International Journal of Electrical and Computer Engineering
International Journal of Electrical and Computer Engineering (IJECE, ISSN: 2088-8708, a SCOPUS indexed Journal, SNIP: 1.001; SJR: 0.296; CiteScore: 0.99; SJR & CiteScore Q2 on both of the Electrical & Electronics Engineering, and Computer Science) is the official publication of the Institute of Advanced Engineering and Science (IAES). The journal is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication and computer engineering from the global world.
Articles
6,301 Documents
Active Distribution Grid Power Flow Analysis using Asymmetrical Hybrid Technique
Paramet Wirasanti;
Egon Ortjohann
International Journal of Electrical and Computer Engineering (IJECE) Vol 7, No 4: August 2017
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (673.413 KB)
|
DOI: 10.11591/ijece.v7i4.pp1738-1748
A conventional distribution power flow analysis has to be improved regards the changes in distribution network. One of the changes is a grid operation because a new grid concept, e.g. micro-grid and aggregation, is aimed to be operated based on area itself. Consequently, each area can be actively operated in either grid connected mode or islanding mode. Hence, this paper proposes an asymmetrical power flow analysis using hybrid technique to support this flexible mode change. The hybrid technique offers an opportunity to analyze power flow in a decoupling way. This means that the power flow analysis can be performed separately in each grid area. Regards the distributed generation, this paper also introduces a model based on inverter-based operation, i.e. grid forming, grid supporting and grid parallel. The proposed asymmetrical hybrid load flow method is examined in three case studies, i.e. a verification study with the DIgSILENT PowerFactory, a demonstration of decoupling analysis approach and a performance study with the Newton-Raphson method.
Quantification of operating reserves with high penetration of wind power considering extreme values
Johan S. Obando;
Gabriel González;
Ricardo Moreno
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 2: April 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (604.535 KB)
|
DOI: 10.11591/ijece.v10i2.pp1693-1700
The high integration of wind energy in power systems requires operating reserves to ensure the reliability and security in the operation. The intermittency and volatility in wind power sets a challenge for day-ahead dispatching in order to schedule generation resources. Therefore, the quantification of operating reserves is addressed in this paper using extreme values through Monte-Carlo simulations. The uncertainty in wind power forecasting is captured by a generalized extreme value distribution to generate scenarios. The day-ahead dispatching model is formulated as a mixed-integer linear quadratic problem including ramping constraints. This approach is tested in the IEEE-118 bus test system including integration of wind power in the system. The results represent the range of values for operating reserves in day-ahead dispatching.
Generating similarity cluster of Indonesian languages with semi-supervised clustering
Arbi Haza Nasution;
Yohei Murakami;
Toru Ishida
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 1: February 2019
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (435.142 KB)
|
DOI: 10.11591/ijece.v9i1.pp531-538
Lexicostatistic and language similarity clusters are useful for computational linguistic researches that depends on language similarity or cognate recognition. Nevertheless, there are no published lexicostatistic/language similarity cluster of Indonesian ethnic languages available. We formulate an approach of creating language similarity clusters by utilizing ASJP database to generate the language similarity matrix, then generate the hierarchical clusters with complete linkage and mean linkage clustering, and further extract two stable clusters with high language similarities. We introduced an extended k-means clustering semi-supervised learning to evaluate the stability level of the hierarchical stable clusters being grouped together despite of changing the number of cluster. The higher the number of the trial, the more likely we can distinctly find the two hierarchical stable clusters in the generated k-clusters. However, for all five experiments, the stability level of the two hierarchical stable clusters is the highest on 5 clusters. Therefore, we take the 5 clusters as the best clusters of Indonesian ethnic languages. Finally, we plot the generated 5 clusters to a geographical map.
Load Balancing Techniques for Efficient Traffic Management in Cloud Environment
Talasila Sasidhar;
Vani Havisha;
Sai Koushik;
Mani Deep;
V Krishna Reddy
International Journal of Electrical and Computer Engineering (IJECE) Vol 6, No 3: June 2016
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (440.112 KB)
|
DOI: 10.11591/ijece.v6i3.pp963-973
Cloud computing is an internet based computing. This computing paradigm has enhanced the use of network where the capability of one node can be utilized by other node. Cloud service provides access on demand to distributive resources such as database, servers, software, infrastructure etc. in pay as you go basis. Load balancing is one of the vexing issues in distributed environment. Resources of service provider need to balance the load of client request. Load balancing is adapted in order to increase the resource consumption in Data centers that leads to enhance the overall performance of system achieving client satisfaction.
Node Cooperation to Avoid Early Congestion Detection Based on Cross-Layer for Wireless Ad Hoc Networks
Abdalrazak Tareq Rahem;
Mahamod Ismail;
Nor Fadzilah Abdullah;
Mohammed Balfaqih
International Journal of Electrical and Computer Engineering (IJECE) Vol 6, No 5: October 2016
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (287.847 KB)
|
DOI: 10.11591/ijece.v6i5.pp2322-2330
The resent application of wireless ad hoc networks (WANET) demands a high and reliable data load. The simultaneous transfer of large amounts of data different nearby sources to nearby destinations in a massive network under these circumstances results in the possibility of network congestion. Congestion is an extremely unwanted condition because it creates extra overhead to the already deeply loaded environment, which ultimately leads to resource exhaustion, and can lead to packet drops and retransmission at either the MAC or upper layers. We present a lightweight congestion control and early avoidance congestion control scheme, which can effective control congestion while keeping overhead to a minimum. This scheme is based on the Cross-layer between the MAC and network layers lead to early detection of congestion. With the help of node cooperation the sender node is triggered to find an alternative route based on TMT. This mechanism controls the network resources rather than the data traffic. Detailed performance results show enhancement in the throughput and packet delivery ratio, as well as a reduction in packet drop. Generally, network performance increases.
Mitigation of Insider Attacks through Multi-Cloud
T Gunasekhar;
K Thirupathi Rao;
V Krishna Reddy;
P Sai Kiran;
B Thirumala Rao
International Journal of Electrical and Computer Engineering (IJECE) Vol 5, No 1: February 2015
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (99.356 KB)
|
DOI: 10.11591/ijece.v5i1.pp136-141
The malicious insider can be an employees, user and/or third party business partner. In cloud environment, clients may store sensitive data about their organization in cloud data centers. The cloud service provider should ensure integrity, security, access control and confidentiality about the stored data at cloud data centers. The malicious insiders can perform stealing on sensitive data at cloud storage and at organizations. Most of the organizations ignoring the insider attack because it is harder to detect and mitigate. This is a major emerging problem at the cloud data centers as well as in organizations. In this paper, we proposed a method that ensures security, integrity, access control and confidentiality on sensitive data of cloud clients by employing multi cloud service providers. The organization should encrypt the sensitive data with their security policy and procedures and store the encrypted data in trusted cloud. The keys which are used during encryption process are again encrypted and stored in another cloud area. So that organization contains only keys for keys of encrypted data. The Administrator of organization also does not know what data kept in cloud area and if he accesses the data, easily caught during the auditing. Hence, the only authorized used can access the data and use it and we can mitigate insider attacks by providing restricted privileges.
Adaptive CSLBP compressed image hashing
Varsha Patil;
Tanuja Sarode
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 4: August 2019
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijece.v9i4.pp2982-2992
Hashing is popular technique of image authentication to identify malicious attacks and it also allows appearance changes in an image in controlled way. Image hashing is quality summarization of images. Quality summarization implies extraction and representation of powerful low level features in compact form. Proposed adaptive CSLBP compressed hashing method uses modified CSLBP (Center Symmetric Local Binary Pattern) as a basic method for texture extraction and color weight factor derived from L*a*b* color space. Image hash is generated from image texture. Color weight factors are used adaptively in average and difference forms to enhance discrimination capability of hash. For smooth region, averaging of colours used while for non-smooth region, color differencing is used. Adaptive CSLBP histogram is a compressed form of CSLBP and its quality is improved by adaptive color weight factor. Experimental results are demonstrated with two benchmarks, normalized hamming distance and ROC characteristics. Proposed method successfully differentiate between content change and content persevering modifications for color images.
Comparative Analysis of Power Quality Indices for Different Lighting Techniogies in Public Lightning
Jurica Perko;
Srete Nikolovski;
Ljubomir Majdandžić
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 2: April 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (834.125 KB)
|
DOI: 10.11591/ijece.v8i2.pp880-887
As with any other product, having electricity of a certain quality is very important for consumers. Its quality has become the key feature that can be disturbed by loads based on power electronic devices. Electricity producers are striving to provide reliable and quality electricity supply to consumers. Public lighting systems that are based on LED lighting technology can potentially positively or negatively affect the power quality because they contain power electronics components in LED drivers. Because of that, two 7-day measurements were conducted on the same public lighting branch but with different lighting technologies (high pressure sodium, known as HPS and LED technology). Results of the measurements were analysed and compared. By analysing the results, other problems were also identified by using LED lighting technology. These problems are addressed in the conclusion of the paper.
A Novel Technique for Tuning PI -controller In Switched Reluctance Motor Drive for Transportation Systems
Mohamed Yaich;
Moez Ghariani
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 6: December 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (2167.854 KB)
|
DOI: 10.11591/ijece.v8i6.pp4272-4281
This paper presents, an optimal basic speed controller for switched reluctance motor (SRM) based on ant colony optimization (ACO) with the presence of good accuracies and performances. The control mechanism consists of proportional-integral (PI) speed controller in the outer loop and hysteresis current controller in the inner loop for the three phases, 6/4 switched reluctance motor. Because of nonlinear characteristics of a SRM, ACO algorithm is employed to tune coefficients of PI speed controller by minimizing the time domain objective function. Simulations of ACO based control of SRM are carried out using MATLAB /SIMULINK software. The behavior of the proposed ACO has been estimated with the classical Ziegler- Nichols (ZN) method in order to prove the proposed approach is able to improve the parameters of PI chosen by ZN method. Simulations results confirm the better behavior of the optimized PI controller based on ACO compared with optimized PI controller based on classical Ziegler-Nichols method.
Video Inter-frame Forgery Detection Approach for Surveillance and Mobile Recorded Videos
Staffy Kingra;
Naveen Aggarwal;
Raahat Devender Singh
International Journal of Electrical and Computer Engineering (IJECE) Vol 7, No 2: April 2017
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (769.793 KB)
|
DOI: 10.11591/ijece.v7i2.pp831-841
We are living in an age where use of multimedia technologies like digital recorders and mobile phones is increasing rapidly. On the other hand, digital content manipulating softwares are also increasing making it easy for an individual to doctor the recorded content with trivial consumption of time and wealth. Digital multimedia forensics is gaining utmost importance to restrict unethical use of such easily available tampering techniques. These days, it is common for people to record videos using their smart phones. We have also witnessed a sudden growth in the use of surveillance cameras, which we see inhabiting almost every public location. Videos recorded using these devices usually contains crucial evidence of some event occurence and thereby most susceptible to inter-frame forgery which can be easily performed by insertion/removal/replication of frame(s). The proposed forensic technique enabled detection of inter-frame forgery in H.264 and MPEG-2 encoded videos especially mobile recorded and surveillance videos. This novel method introduced objectivity for automatic detection and localization of tampering by utilizing prediction residual gradient and optical flow gradient. Experimental results showed that this technique can detect tampering with 90% true positive rate, regardless of the video codec and recording device utilized and number of frames tampered.