Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

27,544 Article Results

Determining Hotspots of Road Accidents using Spatial Analysis

10.11591/ijeecs.v9.i1.pp146-151
S.Sarifah Radiah Shariff , Hamdan Abdul Maad , Nursyaza Narsuha Abdul Halim , Zuraidah Derasit
Road accidents continuously become a major problem in Malaysia and consequently cause loss of life or property. Due to that, many road accident data have been collected by highway concessionaries or build–operate–transfer operating companies in the country meant for coming up with proper counter measures. Several analyses can be done on the accumulated data in order to improve road safety. In this study the reported road accidents cases in North South Expressway (NSE) from Sungai Petani to Bukit Lanjan during 2011 to 2014 period is analyzed. The aim is to determine whether the pattern is clustered at certain area and to identify spatial pattern of hot spots across this longest controlled-access expressway in Malaysia as hotspot represents the location of the road which is considered high risk and the probability of traffic accidents in relation to the level of risk in the surrounding areas. As no methodology for identifying hotspot has been agreed globally yet; hence this study helped determining the suitable principles and techniques for determination of the hotspot on Malaysian highways. Two spatial analysis techniques were applied, Nearest Neighborhood Hierarchical (NNH) Clustering and Spatial Temporal Clustering, using CrimeStat® and visualizing in ArcGIS™ software to calculate the concentration of the incidents and the results are compared based on their accuracies. Results identified several hotspots and showed that they varied in number and locations, depending on their parameter values. Further analysis on selected hot spot location showed that Spatial Temporal Clustering (STAC) has a higher accuracy index compared to Nearest Neighbor Hierarchical Clustering (NNH). Several recommendations on counter measures have also been proposed based on the details results.
Volume: 9
Issue: 1
Page: 146-151
Publish at: 2018-01-01

Data Spread among Vehicular Networks with Minimal Cost and Privacy

10.11591/ijeecs.v9.i1.pp111-114
Atul Kulkarni , Debajyoti Mukhopadhyay
Currently, choosing a node to carry the files via network is inefficient due to multiple end-users are requesting for packets at the same time. The problem is to identify the shortest path, traffic cost is high, and hackers enter the network to access the file. Whenever user requesting for packets to service provider, it has been carried out via router to provide security and effective way of transmission without any hackers. We proposed a VAN router that manages the transmission process. Once the packet enters router follows: (i) identifies the shortest path to transmit the packets, (ii) analyze the migration cost, (iii) when a hacker enters the network, the details of the hacker is send to the GPS to identify hackers location, (iv) provides the user requested packets back to the user without any modification. GPS work is to identify the hacker location in which node they are trying to access the files and that information has been sent to the user where hacker enters the network. Each packet sent by the service provider via router to end-user, the router intimates service provider with a confirmation message. Finally, VAN router provides security to the end-user by avoiding hackers to access the file and minimizes traffic cost, finds shortest path.
Volume: 9
Issue: 1
Page: 111-114
Publish at: 2018-01-01

A View on Creep Failure in Distribution Transformers

10.11591/ijeecs.v9.i1.pp49-52
R. Elavarasi
This paper insight about reasons of disappointment in distribution transformers. It has been suggested that crawl may be a noteworthy purpose behind such disappointments. The impact of anxiety, temperature, and material on unfaltering state killjoy rate on aluminum and copper wires (utilized as a part of 25 KVA distribution transformers) have been introduced. Proposed study affirms that the disappointment rate of aluminum wound DTs is higher than the disappointment rate of copper injury DTs in force insufficient ranges and poor conveyance systems. The higher disappointment rate of aluminum wound DTs has been credited to the lifted enduring state wet blanket rate of the aluminum wire than copper wire.
Volume: 9
Issue: 1
Page: 49-52
Publish at: 2018-01-01

Application of Artificial Neural Network in Electrical Power System

10.11591/ijeecs.v9.i1.pp77-80
P. Palanichamy
The artificial neural network used to detect the fault in electrical machines and can increase the function of new entry detection when compared to the conventional method. In proposed artificial neural network has increased the precision and stability of system performance. The time-area vibration signs of a pivoting machine with ordinary and flawed apparatuses are handled for highlight extraction. The separated elements from unique and preprocessed signs are utilized as contributions to both classifiers in view of ANNs and SVMs for two-class (typical or blame) acknowledgment. The quantity of hubs in the concealed layer, if there should be an occurrence of ANNs, and the extend basis work section parameter, in the event of SVMs, alongside the choice of information components are enhanced utilizing genetic algorithm (GAs).
Volume: 9
Issue: 1
Page: 77-80
Publish at: 2018-01-01

A Review on ZIGBEE in WSN

10.11591/ijeecs.v9.i1.pp29-32
Karthikeyan V
Zigbee is fastidious for a group of abnormal state communication conventions. Zigbee is a run of the mill remote correspondence innovation. ZigBee uses low rate, low-control advanced radios taking into account an IEEE 802 standard for individual region systems. The change characterised by the ZigBee particular is proposed to be easier and less extravagant than the different WPANs remote single zone system, for example, Bluetooth. ZigBee is focused on radio-recurrence applications that compel a low in order rate, long battery life, and secure systems administration. ZigBee has a characterized rate of 250 kbps most appropriate for occasional or irregular information or a single sign transmission from a sensor or data gadget. It is a standard Open convention with no or unimportant permitting charges, chipsets accessible from various sources, remotely redesigned firmware, completely remote and low power, lattice systems administration to work on batteries, low support and bigger system size with standard based high security. 
Volume: 9
Issue: 1
Page: 29-32
Publish at: 2018-01-01

Performance of Principal Component Analysis and Orthogonal Least Square on Optimized Feature Set in Classifying Asphyxiated Infant Cry Using Support Vector Machine

10.11591/ijeecs.v9.i1.pp139-145
R. Sahak , W. Mansor , Khuan Y. Lee , A. Zabidi
An investigation into optimized support vector machine (SVM) integrated with principal component analysis (PCA) and orthogonal least square (OLS) in classifying asphyxiated infant cry was performed in this study. Three approaches were used in the classification; SVM, PCA-SVM, and OLS-SVM. Various numbers of features extracted from Mel-frequency Cepstral coefficient (MFCC) were tested to obtain the optimal parameters of SVM kernels. Once the optimal feature set is obtained, PCA and OLS selected the most significant features and the optimized SVM then classified the selected cry patterns. In PCA-SVM, eigenvalue-one-criterion (EOC), cumulative percentage variance (CPV) and the Scree test (SCREE) were used to select the most significant features. SVM with radial basis function (RBF) kernel was chosen in the classification stage. The classification accuracy and computation time were computed to evaluate the performance of each method. The best method for classifying asphyxiated infant cry is PCA-SVM with EOC since it produces the highest classification accuracy which is 94.84%. Using PCA-SVM, the classification process was performed in 1.98s only. The results also show that employing feature selection techniques could enhance the classifier performance.
Volume: 9
Issue: 1
Page: 139-145
Publish at: 2018-01-01

Chaos Based Image Encryption

10.11591/ijeecs.v9.i1.pp97-100
Suresh. G. B , V. Mathivanan
New method of secure image encryption and decryption scheme based on the chaos is proposed. There are two steps are followed after the preprocessing step in the proposed system namely, Encryption and Decryption. In preprocessing, images are denoised using median filter. Then the original input images will be encrypted by using the chaos mapping algorithm. At last the original images are retrieved back from the encrypted image by using the key that is specified during the encryption process for the decryption of the original images. Then the histogram mapping is done for the encrypted and the decrypted images. The proposed system is tested on well-known images like Lena, Mandrill, Clown and Barbara. The experimental results have demonstrated that the introduced image encryption scheme can achieve high security for practical image encryption.
Volume: 9
Issue: 1
Page: 97-100
Publish at: 2018-01-01

Content Based Image Retrieval Using Lacunarity and Color Moments Of Skin Diseases

10.11591/ijeecs.v9.i1.pp243-248
I Gusti Ayu Triwayuni , I Ketut Gede Darma Putra , I Putu Agus Eka Pratama
The research conducted contributed in the form of CBIR application which was developed using texture and color feature extraction in searching the contents information of an object of skin disease image. The textured feature is extracted using Lacunarity, while for color feature extraction using Color Moments as well as a combination of both methods. The results of color characteristic extraction test using Color Moments Method yielded images corresponding to 100% similarity percentages and experimentation of texture characteristic extraction using Lacunarity Method yielded images corresponding to a percentage of suitability of 25%, followed by a combined test of both methods and the normalization process produces images corresponding to a percentage of conformity of 60%.
Volume: 9
Issue: 1
Page: 243-248
Publish at: 2018-01-01

Novel Method for Detection of Ship Docked In Harbor In High Resolution Remote Sensing Image

10.11591/ijeecs.v9.i1.pp12-14
K. Raghavi
Transport discovery utilizing great determination remote detecting pictures is a hot research theme in both military and nonmilitary personnel applications. In this paper, another technique for identification of boats docked in a harbor was proposed, in which, Harris corner identifier consolidated with nearby striking locale examination were utilized to extricate the important sharp-calculated element identified with the fore piece of a ship in satellite pictures. This technique can decide the course of the ship when the ship is distinguished. The aftereffects of tests on a few great determination remote detecting images confirmed the viability of the proposed strategy. 
Volume: 9
Issue: 1
Page: 12-14
Publish at: 2018-01-01

Review of Modern Three-Dimensional Integration Technologies and Analysis of Prospects of Their Use for High Power Micro-Assemblies

10.11591/ijeecs.v9.i1.pp198-203
A.V. Sukhanov , A.I Artemova , R.S Litvinenko
The new miniaturization technologies of electronic devices find extensive application in the design for any industry, whether it is civil electronics or appliances designed to operate in harsh environments. This article presents an overview of prospective technologies of three-dimensional integration at substrates level for use in the field of power electronics. The review describes the basic principles of three-dimensional integration technologies, their applicability for manufacturing electronic devices, the main advantages and disadvantages.
Volume: 9
Issue: 1
Page: 198-203
Publish at: 2018-01-01

Encryption Techniques and Wireless Power Transfer Schemes

10.11591/ijeecs.v9.i1.pp183-190
Nur Hazwani Hussin
Wireless power transfer (WPT) is one of the most useful ways to transfer power. Based on power transfer distances, the WPT system can be divided into three categories, namely, near, medium, and far fields. Inductive coupling and capacitive coupling contactless techniques are used in the near-field WPT. Magnetic resonant coupling technique is used in the medium-field WPT. Electromagnetic radiation is used in the far-field WPT. This paper reviews the techniques used in WPT. In addition, energy encryption plays a major role in ensuring that power is transferred to the true receiver. Therefore, this paper reviews the energy encryption techniques in WPT. A comparison between different techniques shows that the distance, efficiency, and number of receivers are the main factors in selecting the suitable energy encryption technique.
Volume: 9
Issue: 1
Page: 183-190
Publish at: 2018-01-01

A PV FED Three Phase Switched Z-source Multi Level Inverter for Induction Motor Drives

10.11591/ijeecs.v9.i1.pp24-28
Sinu KJ , G. Ranganathan
Generally induction motor drives posses higher harmonic contents in line voltage and current due to high switching frequency used in inverters. Conventional induction motor drives employ two level voltage source inverters which has THD in level of 50%. This paper presents a switched z-source multilevel inverter which has voltage boosting capability and has lesser THD level in comparison with conventional two level voltage source inverters. This drive is fed from a photo voltaic source because of its voltage boosting capability. A single phase five level switched z-source inverter is initially designed and considered as single cell and three such cells are created for powering three phase induction motor. The proposed three cell PV source switched z-source multilevel inverter for three phase induction motor is simulated in MATLAB/Simulink software to verify merits of proposed IM drive
Volume: 9
Issue: 1
Page: 24-28
Publish at: 2018-01-01

Identifying the Breakdown Voltages of Vegetable Oils with Silicone Carbide Nanoparticle Additive as Insulating Oil for Transformers

10.11591/ijeecs.v9.i1.pp170-176
Muhammad bin Yahya , Nurul Aifaa Najihah binti Maliki
This paper discusses on the breakdown voltage of vegetable oils with nanoparticles added to be used as insulating oil for transformers. Raw samples of Palm Oil (PO) and Coconut Oil (CO) were used in this research. Different percentages of silicone carbide (SiC) nanoparticles was added into the samples of the vegetable oils. The different parameters of the vegetable oil mixtures were investigated through the breakdown voltage tests to analyse the effect of the additive on the dielectric strength of the oils. The performance of insulating oils varies according to the percentage of nanoparticles added through viscosity test and partial discharge (PD) measurement. The initial results for vegetable oils showed that the percentage of additives influenced the value of breakdown voltage of the oils highly. Furthermore, the result shows that PD measured became very low after the addition of silicone carbide nanoparticles.
Volume: 9
Issue: 1
Page: 170-176
Publish at: 2018-01-01

E-Commerce Recommender For Usage Bandwidth Hotel

10.11591/ijeecs.v9.i1.pp227-233
Sfenrianto Sfenrianto , Melva Hermayanty Saragih , Bayu Nugraha
The customer interest is often affected the promotions or product offered it his/her access. The aim of this research is to evaluate the recommendation system, as a promotion model or product offered, on e-commerce to the customer interest. This research focuses on e-commerce which offers the bandwidth internet for a hotel. Firstly, prototype of e-commerce which has recommendation system is built. Then, the eCommerce is evaluated by value creation of an eCommerce. There are four factors value creation, efficiency, lock-in, complementary and novelty based on R. Amit’s and Zott theory. After conducting the evaluation, two factors, efficiency and complementary, are significant to the value creation for eCommerce recommendation, yet the other factors, lock-in and novelty are not significant. This research also confirms that the number of subscribers’ eCommerce increases until 45.06% with using the recommendation than without recommendation.
Volume: 9
Issue: 1
Page: 227-233
Publish at: 2018-01-01

An Image Fusion Method Based On Framelet Transform

10.11591/ijeecs.v9.i1.pp60-63
Patel Kalpana Dhanji , Santhosh Kumar Singh
Image fusion is the process of combining relevant information from two or more images into a single image. The resulting image contains more information as compared to individual images. In this system, we are proposing a new image fusion method by using a technique called framelet transform. This method consists of two phases; First is the frame separation where the pre-processing and Selection of frames for both the images occurs and the second phase is the Frame fusion that is done by inverse framelet transform method is done from which a fused output images will be formed that will be containing both the information of the input images (CT & MRI images).
Volume: 9
Issue: 1
Page: 60-63
Publish at: 2018-01-01
Show 1339 of 1837

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration