjected to different disturbances. Simulation results will demonstrate that the optimal GSA-based coordinated controllers can efficiently damp system oscillations under severe disturbances. Moreover, simulation results will show that the designed optimal controllers obtained using the GSA perform better than the optimal controllers obtained using two commonly used global optimization techniques, which are the Genetic Algorithm (GA) and Particle Swarm Optimization (PSO).
A Survey of Arabic Text Classification Models
Ahed M. F. Al-Sbou
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 6: December 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (248.85 KB)
|
DOI: 10.11591/ijece.v8i6.pp4352-4355
There is a huge content of Arabic text available over online that requires an organization of these texts. As result, here are many applications of natural languages processing (NLP) that concerns with text organization. One of the is text classification (TC). TC helps to make dealing with unorganized text. However, it is easier to classify them into suitable class or labels. This paper is a survey of Arabic text classification. Also, it presents comparison among different methods in the classification of Arabic texts, where Arabic text is represented a complex text due to its vocabularies. Arabic language is one of the richest languages in the world, where it has many linguistic bases. The researche in Arabic language processing is very few compared to English. As a result, these problems represent challenges in the classification, and organization of specific Arabic text. Text classification (TC) helps to access the most documents, or information that has already classified into specific classes, or categories to one or more classes or categories. In addition, classification of documents facilitate search engine to decrease the amount of document to, and then to become easier to search and matching with queries.
Vehicular Ad Hoc Networks: Growth and Survey for Three Layers
Aws Saad;
Abdalrazak Tareq Rahem;
Ammar Jameel Hussein;
Abdullah Amer Mohammed
International Journal of Electrical and Computer Engineering (IJECE) Vol 7, No 1: February 2017
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (510.146 KB)
|
DOI: 10.11591/ijece.v7i1.pp271-284
A vehicular ad hoc network (VANET) is a mobile ad hoc network that allows wireless communication between vehicles, as well as between vehicles and roadside equipment. Communication between vehicles promotes safety and reliability, and can be a source of entertainment. We investigated the historical development, characteristics, and application fields of VANET and briefly introduced them in this study. Advantages and disadvantages were discussed based on our analysis and comparison of various classes of MAC and routing protocols applied to VANET. Ideas and breakthrough directions for inter-vehicle communication designs were proposed based on the characteristics of VANET. This article also illustrates physical, MAC, and network layer in details which represent the three layers of VANET. The main works of the active research institute on VANET were introduced to help researchers track related advanced research achievements on the subject.
Security techniques for intelligent spam sensing and anomaly detection in online social platforms
Monther Aldwairi;
Loai Tawalbeh
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 1: February 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (753.324 KB)
|
DOI: 10.11591/ijece.v10i1.pp275-287
The recent advances in communication and mobile technologies made it easier to access and share information for most people worldwide. Among the most powerful information spreading platforms are the Online Social Networks (OSN)s that allow Internet-connected users to share different information such as instant messages, tweets, photos, and videos. Adding to that many governmental and private institutions use the OSNs such as Twitter for official announcements. Consequently, there is a tremendous need to provide the required level of security for OSN users. However, there are many challenges due to the different protocols and variety of mobile apps used to access OSNs. Therefore, traditional security techniques fail to provide the needed security and privacy, and more intelligence is required. Computational intelligence adds high-speed computation, fault tolerance, adaptability, and error resilience when used to ensure security in OSN apps. This research provides a comprehensive related work survey and investigates the application of artificial neural networks for intrusion detection systems and spam filtering for OSNs. In addition, we use the concept of social graphs and weighted cliques in the detection of suspicious behavior of certain online groups and to prevent further planned actions such as cyber/terrorist attacks before they happen.
A Survey on Automatically Mining Facets for Web Queries
Duhita Pawar;
Vina M. Lomte
International Journal of Electrical and Computer Engineering (IJECE) Vol 7, No 6: December 2017
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (184.309 KB)
|
DOI: 10.11591/ijece.v7i6.pp3700-3704
In this paper, a detailed survey on different facet mining techniques, their advantages and disadvantages is carried out. Facets are any word or phrase which summarize an important aspect about the web query. Researchers proposed different efficient techniques which improves the user’s web query search experiences magnificently. Users are happy when they find the relevant information to their query in the top results. The objectives of their research are: (1) To present automated solution to derive the query facets by analyzing the text query; (2) To create taxonomy of query refinement strategies for efficient results; and (3) To personalize search according to user interest.
The Effect of Rearrangement of the Most Incompatible Particle on Increase of Convergence Speed of PSO
Abbas Fadavi;
Karim Faez
International Journal of Electrical and Computer Engineering (IJECE) Vol 3, No 2: April 2013
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (385.055 KB)
This article presents a new method for increasing the speed of Particle Swarm Optimization (PSO) method. The particle swarm is an optimization method that was inspired by collective movement of birds and fish looking for food. This method is composed of a group of particles: each particle tries to move in one direction that the best individual and best group of particles occur in that direction. Different articles tried to expand PSO so that global optimization is gained in less time. One of the problems of this model that occurs in most cases is falling of particles in local optimum. By finding the most incompatible particle and its rearrangement in the searching space, we increase convergence speed in some considered methods. Different tests of this method in standard searching space demonstrated that this method takes account of suitable function of increasing the convergece speed of particles.DOI:http://dx.doi.org/10.11591/ijece.v3i2.2026
Efficiency and effectiveness video on demand over worldwide interoperability for microwave access
Muthanna Jaafar Abbas;
Abeer Abd Al Hameed Mahmood
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 3: June 2019
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (424.041 KB)
|
DOI: 10.11591/ijece.v9i3.pp1919-1923
(WiMAX) is another solution for readiness broadband networks inside the region, covered or not, by alternative technologies like (ADSL) or cable through this paper by deploying many mobility patterns such as static, random and path for Video on Demand (VoD) over (WiMAX) Network. The performance of varied (QPSK) and (QAM) modulation techniques, by applying the (OPNET) simulator version 17.5. This work is finished in terms of the transmitted traffic and received traffic. Simulation result indicates that once nodes are moving by (SVC) code schema in (WiMAX). The result is an effective and attainable overall performance of (QPSK) which is better than (QAM) modulation technique.