Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

27,762 Article Results

Long-Range Monitoring System with PDMS Material

10.11591/ijeecs.v10.i3.pp974-979
Norsaidah Muhamad Nadzir , M. K. A. Rahim , F. Zubir , H. A. Majid
This paper describes the development of a long range monitoring system that integrates Cottonwood: UHF Long Distance RFID reader module with Raspberry Pi 3. When a UHF RFID tag is within the UHF RFID reader antenna’s range, the unique ID of the tag will be transferred to the Raspberry Pi 3 to be processed. Then, the data will be sent over to the database wirelessly to be managed, stored, and displayed. The paper also describes the measurement done to determine the most suitable thickness of PDMS material so that it could be incorporated as a wearable transponder. After the result is calculated and tabulated, it can be concluded that the most suitable thickness of PDMS material for the transponder is 8 mm.
Volume: 10
Issue: 3
Page: 974-979
Publish at: 2018-06-01

Neural Network and Local Search to Solve Binary CSP

10.11591/ijeecs.v10.i3.pp1319-1330
Adil Bouhouch , Hamid Bennis , Chakir Loqman , Abderrahim El Qadi
Continuous Hopfield neural Network (CHN) is one of the effective approaches to solve Constrain Satisfaction Problems (CSPs). However, the main problem with CHN is that it can reach stabilisation with outputs in real values, which means an inconsistent solution or an incomplete assignment of CSP variables. In this paper, we propose a new hybrid approach combining CHN and min-conflict heuristic to mitigate these problems. The obtained results  show  an  improvement  in  terms  of  solution  quality,  either  our approach achieves feasible soluion with a high rate of convergence, furthermore, this approach can also enhance theperformance more than conventional CHN in some cases, particularly, when the network crashes.
Volume: 10
Issue: 3
Page: 1319-1330
Publish at: 2018-06-01

Extended Bandwidth Optimized and Energy Efficient Dynamic Source Routing Protocol in Mobile Ad-hoc Networks

10.11591/ijece.v8i3.pp1460-1466
Bindiya Bhatia , M. K. Soni , Parul Tomar
With the increase in the evolution of wireless communication, the ad-hoc networks are gaining attention and are significantly becoming the technology solutions to the various problems. Mobile ad-hoc Networks (MANETs) are envisaged to grow as a main component in the today 4G architecture, and ad hoc networks are projected to be a significant element of the whole future wireless communication. The MANETs are infrastructure less, self-forming and self-organizing network in which there is no control of any centralized entity. The nodes are free to move around the network with dynamic topology. But this self formation, flexibility and scalability create many challenges and design constraints like hidden  terminal, limited bandwidth, limited energy of a node, unpredictable change in the topology etc. Bandwidth and energy are the scarce resources of the network. In order to effectively manage the consumption of bandwidth and energy, an algorithm is proposed which is the extension of traditional Dynamic Source Routing (DSR) reactive routing protocol. The extended protocol applies the mobile agents to carry the data. The proposed work is intended to optimize the bandwidth and making the protocol energy efficient.
Volume: 8
Issue: 3
Page: 1460-1466
Publish at: 2018-06-01

Mitigation of Selfish Node Attacks in Autoconfiguration of MANETs

10.11591/ijaas.v7.i2.pp162-168
Reshmi. T.R , Shymala L , Sandhya. M.K
Mobile ad-hoc networks (MANETs) are composed of mobile nodes connected by wireless links without using any pre-existent infrastructure. Hence the assigning of unique IP address to the incoming node becomes difficult. There are various dynamic auto configuration protocols available to assign IP address to the incoming nodes including grid based protocol which assigns IP address with less delay and low protocol overhead. Such protocols get affected by presence of either selfish nodes or malicious nodes. Moreover there is no centralized approach to defend against these threats like in wired network such as firewall, intrusion detection system, proxy etc. The selfish nodes are the nodes which receive packet destined to it and drop packet destined to other nodes in order to save its energy and resources. This behavior of nodes affects normal functioning of auto configuration protocol. Many algorithms are available to isolate selfish nodes but they do not deal with presence of false alarm and protocol overhead. And also there are certain algorithms which use complex formulae and tedious mathematical calculations. The proposed algorithm in this paper helps to overcome the attack of selfish nodes effect in an efficient and scalable address auto configuration protocol that automatically configures a network by assigning unique IP addresses to all nodes with a very low protocol overhead, minimal address acquisition delay and computational overhead.
Volume: 7
Issue: 2
Page: 162-168
Publish at: 2018-06-01

Positive Interval Observer-based State Feedback Controller for Uncertain General Anaesthesia System

10.11591/ijeecs.v10.i3.pp1000-1006
Jing Jing Chang , S. Syafiie
The drug delivery process of general anaesthesia in the human body is most commonly described by the Pharmacokinetic/Pharmacodynamic (PK/PD) model. Since the PK model is a positive linear system, the design of the controller can be treated as a positive stabilization problem. In this paper, a state feedback controller with positive interval observer was designed using a linear programming approach by taking into account the inter-individual variability among patient in the PK model. The designed controller was assessed by simulation on a pool of patients. The result shows that the design of a fix controller for the whole population is difficult due to the conflict between performance and robustness.
Volume: 10
Issue: 3
Page: 1000-1006
Publish at: 2018-06-01

Voltage Oriented Decoupled Control Scheme for DFIG’s Grid Side Converter

10.12928/telkomnika.v16i3.6756
S.A; Universidad de Talca Kamran , Javier; Universidad de Talca Muñoz
This paper proposes a novel voltage oriented decoupled control scheme for the DFIG’s Grid Side Converter (GSC) of a 2.3Mw, 690V, 50Hz, 6 pole doubly-fed induction generator (DFIG) based wind generation system. For Rotor Side Converter (RSC), slip and constant V/Hz control scheme along with a feedback control via PWM is selected but not explained in this paper.Based on the per-phase steady state equivalent circuit model of a DFIG, relationship between stator and rotor voltages is developed. Voltage oriented decoupled control scheme for GSC is designed in such a way that it can keep the dc link voltage constant by regulating grid reactive power when required. The space vector modulation (SVM) algorithm is explained breifly and implemented for the two-level GSC. MATLAB/SIMULINK (R2015a) software validates the proposed control scheme for GSC.
Volume: 16
Issue: 3
Page: 1027-1033
Publish at: 2018-06-01

Transceiver Design for MIMO Systems with Individual Transmit Power Constraints

10.11591/ijece.v8i3.pp1583-1595
Raja Muthalagu
This paper investigate the transceiver design for single-user multiple-input multipleoutput system (SU-MIMO). Joint transceiver design with an improper modulation is developed based on the minimum total mean-squared error (TMSE) criterion under two different cases. One is equal power allocation (EPA) and other is the power constraint that jointly meets both EPA and total transmit power constraint (TTPC) (i.e ITPC). Transceiver is designed based on the assumption that both the perfect and imperfect channel state information (CSI) is available at both the transmitter and receiver. The simulation results show the performance improvement of the proposed work over conventional work in terms of bit error rate (BER).
Volume: 8
Issue: 3
Page: 1583-1595
Publish at: 2018-06-01

Multiwavelength Fiber Laser based on Bidirectional Lyot Filter in Conjunction with Intensity Dependent Loss Mechanism

10.11591/ijeecs.v10.i3.pp840-846
A. H. Sulaiman , N. Md. Yusoff , N. A. Cholan , M. A. Mahdi
We experimentally demonstrate a multiwavelength fiber laser (MWFL) based on bidirectional Lyot filter. A semiconductor optical amplifier (SOA) is used as the gain medium, while its combination with polarization controllers (PCs) and polarization beam combiner (PBC) induces intensity dependent loss (IDL) mechanism. The IDL mechanism acts as an intensity equalizer to flatten the multiwavelength spectrum, which can be obtained at a certain polarization state. Using different ratio of optical splitter has affected to multiwavelength flatness degradation. Subsequently, when we removed a polarizer in the setup, the extinction ratio (ER) is decreased. Ultimately, with two segments of polarization maintaining fiber (PMF), two channel spacings can be achieved due to splicing shift of 0° and 90°.
Volume: 10
Issue: 3
Page: 840-846
Publish at: 2018-06-01

Application Development Risk Assessment Model Based on Bayesian Network

10.12928/telkomnika.v16i3.7288
Jaka; Institut Teknologi Bandung Sembiring , Johan P.; BPS, Statistics of Tapanuli Utara Regency Sipayung , Arry A.; Institut Teknologi Bandung Arman
This paper describes a new risk assessment model for application development and its implementation. The model is developed using a Bayesian network and Boehm’s software risk principles. The Bayesian network is created after mapping top twenty risks in software projects with interrelationship digraph of risk area category. The probability of risk on the network is analyzed and validated using both numerical simulation and subjective probability from several experts in the field and a team of application developers. After obtaining the Bayesian network model, risk exposure is calculated using Boehm's risk principles. Finally, the implementation of the proposed model in a government institution is shown as a real case illustration.
Volume: 16
Issue: 3
Page: 1376-1385
Publish at: 2018-06-01

ETDCC: Energy-Efficient Transmission Scheme for Dynamic Climatic Conditions in WSN

10.12928/telkomnika.v16i3.8513
Sunil; Motilal Nehru National Institute of Technology Allahaba Kumar , Prateek Raj; Motilal Nehru National Institute of Technology Allahaba Gautam , Tarique; Motilal Nehru National Institute of Technology Allahaba Rashid , Akshay; Motilal Nehru National Institute of Technology Allahaba Verma , Arvind; Motilal Nehru National Institute of Technology Allahaba Kumar
In this paper, an energy-efficient transmission scheme for dynamic climatic conditions (ETDCC) has been proposed in wireless sensor networks (WSNs). This scheme is based on IEEE802.15.4 standard. In this method, open-loop and closed-loop feedback systems are used for snowfall variation. An open-loop system is utilized for snowfall-aware link quality compensation and estimation. However, closed-loop system aids to split the network into two logical regions, resulting the overhead of total control packets is minimized. According to link quality changes due to snowfall variation, the transmitting power is decided on the basis of current number of neighbor nodes and threshold power loss for each region. The simulated results depict that the proposed scheme with reduced control packets overhead adjusts transmitting power level (Plevel) to compensate link quality. This scheme based on threshold level is compared with the conventional approach that comprises the division of regions without threshold level.
Volume: 16
Issue: 3
Page: 1126-1134
Publish at: 2018-06-01

Wavelet-Based Color Histogram on Content-Based Image Retrieval

10.12928/telkomnika.v16i3.7771
Alexander; Bina Nusantara University Alexander , Jeklin; Bina Nusantara University Harefa , Yudy; Bina Nusantara University Purnama , Harvianto; Bina Nusantara University Harvianto
The growth of image databases in many domains, including fashion, biometric, graphic design, architecture, etc. has increased rapidly. Content Based Image Retrieval System (CBIR) is a technique used for finding relevant images from those huge and unannotated image databases based on low-level features of the query images. In this study, an attempt to employ 2nd level Wavelet Based Color Histogram (WBCH) on a CBIR system is proposed. Image database used in this study are taken from Wang’s image database containing 1000 color images. The experiment results show that 2nd level WBCH gives better precision (0.777) than the other methods, including 1st level WBCH, Color Histogram, Color Co-occurrence Matrix, and Wavelet texture feature. It can be concluded that the 2nd Level of WBCH can be applied to CBIR system.
Volume: 16
Issue: 3
Page: 1256-1263
Publish at: 2018-06-01

Power Estimation for Wearable Piezoelectric Energy Harvester

10.12928/telkomnika.v16i3.9034
Noor Hazrin Hany; University Malaysia Mohamad Hanif , Mohd Zulhilmi; University Malaysia Zain , Mas Ehsan; University Malaysia Rohaimie , Huda; University Malaysia Azam
The aim of this research work is to estimate the amount of electricity produced to power up wearable devices using a piezoelectric actuator, as an alternative to external power supply. A prototype of the device has been designed to continuously rotate a piezoelectric actuator mounted on a cantilever beam. A MATLAB® simulation was done to predict the amount of power harvested from human kinetic energy. Further simulation was conducted using COMSOL Multiphysics® to model a cantilever beam with piezoelectric layer. With the base excitation and the presence of tip mass at the beam, the natural frequencies and mode shapes have been analyzed to improve the amount of energy harvested. In this work, it was estimated that a maximum amount of power that could be generated is 250 μW with up to 5.5V DC output. The outcome from this research works will aid in optimising the design of the energy harvester. This research work provides optimistic possibility in harvesting sufficient energy required for wearable devices.
Volume: 16
Issue: 3
Page: 983-988
Publish at: 2018-06-01

A Cooperative Cache Management Scheme for IEEE802.15.4 based Wireless Sensor Networks

10.11591/ijece.v8i3.pp1701-1710
Piyush Charan , Tahsin Usmani , Rajeev Paulus , Syed Hasan Saeed
Wireless Sensor Networks (WSNs) based on the IEEE 802.15.4 MAC and PHY layer standards is a recent trend in the market. It has gained tremendous attention due to its low energy consumption characteristics and low data rates. However, for larger networks minimizing energy consumption is still an issue because of the dissemination of large overheads throughout the network. This consumption of energy can be reduced by incorporating a novel cooperative caching scheme to minimize overheads and to serve data with minimal latency and thereby reduce the energy consumption. This paper explores the possibilities to enhance the energy efficiency by incorporating a cooperative caching strategy.
Volume: 8
Issue: 3
Page: 1701-1710
Publish at: 2018-06-01

Effect of Dew and Raindrops on Electric Field around EHV Transmission Lines

10.12928/telkomnika.v16i3.5408
Budi; National College Technology of Yogyakarta (STTNAS) Utama , Asniar; National College Technology of Yogyakarta (STTNAS) Aliyu
This paper analyses the change of electric field in the proximity of 500 kV extra high voltage (EHV) transmission lines, in the presence of raindrops and dew. The computations were carried out using MatLab software by solving the electrostatic equations. The analysis depicts that the spatial distribution of the electric field strength varies with water drop content along the lateral distance along the transmission line. The peak electric field reduces with the water drop content, whereas the electric field remains the same at around 36 m from the transmission line. Then onwards the field strength increases with the water drop content. At long distances the field strength is not affected by the water drops. Such variation is highly important to analyse the adverse effects on the insulators used in HV applications. The results are of high significance to a country such as Indonesia where the precipitation levels are generally high in most parts of the country.
Volume: 16
Issue: 3
Page: 974-982
Publish at: 2018-06-01

Comprehensive Pineapple Segmentation Techniques with Intelligent Convolutional Neural Network

10.11591/ijeecs.v10.i3.pp1098-1105
Muhammad Azmi Ahmed Nawawi , Fatimah Sham Ismail , Hazlina Selamat
This paper proposes an intelligent segmentation technique for pineapple fruit using Convolutional Neural Network (CNN). Cascade Object Detector (COD) method is used to detect the position of the pineapple from the captured image by returning the bounding box around the detecting pineapple. Image background such as ground, sky and other unwanted objects have been removed using Hue value, Adaptive Red and Blue Chromatic Map (ARB) and Normalized Difference Index (NDI) methods. However, the ARB and NDI methods are still producing misclassified error and the edge is not really smooth. In this case Template Matching Method (TMM) has been implemented for image enhancement process. Finally, an intelligent CNN is developed as a decision maker to select the best segmentation image ouput from ARB and NDI. The results obtained show that the proposed intelligent method has successfully verified the fruit from the background with high accuracy as compared to the conventional method.
Volume: 10
Issue: 3
Page: 1098-1105
Publish at: 2018-06-01
Show 1303 of 1851

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration