Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

27,544 Article Results

Evaluation of Energy in Wind Turbine System Using Probability Distribution

10.11591/ijeecs.v9.i2.pp294-298
Kalyan Sagar Kadali , L Rajaji
In this work, annual energy output of a variable speed wind turbine is analyzed using annual Weibull wind speed probability distribution function. The power coefficient variety with tip speed proportion in torque control district and pitch point variety for most extreme power yield from wind turbine are examined for distinguishing control framework parameters. The wind turbine power output and variation of power coefficient with tip speed ratio as well as pitch angle are examined / reported using annual Wei bull distribution function. Finally the variation of the estimated annual energy output of the given wind turbine with the mean wind speed is presented.
Volume: 9
Issue: 2
Page: 294-298
Publish at: 2018-02-01

Data Transmission Analysis using MW-5000 at 5.8 GHz Frequency

10.11591/ijece.v8i1.pp254-258
Abu Bakar Ibrahim , Ashardi Abas
In the recent years, the data communication system become the main type of communication in the world. The FSK modulator or demodulator is one of the part that becomes the most important part and extremely advanced with the involvement of microwave active and passive circuits. This paper presents the data transmission analysis using MW-5000 at 5.8 GHz frequency. This experiment use the microwave communication module MW-5000 that is available in electronic laboratory. From this experiment the duration taken for the transmission of data is depend on the length of sentence and the value of baud rate.
Volume: 8
Issue: 1
Page: 254-258
Publish at: 2018-02-01

Moth Flame Optimization Method for Unified Power Quality Conditioner Allocation

10.11591/ijece.v8i1.pp530-537
M. Laxmidevi Ramanaiah , M. Damodar Reddy
This paper introduces a new optimization method to determine the optimal allocation of Unified Power Quality Conditioner (UPQC) in the distribution systems. UPQC is a versatile Custom Power Device (CPD) to solve problems related to voltage and current by the series and shunt compensator in the distribution systems. The task of UPQC highlighted in this paper is the required load reactive power is provided by both the series and shunt compensators. The UPQC’s steady state compensation capability has given a solution for providing reactive power compensation in large distribution systems. The optimization method adopted is Moth Flame Optimization (MFO). The best location and series compensator voltage are determined using MFO. The voltage injected by the series compensator and reactive power injected by the shunt compensator is incorporated in the load flow method. The effectiveness of the proposed method is validated with standard distribution systems.
Volume: 8
Issue: 1
Page: 530-537
Publish at: 2018-02-01

Design and Implement a Hybrid WebRTC Signalling Mechanism for Unidirectional & Bi-directional Video Conferencing

10.11591/ijece.v8i1.pp390-399
Naktal Edan , Ali Al-Sherbaz , Scott Turner
WebRTC (Web Real-Time Communication) is a technology that enables browser-to-browser communication. Therefore, a signalling mechanism must be negotiated to create a connection between peers. The main aim of this paper is to create and implement a WebRTC hybrid signalling mechanism named (WebNSM) for video conferencing based on the Socket.io (API) mechanism and Firefox. WebNSM was designed over a combination of different topologies, such as simplex, star and mesh. Therefore it offers several communications at the same time as one-to-one (unidirectional/bidirectional), one-to-many (unidirectional) and many-to-many (bi-directional) without any downloading or installation. In this paper, WebRTC video conferencing was accomplished via LAN and WAN networks, including the evaluation of resources in WebRTC like bandwidth consumption, CPU performance, memory usage, Quality of Experience (QoE) and maximum links and RTPs calculation. This paper presents a novel signalling mechanism among different users, devices and networks to offer multi-party video conferencing using various topologies at the same time, as well as other typical features such as using the same server, determining room initiator, keeping the communication active even if the initiator or another peer leaves, etc. This scenario highlights the limitations of resources and the use of different topologies for WebRTC video conferencing.
Volume: 8
Issue: 1
Page: 390-399
Publish at: 2018-02-01

Extended FTOPSIS with Distance and Set Theoretic-Based Similarity Measure

10.11591/ijeecs.v9.i2.pp387-394
Nor Hashimah Sulaiman , Daud Mohamad , Jamilah Mohd Shariff , Sharifah Aniza Sayed Ahmad , Kamilah Abdullah
Comparing fuzzy numbers is an essential process in deducing the output of many fuzzy decision making methods. One of the comparison methods commonly used is by using similarity measure. The main advantage of the similarity measure over other approaches is its ability to minimize the loss of information in the computational process. Several similarity measures have been applied effectively in fuzzy decision making methods. In this paper, a new similarity measure based on the geometric distance, the center of gravity, Hausdorf distance and the set theoretic similarity formula known as the Dice similarity index are incorporated into the Extended Fuzzy Technique for Order Preference by Similarity to Ideal Solution (FTOPSIS) method particularly in calculating the closeness coefficients. This similarity measure is in favor of others as it is able to discriminate two similar shape fuzzy numbers effectively with two different locations. A validation process is carried out by implementing the proposed procedure of the Extended FTOPSIS with the new similarity measure in solving a supplier selection problem and the ranking outcome is then compared with the Extended FTOPSIS with other existing similarity measure. The result shows that the Extended FTOPSIS with the proposed similarity measure gives a consistent result without reducing any information in the computational process.
Volume: 9
Issue: 2
Page: 387-394
Publish at: 2018-02-01

Alternative Methods for Forecasting Variations in Hospital Bed Admission

10.11591/ijeecs.v9.i2.pp410-416
S. Sarifah Radiah Shariff , Mohd Azuan Suhaimi , Siti Meriam Zahari , Zuraidah Derasit
The Malaysian healthcare system is well-being recognized for providing a wide range of access to primary healthcare. The number of hospitals is found to be growing in line with the increase in population. However, over-crowding has become the most common scene that people see in every hospital. The number of  patients being admitted may  somehow  mislead  healthcare planners,  and  thus  causing  them  to  underestimate  the  resources  that  are  required  within  the  hospital. Thus, this study aims to identify better forecasting models for variations in hospital bed admission considering State Space Model (SSM). Data on the admission rate of a state hospital was collected, spanning the period of historical data from 2001 until 2015. The findings indicate that State Space model can outperform common model due to its lower Mean Squared Errors. Female aged between 25 -34 years old are found to be having the highest variation, which could lead to unpredictable in terms of being admitted to hospital.
Volume: 9
Issue: 2
Page: 410-416
Publish at: 2018-02-01

Improvement of Data Security Using Mixcolumn

10.11591/ijeecs.v9.i2.pp361-364
Singh Poja Ramesh , Santhosh Kumar Singh
Advanced Encryption Standard is the security based algorithm used to protect the data from the attackers.In this paper, Optimized Inverse MixColumn transformation has been designed with the help of Xtime multiplication process. Xtime multiplication performs the multiplication function for ‘m X m’ data; results will be m-bit data. Further the complexity of Xtime multiplication process has been identified and re-designed with the help of effective CSE techniques. Developed Reduced Xtime based optimized Inverse MixColumn transformation provide better performances than traditional Xtime based Inverse MixColumn multiplication.
Volume: 9
Issue: 2
Page: 361-364
Publish at: 2018-02-01

Efficient Data Assumption and Optimization of Analog Response Communication Systems

10.11591/ijeecs.v9.i2.pp269-270
Prasanna Moorthi N , V Mathivanan
This paper is focused on the examination of connection between the premier remote reason exactitude of transmission information and qualities for driving edge correspondence structures and straightforward data cesium (AFCS) identified with transmission of signs from fundamental sources. It's displayed that the mean sq. oversight of transmission picks information properties of AFCS. Varieties between the cutoff purposes of AFCS thought of as summed up correspondence channel and their forward channel square measure investigated. The new impacts appearing in incredible AFCS and in DCS working near Shannon's cutoff square measure thought of also. Amid this works advanced and essential correspondence frameworks were thought of with none inclinations and no confirmation that the use of simple cesium is frequently less able than modernized correspondence structures had been given start inside the no in this way far off past. The secured comes about unambiguously showed the capacity of simple data cesium to transmit the signs while not committal to composing with to a little degree rate up to the uttermost ranges of the forward control.
Volume: 9
Issue: 2
Page: 269-270
Publish at: 2018-02-01

Performance Of Full-Duplex One-Way And Two-Way Cooperative Relaying Networks

10.11591/ijeecs.v9.i2.pp526-538
Arunmozhi Sinouvassane , Nagarajan G
The wireless research requires concurrent transmission and reception in a single time/frequency channel with good spectral efficiency. The Full duplex system is the alternate for the conventional half duplex systems. An investigation on the need for a full duplex two way (FD-TWR) and one way relaying (FD-OWR) to improve the performance of outage probability and average rate employing amplify-and-forward (AF) and decode-and-forward (DF) protocol is considered. Further the relaying systems performance under the network coding schemes is taken into consideration. The outage probability and average rate of FD-TWR and FD-OWR using a physical layer network coding was performed. In contrast to “straightforward” network coding which performs arithmetic function on digital bit streams after information have been received. The result shows the DF protocol achieves better outage probability and average rate, when compared to the AF protocol. And comparing the full duplex schemes like FD-TWR and FD-OWR, it is found that the FD-TWR achieves better outage probability and average rate, when compared to the FD-OWR. The performance was extended with different loop interference among the relay antennas. The performance show that FD-TWR performs well even in spite of loop interference. 
Volume: 9
Issue: 2
Page: 526-538
Publish at: 2018-02-01

Explanatory Server Protection Problem for Automated Wireless System

10.11591/ijeecs.v9.i2.pp302-305
Singh Poja Ramesh , Santhosh Kumar Singh
Many sorts of servers exists which incorporates both openly available servers and inside servers, for example, mail servers, web servers, application servers, assemble and test servers and so forth., that store numerous private and delicate data. Giving security to such servers has turned out to be one of the center necessities in this day and age as they are under danger of assault. The information put away on the server can go from hierarchical data, for example, classified client related records, extend subtle elements, company's product source code to private media data, individual information, national security related data, patients database, address papers of the focused exams and so forth. On the off chance that such delicate information gets into wrong hands, it can be abused. Along these lines the business and the notoriety of the association would beat stake. It can likewise posture risk to countries. The fundamental reasons of security break in servers is because of the utilization of versatile stockpiling gadgets, for example, pen drives, hard circles, and so on., which can be potential transporters of malware and Trojans. At the point when tainted by such infection, these compact stockpiling gadgets can bring about serious harm. Physically keeping up and securing servers would be extremely troublesome and can likewise prompt tremendous authoritative overhead. Henceforth the requirement for computerized security system to distinguish, keep and shield the servers from the aggressors. Security strategies assume a critical part in keeping the trade off of system security which would influence the server security.
Volume: 9
Issue: 2
Page: 302-305
Publish at: 2018-02-01

Performance Analysis of Uplink Scheduling Algorithms in LTE Networks

10.11591/ijeecs.v9.i2.pp373-379
Shafinaz Bt Ismail , Darmawaty Bt Mohd Ali , Norsuzila Ya’acob
Scheduling is referring to the process of allocating resources to User Equipment based on scheduling algorithms that is located at the LTE base station. Various algorithms have been proposed as the execution of scheduling algorithm, which represents an open issue in Long Term Evolution (LTE) standard. This paper makes an attempt to study and compare the performance of three well-known uplink schedulers namely, Maximum Throughput (MT), First Maximum Expansion (FME), and Round Robin (RR). The evaluation is considered for a single cell with interference for three flows such as Best effort, Video and VoIP in a pedestrian environment using the LTE-SIM network simulator. The performance evaluation is conducted in terms of system throughput, fairness index, delay and packet loss ratio (PLR). The simulations results show that RR algorithm always reaches the lowest PLR, delivering highest throughput for video and VoIP flows among all those strategies. Thus, RR is the most suitable scheduling algorithm for VoIP and video flows while MT and FME is appropriate for BE flows in LTE networks.
Volume: 9
Issue: 2
Page: 373-379
Publish at: 2018-02-01

Active and Reactive Power Scheduling Optimization using Firefly Algorithm to Improve Voltage Stability under Load Demand Variation

10.11591/ijeecs.v9.i2.pp365-372
Mohamad Khairuzzaman Mohamad Zamani , Ismail Musirin , Halim Hassan , Sharifah Azwa Shaaya , Shahril Irwan Sulaiman , Nor Azura Md. Ghani , Saiful Izwan Suliman
This paper presents active and reactive power scheduling using firefly algorithm (FA) to improve voltage stability under load demand variation. The study involves the development of firefly optimization engine for power scheduling process involving the active and reactive power for wind generator. The scheduling optimization of wind generator is tested by using IEEE 30-Bus Reliability Test System (RTS). Voltage stability of the system is assessed based in a pre-developed voltage stability indicator termed as fast voltage stability index (FVSI). This study also considers the effects on the loss and voltage profile of the system resulted from the optimization, where the FVSI value at the observed line, minimum voltage of the system and loss were monitored during the load increment. Results obtained from the study are convincing in addressing the scheduling of power in wind generator. Implementation of FA approach to solve power scheduling revealed its flexibility and feasible for solving larger system within different objective functions.This paper presents active and reactive power scheduling using firefly algorithm (FA) to improve voltage stability under load demand variation. The study involves the development of firefly optimization engine for power scheduling process involving the active and reactive power for wind generator. The scheduling optimization of wind generator is tested by using IEEE 30-Bus Reliability Test System (RTS). Voltage stability of the system is assessed based in a pre-developed voltage stability indicator termed as fast voltage stability index (FVSI). This study also considers the effects on the loss and voltage profile of the system resulted from the optimization, where the FVSI value at the observed line, minimum voltage of the system and loss were monitored during the load increment. Results obtained from the study are convincing in addressing the scheduling of power in wind generator. Implementation of FA approach to solve power scheduling revealed its flexibility and feasible for solving larger system within different objective functions.
Volume: 9
Issue: 2
Page: 365-372
Publish at: 2018-02-01

Full C-Band Tunable V-Cavity-Laser based TOSA and SFP Transceiver Modules

10.11591/ijeecs.v9.i2.pp327-331
Saravanan K , V Mathivanan
We report the latest development in tunable transmitter optical sub-assembly (TOSA) and small form-factor pluggable (SFP) transceivers based on simple and compact V-cavity laser (VCL), aiming for low-cost deployment in metro, access and data center networks. The VCL employs a half-wave coupler to achieve high side-mode suppression ratio (SMSR) and the Vernier effect to achieve a wide wavelength tuning range. Full C-band tuning from 1529.55-nm to 1566.31-nm with SMSR above 36 dB is demonstrated. Since the laser does not involve any grating or epitaxial regrowth, and has a simple tuning algorithm, it allows simpler processes for fabrication and testing as compared to other widely tunable laser structures. Compact TOSAs and SFP transceiver modules have been developed for full C-band tuning with up to 93 channels at 50 GHz spacing. Transmission experiments are carried out for direct modulation with data rates from 2.5 Gbps to 8.5 Gbps. The results of reliability tests of the modules are also presented.
Volume: 9
Issue: 2
Page: 327-331
Publish at: 2018-02-01

Heuristic Based Power Consumption Minimisation and Optimisation on Smartphones

10.11591/ijeecs.v9.i2.pp345-346
Suresh G B , D Mathivanan
In the direction of capable save the energy of battery life in Smartphone accurate with sensible influence form of Wi-Fi data communication in infrastructure mode. The network environment parameters like still time in a 3G system the network throughput and the convey pattern have been accepted all through measurement study the collective impact of an issue has not been systematical.
Volume: 9
Issue: 2
Page: 345-346
Publish at: 2018-02-01

Design and Implementation Intelligent Adaptive Front-lighting System of Automobile using Digital Technology on Arduino Board

10.11591/ijece.v8i1.pp521-529
H. Dahou , R. El Gouri , Mohammed Alareqi , K. Mateur , A. Mezouari , A. Zemmouri , L. Hlou
The automatic light AFS (Adaptive Front - Lighting System) is added to the capabilities of modern vehicles that will improve the safety of vehicle drivers and passengers traveling at night. A new architecture of the AFS has proposed in this paper. This architecture is powerful and intelligent using the PWM technique on ARDUINO Board replaces the old mechanical system based on stepper motors.
Volume: 8
Issue: 1
Page: 521-529
Publish at: 2018-02-01
Show 1329 of 1837

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration