Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

27,762 Article Results

Performance Comparison of Controllers for Suppressing the Structural Building Vibration

10.11591/ijeecs.v10.i2.pp537-544
Normaisharah Mamat , Fitri Yakub , Sheikh Ahmad Zaki Shaikh Salim , Mohamed Sukri Mat Ali
This paper presents the modelling and simulation of controllers for controlling the position of two degree of freedom (2 DOF) mass spring damper system. Proportional integral (PI), fuzzy logic controller (FLC) and sliding mode controller (SMC) are design to minimize the vibration of the system that represent as building structure towards earthquake. A structural building is simulate based on real earthquake occur in El Centro on May 1940. The algorithm for building structure, actuator and controller is derived. Matlab/Simulink is used to analyze the performance of controllers towards the vibration building structure. At the end of the study the time response for two story building for uncontrolled and controlled system is present. Besides, the result for limitation voltage for each controller is also analyse to determine the maximum voltage consume for the system. The simulation results show the comparison of the controllers’ performance in suppressing the building vibration. From performance analysis, SMC provides better performance compared to PI and FLC based on structural vibration reduction.
Volume: 10
Issue: 2
Page: 537-544
Publish at: 2018-05-01

A MIMO H-shape Dielectric Resonator Antenna for 4G Applications

10.11591/ijeecs.v10.i2.pp648-653
S. Salihah , M. H. Jamaluddin , R. Selvaraju , M. N. Hafiz
In this article, a Multiple-Input-Multiple-Output (MIMO) H-shape Dielectric Resonator Antenna (DRA) is designed and simulated at 2.6 GHz for 4G applications. The proposed structure consists of H-shape DRA ( =10) which is mounted on FR4 substrate ( =4.6), and feed by two different feeding mechanisms. First, microstrip with slot coupling as Port 1. Second, coaxial probe as Port 2. The electrical properties of the proposed MIMO H-shape DRA in term of return loss, bandwidth and gain are completely obtained by using CST Microwave Studio Suite Software. The simulated results demonstrated a return loss more than 20 dB, an impedance bandwidth of 26 % (2.2 – 2.9 GHz), and gain of 6.11 dBi at Port 1. Then, a return loss more than 20 dB, an impedance bandwidth of 13 % (2.2 – 2.7 GHz), and gain of 6.63 dBi at Port 2. Both ports indicated impedance bandwidth more than 10 %, return loss lower than 20 dB, and gain more than 10 dBi at 2.6 GHz. The simulated electrical properties of the proposed design show a good potential for LTE applications.
Volume: 10
Issue: 2
Page: 648-653
Publish at: 2018-05-01

Intelligent Packet Delivery in Router Using Structure Optimized Neural Network

10.11591/ijeecs.v10.i2.pp545-553
R. Deebalakshmi , V. L. Jyothi
The Internet itself is a worldwide network connecting millions of computers and less significant networks. Computers communicated by routers. Crucial the role of a router is to our technique of communicating and computing. Routers are situated at gateways, the spaces where two or more networks connect, and are the decisive device that keeps data flow between networks and keeps the networks connected to the Internet. When data is sent between places on one network or from one network to a second network the data is always seen and intended for to the proper place by the router. The router carries out this by using headers and routing tables to establish the best path for routing the data packets. This trim down the effectiveness of edge router only when the path engaged, it will enhanced by classification method, predictable classification methods like port based ,deep packet inspection and  statistical classification are give less precision. In this system structured optimized neural network is used for more precise organization. Classification output forwarded to router dynamically for intellectual packet delivery. The method will improve router competence by greater than before throughput and decreased latency.The Internet itself is a worldwide network connecting millions of computers and less significant networks. Computers communicated by routers. Crucial the role of a router is to our technique of communicating and computing. Routers are situated at gateways, the spaces where two or more networks connect, and are the decisive device that keeps data flow between networks and keeps the networks connected to the Internet. When data is sent between places on one network or from one network to a second network the data is always seen and intended for to the proper place by the router. The router carries out this by using headers and routing tables to establish the best path for routing the data packets. This trim down the effectiveness of edge router only when the path engaged, it will enhanced by classification method, predictable classification methods like port based ,deep packet inspection and  statistical classification are give less precision. In this system structured optimized neural network is used for more precise organization. Classification output forwarded to router dynamically for intellectual packet delivery. The method will improve router competence by greater than before throughput and decreased latency.
Volume: 10
Issue: 2
Page: 545-553
Publish at: 2018-05-01

Maximally Spatial-Disjoint Lightpaths in Optical Networks

10.11591/ijeecs.v10.i2.pp733-740
M. Waqar Ashraf , Sevia M. Idrus , Farabi Iqbal
Lightpaths enable end-to-end all-optical transmission between network nodes. For survivable routing, traffic is often carried on a primary lightpath, and rerouted to another disjointed backup lightpath in case of the failure of the primary lightpath. Though both lightpaths can be physically disjointed, they can still fail simultaneously if a disaster affects them simultaneously on the physical plane. Hence, we propose a routing algorithm for provisioning a pair of link-disjoint lightpaths between two network nodes such that the minimum spatial distance between them (while disregarding safe regions) is maximized. Through means of simulation, we show that our algorithm can provide higher survivability against spatial-based simultaneous link failures (due to the maximized spatial distance).
Volume: 10
Issue: 2
Page: 733-740
Publish at: 2018-05-01

High Potential of Magnet on the Performance of Dual Piezoelectric Fans in Electronics Cooling System

10.11591/ijeecs.v10.i2.pp469-479
Abdul Razak Fadhilah , Robiah Ahmad , Sarip Shamsul
Recently, piezoelectric fan has gained attention as potential active cooling method for electronics devices. Even though the piezoelectric requires high voltage, there are findings to overcome the shortcomings. Adding on a magnet at the tip of the piezoelectric fan to activate other magnetic passive fans is one of the methods to increase the total amplitude generated by the fans. This paper will discuss on the performance of integrated piezoelectric fan with passive fans (later refer to magnetic fans) to enhance the heat transfer in cooling system. A repulsive force produced by the magnets will cause the magnetic blades to oscillate together with the piezoelectric fan. The paper will focus on the optimization parameters of the magnets for selected dimension of piezoelectric fan. The parameters under investigation are the position of the magnet on the piezoelectric fan, number of magnets on each blades and orientation of blades with respect to adjacent blade. Results show that the magnet at middle location of extensive blade with double magnets generate the largest amplitude, 80% better than fan without magnet and for dual integrated piezoelectric fan with magnetic fan, radial orientation gives better result by 25%. By increasing the total amplitude using magnetic force, power consumption can be reduced while the heat transfer performance can be enhanced. it shows a good agreement for positive heat transfer and thermal resistance improvement compared to natural convection.
Volume: 10
Issue: 2
Page: 469-479
Publish at: 2018-05-01

Improving the Cost Factor of DLBCA Lightweight Block Cipher Algorithm

10.11591/ijeecs.v10.i2.pp786-791
Sufyan Salim Mahmood AlDabbagh , Alyaa Ghanim Sulaiman , Imad Fakhri Taha Al Shaikhli , Khalid Abdulkareem Al-Enezi , Abdulrahman Yousef Alenezi
The needing to secure information in restricted environments is very important so that lightweight block cipher algorithm is suitable for these environments. This paper improved DLBCA algorithm by decreasing the cost factor through using the less number of S-boxes. Also, differential and boomerang attacks have been applied in this paper. Finally, all the results have been presented
Volume: 10
Issue: 2
Page: 786-791
Publish at: 2018-05-01

Edge Dissimilarity Reduced-Reference Quality Metric with Low Overhead Bitrate

10.11591/ijeecs.v10.i2.pp631-640
Farah Diyana Abdul Rahman , Dimitris Agrafiotis , Ahmad Imran Ibrahim
In multimedia transmission, it is important to rely on an objective quality metric which accurately represents the subjective quality of processed images and video sequences. Reduced-reference metrics make use of side-information that is transmitted to the receiver for estimating the quality of the received sequence with low complexity. In this paper, an Edge-based Dissimilarity Reduced-Reference video quality metric with low overhead bitrate is proposed. The metric is evaluated by finding the dissimilarity between the edge information of original and distorted sequences. The edge degradation can be detected in this manner as perceived video quality is highly associated with edge structural. Due to the high overhead using the Soergel distance, it is pertinent to find a way to reduce the overhead while maintaining the edge information that can convey the quality measure of the sequences. The effects of different edge detection operator, video resolution and file compressor are investigated. The aim of this paper is to significantly reduce the bitrate required in order to transmit the side information overhead as the reduced reference video quality metric. From the results obtained, the side information extracted using Sobel edge detector maintained consistency throughout the reduction of spatial and temporal down-sample.
Volume: 10
Issue: 2
Page: 631-640
Publish at: 2018-05-01

A Effective Cross Layer Multi-Hop Routing Protocol for Heterogeneous Wireless Sensor Network

10.11591/ijeecs.v10.i2.pp664-671
Manisha R. Dhage , Srikanth Vemuru
In today’s scenario to solve the real world problem heterogeneous wireless sensor is necessary. It consists of different sensor with different sensing capability and different energy level. Routing is important task in HWSN from energy dissipation point of view. In HWSN many routing protocols were proposed but many protocols are for single hop communication between cluster head and sink. Here we have designed multi-hop routing protocol for HWSN, which will be energy efficient and also solve the problem of hot spot using unequal clustering. To make this protocol more energy efficient cross layer information exchange approach is used. Using cross layer communication this protocol will get residual energy, quality of link and neighboring nodes information and this information is used in cluster head selection. Moreover there is no need to do broadcast of residual energy for every round because of RDA (regular data acquisition) nodes. We can predict the energy consumption of node, which will conserve the energy using Energy Efficient Fuzzy Based Cross Layer Protocol (EEFCLP). This proposed protocol can achieve longer sensor lifetime and more energy efficiency.
Volume: 10
Issue: 2
Page: 664-671
Publish at: 2018-05-01

Multivariable Parametric Modeling of a Greenhouse by Minimizing the Quadratic Error

10.12928/telkomnika.v16i2.8486
Mohamed; University of Sultan Essahafi , Mustapha Ait; University of Sultan Lafkih
This paper concerns the identification of a greenhouse described in a multivariable linear system with two inputs and two outputs (TITO). The method proposed is based on the least squares identification method, without being less efficient, presents an iterative calculation algorithm with a reduced computational cost. Moreover, its recursive character allows it to overcome, with a good initialization, slight variations of parameters, inevitable in a real multivariable process. A comparison with other methods recently proposed in the literature demonstrates the advantage of this method. Simulations obtained will be exposed to showthe effectiveness and application of the method on multivariable systems.
Volume: 16
Issue: 2
Page: 641-647
Publish at: 2018-04-18

Qualitative Assessment on Effectiveness of Security Approaches towards Safeguarding NFC Devices & Services

10.11591/ijece.v8i2.pp1214-1221
Anusha R , Veena Devi Shastrimat V
The increasing pace in the wireless communication taking momentum in the market of commercial application where a significant trade-off between user-experience and security demands exists. The Near Field Communication or NFC is one such communication trend which is effectively adopted by the user worldwide to make touchless operation using their mobile device. Although, it is claimed that NFC incorporates some of the standard encryption but existing researchers fails to prove that their electromagnetic signals are not so difficult to compromise to result in collateral damage to user's resources. Thus, there exist research work towards strengthing security system, but there is yet to report on any standard security protocol or framework to ensure the highest resiliency. This paper provides a comprehensive visualization towards the effectiveness of existing research approaches to formulate the research trend and gap.
Volume: 8
Issue: 2
Page: 1214-1221
Publish at: 2018-04-01

Workflow Scheduling Techniques and Algorithms in IaaS Cloud: A Survey

10.11591/ijece.v8i2.pp853-866
K. Kalyana Chakravarthi , Vaidhehi Vijayakumar
In the modern era, workflows are adopted as a powerful and attractive paradigm for expressing/solving a variety of applications like scientific, data intensive computing, and big data applications such as MapReduce and Hadoop. These complex applications are described using high-level representations in workflow methods. With the emerging model of cloud computing technology, scheduling in the cloud becomes the important research topic. Consequently, workflow scheduling problem has been studied extensively over the past few years, from homogeneous clusters, grids to the most recent paradigm, cloud computing. The challenges that need to be addressed lies in task-resource mapping, QoS requirements, resource provisioning, performance fluctuation, failure handling, resource scheduling, and data storage. This work focuses on the complete study of the resource provisioning and scheduling algorithms in cloud environment focusing on Infrastructure as a service (IaaS). We provided a comprehensive understanding of existing scheduling techniques and provided an insight into research challenges that will be a possible future direction to the researchers.
Volume: 8
Issue: 2
Page: 853-866
Publish at: 2018-04-01

Avoidance of Over Speed Through Intelligent Speed Breaking System

10.11591/ijict.v7i1.pp13-15
M S Satyanarayana , Aruna T M , Divya G N
Accidents have become major issue in Developing countries like India now a day. As per the Surveys 60% of the accidents are happening due to over speed. Though the government has taken so many initiatives like Traffic Awareness & Driving Awareness Week etc.., but still the percentage of accidents are not getting reduced. In this paper a new technique has been introduced in order to reduce the percentage of accidents. The new technique is implemented using the concept of Intelligent Speed Braking System. The Intelligent Speed Braking systems can be implemented any where essential in order to avoid the accidents. The main objective of this system is to calculate the speed of the vehicle at three different locations based on the place where the vehicle speed has to be controlled and if the speed is greater than the designated speed in that road then it will automatically open up the speed breaker to control the speed of the vehicle. If the speed is less or equal to the designated speed in that road then the vehicle will be passed without any disturbance. This system though it won’t avoid 100% accidents at least it will reduce the percentage of accidents. This is system is not only to avoid accidents it will also intelligently controls the speed of the vehicles and creates awareness amongst the drivers.
Volume: 7
Issue: 1
Page: 13-15
Publish at: 2018-04-01

Routing Design Issues in Heterogeneous Wireless Sensor Network

10.11591/ijece.v8i2.pp1028-1039
Manisha R. Dhage , Srikanth Vemuru
WSN has important applications such as habitat monitoring, structural health monitoring, target tracking in military and many more. This has evolved due to availability of sensors that are cheaper and intelligent but these are having battery support. So, one of the major issues in WSN is maximization of network life. Heterogeneous WSNs have the potential to improve network lifetime and also provide higher quality networking and system services than the homogeneous WSN. Routing is the main concern of energy consumption in WSN. Previous research shows that performance of the network can be improve significantly using protocol of hierarchical HWSN. However, the appropriateness of a particular routing protocol mainly depends on the capabilities of the nodes and on the application requirements. This study presents different aspects of Heterogeneous Wireless Sensor network and design issues for routing in heterogeneous environment. Different perspectives from different authors regarding energy efficiency based on resource heterogeneity for heterogeneous wireless sensor networks have been presented.
Volume: 8
Issue: 2
Page: 1028-1039
Publish at: 2018-04-01

A New Scheme of Group-based AKA for Machine Type Communication over LTE Networks

10.11591/ijece.v8i2.pp1169-1181
Mariya Ouaissa , A. Rhattoy
Machine Type Communication (MTC) is considered as one of the most important approaches to the future of mobile communication has attracted more and more attention. To reach the safety of MTC, applications in networks must meet the low power consumption requirements of devices and mass transmission device. When a large number of MTC devices get connected to the network, each MTC device must implement an independent access authentication process according to the 3GPP standard, which will cause serious traffic congestion in the Long Term Evolution (LTE) network. In this article, we propose a new group access authentication scheme, by which a huge number of MTC devices can be simultaneously authenticated by the network and establish an independent session key with the network respectively. Experimental results show that the proposed scheme can achieve robust security and avoid signaling overload on LTE networks
Volume: 8
Issue: 2
Page: 1169-1181
Publish at: 2018-04-01

Ontological MobiHealth System

10.11591/ijeecs.v10.i1.pp309-319
Nasim Khozouie , Faranak Fotouhi-Ghazvini , Behrouz Minaei-Bidgoli
MobiHealth systems are tele-monitoring systems based on BAN (Body Area Network) and mobile health care (m-health) service platform utilizing next generation public wireless networks.  Smart phone applications have self-monitoring and sensing capabilities and are used in health interventions and disease prevention. In this study, a prototype mobile sensing platform was introduced for m-Health and telemedicine applications, which medical sensors on patient body reports biological signals and environmental sensors send environment raw data to base station (smart phone). Then raw data were preprocessed and necessary features (situations) were extracted. In order to context computation and respond with adaptability, we have used ontology-based model.   
Volume: 10
Issue: 1
Page: 309-319
Publish at: 2018-04-01
Show 1317 of 1851

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration