Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,922 Article Results

Performance analysis of CIC multirate filter in cognitive radio for efficient pulse shaping in wireless domain

10.11591/ijict.v8i3.pp184-190
A. S. Kang , Er.Vishal Sharma , Prof.Renu Vig
In this paper, the Performance Analysis of Cascade Integrator Comb Filter in context of Filter Bank Multicarrier Transmission has been presented for Cognitive radio. A benefit of the chosen technique is that, a CIC filter can be designed with a slight adjustment in parameters of interest. The entire performance of the filters designed is analyzed and evaluated by analyzing Normalized Amplitude versus Normalized Frequency plots at typical K and N values. The roll off factor plays a significant role in performance analysis of CIC filter. The results shown are a useful advance for rf design engineers working in the domain of multirate signal processing in wireless communication. To ensure the acceptable performance of Enhanced FBMC, computational complexity, and transmission burst length need to be reduced. The effect of Stop band attenuation on the edges of Magnitude and Frequency responses has been studied under constraints such as Lp, K and M during different simulation runs.
Volume: 8
Issue: 3
Page: 184-190
Publish at: 2019-12-01

Design of a discrete PID controller based on identification data for a simscape buck boost converter model

10.11591/ijpeds.v10.i4.pp1797-1805
Mohammed Almaged , Salam Ibrahim Khather , Abdulla I. Abdulla
This work shows the design and tuning procedure of a discrete PID controller for regulating buck boost converter circuits. The buck boost converter model is implemented using Simscape Matlab library without having to derive a complex mathematical model. A new tuning process of digital PID controllers based on identification data has been proposed. Simulation results are introduced to examine the potentials of the designed controller in power electronic applications and validate the capability and stability of the controller under supply and load perturbations. Despite controller linearity, the new approach has proved to be successful even with highly nonlinear systems. The proposed controller has succeeded in rejecting all the disturbances effectively and maintaining a constant output voltage from the regulator.
Volume: 10
Issue: 4
Page: 1797-1805
Publish at: 2019-12-01

Bivariate modified hotelling’s T2 charts using bootstrap data

10.11591/ijece.v9i6.pp4721-4727
Firas Haddad , Mutasem K. Alsmadi , Usama Badawi , Tamer Farag , Raed Alkhasawneh , Ibrahim Almarashdeh , Walaa Hassan
The conventional Hotelling’s  charts are evidently inefficient as it has resulted in disorganized data with outliers, and therefore, this study proposed the application of a novel alternative robust Hotelling’s  charts approach. For the robust scale estimator , this approach encompasses the use of the Hodges-Lehmann vector and the covariance matrix in place of the arithmetic mean vector and the covariance matrix, respectively.  The proposed chart was examined performance wise. For the purpose, simulated bivariate bootstrap datasets were used in two conditions, namely independent variables and dependent variables. Then, assessment was made to the modified chart in terms of its robustness. For the purpose, the likelihood of outliers’ detection and false alarms were computed. From the outcomes from the computations made, the proposed charts demonstrated superiority over the conventional ones for all the cases tested.
Volume: 9
Issue: 6
Page: 4721-4727
Publish at: 2019-12-01

Enhancing active radial distribution networks by optimal sizing and placement of DGs using modified crow search algorithm

10.11591/ijeecs.v16.i3.pp1179-1188
Mohamed Abdelbadea , Tarek A. Boghdady , Doaa Khalil Ibrahim
Incorporating many Distributed Generators (DGs) technologies in power system networks has grown rapidly in recent years. Distributed generation (DG) plays a key role in reducing power loss and enhancing the voltage profile in radial distribution networks. However, inappropriate DGs site or size may cut network efficiency; moreover, injecting harmonics is one of the integration concerns of inverter-based DGs. Two-procedure based approach is introduced in this paper. The first procedure solves the DGs siting and sizing problem, as a multi-objective one by improving the voltage profile of the whole distribution network and also reducing its power loss. A weighted sum method is presented to create the Pareto optimal front in this procedure and get the compromised solution by applying a novel metaheuristic optimizer, named Crow Search Algorithm (CSA). A modification on CSA is also proposed and applied to improve its performance. The achieved solution for inverter-based DGs placement and size is checked in the second procedure to make sure the accepted voltage THD at all buses by implementing detailed simulation for the tested system using Matlab/Simulink. The proposed approach has been tested on IEEE 33-bus radial distribution system with photovoltaic DGs. To confirm the superiority of the modified CSA algorithm in terms of quality of solution, its achieved results are compared with the results offered by the original CSA algorithm and published results of some other nature-inspired algorithms.
Volume: 16
Issue: 3
Page: 1179-1188
Publish at: 2019-12-01

Intelligent control of DC-DC converter based on PID-neural network

10.11591/ijpeds.v10.i4.pp2254-2262
Hussain K. khleaf , Ali kareem Nahar , Ansam Subhi Jabbar
This paper introduced a “PID-NN” based on Particle Swarm Optimization control that was applied to a boost converter operating in large-signal domains. Simulation results have shown that the proposed “PID-NN controller” could enhance the (boost converter) startup response with the use of fewer on-off switch operations compared to the Conventional “PID controllers”. This result is of high importance in practice since reducing the number of on-off switches can effectively decrease the transient disturbances and losses due to switching. Simulations also prove that the proposed “PID-NN controller” is capable of efficiently improving rejecting potential disturbances that could happen in the input voltage. Moreover, it has been noticed that the output voltage is more efficiently controlled when applying “PID-NN controller”. The results of the simulation show the efficiency of the suggested algorithm compared with other well-known learning methods.
Volume: 10
Issue: 4
Page: 2254-2262
Publish at: 2019-12-01

RB-Bayes algorithm for the prediction of diabetic in Pima Indian dataset

10.11591/ijece.v9i6.pp4866-4872
Rajni Rajni , Amandeep Amandeep
Diabetes is a major concern all over the world. It is increasing at a fast pace. People can avoid diabetes at an early stage without any test. The goal of this paper is to predict the probability of whether the person has a risk of diabetes or not at an early stage. This would lead to having a great impact on their quality of human life. The datasets are Pima Indians diabetes and Cleveland coronary illness and consist of 768 records. Though there are a number of solutions available for information extraction from a huge datasets and to predict the possibility of having diabetes, but the accuracy of their mining process is far from accurate. For achieving highest accuracy, the issue of zero probability which is generally faced by naïve bayes analysis needs to be addressed suitably. The proposed framework RB-Bayes aims to extract the required information with high accuracy that could survive the problem of zero probability and also configure accuracy with other methods like Support Vector Machine, Naive Bayes, and K Nearest Neighbor. We calculated mean to handle missing data and calculated probability for yes (positive) and no (negative). The highest value between yes and no decide the value for the tuple. It is mostly used in text classification. The outcomes on Pima Indian diabetes dataset demonstrate that the proposed methodology enhances the precision as a contrast with other regulated procedures. The accuracy of the proposed methodology large dataset is 72.9%.
Volume: 9
Issue: 6
Page: 4866-4872
Publish at: 2019-12-01

Remote monitoring of an object using a wireless sensor network based on NODEMCU ESP8266

10.11591/ijeecs.v16.i3.pp1154-1162
Hicham Ouldzira , Ahmed Mouhsen , Hajar Lagraini , Mostafa Chhiba , Abdelmoumen Tabyaoui , Said Amrane
In recent years, wireless sensors networks (WSNs) have been imposed as an effective means of interconnection with simultaneous communication and information processing. They allow operating with sensors at low cost and low power consumption in various application areas such as ecosystem monitoring, detection and monitoring of objects and smart cities, etc.This paper describes the development of a system to detect the presence of an object and monitor it. This prototype is based on four NodeMcu modules (a static access point that provides the WIFI network, a server, a client and a mobile access point attached to the remote surveillance object) programmed under Arduino IDE and communicating between them via the HTTP protocol. The remote monitoring of the object for a linear disposition of the nodes used is based on the existence of the mobile access point in the HTTP client field.
Volume: 16
Issue: 3
Page: 1154-1162
Publish at: 2019-12-01

Decentralized collaborative TTP free approach for privacy preservation in location based services

10.11591/ijece.v9i6.pp5376-5385
Ajaysinh Devendrasinh Rathod , Saurabh Shah , Vivaksha J. Jariwala
In recent trends, growth of location based services have been increased due to the large usage of cell phones, personal digital assistant and other devices like location based navigation, emergency services, location based social networking, location based advertisement, etc. Users are provided with important information based on location to the service provider that results the compromise with their personal information like user’s identity, location privacy etc. To achieve location privacy of the user, cryptographic technique is one of the best technique which gives assurance. Location based services are classified as Trusted Third Party (TTP) & without Trusted Third Party that uses cryptographic approaches. TTP free is one of the prominent approach in which it uses peer-to-peer model. In this approach, important users mutually connect with each other to form a network to work without the use of any person/server. There are many existing approaches in literature for privacy preserving location based services, but their solutions are at high cost or not supporting scalability.  In this paper, our aim is to propose an approach along with algorithms that will help the location based services (LBS) users to provide location privacy with minimum cost and improve scalability.
Volume: 9
Issue: 6
Page: 5376-5385
Publish at: 2019-12-01

The use of Least Significant Bit (LSB) and Knight Tour Algorithm for image steganography of cover image

10.11591/ijece.v9i6.pp5218-5226
Soo Ann Nie , Ghazali Sulong , Rozniza Ali , Andrew Abel
Steganography is one of the method to communicate in a hidden way. In another word, steganography literally means the practice of hiding messages or information within another data. Previous studies have proposed various steganography techniques using different approaches including Least Significant Bit (LSB), Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT). However, different approaches still have its own weaknesses. Therefore image stenography using Knight Tour Algorithm with Least Significant Bit (LSB) technique is presented. The main objective is to improve the security factor in the stego image. Basically, the proposed technique is divided into two parts which are the sender and receiver side. Then, steganalysis which is a type of attack on stenography algorithm is used to detect the secret message in the cover image by the statistical analysis of pixel values. Chi Square Statistical Attach which is one of the type of steganalysis is used to detect these near-equal Po Vs in images and bases the probability of embedding on how close to equal the even pixel values and their corresponding odd pixel values are in the test image. The Knight Tour Algorithm is applied due to the common Least Significant Bit technique that is weak in security and easily decoded by outsider.
Volume: 9
Issue: 6
Page: 5218-5226
Publish at: 2019-12-01

Modular multilevel converter (MMC) based STATCOM with vector control and virtual impedance voltage compensations

10.11591/ijpeds.v10.i4.pp1833-1851
Abdurrahman Umar Lawan , Haider A.F. Almurib , Jeen G. Khor
This paper presents modular multilevel converter (MMC) with circulating current control which provides an improved balanced capacitors voltages. The control is achieved by employing compensation techniques in the external and internal controls of the MMC based static compensator (STATCOM). Performance variations arise during STATCOM non-ideal operation with grid externally and during capacitors voltage transients due to charging and discharging within the MMC that result in the emergence of a voltage disturbance. The proportional integral (PI) controller is usually employed in the external and internal controls for a fast response and reactive current control. In this paper, the performance of the PI controller is improved using voltage compensation in the external control and virtual impedance in the capacitor voltage control within a five-level MMC. The proposed control minimizes the variations in the STATCOM operations with the grid and within the MMC to provide an enhanced overall system response.
Volume: 10
Issue: 4
Page: 1833-1851
Publish at: 2019-12-01

A new approach for enhancing LSB steganography using bidirectional coding scheme

10.11591/ijece.v9i6.pp5286-5294
Mohammed M. Saeed Abdullah Al-Momin , Issa Ahmed Abed , Hussein A. Leftah
This paper proposes a new algorithm for embedding private information within a cover image. Unlike all other already existing algorithms, this one tends to employ the data of the carrier image more efficiently such that the image looks less distorted. As a consequence, the private data is maintained unperceived and the sent information stays unsuspicious.  This task is achieved by dividing the least significant bit plane of the cover image into fixed size blocks, and then embedding the required top-secret message within each block using one of two opposite ways depending on the extent of similarity of each block with the private information needed to be hidden. This technique will contribute to lessen the number of bits needed to be changed in the cover image to accommodate the private data, and hence will substantially reduce the   amount of distortion in the stego-image when compared to the classic LSB image steganography algorithms.
Volume: 9
Issue: 6
Page: 5286-5294
Publish at: 2019-12-01

Product recommendation system based user purchase criteria and product reviews

10.11591/ijece.v9i6.pp5454-5462
Jinyoung Kim , Doyeun Hwang , Hoekyung Jung
In this paper, we propose a system that provides customized product recommendation information after crawling product review data of internet shopping mall with unstructured data, morphological analysis using Python. User searches for a proudct to be purchased and select the most important purchase criteria when purchasing the product. User searches for a proudct to be purchased and select the most important purchase criteria when purchasing the product. And extracts and analyzes only the review including the purchase criterion selected by the user among the product reviews left by other users. The positive and negative evaluations contained in the extracted product review data are quantified and using the average value, we extract the top 10 products with good product evaluation, sort and recommend to users. And provides user-customized information that reflects the user's preference by arranging and providing a center around the criteria that the user occupies the largest portion of the product purchase. This allows users to reduce the time it takes to purchase a product and make more efficient purchasing decisions.
Volume: 9
Issue: 6
Page: 5454-5462
Publish at: 2019-12-01

Solar energy density estimation using ANFIS based on daily maximum and minimum temperature

10.11591/ijpeds.v10.i4.pp2206-2213
M. Irwanto , H. Alam , M. Masri , B. Ismail , W. Z. Leow , Y. M. Irwan
The data of solar energy density in one area is very important when the area will constructed photovoltaic (PV) system. The data is as preliminary study to decide what the area is suitable or not to be constructed the PV application system. But, sometime the available data is missing because the limitation of weather equipment.  An alternative technique for the available data of solar energy density should be done for the continuity of PV application system decision. An estimation technique of solar energy density is one part of good alternative to solve this problem. This paper presents the estimation of solar energy density using Adaptive Neuron Fuzzy Inference System (ANFIS). The ANFIS system has two input data of the measured daily minimum, maximum temperature and difference between maximum and minimum temperature. The measured solar energy density is as target data of ANFIS system. The data is recorded from Medan meteorological station through the web site of world weather online for the year of 2018. The result shows that the average estimated solar energy density is classified in the very high solar energy density and based on the percentage error shows that the estimated solar energy density is acceptable.
Volume: 10
Issue: 4
Page: 2206-2213
Publish at: 2019-12-01

An accurate pattern classification for empty fruit bunch based on the age profile of oil palm tree using neural network

10.11591/ijece.v9i6.pp5636-5643
Wafi Aziz , Afif Kasno , Nurkamilia Kamarudin , Zaidi Tumari , Shahrieel Aras , Herdy Rusnandi , Kamal Musa
This paper proposes an efficient method for pattern classification system of empty fruit bunch (EFB) by using a neural network technique. The main advantage of this method is the accuracy and speed of algorithm such that it can be computed rapidly with the proposed system. To test the effectiveness of the proposed method, 120 of EFB’s data with different ages and length that been obtained from Malaysian Palm Oil Board (MPOB) are use in the pattern classification process. In addition, there  are three classes of EFB in this system, which are Class 1 (less than 7 year old), Class 2 (8 to 17 year old) and Class 3 (more than 17 year old). It is envisaged that the proposed method is very useful in classifying the EFB and  90% of the sample parameters are successfully classified to its class.
Volume: 9
Issue: 6
Page: 5636-5643
Publish at: 2019-12-01

Image multiplexing using residue number system coding over MIMO-OFDM communication system

10.11591/ijece.v9i6.pp4815-4825
Mohamed Ibrahim Youssif , Amr ElSayed Emam , Mohamed Abd ElGhany
Image transmission over Orthogonal Frequency-Division Multiplexing (OFDM) communication system is prone to distortion and noise due to the encountered High-Peak-to-Average-Power-Ratio (PAPR) generated from the OFDM block. This paper studies the utilization of Residue Number System (RNS) as a coding scheme for digital image transmission over Multiple-Input-Multiple-Output (MIMO) – OFDM transceiver communication system. The use of the independent parallel feature of RNS, as well as the reduced signal amplitude to convert the input signal to parallel smaller residue signals, enable to reduce the signal PAPR, decreasing the signal distortion and the Bit Error Rate (BER). Consequently, improving the received Signal-to-Noise Ratio (SNR) and enhancing the received image quality. The performance analyzed though BER, and PAPR. Moreover, image quality measurement is achieved through evaluating the Mean Squared Error (MSE), Peak Signal to Noise Ratio (PSNR), and the correlation values between the initial and retrieved images. Simulation results had shown the performance of transmission/reception model with and without RNS coding implementation. 
Volume: 9
Issue: 6
Page: 4815-4825
Publish at: 2019-12-01
Show 1205 of 1995

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration