International Journal of Electrical and Computer Engineering
International Journal of Electrical and Computer Engineering (IJECE, ISSN: 2088-8708, a SCOPUS indexed Journal, SNIP: 1.001; SJR: 0.296; CiteScore: 0.99; SJR & CiteScore Q2 on both of the Electrical & Electronics Engineering, and Computer Science) is the official publication of the Institute of Advanced Engineering and Science (IAES). The journal is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication and computer engineering from the global world.
Articles
6,301 Documents
Modeling of digital converter for GSM signals with MATLAB
Metodi Traykov;
Radoslav Mavrevski;
Ivan Trenchev
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 5: October 2019
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (411.525 KB)
|
DOI: 10.11591/ijece.v9i5.pp4417-4422
In this study will simulate steady state of Digital Down Convertor (DDC) for GSM signal with a narrow frequency range. The MATLAB model that is described in this article simulates the work of the TIGC4016 Quad Digital Down Converter. This converter is used for digital mixing (down conversion) of signals, narrow band low-pass filtering and decimation. To implementation of the model, we use high sample-rate (69,333 MSPS) bandpass signal. The result contains low sample-rate (270.83 KSPS) baseband signal, thus facilitating the demodulation process.
Performance Analysis of 3-Level 5-Phase Multilevel Inverter Topologies
B. Jyothi;
M. Venu Gopala Rao
International Journal of Electrical and Computer Engineering (IJECE) Vol 7, No 4: August 2017
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (717.771 KB)
|
DOI: 10.11591/ijece.v7i4.pp1696-1705
Now a day’s many industrial applications requires high power. Some other appliances may require intermediate power either more or less depending upon their operation. With these consequences, MULTI LEVEL INVERTERS are introduced in 1975.for above intermediate voltage applications. The name MULTI LEVEL began with the three-level converter.By enormous advancement in power semiconductor switches, in electric drives increasing the phase number greater than the conventional three phase especially in locomotives, naval, aerospace, and electrical vehicles industry has many advantages than three phase. In this view, here five phase VSI has developed. This paper aims at comparing the performance of conventional two level inverter Diode clamped and Capacitor clamped topologies of 5-phase multilevel inverter (3-level) using sinusoidal pulse width modulation. SPWM is highly economical, has more efficiency, controllability. These circuits are analyzed by using simulation software package such as MATLAB.
The best sextic approximation of hyperbola with order twelve
Abedallah Rababah;
Esra’a Rababah
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 2: April 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (181.196 KB)
|
DOI: 10.11591/ijece.v10i2.pp2192-2199
In this article, the best uniform approximation for the hyperbola of degree 6 that has approximation order 12 is found. The associated error function vanishes 12 times and equioscillates 13 times. For an arc of the hyperbola, the error is bounded by 2:4 x 10-4. We explain the details of the derivation and show how to apply the method. The method is simple and this encourages and motivates people working in CG and CAD to apply it in their works.
A hybrid content based image retrieval system using log-gabor filter banks
D. Madhavi;
Khwaja Muinuddin Chisti Mohammed;
N. Jyothi;
M. Ramesh Patnaik
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 1: February 2019
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1176.708 KB)
|
DOI: 10.11591/ijece.v9i1.pp237-244
In this paper, a new efficient image retrieval system using sequential process of three stages with filtering technique for the feature selection is proposed. In the first stage the color features are extracted using color histogram method and in the second stage the texture features are obtained using log-Gabor filters and in the third stage shape features are extracted using shape descriptors using polygonal fitting algorithm. The proposed log-Gabor filter in the second stage has advantages of retrieving images over regular Gabor filter for texture. It provides better representation of the images. Experimental evaluation of the proposed system shows improved performance in retrieval as compared to other existing systems in terms of average precision and average recall.
Automatic Detection of Illegitimate Websites with Mutual Clustering
Kanaka Durga;
V Rama Krishna
International Journal of Electrical and Computer Engineering (IJECE) Vol 6, No 3: June 2016
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (164.228 KB)
|
DOI: 10.11591/ijece.v6i3.pp995-1001
In the websites the contents will be are similarity when we compared with other search engines. So to check the similar content in the websites and its web contents we created a overhead to the search engine which will severely effect its performance & quality. So to detect the silmilar or same content or web documenattion some techniques are implemented by web crawling research community. So it is one of major factor for the search engines to provide some applicatory data to users in the first page itself. So to avoid such issues we proposed a methodlogy called Automatic Detection of illegitimate websites with Mutual Clustering (ADIWMC) paper we are presenting a peculiar and efficacious path for the detection of similarities in the web pages in web clustering. Detection of same and similar web pages and web content will be done by storing the crawled web pages into depository. Initially the adwords will be extracted from the crawled pages and similarity checking will be done between the two pages based in the usage of adwords. So a threshold value is set for this, if the similarity checking percentage is greater than the threshold then similarity content is reduced and improves the depositary and improves the search engine quality. In the sections of existing analysis and the proposed analysis we are clearly exploring how it works.
Light-weight Routing Protocol in IoT-based Inter-Device Telecommunication Wireless Environment
Hayoung Oh;
Sangsoon Lim
International Journal of Electrical and Computer Engineering (IJECE) Vol 6, No 5: October 2016
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (519.963 KB)
|
DOI: 10.11591/ijece.v6i5.pp2352-2361
The primary task for IoT-based hyper-connectivity communications lies in the development of direct communications technique among IoT devices in RPL (Routing Protocol for Low-Power and Lossy Networks) environment without the aid from infras such as access points, base stations etc. In a low-power and lossy wireless network, IoT devices and routers cannot keep the original path toward the destination since they have the limited memory, except for a limited number of the default router information.. Different from the previous light-weight routing protocols focusing on the reduction of the control messages, the proposed scheme provides the light-weight IPv6 address auto-configuration, IPv6 neighbor discovery and routing protocol in a IoT capable infra-less wireless networks with the bloom filer and enhanced rank concepts. And for the first time we evaluate our proposed scheme based on the modeling of various probability distributions in the IoT environments with the lossy wireless link. Specifically, the proposed enhanced RPL based light-weight routing protocol improves the robustness with the multi-paths locally established based on the enhanced rank concepts even though lossy wireless links are existed. We showed the improvements of the proposed scheme up to 40% than the RPL based protocol.
Impact of Harmonics on Power Quality and Losses in Power Distribution Systems
M. Jawad Ghorbani;
Hossein Mokhtari
International Journal of Electrical and Computer Engineering (IJECE) Vol 5, No 1: February 2015
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (335.051 KB)
|
DOI: 10.11591/ijece.v5i1.pp166-174
This paper investigates the harmonic distortion and losses in power distribution systems due to the dramatic increase of nonlinear loads. This paper tries to determine the amount of the harmonics generated by nonlinear loads in residential, commercial and office loads in distribution feeders and estimates the energy losses due to these harmonics. Norton equivalent modeling technique has been used to model the nonlinear loads. The presented harmonic Norton equivalent models of the end user appliances are accurately obtained based on the experimental data taken from the laboratory measurements. A 20 kV/400V distribution feeder is simulated to analyze the impact of nonlinear loads on feeder harmonic distortion level and losses. The model follows a “bottom-up” approach, starting from end users appliances Norton equivalent model and then modeling residential, commercial and office loads. Two new indices are introduced by the authors to quantize the effect of each nonlinear appliance on the power quality of a distribution feeder and loads are ranked based on these new defined indices. The simulation results show that harmonic distortion in distribution systems can increase power losses up to 20%.
Facility maintenance management system based on GIS and indoor map
Supattra Puttinaovarat;
Suwat Jutapruet;
Aekarat Saeliw;
Siwipa Pruitikanee;
Jinda Kongcharoen;
Watchara Jiamsawat;
Suchakree Limpasamanon
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 4: August 2019
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1089.004 KB)
|
DOI: 10.11591/ijece.v9i4.pp3323-3332
This research presented a system development approach for facility maintenance management system based on GIS and indoor map in the form of web applications that can be used with all devices and no worries about time limitations. The capabilities of GIS, indoor map, and geospatial data visualization help speeding up facility maintenance management process and create benefits to all concerned parties, i.e., users can notify and follow the data of facility errors at the time; or officers in charge can operate quickly because they can access real-time data. Indoor map display makes it easier to access locations or places of damaged facilities. In addition, the data from the model system presented in this research can also be applied to planning and decision-making of executives.
The Security Challenges of the Rhythmprint Authentication
Nakinthorn Wongnarukane;
Pramote Kuacharoen
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 3: June 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (646.99 KB)
|
DOI: 10.11591/ijece.v8i3.pp1281-1287
The Rhythmprint authentication combines an advantage of the traditional keystroke authentication and the multi-touch technology based on a touchable device such as touchpad on a laptop, a smartphone and a tablet. With the Rhythmprint authentication, the user is less likely to suffer from shoulder surfing and eavesdropping attacks. This research provides empirical evidence to verify the security performance of the Rhythmprint authentication comparing to the traditional keystroke authentication for shoulder surfing and eavesdropping attacks, when the user tries to login to a website on a laptop for 10 times in a public place while the attacker stands behind. The experimental results show that the Rhythmprint authentication provides higher security than the traditional keystroke authentication in both shoulder surfing and eavesdropping attacks.
Caching on Named Data Network: a Survey and Future Research
Leanna Vidya Yovita;
Nana Rachmana Syambas
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 6: December 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (576.074 KB)
|
DOI: 10.11591/ijece.v8i6.pp4456-4466
The IP-based system cause inefficient content delivery process. This inefficiency was attempted to be solved with the Content Distribution Network. A replica server is located in a particular location, usually on the edge router that is closest to the user. The user’s request will be served from that replica server. However, caching on Content Distribution Network is inflexible. This system is difficult to support mobility and conditions of dynamic content demand from consumers. We need to shift the paradigm to content-centric. In Named Data Network, data can be placed on the content store on routersthat are closest to the consumer. Caching on Named Data Network must be able to store content dynamically. It should be selectively select content that is eligible to be stored or deleted from the content storage based on certain considerations, e.g. the popularity of content in the local area. This survey paper explains the development of caching techniques on Named Data Network that are classified into main points. The brief explanation of advantages and disadvantages are presented to make it easy to understand. Finally, proposed the open challenge related to the caching mechanism to improve NDN performance.