International Journal of Electrical and Computer Engineering
International Journal of Electrical and Computer Engineering (IJECE, ISSN: 2088-8708, a SCOPUS indexed Journal, SNIP: 1.001; SJR: 0.296; CiteScore: 0.99; SJR & CiteScore Q2 on both of the Electrical & Electronics Engineering, and Computer Science) is the official publication of the Institute of Advanced Engineering and Science (IAES). The journal is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication and computer engineering from the global world.
Articles
6,301 Documents
Optimal Allocation of Capacitor Bank in Radial Distribution System using Analytical Approach
Sarfaraz Nawaz;
M.P. Sharma;
Abhishek Gupta
International Journal of Electrical and Computer Engineering (IJECE) Vol 7, No 2: April 2017
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (27.279 KB)
|
DOI: 10.11591/ijece.v7i2.pp748-753
In this paper, a novel analytical technique is proposed for optimal allocation of shunt capacitor bank in radial distribution system. An objective function is formulated to determine the optimal size, number and location of capacitor bank for real & reactive power loss reduction, voltage profile enhancement and annual cost saving. A new constant, Power Voltage Sensitivity Constant (PVSC), has been proposed here. The value of PVSC constant decides the candidate bus location and size. The achievability of the proposed method has been demonstrated on IEEE-69 bus and real distribution system of Jamawaramgarh, Jaipur city. The obtained results are compared with latest optimization techniques to show the effectiveness and robustness of the proposed technique.
A New Approach to the Detection of Mammogram Boundary
Mohammed Rmili;
Abdelmajid El Moutaouakkil;
Mousatapha M. Saleck;
Maksi Bouchaib;
Fatiha Adnani;
El Mehdi El Aroussi
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 5: October 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (622.454 KB)
|
DOI: 10.11591/ijece.v8i5.pp3587-3593
Mammography is a method used for the detection of breast cancer. computer-aided diagnostic (CAD) systems help the radiologist in the detection and interpretation of mass in breast mammography. One of the important information of a mass is its contour and its form because it provides valuable information about the abnormality of a mass. The accuracy in the recognition of the shape of a mass is related to the accuracy of the detected mass contours. In this work we propose a new approach for detecting the boundaries of lesion in mammography images based on region growing algorithm without using the threshold, the proposed method requires an initial rectangle surrounding the lesion selected manually by the radiologist (Region Of Interest), where the region growing algorithm applies on lines segments that attach each pixel of this rectangle with the seed point, such as the ends (seeds) of each line segment grow in a direction towards one another. The proposed approach is evaluated on a set of data with 20 masses of the MIAS base whose contours are annotated manually by expert radiologists. The performance of the method is evaluated in terms of specificity, sensitivity, accuracy and overlap. All the findings and details of approach are presented in detail.
A reliable next generation cyber security architecture for industrial internet of things environment
C. Vijayakumaran;
B. Muthusenthil;
B. Manickavasagam
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 1: February 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (432.618 KB)
|
DOI: 10.11591/ijece.v10i1.pp387-395
Architectural changes are happening in the modern industries due to the adaption and the deployment of ‘Internet of Things (IoT)’ for monitoring and controlling various devices remotely from the external world. The most predominant place where the IoT technology makes the most sense is the industrial automation processes in smart industries (Industry 4.0). In this paper, a reliable ‘Next Generation Cyber Security Architecture (NCSA)’ is presented for Industrial IoT (IIoT) environment that detects and thwarts cybersecurity threats and vulnerabilities. It helps to automate the processes of exchanging real-time critical information between devices without any human intervention. It proposes an analytical framework that can be used to protect entities and network traffics involved in the IIoT wireless communication. It incorporates an automated cyber-defense authentication mechanism that detects and prevents security attacks when a network session has been established. The defense mechanism accomplishes the required level of security protection in the network by generating an identity token which is cryptographically encrypted and verified by a virtual gateway system. The proposed NCSA improves security in the IIoT environment and reduces operational management cost.
Towards a Consistent Measurement Stream Processing from Heterogeneous Data Sources
Mario Diván;
María de los Ángeles Martín
International Journal of Electrical and Computer Engineering (IJECE) Vol 7, No 6: December 2017
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1201.368 KB)
|
DOI: 10.11591/ijece.v7i6.pp3164-3175
In this work an updating of the C-INCAMI (Context-Information Need, Concept model, Attribute, Metric and Indicator) conceptual framework for Measurement and Evaluation projects was proposed. The updating incorporated better supporting for the measures stream processing. Therefore, a new version of the measurement interchange schema based on the updated C-INCAMI framework was introduced. This new schema incorporated the concept of “complementary data” linking them with geographic information. The complementary data could be associated with the measures and allowed us incorporating video, geographic information, text plain, audio or pictures with the quantitative measures (deterministic or estimated) jointly. A practical case associated with the Weather Radar of the Experimental Agricultural Station (EAS) INTA Anguil (Province of La Pampa, Argentina) was shown, indicating the advantages of the new schema.
Comparative study of the price penalty factors approaches for Bi-objective dispatch problem via PSO
Mohammed Amine Meziane;
Youssef Mouloudi;
Abdelghani Draoui
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 4: August 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (17.189 KB)
|
DOI: 10.11591/ijece.v10i4.pp3343-3349
One of the main objectives of electricity dispatch centers is to schedule the operation of available generating units to meet the required load demand at minimum operating cost with minimum emission level caused by fossil-based power plants. Finding the right balance between the fuel cost the green gasemissionsis reffered as Combined Economic and Emission Dispatch (CEED) problem which is one of the important optimization problems related the operationmodern power systems. The Particle Swarm Optimization algorithm (PSO) is a stochastic optimization technique which is inspired from the social learning of birds or fishes. It is exploited to solve CEED problem. This paper examines the impact of six penalty factors like "Min-Max", "Max-Max", "Min-Min", "Max-Min", "Average" and "Common" price penalty factors for solving CEED problem. The Price Penalty Factor for the CEED is the ratio of fuel cost to emission value. This bi-objective dispatch problem is investigated in the Real West Algeria power network consisting of 22 buses with 7 generators. Results prove capability of PSO in solving CEED problem with various penalty factors and it proves that Min-Max price penalty factor provides the best compromise solution in comparison to the other penalty factors.
A new approach to gather similar operations extracted from web services
Rekkal Sara;
Amrane Bakhta;
Loukil Lakhdar
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 2: April 2019
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (708.279 KB)
|
DOI: 10.11591/ijece.v9i2.pp1437-1444
A web service is an autonomous software that exposes a set of features on the Internet, it is developed and published by providers and accessed by customers who discover it, select it, invoke and use it. Several research policies have been implemented such as searching through keywords, searching according to semantics and searching by estimating the similarity. A customer is looking for a service for the operations he/she carries out, hence the interest of guiding the search for services towards a search for operations: finding the desired operations amounts to finding the services. For this, groupings of similar operations would make it possible to obtain all the services that can meet the desired functionalities. The customer can then select, in this set the service or services according to its non-functional criteria. The paper presents a study of the similarity between operations. The proposed approach is validated through an experimental study conducted on web services belonging to various domains.
Siting and Sizing of DG for Loss Reduction and Voltage Sag Mitigation in RDS Using ABC Algorithm
Kuruva Siva Ramudu;
M. Padma Lalitha;
P. Suresh Babu
International Journal of Electrical and Computer Engineering (IJECE) Vol 3, No 6: December 2013
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (122.875 KB)
In order to reduce the power loss and to improve the voltage profile in the distribution system, distributed generators (DGs) are connected to load bus. To reduce the total power loss in the system, the most important process is to identify the proper location for fixing and sizing of DGs. This paper presents a new methodology using a new population based meta heuristic approach namely Artificial Bee Colony algorithm (ABC) for the placement of Distributed Generators (DG) in the radial distribution systems to reduce the real power loss, to improve the voltage profile & voltage sag mitigation. While these power loss reduction, voltage profile improvement and voltage sag mitigation has significant role in lessoning imposed expenditures to utility companies. The power loss reduction is important factor for utility companies because it is directly proportional to the company benefits in a competitive electricity market, while reaching the better power quality standards is too important as it has vital effect on customer orientation. In this paper an ABC algorithm is developed to gain these goals all together. In order to evaluate sag mitigation capability of the proposed algorithm, voltage in voltage sensitive buses is investigated. An existing 20KV network (32-bus system) has been chosen as test network and results are compared with the proposed method in the radial distribution system.DOI:http://dx.doi.org/10.11591/ijece.v3i6.4399
Anti-Phishing Techniques in Cryptography
Akshey Nanda;
Himanshu Gupta
International Journal of Electrical and Computer Engineering (IJECE) Vol 5, No 6: December 2015
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (304.764 KB)
|
DOI: 10.11591/ijece.v5i6.pp1511-1515
Phishing is a process in which Phishers try to leak out the credentials of users by hosting a fake web page on user's browser. To save users from phishing attacks, many researchers have dug deep and presented their insights. Nowadays, in the era of 21st century, banks are using the OTP and visual cryptography for the authentication of both sides i.e. user and the bank. In this paper, we are proposing a methodology in which a user will need to give his finger prints as an authentication.
Hybrid approach of the fuzzy C-Means and the K-Nearest neighbors methods during the retrieve phase of dynamic case based reasoning for personalized Follow-up of learners in real time
EL Ghouch Nihad;
En-Naimi El Mokhtar;
Zouhair Abdelhamid;
Al Achhab Mohammed
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 6: December 2019
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (823.236 KB)
|
DOI: 10.11591/ijece.v9i6.pp4939-4950
The goal of adaptive learning systems is to help the learner achieve their goals and guide their learning. These systems make it possible to adapt the presentation of learning resources according to learners' needs, characteristics and learning styles, by offering them personalized courses. We propose an approach to an adaptive learning system that takes into account the initial learning profile based on Felder Silverman's learning style model in order to propose an initial learning path and the dynamic change of his behavior during the learning process using the Incremental Dynamic Case Based Reasoning approach to monitor and control its behavior in real time, based on the successful experiences of other learners, to personalize the learning. These learner experiences are grouped into homogeneous classes at the behavioral level, using the Fuzzy C-Means unsupervised machine learning method to facilitate the search for learners with similar behaviors using the supervised machine learning method K- Nearest Neighbors.
Framework to Avoid Similarity Attack in Big Streaming Dat
Ganesh Dagadu Puri;
D. Haritha
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 5: October 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (108.572 KB)
|
DOI: 10.11591/ijece.v8i5.pp2920-2925
The existing methods for privacy preservation are available in variety of fields like social media, stock market, sentiment analysis, electronic health applications. The electronic health dynamic stream data is available in large quantity. Such large volume stream data is processed using delay free anonymization framework. Scalable privacy preserving techniques are required to satisfy the needs of processing large dynamic stream data. In this paper privacy preserving technique which can avoid similarity attack in big streaming data is proposed in distributed environment. It can process the data in parallel to reduce the anonymization delay. In this paper the replacement technique is used for avoiding similarity attack. Late validation technique is used to reduce information loss. The application of this method is in medical diagnosis, e-health applications, health data processing at third party.