Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

27,762 Article Results

Efficient and Secure Resource Allocation and Data Forwarding in Cellular Network

10.11591/ijeecs.v9.i2.pp267-268
Sudha Mishra , A Arivazhagan
Data sharing in networks are now days a challenging one where the source is sending a file to destination, major problem is interference. Once the router is set to search for a path takes too time for identifying a better path to transmit data. The performance is affected due to the time delay of searching path and the interference cause data loss or interruption of transmission. We proposed an overlay router which search better path in short period of time with the help of BJP router. When a sender sends the data, the overlay router contact with BJP router to analyze existing path used to transmit. To ensure a better path and low travelling time will be an efficient way to share the data between source and destination without any interference, low performance and time delay. BJP searches the existing routes that will be low processing time to forward the data sent by the source and received on time by the destination. Whenever a data is been shared between these two: source and destination, overlaying protocol is user to find the shortest path among the existing path search. By using overlay router and BJP router the performance is increased, avoid interference, path identification is solved within short time and provide a better solution for the current environment.
Volume: 9
Issue: 2
Page: 267-268
Publish at: 2018-02-01

Ant Colony Optimization (ACO) based Data Hiding in Image Complex Region

10.11591/ijece.v8i1.pp379-389
Sahib Khan
This paper presents data an Ant colony optimization (ACO) based data hiding technique. ACO is used to detect complex region of cover image and afterward, least significant bits (LSB) substitution is used to hide secret information in the detected complex regions’ pixels. ACO is an algorithm developed inspired by the inborn manners of ant species. The ant leaves pheromone on the ground for searching food and provisions. The proposed ACO-based data hiding in complex region establishes an array of pheromone, also called pheromone matrix, which represents the complex region in sequence at each pixel position of the cover image. The pheromone matrix is developed according to the movements of ants, determined by local differences of the image element’s intensity. The least significant bits of complex region pixels are substituted with message bits, to hide secret information. The experimental results, provided, show the significance of the performance of the proposed method.
Volume: 8
Issue: 1
Page: 379-389
Publish at: 2018-02-01

Development of Mobile Cloud Applications using UML

10.11591/ijece.v8i1.pp596-604
Dong Kwan Kim
With the proliferation of cloud computing technologies, smartphone users are able to use a variety of cloud computing-based mobile services such as games, education, entertainment, and social networking. Despite the popularity of such a mobile cloud computing, the complicated multi-tier system configuration of the mobile application must be one of the major impediments to develop mobile cloud applications. This paper presents development processes and procedures for developing mobile cloud applications by effectively applying Unified Modeling Language (UML), a representative object-oriented modeling language. The paper is intended to enhance the development productivity of the mobile cloud application and to improve the effectiveness of communication between software developers. In addition, we used the Android mobile platform and Amazon Web Service for cloud computing in order to demonstrate the applicability of the proposed approach to systematically apply the UML profiles and diagrams for cloud-based mobile applications.
Volume: 8
Issue: 1
Page: 596-604
Publish at: 2018-02-01

E-Carnet Resumption and Repository System for Bus Line Commuters

10.11591/ijeecs.v9.i2.pp262-264
Sujatha V , E.A. Mary Anitha
E-Carnet Resumption and Repository System for Bus Line Commuters is an ongoing venture which is very useful for the passengers. Resumption can be done using any two id proof and using credit card for paying money. This online bus pass Resumption application will help people to save their time and repository the bus passes without standing in a line for hours near counters. At first individuals need to enlist with the application by submitting points of interest of photograph, address proof, any two id verification and required subtle elements and submit through on the web. The application will verify the details and if all proves are verified then followed by transaction will be held. After that the pass will automatically generating and send it through mail. You can even repository using credit card or wire transfer methods.  This system can be used in bus transport undertaking services. Using the system in government and private sectors can exclude the use of human efforts and saves lot of money and time. This system also used to finding the route for Different places. The route information updates admin control so user trusts the valid paths. User locations are tracking using GPS tracker.
Volume: 9
Issue: 2
Page: 262-264
Publish at: 2018-02-01

Cryptanalysis on Privacy-Aware Two-factor Authentication Protocol for Wireless Sensor Networks

10.11591/ijece.v8i1.pp605-610
Younsung Choi
Das first proposed two-factor authentication combining the smart card and password to resolve the security problems of wireless sensor networks (WSNs). After that, various researchers studied two-factor authentication suitable for WSNs. In user authentication protocols based on the symmetric key approach, a number of elliptic curve cryptography (ECC)-based authentication protocols have been proposed. To resolve the security and efficiency problems of ECC-based two-factor authentication protocols, Jiang et al. proposed a privacy-aware two-factor authentication protocol based on ECC for WSNs. However, this paper performs a vulnerability analysis on Jiang et al.’s authentication protocol and shows that it has security problems, such as a lack of mutual authentication, a risk of SID modification and DoS attacks, a lack of sensor anonymity, and weak ID anonymity.
Volume: 8
Issue: 1
Page: 605-610
Publish at: 2018-02-01

Extremely Vibrant Routing Scheme for Mobile Adhoc Network

10.11591/ijeecs.v9.i2.pp306-310
Syes Abdul Syed S , T Senthil Kumaran
This paper aims to improve the performance of the traditional routing protocol for MANET such as DSR and AODV in terms of delay and overhead. The proposed routing scheme is called as Extremely Vibrant Routing (EVR) which adopts with the highly dynamic environment of MANET. The link residual life is estimated to reduce the link failure before forwarding data through a node. The velocity of the moving mode is considered while choosing the next forwarder node. This enables the EVR to decrease the delay in the network. The proposed routing scheme reduces routing overhead and reduces the delay. This scheme reduces the link failure too. The performance is evaluated by using the simulation results obtained by using NS2 simulator.
Volume: 9
Issue: 2
Page: 306-310
Publish at: 2018-02-01

Gauss-Seidel Method based Voltage Security Analysis of Distribution System

10.11591/ijece.v8i1.pp43-51
Gagari Deb , Kabir Chakraborty
Complexity of modern power network and Large disturbance results voltage collapse. So, voltage security analysis is important in power system. Indicators are helpful in voltage stability analysis, as they give information about the state of the system. In this paper a new indicator namely Distribution System Stability Indicator (DSSI) has been formulated using the information of Phasor Measurement Unit (PMU).The proposed indicator (DSSI) is tested on standard IEEE 33 bus radial distribution system. The suggested indicator is also applicable to the equivalent two bus system of a multi-bus power system. The proposed indicator is calculated for different contingent conditions at different system load configurations. The result of DSSI is verified with the standard indicator (VSI) which proves applicability of the proposed indicator. The bus voltages of all the buses at base loading and at maximum loading are evaluated for base data and for tripping of most critical line.
Volume: 8
Issue: 1
Page: 43-51
Publish at: 2018-02-01

Microstrip-Fed Circular Disc Monopole Antenna with Defected Waveguide Structure

10.11591/ijece.v8i1.pp189-197
S. J. Chin , M. Z. A. Abd. Aziz , M. R. Ahmad
This paper presented the microstrip-fed circular disc monopole antenna with defected waveguide structure. First, the microstrip-fed circular disc monopole antenna was designed. Next, the monopole antenna was designed with waveguide and lastly followed by the defected waveguide structure where the uniplanar compact (UC) structure was used. CST Microwave studio software was used for simulation and parametric studies process. Initially, the microstrip-fed circular disc monopole antenna was designed to achieve return loss less than -10dB for wideband frequencies. Then, the gain and directivity was improved with the integration of waveguide. The highest directivity of 11.38dBi found at 13.5GHz. However, low efficiency and narrower bandwidth were obtained. Next, uniplanar compact defected waveguide structure (UC DWS) was designed at inner surface of waveguide. The bandwidth achieved 3.09GHz where it covered from 10.91GHz to 14GHz. Meanwhile, the directivity maintained higher than the monopole antenna with highest directivity of 8.84dBi at 10GHz. The gain was also improved from 11GHz to 14GHz with highest gain of 6.38dB occurred at 13.5GHz.
Volume: 8
Issue: 1
Page: 189-197
Publish at: 2018-02-01

A Comparative Study of Phase Offset Disposition Sinusoidal Pulse Width Modulation (POD-SPWM) and Symmetrical Pulse Width Modulation Switching Techiques for Generalized Current Source Multilevel Inverter(MCSI)

10.11591/ijeecs.v9.i2.pp395-402
Nik Fasdi Nik Ismail , Nasrudin Abdul Rahim , Siti Rohani Sheikh Raihan , Yusuf Al-Turki
This paper presents a comparison between two switching techniques namely Phase Offset Disposition Sinusoidal PWM (POD-SPWM) and Symmetrical PWM switching for a generalized current source multilevel inverter (MCSI) topology. One of the advantages of MCSI is it can reduce the total harmonic distortion (THD) at the output load current with a sinusoidal current waveform. In this paper, the generalized MCSI with the different levels has been developed with Matlab@simulation software in order to study the performance of the two switching schemes for the operation of the MCSI. From the simulation results, POD-SPWM switching technique can give better THD results compare to symmetrical switching technique.
Volume: 9
Issue: 2
Page: 395-402
Publish at: 2018-02-01

Schedulability of Rate Monotonic Algorithm using Improved Time Demand Analysis for Multiprocessor Environment

10.11591/ijece.v8i1.pp429-440
Leena Das , Sourav Mohapatra , Durga Prasad Mohapatra
Real-Time Monotonic algorithm (RMA) is a widely used static priority scheduling algorithm. For application of RMA at various systems, it is essential to determine the system’s feasibility first. The various existing algorithms perform the analysis by reducing the scheduling points in a given task set. In this paper we propose a schedubility test algorithm, which reduces the number of tasks to be analyzed instead of reducing the scheduling points of a given task. This significantly reduces the number of iterations taken to compute feasibility. This algorithm can be used along with the existing algorithms to effectively reduce the high complexities encountered in processing large task sets. We also extend our algorithm to multiprocessor environment and compare number of iterations with different number of processors. This paper then compares the proposed algorithm with existing algorithm. The expected results show that the proposed algorithm performs better than the existing algorithms.
Volume: 8
Issue: 1
Page: 429-440
Publish at: 2018-02-01

Audio Denoising Based on Short Time Fourier Transform

10.11591/ijeecs.v9.i1.pp89-92
J. S. Ashwin , N. Manoharan
This paper presents a novel audio de-noising scheme in a given speech signal. The recovery of original from the communication channel without any noise is a difficult task. Many de-noising techniques have been proposed for the removal of noises from a digital signal. In this paper, an audio de-noising technique based on Short Time Fourier Transform (STFT) is implemented. The proposed architecture uses a novel approach to estimate environmental noise from speech adaptively. Here original speech signals are given as input signal. Using AWGN, noises are added to the signal. Then noised signals are de-noised using STFT techniques. Finally Signal to Noise Ratio (SNR), Peak Signal to Noise Ratio (PSNR) values for noised and de-noised signals are obtained.
Volume: 9
Issue: 1
Page: 89-92
Publish at: 2018-01-01

Development of Learning Tools using Maples for Engineering Mathematics Subject

10.11591/ijeecs.v9.i1.pp131-138
Norlenda Mohd Noor , Hanifah Sulaiman , Zuraida Alwadood , Suhaila Abd Halim , Nurul Filzah Syamimi Wahid , Nor Adilah Ab Halim
Mathematics is one of the basic and core subject for engineering students. Learning mathematics helps in developing problem solving skills as the subject requires critical thinking. However, many students perceive mathematics as a difficult subject and eventually get poor result for the subject. In the institution under study, there were increases in failure rate for the subject for the past few semesters. Based on a preliminary study, it was found that 55 percent of engineering student claimed that they encountered difficulties in visualizing functions in 3-dimensional space, which is the main content for engineering calculus subject. This fact is very unsatisfactory as engineering students are expected to possess strong mathematical problem solving skills. In light of this, the objective of this research is to develop an interactive teaching and learning tools, so as to assist students in visualizing 3-dimensional space functions. The tool is intended to be used in teaching and learning process in classrooms and it is expected that the students’ understanding in the subject could be improved.
Volume: 9
Issue: 1
Page: 131-138
Publish at: 2018-01-01

Achievement of a Radio Monitor Station Management Data Framework

10.11591/ijeecs.v9.i1.pp53-55
Sarfaraz Ahmed , T. Senthil Kumaran
A radio monitor station (RMS) gathers the radio flag data of a substantial scope of recurrence for the administration. The framework is completely fledged with essential and propelled functionalities and now in charge of a common of radio transmission capacity use. To address the difficulties of huge dynamic information, we have built up an area particular management data framework (MDF) for the radio monitor stations. The framework outline and usage are depicted in the paper. A calculation is furnished to work with the radio transmission models for count of the radio flag scopeday by day RMS management in practice.
Volume: 9
Issue: 1
Page: 53-55
Publish at: 2018-01-01

Analysis of BBNs Over Fault Detection and Diagnosis in Industrial Application

10.11591/ijeecs.v9.i1.pp68-72
Upadhyay Anand Trilokinath , Santhosh Kumar Singh
In Industrial procedures, to trust the achievement of planned operation, actualising new and exact strategy for perceiving irregular working conditions, known as shortcomings, is essential. A powerful technique for blame location and analysis helps to decrease the effect of these deficiencies, praises the wellbeing of operation, limits downtime and lessens fabricating costs. In this paper, utilisation of BBNs examined for a benchmark synthetic modern process, known as, Tennessee Eastman keeping in mind the end goal to accomplish prime blame location and specific likely finding of their causes. Use of Bayesian conviction systems for blame location and conclusion of Tennessee Eastman prepare in the graphical setting depiction has not been tried yet. The accomplishment of this component affirms capacity and straightforwardness utilisation of it as an asymptomatic framework in specific current procedures.
Volume: 9
Issue: 1
Page: 68-72
Publish at: 2018-01-01

A Study about SOA Based Agriculture Management Data Framework

10.11591/ijeecs.v9.i1.pp39-42
Prasanna Moorthi N , Mathivananr Mathivananr
Agricultural MDF is a sort of data framework concentrating on the agricultural generation, administration, logical research data gathering, ordering, arranging, recovery and yield; it is an imperative piece of the farming informatization. In view of the examination of circumstance and issue of rural data management, this paper give a coordination model of utilizing SOA to outline agrarian MDF. The SOA's hypothesis, execute innovation and application structure and character were talked about in detail. In light of the investigation of necessity is meaning of agrarian MDF. Utilizing the planning thought of SOA, based-SOA farming MDF was presented, and the fundamental idea, model of configuration was talked about in points of interest.
Volume: 9
Issue: 1
Page: 39-42
Publish at: 2018-01-01
Show 1351 of 1851

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration