SCIREA Journal of Electrical Engineering (ISSN: 2995-7141)
SCIREA Journal of Electrical Engineering is an
international, scientific peer-reviewed open access journal
published online by SCIREA.
Open Access free for readers, with article processing charges (APC)paid by authors or their
institutions.
High visibility: Indexed in the Google Scholar
and other databases.
Rapid publication:
manuscripts are peer-reviewed and a first decision provided to
authors approximately 20 days after submission; acceptance to
publication is undertaken in 5 days.
Recognition of reviewers:
reviewers who provide timely, thorough peer-review reports receive
vouchers entitling them to a discount on the APC of their next
publication in any SCIREA journal, in appreciation of the work
done.
Abstract:This paper specifically focuses on the validity of generalized modal syllogism (i.e. A□MI-1) that contains the quantifier ‘most’. By making full use of generalized quantifier theory, modal logic and set theory, this paper derives 24 valid generalized modal syllogisms based on the validity of the syllogism A□MI-1. This metho
Abstract:This paper investigates the formulation of a State Space Model for a Capacitor Coupled Substation to facilitate power tapping and injection into an electrical transmission network. The primary objective is to establish a state space representation of the electrical system that can be used to simplify the modeling of complex
Abstract:Electricity is indispensable worldwide, but conventional distribution networks struggle in sparsely populated areas. Capacitor Coupled Substations (CCS) and Controllable Network Transformers (CNT) are promising solutions for supplying electricity to such regions. CCS efficiently delivers power to remote areas, while CNT ena
Abstract:This paper firstly proves that the generalized syllogism HMO-3 is valid according to the relevant definitions, facts and rules, and then shows that at least the other 21 valid generalized syllogisms can be deduced from the syllogism HMO-3 with the common generalized quantifiers ‘most’ and ‘at most half of the’. The main con
Abstract:The concept of metric space and topological space grew out of the study of real line and Euclidean space and study of continuous function on these spaces. In this Paper, we will try to discuss some concepts in metric spaces and topological spaces whose meanings are same but presented by the different ways. We will discuss o
Abstract:As technology became more advanced, a lot of products have included electric circuits in order to increase their capabilities. The demand for circuit boards rises naturally alongside with the demand for these products said above. Many manufacturers have started to incorporate automation systems into their production lines,
Abstract:This article discusses membrane desalination methods that use membrane processes (ion exchange membranes, electrodialysis). A brief summary of the technology of water desalination on the electrodialysis apparatus as part of a combined scheme is given followed by a reduction in the maximum salinity of the resulting solution
Desmond TC Ang, Peter Junk, Glen Deacon, Maria Forsyth
Abstract:The syntheses and characterisation of Rare-Earth-Metals (REMs) heteroaromatic complexes, via the use of green organic esters such as Pyridinecarboxylate (Pyc) or heteroaromatic organic to form stable compounds ie. Lanthanide-Pyridinecarboxylate (Ln-Pyc), has been demonstrated to be one of the preferred compounds to form a g
Abstract:To help scholars in computer engineering get to know the state-of-the-art topics and choose suitable journals to publish their work, the method that uses structural topic model (STM) to extract the topics of papers and uses the generalized linear model to analyze the influence of time on topic prevalence. Based on these res
Abstract:In our daily lives, embedded and Internet of Things (IoT) applications are becoming extremely important. It advised using intellectual property (IP) while developing embedded and IoT applications. Hardware security and electronic component counterfeiting pose a threat to IoT devices and IPs. Another consideration is that to