Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

27,544 Article Results

Enhanced Automaton Monitoring Method on Satellite Receiving Position

10.11591/ijeecs.v9.i2.pp289-293
Upadhyay Anand Trilokinath , Santhosh Kumar Singh
Security is an essential need of system and it is one of center innovation of remote controlled system. Robot checking arrangement of sea remote detecting satellite getting station incorporates robot, distributed computing system and remote terminals. Robot procures continuous picture of controlled system and works it; distributed computing system fabricate visual choice subsystem to recognize the objective utilizing wavelet change calculation, neural system calculation and learning database of components video of particular natural; utilizing remote terminal manager watches the controlled system through its scene test system and control robot to work it remotely. Utilizing innovation of the pseudo-irregular number secret word, innovation of shared verification to counteract cloning site, innovation of change between the picture of controlled system and its status code and innovation of transformation between operation codes and operation guidelines, the security quality of the robot observing system is enhanced incredibly.
Volume: 9
Issue: 2
Page: 289-293
Publish at: 2018-02-01

MalayIK: An Ontological Approach to Knowledge Transformation in Malay Unstructured Documents

10.11591/ijece.v8i1.pp1-10
Fatimah Sidi , Iskandar Ishak , Marzanah A. Jabar
The number of unstructured documents written in Malay language is enormously available on the web and intranets. However, unstructured documents cannot be queried in simple ways, hence the knowledge contained in such documents can neither be used by automatic systems nor could be understood easily and clearly by humans. This paper proposes a new approach to transform extracted knowledge in Malay unstructured document using ontology by identifying, organizing, and structuring the documents into an interrogative structured form. A Malay knowledge base, the MalayIK corpus is developed and used to test the MalayIK-Ontology against Ontos, an existing data extraction engine. The experimental results from MalayIK-Ontology have shown a significant improvement of knowledge extraction over Ontos implementation. This shows that clear knowledge organization and structuring concept is able to increase understanding, which leads to potential increase in sharable and reusable of concepts among the community.
Volume: 8
Issue: 1
Page: 1-10
Publish at: 2018-02-01

Classification of The NTEV Problems on The Commercial Building

10.11591/ijeecs.v9.i2.pp380-386
Mohd Abdul Talib Mat Yusoh , Saidatul Habsah Asman , Zuhaila Mat Yasin , Ahmad Farid Abidin
Neutral to Earth Voltage (NTEV) is one of power quality (PQ) problems in the commercial building that need to be resolved.  The classification of the NTEV problems is a method to identify the source types of disturbance in alleviating the problems.  This paper presents the classification of NTEV source in the commercial building which is known as the harmonic, loose termination, and lightning.  The Euclidean, City block, and Chebyshev variables for K-Nearest Neighbor (K-NN) classifying are being utilized in order to identify the best performance for classifying the NTEV problems.  Then, S-Transform (ST) is applied as a pre-processing signal to extract the desired features of NTEV problem for classifier input.  Furthermore, the performance of K-NN variables is validated by using the confusion matrix and linear regression.  The classification results show that all the K-NN variables capable to identify the NTEV problems. While the K-NN results show that the Euclidean and City block variables are well performed rather than the Chebyshev variable.  However, the Chebyshev variable is still reliable as the confusion matrix shows minor misclassification. Then, the linear regression outperformed the percentage close to a perfect value which is hundred percent.
Volume: 9
Issue: 2
Page: 380-386
Publish at: 2018-02-01

A Simplified Design and Modeling of Boost Converter for Photovoltaic Sytem

10.11591/ijece.v8i1.pp141-149
Arjyadhara Pradhan , Bhagabat Panda
The Photovoltaic standalone system is gaining its high importance mostly for rural application like pv water pumping, solar lighting, battery charging etc.Considering environmental effects and scarcity of fossil fuel the trend has developed towards the use of more and more renewable energy.In this paper a basic circuit of boost converter is designed in MATLAB/Simulink with constant dc source voltage. However a comparative study has also been done for the converter connected with pv system directly with the converter connected with mppt tracking technique. Perturb and Observance (P&O) algorithm is implemented for providing the necessary duty pulse and makes the system operate at maximum power point.The boost converter connected with PV system without mppt operates at any other point other then the maximum power point and hence the output voltage decreases.But with mppt the proposed system performs better.
Volume: 8
Issue: 1
Page: 141-149
Publish at: 2018-02-01

Development of Quranic Reciter Identification System using MFCC and GMM Classifier

10.11591/ijece.v8i1.pp372-378
Teddy Surya Gunawan , Nur Atikah Muhamat Saleh , Mira Kartiwi
Nowadays, there are many beautiful recitation of Al-Quran available. Quranic recitation has its own characteristics, and the problem to identify the reciter is similar to the speaker recognition/identification problem. The objective of this paper is to develop Quran reciter identification system using Mel-frequency Cepstral Coefficient (MFCC) and Gaussian Mixture Model (GMM). In this paper, a database of five Quranic reciters is developed and used in training and testing phases. We carefully randomized the database from various surah in the Quran so that the proposed system will not prone to the recited verses but only to the reciter. Around 15 Quranic audio samples from 5 reciters were collected and randomized, in which 10 samples were used for training the GMM and 5 samples were used for testing. Results showed that our proposed system has 100% recognition rate for the five reciters tested. Even when tested with unknown samples, the proposed system is able to reject it.
Volume: 8
Issue: 1
Page: 372-378
Publish at: 2018-02-01

Hybrid Microstrip Diplexer Design for Multi-band WiMAX Application in 2.3 and 3.5 GHz Bands

10.11591/ijece.v8i1.pp576-584
M. A. Sazali , N. A. Shairi , Z. Zakaria
In this paper, a design of hybrid microstrip diplexer is proposed for multi-band Worldwide Interoperability for Microwave Access (WiMAX) application in 2.3 and 3.5 GHz bands. The diplexer consists of a combination of two different filter designs. These filters were designed based on microstripline coupling techniques in order to obtain minimum insertion losses and achieve the desired frequency bandwidth. Therefore, a coupled open loop ring resonator was chosen for the filter design in 2.3 GHz band and a folded coupled line resonator was chosen for the filter design in 3.5 GHz band. Then, these filters were combined with a ring manifold matching network to be a hybrid microstrip diplexer. Based on the results, good agreements were achieved between the simulation and measurement results in terms of insertion loss, return loss and bandwidth in the 2.3 and 3.5 GHz bands.
Volume: 8
Issue: 1
Page: 576-584
Publish at: 2018-02-01

Solar Photovoltaic Power Forecasting in Jordan using Artificial Neural Networks

10.11591/ijece.v8i1.pp497-504
Mohammad H. Alomari , Jehad Adeeb , Ola Younis
In this paper, Artificial Neural Networks (ANNs) are used to study the correlations between solar irradiance and solar photovoltaic (PV) output power which can be used for the development of a real-time prediction model to predict the next day produced power. Solar irradiance records were measured by ASU weather station located on the campus of Applied Science Private University (ASU), Amman, Jordan and the solar PV power outputs were extracted from the installed 264KWp power plant at the university. Intensive training experiments were carried out on 19249 records of data to find the optimum NN configurations and the testing results show excellent overall performance in the prediction of next 24 hours output power in KW reaching a Root Mean Square Error (RMSE) value of 0.0721. This research shows that machine learning algorithms hold some promise for the prediction of power production based on various weather conditions and measures which help in the management of energy flows and the optimisation of integrating PV plants into power systems.
Volume: 8
Issue: 1
Page: 497-504
Publish at: 2018-02-01

Efficient and Secure Resource Allocation and Data Forwarding in Cellular Network

10.11591/ijeecs.v9.i2.pp267-268
Sudha Mishra , A Arivazhagan
Data sharing in networks are now days a challenging one where the source is sending a file to destination, major problem is interference. Once the router is set to search for a path takes too time for identifying a better path to transmit data. The performance is affected due to the time delay of searching path and the interference cause data loss or interruption of transmission. We proposed an overlay router which search better path in short period of time with the help of BJP router. When a sender sends the data, the overlay router contact with BJP router to analyze existing path used to transmit. To ensure a better path and low travelling time will be an efficient way to share the data between source and destination without any interference, low performance and time delay. BJP searches the existing routes that will be low processing time to forward the data sent by the source and received on time by the destination. Whenever a data is been shared between these two: source and destination, overlaying protocol is user to find the shortest path among the existing path search. By using overlay router and BJP router the performance is increased, avoid interference, path identification is solved within short time and provide a better solution for the current environment.
Volume: 9
Issue: 2
Page: 267-268
Publish at: 2018-02-01

Ant Colony Optimization (ACO) based Data Hiding in Image Complex Region

10.11591/ijece.v8i1.pp379-389
Sahib Khan
This paper presents data an Ant colony optimization (ACO) based data hiding technique. ACO is used to detect complex region of cover image and afterward, least significant bits (LSB) substitution is used to hide secret information in the detected complex regions’ pixels. ACO is an algorithm developed inspired by the inborn manners of ant species. The ant leaves pheromone on the ground for searching food and provisions. The proposed ACO-based data hiding in complex region establishes an array of pheromone, also called pheromone matrix, which represents the complex region in sequence at each pixel position of the cover image. The pheromone matrix is developed according to the movements of ants, determined by local differences of the image element’s intensity. The least significant bits of complex region pixels are substituted with message bits, to hide secret information. The experimental results, provided, show the significance of the performance of the proposed method.
Volume: 8
Issue: 1
Page: 379-389
Publish at: 2018-02-01

Development of Mobile Cloud Applications using UML

10.11591/ijece.v8i1.pp596-604
Dong Kwan Kim
With the proliferation of cloud computing technologies, smartphone users are able to use a variety of cloud computing-based mobile services such as games, education, entertainment, and social networking. Despite the popularity of such a mobile cloud computing, the complicated multi-tier system configuration of the mobile application must be one of the major impediments to develop mobile cloud applications. This paper presents development processes and procedures for developing mobile cloud applications by effectively applying Unified Modeling Language (UML), a representative object-oriented modeling language. The paper is intended to enhance the development productivity of the mobile cloud application and to improve the effectiveness of communication between software developers. In addition, we used the Android mobile platform and Amazon Web Service for cloud computing in order to demonstrate the applicability of the proposed approach to systematically apply the UML profiles and diagrams for cloud-based mobile applications.
Volume: 8
Issue: 1
Page: 596-604
Publish at: 2018-02-01

E-Carnet Resumption and Repository System for Bus Line Commuters

10.11591/ijeecs.v9.i2.pp262-264
Sujatha V , E.A. Mary Anitha
E-Carnet Resumption and Repository System for Bus Line Commuters is an ongoing venture which is very useful for the passengers. Resumption can be done using any two id proof and using credit card for paying money. This online bus pass Resumption application will help people to save their time and repository the bus passes without standing in a line for hours near counters. At first individuals need to enlist with the application by submitting points of interest of photograph, address proof, any two id verification and required subtle elements and submit through on the web. The application will verify the details and if all proves are verified then followed by transaction will be held. After that the pass will automatically generating and send it through mail. You can even repository using credit card or wire transfer methods.  This system can be used in bus transport undertaking services. Using the system in government and private sectors can exclude the use of human efforts and saves lot of money and time. This system also used to finding the route for Different places. The route information updates admin control so user trusts the valid paths. User locations are tracking using GPS tracker.
Volume: 9
Issue: 2
Page: 262-264
Publish at: 2018-02-01

Cryptanalysis on Privacy-Aware Two-factor Authentication Protocol for Wireless Sensor Networks

10.11591/ijece.v8i1.pp605-610
Younsung Choi
Das first proposed two-factor authentication combining the smart card and password to resolve the security problems of wireless sensor networks (WSNs). After that, various researchers studied two-factor authentication suitable for WSNs. In user authentication protocols based on the symmetric key approach, a number of elliptic curve cryptography (ECC)-based authentication protocols have been proposed. To resolve the security and efficiency problems of ECC-based two-factor authentication protocols, Jiang et al. proposed a privacy-aware two-factor authentication protocol based on ECC for WSNs. However, this paper performs a vulnerability analysis on Jiang et al.’s authentication protocol and shows that it has security problems, such as a lack of mutual authentication, a risk of SID modification and DoS attacks, a lack of sensor anonymity, and weak ID anonymity.
Volume: 8
Issue: 1
Page: 605-610
Publish at: 2018-02-01

Improving the Performance of Viterbi Decoder using Window System

10.11591/ijece.v8i1.pp611-621
Rekkal Kahina , Abdesselam Bassou
An efficient Viterbi decoder is introduced in this paper; it is called Viterbi decoder with window system. The simulation results, over Gaussian channels, are performed from rate 1/2, 1/3 and 2/3 joined to TCM encoder with memory in order of 2, 3. These results show that the proposed scheme outperforms the classical Viterbi by a gain of 1 dB. On the other hand, we propose a function called RSCPOLY2TRELLIS, for recursive systematic convolutional (RSC) encoder which creates the trellis structure of a recursive systematic convolutional encoder from the matrix “H”. Moreover, we present a comparison between the decoding algorithms of the TCM encoder like Viterbi soft and hard, and the variants of the MAP decoder known as BCJR or forward-backward algorithm which is very performant in decoding TCM, but depends on the size of the code, the memory, and the CPU requirements of the application.
Volume: 8
Issue: 1
Page: 611-621
Publish at: 2018-02-01

Gauss-Seidel Method based Voltage Security Analysis of Distribution System

10.11591/ijece.v8i1.pp43-51
Gagari Deb , Kabir Chakraborty
Complexity of modern power network and Large disturbance results voltage collapse. So, voltage security analysis is important in power system. Indicators are helpful in voltage stability analysis, as they give information about the state of the system. In this paper a new indicator namely Distribution System Stability Indicator (DSSI) has been formulated using the information of Phasor Measurement Unit (PMU).The proposed indicator (DSSI) is tested on standard IEEE 33 bus radial distribution system. The suggested indicator is also applicable to the equivalent two bus system of a multi-bus power system. The proposed indicator is calculated for different contingent conditions at different system load configurations. The result of DSSI is verified with the standard indicator (VSI) which proves applicability of the proposed indicator. The bus voltages of all the buses at base loading and at maximum loading are evaluated for base data and for tripping of most critical line.
Volume: 8
Issue: 1
Page: 43-51
Publish at: 2018-02-01

Microstrip-Fed Circular Disc Monopole Antenna with Defected Waveguide Structure

10.11591/ijece.v8i1.pp189-197
S. J. Chin , M. Z. A. Abd. Aziz , M. R. Ahmad
This paper presented the microstrip-fed circular disc monopole antenna with defected waveguide structure. First, the microstrip-fed circular disc monopole antenna was designed. Next, the monopole antenna was designed with waveguide and lastly followed by the defected waveguide structure where the uniplanar compact (UC) structure was used. CST Microwave studio software was used for simulation and parametric studies process. Initially, the microstrip-fed circular disc monopole antenna was designed to achieve return loss less than -10dB for wideband frequencies. Then, the gain and directivity was improved with the integration of waveguide. The highest directivity of 11.38dBi found at 13.5GHz. However, low efficiency and narrower bandwidth were obtained. Next, uniplanar compact defected waveguide structure (UC DWS) was designed at inner surface of waveguide. The bandwidth achieved 3.09GHz where it covered from 10.91GHz to 14GHz. Meanwhile, the directivity maintained higher than the monopole antenna with highest directivity of 8.84dBi at 10GHz. The gain was also improved from 11GHz to 14GHz with highest gain of 6.38dB occurred at 13.5GHz.
Volume: 8
Issue: 1
Page: 189-197
Publish at: 2018-02-01
Show 1336 of 1837

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration