Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

27,762 Article Results

Improving Medical Adherence using Smart Medicine Cabinet Monitoring System

10.11591/ijeecs.v9.i1.pp164-169
S. A. Ishak , H. Zainol Abidin , M. Muhamad
Patients at home may forget to take their medicines on time, miss doses or even take overdoses. This particularly applies to the elderly at home. Hence, this paper presents a monitoring system to improve the medical adherence which is based on Internet of Things (IoT) concept known as smart medicine cabinet monitoring system.  The system is proposed to remind the elderly to take their medicines on time, to ensure that the elderly have taken their medicines and to notify the family member of the elderly about their medication intake. This paper presents a method of monitoring the medication intake of the elderly which is based on IoT concept to display the data on the web database. The system uses an Arduino microcontroller, a toggle switch, LCD Display, limit switch, alarm system and a Wi-Fi module. The developed system is seen to be another alternative that would help the elderly especially who are living alone for their medication adherence to home-based treatment.
Volume: 9
Issue: 1
Page: 164-169
Publish at: 2018-01-01

Impact of Inter-eNodeB Handover Pameters on Performance Optimization of LTE Networks

10.11591/ijeecs.v9.i1.pp212-220
Mina Malekzadeh , Fatemeh Rezaiee
Handover, as a resource consuming process, is an important issue in mobile communications which can highly affect the overall performance of the LTE networks. Since the handover process mainly relies on four main entry condition parameters, optimizing these parameters will in turn improve the handover process. In this work, we investigate the effectiveness of the four handover parameters by measuring the resulting downlink throughput and number of the required handovers. We furthermore determine the optimized values of the parameters through implementing different sets of experiments. Finally, by applying the obtained optimized parameters on two main LTE handover algorithms i.e. A3RSRP and A2A4RSRQ, their performance is compared regarding to different speeds of the mobile equipment. We determine how to accurately select the optimal settings for the parameters so that greater LTE performance can be achieved. 
Volume: 9
Issue: 1
Page: 212-220
Publish at: 2018-01-01

Parallelization of Pairwise Alignment and Neighbor-Joining Algorithm in Progressive Multiple Sequence Alignment

10.11591/ijeecs.v9.i1.pp234-242
Agung Widyo Utomo
Progressive multiple sequence alignment ClustalW is a widely used heuristic method for computing multiple sequence alignment (MSA). It has three stages: distance matrix computation using pairwise alignment, guide tree reconstruction using neighbor-joining and progressive alignment. To accelerate computing for large data, the progressive MSA algorithm needs to be parallelized. This research aims to identify, decompose and implement the pairwise alignment and neighbor-joining in progressive MSA using message passing, shared memory and hybrid programming model in the computer cluster. The experimental results obtained shared memory programming model as the best scenario implementation with speed up up to 12 times.
Volume: 9
Issue: 1
Page: 234-242
Publish at: 2018-01-01

Cloud Deployment Methods In Guarantee of Protection and Confidentiality Constraints

10.11591/ijeecs.v9.i1.pp101-103
Sarfaraz Ahmed , T. Senthil Kumaran
Despite of the few advantages of moving venture basic resources for the Cloud, there are difficulties particularly identified with protection and confidentiality. It is essential that Cloud Users comprehend their protection and confidentiality needs, in view of their particular setting and select cloud demonstrate best fit to bolster these requirements. The writing gives works that emphasis on examining protection and confidentiality issues for cloud frameworks however such works don't give a methodological way to deal with evoke security and security necessities neither one of the methods to choose cloud arrangement models in light of fulfillment of these prerequisites by Cloud Service Providers. This work progresses the present cutting edge towards this bearing. Specifically, we consider necessities designing ideas to inspire and investigate protection and confidentiality prerequisites and their related instruments utilizing a calculated structure and an efficient procedure. The work presents confirmation as proof for fulfilling the protection and confidentiality necessities regarding culmination and reportable of security occurrence through review. This enables point of view cloud clients to characterize their affirmation prerequisites so that proper cloud models can be chosen for a given setting.
Volume: 9
Issue: 1
Page: 101-103
Publish at: 2018-01-01

Codesign Methodology based FPGA and Embedded Linux for Motor Control

10.11591/ijeecs.v9.i1.pp204-211
Ibtihel Jaziri , Lotfi Charaabi , Khaled Jelassi
Recently, the complexity of the embedded electrical systems is increasing due to the growing of industrial necessities. To handle with this complexity, the use of reconfigurable hardware/software codesign methodology using digital platforms becomes necessary. Reconfigurable methodology can be seen as an essential feature in motor control systems as it offers many advantages such as increased flexibility, low energy consumption. In these kind of systems, both hardware and software designs can be reconfigurated depending upon the designer requirements. This paper presents hardware/software codesign methodology with flexible hardware devices and configurable graphical user interface: the hardware architecture is based on field-programmable gate array and the software architecture is based on embedded Linux operating system running on Beaglebone. The user interface is designed as a graphical user interface developed on an emebdded server; this enables the user to access to the system rapidly, parameterize and observe the behavior of the controller.
Volume: 9
Issue: 1
Page: 204-211
Publish at: 2018-01-01

A Fusion Network for Nautical On-Board Communications

10.11591/ijeecs.v9.i1.pp1-4
Capt. Samson Joseph
Modern maritime on-board communications have to be improved for safety and security. Current technology provides ease and expediency together to the crew and passengers with the help of ubiquitous technologies. Making use of Wireless Sensor Network (WSN) on board is a current custom of implementing ubiquitous technology for ships as it is important for an on-board communication system which provides reliability and flexibility for handling emergency situations. Two key phases of this scheme are: merging different on-board communiqué networks into a fusion system and enabling the cooperation between them; smoothly incorporating these networks with a consideration of backward compatibility, ease of deployment and association to shore via Internet. A combined integration move towards is selected based on comprehensive analysis.
Volume: 9
Issue: 1
Page: 1-4
Publish at: 2018-01-01

Ziegler-Nichols Based Proportional-Integral-Derivative Controller for a Line Tracking Robot

10.11591/ijeecs.v9.i1.pp221-226
Kim Seng Chia
Line tracking robots have been widely implemented in various applications. Among various control strategies, a proportional-integral-derivative (PID) algorithm has been widely proposed to optimize the performance of a line tracking robot. However, the motivation of using a PID controller, instead of a proportional (P) or a proportional-integral (PI) controller, in a line tracking task has seldom been discussed. Particularly, the use of a systematic tuning approach e.g. closed loop Ziegler Nichols rule to optimize the parameters of a PID controller has rarely been investigated. Thus, this paper investigates the performance of P, PI, and PID controllers in a line tracking task, and the ability of Ziegler Nichols rule to optimize the parameters of the P, PI, and PID controllers. First, the ultimate gain value, Ku and ultimate period of oscillation, Pu were estimated using a proposed approach. Second, the values of KP, KI and KD were estimated using the Ziegler Nichols formulae. The performance of a differential wheeled robot in the line tracking task was evaluated using three different speeds. Results indicate that the Ziegler Nichols rule coupled with the proposed method is able to identify the parameters of the P, PI, and PID controllers systematically in the line tracking task. Findings indicate that the mobile robot coupled with a proportional controller achieved the best performance compared to PI and PID controllers in the line tracking process when the estimated initial parameters were used.
Volume: 9
Issue: 1
Page: 221-226
Publish at: 2018-01-01

An Impact of ZigBee Technology in Data Communication System

10.11591/ijeecs.v9.i1.pp64-67
Dhanya. T
ZigBee is an IEEE 802.15.4 standard for information interchanges with business and purchaser gadgets. It is composed around low-control utilization permitting batteries to keep going forever. The ZigBee standard gives system, security, and application bolster administrations working on top of the IEEE 802.15.4 Medium Access Control (MAC) and Physical Layer (PHY) remote standard. It utilizes a suite of innovations to empower adaptable, self-arranging, self-mending systems that can oversee different information movement designs. ZigBee is an ease, low-control, remote lattice organizing standard. The ease permits the innovation to be broadly sent in remote control and observing applications, the low power-use permits longer an existence with little batteries, and the cross-section systems administration gives high dependability and bigger range.ZigBee has been created to take care of the developing demand for able remote systems administration between various low power. In industry ZigBee is being utilized for cutting-edge robotized assembling, with little transmitters in each gadget on the floor, taking into consideration correspondence between devices to a focal PC. This new level of communication allows finely-tuned remote observing and control.
Volume: 9
Issue: 1
Page: 64-67
Publish at: 2018-01-01

Changing the Electrical Safety Culture

10.11591/ijeecs.v9.i1.pp93-96
Benjamin Franklin A , Sasilatha T
Electrical wellbeing - Where were we yesterday? Where are we today? Where will we be later on? The wellbeing society is proceeding to advance to give a more secure workplace to individuals working around electrical hardware. To enhance electrical security, it takes sense of duty regarding consistent change of the electrical wellbeing society. New musings and thoughts to enhance electrical wellbeing are basic. This paper addresses how function hones have changed after some time and prescribes thoughts to overhaul the current electrical culture. To change the current security culture new thoughts should be produced to cause higher execution in electrical wellbeing for all individuals presented to electrical risks. New circuit testers take in great and unfortunate propensities from more experienced circuit testers. Human execution depends on a mix of information, abilities, and educated practices. Convictions can be affected through perceptions and collaborations with different experts. The estimation of value mentorship conveys a high level of obligation to guarantee legitimate wellbeing rehearses is taken after. Almost no exertion has been given to preparing the nonelectrical labourers that are presented to electrical risks. Preparing for non-electrical labourers is a missing component in the present electrical security culture. A principal contention in this paper is that culture speaks to the entirety of what is regularly adequate without examination. The way of life is likewise determined by regular perception and experience. With a specific end goal to change the way of life there must be a redefinition of what is satisfactory, trailed by noticeable changes that everybody can understanding and watch. Administration possesses culture since it sets what is passable and satisfactory. Accordingly, the fate of electrical wellbeing will rely upon how well administration comprehends the hazard and results of electrical work and their duty in moulding and owning electrical security strategies. Enter components tended to in this paper incorporate human execution, innovation changes, adjusting to change, actualizing new thoughts to enhance security and how staff changes inside an enterprise can influence wellbeing execution. 
Volume: 9
Issue: 1
Page: 93-96
Publish at: 2018-01-01

Gravitational Search Algorithm Based Technique for Voltage Stability Improvement

10.11591/ijeecs.v9.i1.pp123-130
Mohamad Khairuzzaman Mohamad Zamani , Ismail Musirin , Mohamad Sabri Omar , Saiful Izwan Suliman , Nor Azura Md. Ghani , Nur Azwan Mohamed Kamari
Voltage instability problem has been known as a significant threat to power system operation since its occurrence can lead to power interruption. This phenomenon can be due to uncontrollable load increment, line and generator outage contingencies or unplanned load curtailment. Optimal reactive power dispatch involving reactive power support can be one of the options for improving voltage stability of a power system, which also requires optimization process. Optimal sizing and location can of reactive power support can avoid the system from experiencing over-compensated or under-compensated phenomena. The presence of optimization techniques has helped solving non-optimal phenomenon, nevertheless some setbacks have also been experienced in terms of inaccuracy and stuck in local optima. This paper presents the application of Gravitational Search Algorithm (GSA) technique in attempt to solve optimal reactive power dispatch problem in terms of reactive power support for voltage stability improvement. Optimization process tested on IEEE 14-bus Reliability Test System (RTS) has revealed its superiority with significant promising results in terms of voltage stability improvement in the test system. 
Volume: 9
Issue: 1
Page: 123-130
Publish at: 2018-01-01

A Study of Secured Enabled Passive Optical Network Enabling RoF

10.11591/ijeecs.v9.i1.pp43-48
M. Deepak
Innovation is an incorporation of radio sign in optical fiber transmission inside of system foundations that are thought to be financially savvy, pragmatic and moderately adaptable framework setup for whole deal transport remote signs. This venture proposes a Next era PON construction modeling backings RoF and OFDMA signal coordination without WDM lasers, and exhibit that 10-Gb/s OFDMA and three RF signals at 2.1GHz are transmitted more than 20km SMF in a 32-ONU in both upstream and downstream bearing. A security control unit and an optical switch are utilized associating four Optical Line Terminations (OLTs) with everyone serving just 32 Optical Network Units (ONUs). Insurance control unit gathers data of ONUs served by each OLT, and when an OLT falls flat, it will educate an active OLT to help its unique ONUs together with the burden served by the fizzled OLT.
Volume: 9
Issue: 1
Page: 43-48
Publish at: 2018-01-01

A Semi-Autonomous Coal Mine Monitoring Security System Based On Wireless Control Using RTOS

10.11591/ijeecs.v9.i1.pp33-35
Singh Omkar Ramabhilash , Santosh Kumar Singh
Novel coal mine administration framework to tackle the ongoing observing and profoundly effective safeguard issues of underground work stages. In this paper proposing a robot that has the fitness to identify the covered mine and let the client control it remotely to stay away from others conscious causalities. The robot is outfitted with exceptional wheels controlled by H-Bridge module, enabling it to move in every single conceivable bearing. In this venture we concentrate on the security of people and the robot; the robot is outfitted with unique range sensors that assistance in staying away from the snags in the field by extraordinarily recognizing the position of obstructions. For the manufacture of the venture, a unique model made of lightweight temperature safe metal is utilized on which every one of the articles is conveyed. Gas immediate, mischance help ask for, video gushing and voice declaration are the extra components of this framework. Advance, a remote ZigBee is added to the robot, which gets the constant estimations of flame, temperature. ARM microcontroller charges the robot. The camcorder connection to the gadget will transmit the picture in the Motion-JPEG arrange alongside a speaker who will enable us to send the crisis charge with the assistance of the voice message device. The application firmware keeps running on top of a RTOS to deal with multitasking prerequisites of the framework. This strategy has a down to earth profit if diminishing the quantity of causalities, after the execution of the procedure; the robot can be controlled productively with slightest buffering time.
Volume: 9
Issue: 1
Page: 33-35
Publish at: 2018-01-01

Controlling Pornography Over The Web

10.11591/ijeecs.v9.i1.pp104-106
Archenaa J , E. A. Mary Anitha
This investigation analyzed the degree to which youngsters are protected on the web with an emphasis on web erotica. The goals of this investigation incorporate (a) to find out the degree to which kids peer connections impact their web get to; (b) to decide the effect of sex on understudy utilization of web for long range informal communication; (c) to test whether sex have huge impact on understudy utilization of web for texting; (d) to test whether sex affect on understudy utilization of web for Email; (e) to decide the commitment of sex understudy utilization of web for video posting/seeing; (f) to test whether sex have huge commitment on understudy utilization of web for their homework; and (g) to discover the degree of youngsters open to erotica on the web. Essential wellspring of information gathering was utilized in this investigation and the factual devices utilized for information examination incorporate the Chi-square test measurement, Bar outline, Pie diagram and rate circulation. The outcome got was that greater part of kids don't approach web through associate connections which suggests that the degree to which youngsters peer connections impact their web get to is low. It was uncovered that understudies utilize the web for long range interpersonal communication, video posting/review, and Emailing yet don't utilize it for texting and in getting their work done. It was discovered that dominant part of the kids are not presented to online erotica, in opposite it ought to be noticed that the couple of kids who utilize the web for these exercises are at danger of being presented to obscenity on the web.
Volume: 9
Issue: 1
Page: 104-106
Publish at: 2018-01-01

Cryptographic Hashing Method using for Secure and Similarity Detection in Distributed Cloud Data

10.11591/ijeecs.v9.i1.pp107-110
A. Mohamed Divan Masood , S. K. Muthusundar
The explosive increase of data brings new challenges to the data storage and supervision in cloud settings. These data typically have to be processed in an appropriate fashion in the cloud. Thus, any improved latency may originanimmense loss to the enterprises. Duplication detection plays a very main role in data management. Data deduplication calculates an exclusive fingerprint for each data chunk by using hash algorithms such as MD5 and SHA-1. The designed fingerprint is then comparing against other accessible chunks in a database that dedicates for storing the chunks. As an outcome, Deduplication system improves storage consumption while reducing reliability. Besides, the face of privacy for responsive data also arises while they are outsourced by users to cloud. Aiming to deal with the above security challenges, this paper makes the first effort to honor the notion of distributed dependable Deduplication system. We offer new distributed Deduplication systems with privileged reliability in which the data chunks are distributed across a variety of cloud servers. The protection needs an different of using convergent encryption as in foregoing Deduplication systems.
Volume: 9
Issue: 1
Page: 107-110
Publish at: 2018-01-01

Analysis on Modified Fuzzy Logic Toolbox for Marine Navigation Applications

10.11591/ijeecs.v9.i1.pp73-76
P. Palanichamy
Programmed marine navigation and control is a vital piece of savvy vehicle control framework. It incorporates course keeping, and the course is evolving. Its primary design is to guarantee that boats cruise in the provided guidance consequently disregarding changes in ocean conditions, wind and different, unsettling influences. Fuzzy control is the verifiable truth that Fuzzy rationale frameworks require no exact scientific models of the framework under control. Expansion rationale, given expansion set, is to explore the different issue. The blend of development hypothesis and control theory brought another sort of wise control augmentation control. This paper presents Fuzzy augmentation control strategy for marine directing. The paper set up the model of Fuzzy augmentation control framework and concentrated the outline of Fuzzy augmentation controller. Recreation comes about show that the control strategy is profitable.
Volume: 9
Issue: 1
Page: 73-76
Publish at: 2018-01-01
Show 1352 of 1851

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration