Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

27,544 Article Results

An Impact of ZigBee Technology in Data Communication System

10.11591/ijeecs.v9.i1.pp64-67
Dhanya. T
ZigBee is an IEEE 802.15.4 standard for information interchanges with business and purchaser gadgets. It is composed around low-control utilization permitting batteries to keep going forever. The ZigBee standard gives system, security, and application bolster administrations working on top of the IEEE 802.15.4 Medium Access Control (MAC) and Physical Layer (PHY) remote standard. It utilizes a suite of innovations to empower adaptable, self-arranging, self-mending systems that can oversee different information movement designs. ZigBee is an ease, low-control, remote lattice organizing standard. The ease permits the innovation to be broadly sent in remote control and observing applications, the low power-use permits longer an existence with little batteries, and the cross-section systems administration gives high dependability and bigger range.ZigBee has been created to take care of the developing demand for able remote systems administration between various low power. In industry ZigBee is being utilized for cutting-edge robotized assembling, with little transmitters in each gadget on the floor, taking into consideration correspondence between devices to a focal PC. This new level of communication allows finely-tuned remote observing and control.
Volume: 9
Issue: 1
Page: 64-67
Publish at: 2018-01-01

Changing the Electrical Safety Culture

10.11591/ijeecs.v9.i1.pp93-96
Benjamin Franklin A , Sasilatha T
Electrical wellbeing - Where were we yesterday? Where are we today? Where will we be later on? The wellbeing society is proceeding to advance to give a more secure workplace to individuals working around electrical hardware. To enhance electrical security, it takes sense of duty regarding consistent change of the electrical wellbeing society. New musings and thoughts to enhance electrical wellbeing are basic. This paper addresses how function hones have changed after some time and prescribes thoughts to overhaul the current electrical culture. To change the current security culture new thoughts should be produced to cause higher execution in electrical wellbeing for all individuals presented to electrical risks. New circuit testers take in great and unfortunate propensities from more experienced circuit testers. Human execution depends on a mix of information, abilities, and educated practices. Convictions can be affected through perceptions and collaborations with different experts. The estimation of value mentorship conveys a high level of obligation to guarantee legitimate wellbeing rehearses is taken after. Almost no exertion has been given to preparing the nonelectrical labourers that are presented to electrical risks. Preparing for non-electrical labourers is a missing component in the present electrical security culture. A principal contention in this paper is that culture speaks to the entirety of what is regularly adequate without examination. The way of life is likewise determined by regular perception and experience. With a specific end goal to change the way of life there must be a redefinition of what is satisfactory, trailed by noticeable changes that everybody can understanding and watch. Administration possesses culture since it sets what is passable and satisfactory. Accordingly, the fate of electrical wellbeing will rely upon how well administration comprehends the hazard and results of electrical work and their duty in moulding and owning electrical security strategies. Enter components tended to in this paper incorporate human execution, innovation changes, adjusting to change, actualizing new thoughts to enhance security and how staff changes inside an enterprise can influence wellbeing execution. 
Volume: 9
Issue: 1
Page: 93-96
Publish at: 2018-01-01

Review of Modern Three-Dimensional Integration Technologies and Analysis of Prospects of Their Use for High Power Micro-Assemblies

10.11591/ijeecs.v9.i1.pp198-203
A.V. Sukhanov , A.I Artemova , R.S Litvinenko
The new miniaturization technologies of electronic devices find extensive application in the design for any industry, whether it is civil electronics or appliances designed to operate in harsh environments. This article presents an overview of prospective technologies of three-dimensional integration at substrates level for use in the field of power electronics. The review describes the basic principles of three-dimensional integration technologies, their applicability for manufacturing electronic devices, the main advantages and disadvantages.
Volume: 9
Issue: 1
Page: 198-203
Publish at: 2018-01-01

Gravitational Search Algorithm Based Technique for Voltage Stability Improvement

10.11591/ijeecs.v9.i1.pp123-130
Mohamad Khairuzzaman Mohamad Zamani , Ismail Musirin , Mohamad Sabri Omar , Saiful Izwan Suliman , Nor Azura Md. Ghani , Nur Azwan Mohamed Kamari
Voltage instability problem has been known as a significant threat to power system operation since its occurrence can lead to power interruption. This phenomenon can be due to uncontrollable load increment, line and generator outage contingencies or unplanned load curtailment. Optimal reactive power dispatch involving reactive power support can be one of the options for improving voltage stability of a power system, which also requires optimization process. Optimal sizing and location can of reactive power support can avoid the system from experiencing over-compensated or under-compensated phenomena. The presence of optimization techniques has helped solving non-optimal phenomenon, nevertheless some setbacks have also been experienced in terms of inaccuracy and stuck in local optima. This paper presents the application of Gravitational Search Algorithm (GSA) technique in attempt to solve optimal reactive power dispatch problem in terms of reactive power support for voltage stability improvement. Optimization process tested on IEEE 14-bus Reliability Test System (RTS) has revealed its superiority with significant promising results in terms of voltage stability improvement in the test system. 
Volume: 9
Issue: 1
Page: 123-130
Publish at: 2018-01-01

A Study of Secured Enabled Passive Optical Network Enabling RoF

10.11591/ijeecs.v9.i1.pp43-48
M. Deepak
Innovation is an incorporation of radio sign in optical fiber transmission inside of system foundations that are thought to be financially savvy, pragmatic and moderately adaptable framework setup for whole deal transport remote signs. This venture proposes a Next era PON construction modeling backings RoF and OFDMA signal coordination without WDM lasers, and exhibit that 10-Gb/s OFDMA and three RF signals at 2.1GHz are transmitted more than 20km SMF in a 32-ONU in both upstream and downstream bearing. A security control unit and an optical switch are utilized associating four Optical Line Terminations (OLTs) with everyone serving just 32 Optical Network Units (ONUs). Insurance control unit gathers data of ONUs served by each OLT, and when an OLT falls flat, it will educate an active OLT to help its unique ONUs together with the burden served by the fizzled OLT.
Volume: 9
Issue: 1
Page: 43-48
Publish at: 2018-01-01

A Semi-Autonomous Coal Mine Monitoring Security System Based On Wireless Control Using RTOS

10.11591/ijeecs.v9.i1.pp33-35
Singh Omkar Ramabhilash , Santosh Kumar Singh
Novel coal mine administration framework to tackle the ongoing observing and profoundly effective safeguard issues of underground work stages. In this paper proposing a robot that has the fitness to identify the covered mine and let the client control it remotely to stay away from others conscious causalities. The robot is outfitted with exceptional wheels controlled by H-Bridge module, enabling it to move in every single conceivable bearing. In this venture we concentrate on the security of people and the robot; the robot is outfitted with unique range sensors that assistance in staying away from the snags in the field by extraordinarily recognizing the position of obstructions. For the manufacture of the venture, a unique model made of lightweight temperature safe metal is utilized on which every one of the articles is conveyed. Gas immediate, mischance help ask for, video gushing and voice declaration are the extra components of this framework. Advance, a remote ZigBee is added to the robot, which gets the constant estimations of flame, temperature. ARM microcontroller charges the robot. The camcorder connection to the gadget will transmit the picture in the Motion-JPEG arrange alongside a speaker who will enable us to send the crisis charge with the assistance of the voice message device. The application firmware keeps running on top of a RTOS to deal with multitasking prerequisites of the framework. This strategy has a down to earth profit if diminishing the quantity of causalities, after the execution of the procedure; the robot can be controlled productively with slightest buffering time.
Volume: 9
Issue: 1
Page: 33-35
Publish at: 2018-01-01

Controlling Pornography Over The Web

10.11591/ijeecs.v9.i1.pp104-106
Archenaa J , E. A. Mary Anitha
This investigation analyzed the degree to which youngsters are protected on the web with an emphasis on web erotica. The goals of this investigation incorporate (a) to find out the degree to which kids peer connections impact their web get to; (b) to decide the effect of sex on understudy utilization of web for long range informal communication; (c) to test whether sex have huge impact on understudy utilization of web for texting; (d) to test whether sex affect on understudy utilization of web for Email; (e) to decide the commitment of sex understudy utilization of web for video posting/seeing; (f) to test whether sex have huge commitment on understudy utilization of web for their homework; and (g) to discover the degree of youngsters open to erotica on the web. Essential wellspring of information gathering was utilized in this investigation and the factual devices utilized for information examination incorporate the Chi-square test measurement, Bar outline, Pie diagram and rate circulation. The outcome got was that greater part of kids don't approach web through associate connections which suggests that the degree to which youngsters peer connections impact their web get to is low. It was uncovered that understudies utilize the web for long range interpersonal communication, video posting/review, and Emailing yet don't utilize it for texting and in getting their work done. It was discovered that dominant part of the kids are not presented to online erotica, in opposite it ought to be noticed that the couple of kids who utilize the web for these exercises are at danger of being presented to obscenity on the web.
Volume: 9
Issue: 1
Page: 104-106
Publish at: 2018-01-01

Cryptographic Hashing Method using for Secure and Similarity Detection in Distributed Cloud Data

10.11591/ijeecs.v9.i1.pp107-110
A. Mohamed Divan Masood , S. K. Muthusundar
The explosive increase of data brings new challenges to the data storage and supervision in cloud settings. These data typically have to be processed in an appropriate fashion in the cloud. Thus, any improved latency may originanimmense loss to the enterprises. Duplication detection plays a very main role in data management. Data deduplication calculates an exclusive fingerprint for each data chunk by using hash algorithms such as MD5 and SHA-1. The designed fingerprint is then comparing against other accessible chunks in a database that dedicates for storing the chunks. As an outcome, Deduplication system improves storage consumption while reducing reliability. Besides, the face of privacy for responsive data also arises while they are outsourced by users to cloud. Aiming to deal with the above security challenges, this paper makes the first effort to honor the notion of distributed dependable Deduplication system. We offer new distributed Deduplication systems with privileged reliability in which the data chunks are distributed across a variety of cloud servers. The protection needs an different of using convergent encryption as in foregoing Deduplication systems.
Volume: 9
Issue: 1
Page: 107-110
Publish at: 2018-01-01

Analysis on Modified Fuzzy Logic Toolbox for Marine Navigation Applications

10.11591/ijeecs.v9.i1.pp73-76
P. Palanichamy
Programmed marine navigation and control is a vital piece of savvy vehicle control framework. It incorporates course keeping, and the course is evolving. Its primary design is to guarantee that boats cruise in the provided guidance consequently disregarding changes in ocean conditions, wind and different, unsettling influences. Fuzzy control is the verifiable truth that Fuzzy rationale frameworks require no exact scientific models of the framework under control. Expansion rationale, given expansion set, is to explore the different issue. The blend of development hypothesis and control theory brought another sort of wise control augmentation control. This paper presents Fuzzy augmentation control strategy for marine directing. The paper set up the model of Fuzzy augmentation control framework and concentrated the outline of Fuzzy augmentation controller. Recreation comes about show that the control strategy is profitable.
Volume: 9
Issue: 1
Page: 73-76
Publish at: 2018-01-01

Natural Dyes from Roselle Flower as a Sensitizer in Dye-Sensitized Solar Cell (DSSC)

10.11591/ijeecs.v9.i1.pp191-197
Dayang Suriani , Muhammad Irwanto Misrun , Gomesh Nair , Baharuddin Ismail
Hibiscus Sabdariffa L. well known as Roselle flower was used as sensitizers for Dye-Sensitized Solar Cell (DSSC). The dyes were extracted using distilled water (DI) and ethanol (E) extract solvent in an ultrasonic cleaner for 30 minutes with a frequency of 37 Hz by using ‘degas’ mode at the temperature of 30°. Doctor blade method was applied in the fabrication of titanium dioxide (TiO2) on ITO glass. Absorption spectra of Roselle dye with different extract solvent were tested using Evolution 201 UV-Vis Spectrophotometer. Fourier-Transform Infrared (FTIR) was used to identify the functional active group in extract dye. Based on FTIR result, the broad absorption at peak 2889 cm-1, 2976 cm-1, and 3366 cm-1 attributed to the O-H stretching which is the presence of hydroxyl group. The use Field Emission Scanning Electron Microscopy (FESEM) and Energy-Dispersive Spectroscopy (EDS) analysis are to characterize the surface morphology and element in the TiO2 thin film.
Volume: 9
Issue: 1
Page: 191-197
Publish at: 2018-01-01

A Novel Hydro Powered Online Power Converter for Marine Lighting Applications

10.11591/ijeecs.v9.i1.pp15-19
Sinu KJ , G. Ranganathan
This paper presents a new hydro energy based dc-dc PFC sepic based buck converter for marine lighting applications. The major advantage of the proposed power converter is high power factor and low THD with higher efficiency. SEPIC converter produces continuous smooth ripple free current because of two inductors in series in line in its circuit. Sepic converter produces lower switching losses because of lower voltage stress on power switch employed compared to other buck-boost converter topologies. Tidal wave energy is converted into mechanical energy with the help of a hydro turbine which drives a permanent magnet synchronous generator to produce three phase ac output voltage. It produces a low ac voltage which is converted into DC using passive diode rectifier and fed to sepic converter for voltage regulation as well as to improve quality of power supply such as high power factor, low THD. The proposed sepic based power converter for marine lighting application is simulated in MATLAB/Simulink environment for verifying the performance of proposed scheme.
Volume: 9
Issue: 1
Page: 15-19
Publish at: 2018-01-01

A Smart Method for Monitoring and Scheming Of Road Luminosity Using GSM Equipment

10.11591/ijeecs.v9.i1.pp36-38
Ravichandran G , Krishnamurthy M
In our modern life, energy wastage in Streetlight is a big problem faced in walkways and roads during dawn and dusk. These days, the present road light structures are wired which are hard to make and has poor adaptability. During the daytime, the battery gets charged by sun rays, and the energy can be used to power the road lights at night time. The structure regards sun situated cell foundation. It is like manner delineates the usage of remote sensor frameworks using GSM for streetlight checking and control. This system would give remote access to streetlight upkeep and monitoring. It likewise talks about a perceptive framework that takes programmed choices for sparkling control (ON/OFF/DIMMING) considering encompassing light power and time both at a similar minute. The data collected from the sensor is given to the microcontroller of one unit, and at the same time, the SMS is sent through GSM to the Raspberry PI microcontroller to monitor and control the street light.
Volume: 9
Issue: 1
Page: 36-38
Publish at: 2018-01-01

Assault Discovery and Localizing Adversary in Remote Networks

10.11591/ijeecs.v9.i1.pp81-84
Patel KalpanaDhanji , Santhoshkumarsingh Santhoshkumarsingh
Remote Systems are presently prevalent worldwide to help individuals and machines to speak with each other regardless of their area, where it has an unending mission for expanded limit and enhanced quality. Despite the fact that there are many points of interest yet regardless it have a few burdens. This paper manages the vulnerabilities in the remote frameworks. The vulnerabilities show in the remote innovation that is generally identified with dangers and dangers. Despite the fact that much defencelessness are in the remote frameworks this paper for the most part manages the parodying assaults. In remote frameworks the foes can dispatch any kind of assaults to take the information and to lull the execution of the system. The fundamental driver of this paper is to pass on that remote frameworks require a more grounded instrument. So we likewise propose to perform equipment execution utilizing a Zig honey bee handset which utilizes the standard (802.15.4) chiefly in view of Zigbee convention Stack.
Volume: 9
Issue: 1
Page: 81-84
Publish at: 2018-01-01

Investigating Thermal Comfort for the Classroom Environment using IoT

10.11591/ijeecs.v9.i1.pp157-163
Nurshahrily Idura Ramli , Mohd Izani Mohamed Rawi , Ahmad Zahid Hijazi , Abdullah Hayyan Kunji Mohammed
In this modern century where fine comfort is a necessity especially in buildings and occupied space, the study to satisfy one aspect of human comfort is a must. This study encompasses of exploring the physiological and environmental factors in achieving thermal comfort which specifically considering the clothing insulation and metabolic rate of students as well as the deployment of dry-bulb temperature, mean radiant temperature, humidity, and air movement in order to obtain the level of comfort students are experiencing in class. The level of comfort are detected by using ASHRAE 55 to determine the average thermal sensation response through the Predicted Mean Vote (PMV) value. An android application were developed to read input of recognizing clothing level (thickness of clothing) and capturing metabolic rate to cater the inputs for physiological factors, while radiant temperature, humidity and air movement are captured through static sensors set up in the classroom space. This paper analyses both the physiological and environmental factors in affecting students in class and further determine their comfort levels that is a major influencing factor of focus in learning. Through cross referencing collected data from IoT enabled nodes, it is found that both physiological and environmental factors, and the combination of them greatly influence in getting the most comfortable state with PMV value of 0.
Volume: 9
Issue: 1
Page: 157-163
Publish at: 2018-01-01

The Application of S-Transform to Reduce Border Distortion Effect Based on Window Length

10.11591/ijeecs.v9.i1.pp177-182
S. Habsah Asman , M. A. Talib Mat Yusoh , A. Farid Abidin
The enhancement of powerful signal processing  tools has broadened the scope research in power quality analysis.The necessity of processing tools to compute the signals accurately without border distortion effect presence has demanded nowadays. Hence, S-Transform has been selected in this paper as a time-frequency analysis tools for power disturbance detection and localization as it capable to extract features and high resolution to deal with border distortion effect. Various window length signal has been analyzed to overcome the border distortion effect in S-Transform.To ascertain validity of the proposed scheme, it is  validated with IEEE 3 bus test system and simulation results show that the proposed technique can minimize the border effect  while detecting transient and voltage sag during fault system. As a result, the longest window length which is four cycle, outperform the least MSE value which indicate the best performance. While, the shortest window length resulting highest MSE value which indicate the worst performance.
Volume: 9
Issue: 1
Page: 177-182
Publish at: 2018-01-01
Show 1338 of 1837

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration