Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

27,860 Article Results

A New Dual Band Printed Metamaterial Antenna for RFID Reader Applications

10.11591/ijece.v7i6.pp3507-3514
Abdelhadi Ennajih , Jamal Zbitou , Mohamed Latrach , Ahmed Errkik , Rachid Mandry
In this paper, we present a new dual band metamaterial printed antenna for radio frequency identification applications. The proposed antenna consists of two L-shaped slot in the radiating element for dual band operation and a complementary split ring resonator etched from the ground plane for size miniaturization. This antenna is designed and optimized by CST microwave studio on FR-4 substrate with thickness of 1.6 mm, dielectric constant of 4.4 and tangent loss of 0.025. A microstrip line with characteristic impedance of 50 ohms is used to feed this antenna. A prototype of the proposed antenna is fabricated to validate the simulation results. The measured and simulated results are in good agreement. 
Volume: 7
Issue: 6
Page: 3507-3514
Publish at: 2017-12-01

Quantization Encoding Algorithm Based Satellite Image Compression

10.11591/ijeecs.v8.i3.pp740-742
Anand M , V. Mathivananr
In the field of digital data there is a demand in bandwidth for the transmission of the videos and images all over the worlds. So in order to reduce the storage space in the field of image applications there is need for the image compression process with lesser transmission bandwidth. So in this paper we are proposing a new image compression technique for the compression of the satellite images by using the Region of Interest (ROI) based on the lossy image technique called the Quantization encoding algorithm for the compression. The performance of our method can be evaluated and analyzing the PSNR values of the output images.
Volume: 8
Issue: 3
Page: 740-742
Publish at: 2017-12-01

STM Observation of the Si(111) - (7×7) Reconstructed Surface Modified by Excess Phosphorus Doping

10.11591/ijece.v7i6.pp2993-3001
Hirulak D. Siriwardena , Toru Yamashita , Masaru Shimomura
The electronic properties of semiconductor surfaces change readily upon changing the carrier densities by controlling the dopant concentration. Additionally, excess dopant atoms can exert electric field which would affect the molecular adsorption process and could be used to manipulate the dynamic movement of confined molecules. A mechanism can be developed to control the molecular dynamic movement on modified semiconductor surface by dopants thus changing the effect of the electric field on the active molecules.  In this study, the Si(111) surface was doped with phosphorus excessively using thermal diffusion process. The surface was then reconstructed to the 7 × 7 configuration via heating under UHV conditions and then studied through STM and STS techniques. The protrusions due to surface and subsurface P atoms appear brighter due to the lone electron pair. The 7 × 7 reconstruction would be destabilized after a critical P substitution of Si-adatom concentration due to high surface strain result in P-terminated (6√3 × 6√3)R30º reconstruction.
Volume: 7
Issue: 6
Page: 2993-3001
Publish at: 2017-12-01

PDC Analysis of LLDPE-NR Nanocomposite for Effect of Moisture Absorption

10.11591/ijece.v7i6.pp3133-3139
N. A. M. Jamail , M. A. M. Piah , N. A. Muhammad , Q. E. Kamarudin
The properties of insulation have been improved by many research and the ability of nanocomposite material that composes the characteristic of improving electrical performance due to the addition of nanofiller into the based material gets serious attention. Polarization and Depolarization Current (PDC) measurement that has the ability to assess the condition of HV insulations with the initial periods after a DC step voltage application was favoured compared to other non-destructive monitoring techniques. This paper presents the works on moisture absorption in LLDPE-NR nanocomposite with different amount and percentage of nanofillers. The study of PDC level of the LLDPE-NR compound, filled with different amount of SiO2, TiO2 and MMT nanofiller using Polarization and Depolarization Current (PDC) measurement technique is the main objective of this research. These results show that sample A1 has the lowest polarization current value and sample B5 has the lowest depolarization current value.
Volume: 7
Issue: 6
Page: 3133-3139
Publish at: 2017-12-01

S-Bend Silicon-On-Insulator (SOI) Large Cross-Section Rib Waveguide for Directional Coupler

10.11591/ijece.v7i6.pp3299-3305
Nurdiani Zamhari , Abang Annuar Ehsan , Mohd Syuhaimi Abdul Rahman
S-bend contributes the high losses in the silicon-on-insulator (SOI) large cross-section rib waveguide (LCRW). The objective of this work is to investigate S-bend SOI LCRW with two different single-mode dimensions named symmetrical and asymmetrical. The S-bend SOI LCRW has been simulating using beam propagation method in OptiBPM software. The asymmetrical waveguide with two different dimension arc given the best performance if compared to others dimension with 3 µm of waveguide spacing. It achieved 92.24% and 91.10% of normalized output power (NOP) for 1550 nm and 1480 nm wavelength respectively. Moreover, the minimum of S-bend spacing between the two cores is 0.9 µm for both 1550 nm and 1480 nm. Therefore, asymmetrical waveguide with two different dimension arc and 0.9 µm of S-bend spacing are chosen. This analysis is important to determine the right parameter in order to design the SOI passive devices. However, future work should be done to see the performance by designing the coupler and implement in the real system.
Volume: 7
Issue: 6
Page: 3299-3305
Publish at: 2017-12-01

A Reliable Peer-to-Peer Platform for Adding New Node Using Trust Based Model

10.11591/ijece.v7i6.pp3515-3520
Vimal S. , Srivatsa S K.
In order to evaluate the trustworthiness of participating peers in unstructured peer-to-peer networks, Reputation aggregation methods are used in this method. Each and every peer of the network will collect the local scores of each transaction and will compute global scores by aggregating all the local scores with the help of global scores, each individual peer can interact with its suitable peers. But the existing method will not consider the score of the new peer. In this condition, requests are handled by existing peers who leads to failure in downloading process. To rectify this, NP-TRUST model is used to distribute the request to all peers including the newly joined peers. The proposed method is compared with gossip and DFR-TRUST model in Transaction Success rate and variation in file request.
Volume: 7
Issue: 6
Page: 3515-3520
Publish at: 2017-12-01

Fog Computing: Issues, Challenges and Future Directions

10.11591/ijece.v7i6.pp3669-3673
Prakash P , Darshaun K. G. , Yaazhlene. P , Medidhi Venkata Ganesh , Vasudha B
In Cloud Computing, all the processing of the data collected by the node is done in the central server. This involves a lot of time as data has to be transferred from the node to central server before the processing of data can be done in the server. Also it is not practical to stream terabytes of data from the node to the cloud and back. To overcome these disadvantages, an extension of cloud computing, known as fog computing, is introduced. In this, the processing of data is done completely in the node if the data does not require higher computing power and is done partially if the data requires high computing power, after which the data is transferred to the central server for the remaining computations. This greatly reduces the time involved in the process and is more efficient as the central server is not overloaded. Fog is quite useful in geographically dispersed areas where connectivity can be irregular. The ideal use case requires intelligence near the edge where ultra-low latency is critical, and is promised by fog computing. The concepts of cloud computing and fog computing will be explored and their features will be contrasted to understand which is more efficient and better suited for real-time application.
Volume: 7
Issue: 6
Page: 3669-3673
Publish at: 2017-12-01

Pedestrian Detection using Triple Laser Range Finders

10.11591/ijece.v7i6.pp3037-3045
Abdul Hadi Abd Rahman , Khairul Akram Zainol Ariffinv , Nor Samsiah Sani , Hairi Zamzuri
Pedestrian detection is one of the important features in autonomous ground vehicle (AGV). It ensures the capability for safety navigation in urban environment. Therefore, the detection accuracy became a crucial part which leads to implementation using Laser Range Finder (LRF) for better data representation. In this study, an improved laser configuration and fusion technique is introduced by implementation of triple LRFs in two layers with Pedestrian Data Analysis (PDA) to recognize multiple pedestrians. The PDA integrates various features from feature extraction process for all clusters and fusion of multiple layers for better recognition. The experiments were conducted in various occlusion scenarios such as intersection, closed-pedestrian and combine scenarios. The analysis of the laser fusion and PDA for all scenarios showed an improvement of detection where the pedestrians were represented by various detection categories which solve occlusion issues when low numberof laser data were obtained.
Volume: 7
Issue: 6
Page: 3037-3045
Publish at: 2017-12-01

Multi-Machine Stability Using Dynamic Inversion Technique

10.11591/ijece.v7i6.pp3176-3189
Abha Tripathi , K. Uma Rao , L. Venkatesha
Stability studies of multi machine system are a major concern to power system engineers due to the increasing complexity involved. This paper deals with the application of a nonlinear technique called Dynamic Inversion, to TCSC for the improvement of stability of multi-machine system. The transient stability studies for various cases: without any controller, with 75% line compensation and with Dynamic Inversion technique, are compared. The critical clearing time as well as the maximum loading ability is also discussed. The result for the nonlinear controller is found to be better than all the other cases.
Volume: 7
Issue: 6
Page: 3176-3189
Publish at: 2017-12-01

Power Consumption Modeling and Analysis of Integrated Optical-Wireless Access Network

10.11591/ijece.v7i6.pp3475-3483
A. Ramli , N. Zulkifli , S. M. Idrus
The integration of optical and wireless technologies at access networks are considered as a future solution which provide both high bandwidth and high mobility in an efficient way. GPON is a suitable candidate for optical backhaul due to the combination of higher data rates, greater split ratio and support for triple play services hence it offers maximum flexibility and cost advantages. On the other hand, recent developments of new radio access technologies and introduction of femtocell base stations provide the potential of offering broadband services and applications to everyone and everywhere. However, the power consumption of this network demands a particular attention because access networks are the largest contributor the network related electricity consumption. Therefore, in this paper we evaluate the power consumption of integrated optical-wireless access network which is based on independent ONU-BS architecture. We proposed a power consumption model for such network and the assessment has been done under different simulation scenarios. The constructed model will provide insight of the energy performance of the integrated access network so that in the network design process, focus can be done to the most energy saving strategies.
Volume: 7
Issue: 6
Page: 3475-3483
Publish at: 2017-12-01

Efficient End-to-End Secure Key Management Protocol for Internet of Things

10.11591/ijece.v7i6.pp3622-3631
Yamina Benslimane , Khelifa BenAhmed
Internet of things (IoT) has described a futurevision of internetwhere users, computing system, and everyday objects possessing sensing and actuating capabilities are part of distributed applications and required to support standard internet communication with more powerful device or internet hosts. This vision necessitates the security mechanisms for end-to-end communication. A key management protocol is critical to ensuring the secure exchange of data between interconnecting entities, but due to the nature of this communication system where a high resource constrained node may be communicating with node with high energy makes the application of existing key management protocols impossible. In this paper, we propose a new lightweight key management protocol that allows the constrained node in 6loWPAN network to transmit captured data to internet host in secure channel. This protocol is based on cooperation of selected 6loWPAN routers to participate in computation of highly consuming cryptographic primitives. Our protocol is assessed with AVISPA tool, the results show that our scheme ensured security properties.
Volume: 7
Issue: 6
Page: 3622-3631
Publish at: 2017-12-01

Reduction of Total Harmonic Distortion in Cascaded H-Bridge Inverter by Pattern Search Technique

10.11591/ijece.v7i6.pp3292-3298
Suresh N. , R. Samuel Rajesh Babu
Pattern Search technique can be used to find the solution for the optimization problem. In this paper, pattern search algorithm has been utilized to calculate the switching angles for the cascaded H-bridge inverter with  the consideration of minimizing total harmonic distortion. Mathematical equations for the optimization problem were formulated by fourier analysis technique. Lower order harmonics such as third, fifth, seventh, ninth and eleventh order harmonics were taken into account to mitigate the total harmonic distortion of the inverter. Simulations have been carried out for thirteen level, fifteen level and seventeen level cascaded H-bridge inverter using matlab software. Total harmonic distortion of voltage and current for resistive load, resistive-inductive load and motor load were analyzed.
Volume: 7
Issue: 6
Page: 3292-3298
Publish at: 2017-12-01

Study on the Effect of the Ambient Temperature toward the Quality of Sleep

10.11591/ijece.v7i6.pp2986-2992
Wira Hidayat bin Mohd Saad , Khoo Chin Wuen , Masrullizam bin Mat Ibrahim , Nor Hashimah Binti Mohd Saad , Syafeeza Binti Ahmad Radz , Ahmad Sayuthi bin Mohamad Shokri , Mohd Safirin bin Karis
Getting enough sleep at the right times can help in improving quality of life and protect mental and physical health. This study proposes a portable sleep monitoring device to determine the relationship between the ambient temperature and quality of sleep. Body condition parameter such as heart rate, body temperature and body movement was used to determine quality of sleep. All readings will be log into database so that users can review back and hence analyze quality of sleep. The functionality of the overall system is designed for a better experience with a very minimal intervention to the user. The simple test on the body condition (body temperature and heart rate) while asleep with several different ambient temperatures are varied and the result shows that someone has a better sleep for the temperature range of 23 to 28 degree Celsius. This can prove by lower body temperature and lower heart rate.
Volume: 7
Issue: 6
Page: 2986-2992
Publish at: 2017-12-01

Planning and Conducting Magnetic Field Level Measurement from Overhead Transmission Line

10.11591/ijece.v7i6.pp3124-3132
H.M. Luqman , M.N.R. Baharom , H. Ahmad , Irshad Ullah
Human population and power consumption keeps on growing with each year. In order to satisfy electricity demand, more electrical energy has to be supplied, resulting in higher magnetic field level radiation. In rapid urbanization country, lack of space will force civilization to be built near overhead transmission line that sparks public concern on adverse health effects due to the magnetic field radiation. A new UTHM hostel residential area was built near OTLs that shared the same concern. Thus a proper planning to conduct magnetic field level measurement was done to examine the maximum magnetic field level radiated that covered the hostel residential area. The results were far from reaching the maximum permissible magnetic field level proposed by ICNIRP. Though, the steps taken and the methods used might be suitable guidelines for others that encounter similar situations.
Volume: 7
Issue: 6
Page: 3124-3132
Publish at: 2017-12-01

Design of Android Based Smart Car

10.11591/ijeecs.v8.i3.pp648-650
D. Wilfred Shiju
Android smart car is designed with safety in mind. A simple and sensitiveline, included steering wheels and new voice events, this is designed to reduceinterruption so you can stay focused on the highway.This car which can be controlling using an Android APP for smart phones.A car is regularly an electronic mechanic machine that is guide by computer and electronic controlling programming. The innovation of the Smart Car technology to developing based on remote connection using android application can control the car movements. This system use Bluetooth device controller to control the mobile App. This Bluetooth device interface with UART communication. The UART receive the command via the Bluetooth device.   This design is may helps to our rural citifies. This system is developing to help to self driving vehicles.
Volume: 8
Issue: 3
Page: 648-650
Publish at: 2017-12-01
Show 1380 of 1858

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration