Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

28,451 Article Results

Design, Realization and Measurements of Compact Dual-band CPW-fed Patch Antenna for 2.45/5.80 GHz RFID Applications

10.11591/ijece.v8i1.pp172-178
Mohamed Tarbouch , Abdelkebir El Amri , Hanae Terchoune
In this paper, a Coplanar Wave Guide (CPW)-Fed microstrip octagonal patch antenna for RFID Applications is proposed. The studied structure is suitable for 2.45/5.80 GHz applications. The octagonal shape is obtained by making triangular cuts in the four angles of the rectangular microstrip patch antenna; in addition the using of CPW-Fed allows obtaining UWB characteristics in the higher band. The miniaturization in the antenna size for lower band is achieved by introducing an inverted E slot in the radiating element. The proposed antenna is designed on a single and a small substrate board of dimensions 29.5×29.5×1.6 mm3. Moreover the miniaturized antenna has a good impedance matching and an enhanced gain. The simulation analysis was performed using the CADFEKO software, a Method of Moment (MoM) based solver, and a prototype of this antenna was fabricated, good agreement with the simulation providing validation of the design procedure. The measurements are done with ANRITSU MS2026C Vectorial Network Analyzer.
Volume: 8
Issue: 1
Page: 172-178
Publish at: 2018-02-01

Symbolic-Connectionist Representational Model for Optimizing Decision Making Behavior in Intelligent Systems

10.11591/ijece.v8i1.pp326-332
R. John Martin , Sujatha Sujatha
Modeling higher order cognitive processes like human decision making come in three representational approaches namely symbolic, connectionist and symbolic-connectionist. Many connectionist neural network models are evolved over the decades for optimizing decision making behaviors and their agents are also in place. There had been attempts to implement symbolic structures within connectionist architectures with distributed representations. Our work was aimed at proposing an enhanced connectionist approach of optimizing the decisions within the framework of a symbolic cognitive model. The action selection module of this framework is forefront in evolving intelligent agents through a variety of soft computing models. As a continous effort, a Connectionist Cognitive Model (CCN) had been evolved by bringing a traditional symbolic cognitive process model proposed by LIDA as an inspiration to a feed forward neural network model for optimizing decion making behaviours in intelligent agents. Significanct progress was observed while comparing its performance with other varients.
Volume: 8
Issue: 1
Page: 326-332
Publish at: 2018-02-01

Comparative Analysis of Linear Controllers used for Grid Connected PV System

10.11591/ijece.v8i1.pp513-520
Ritesh Dash , Sarat Chandra Swain , Sanhita Mishra
Requirement for electrical energy is increasing in a ramp function manner. To meet the steady increasing in energy demand it is required to find some alternate source of energy. Except the conventional source of energy one type of renewable energy i.e PV may be regarded as a clean source of energy to meet the energy demand. PV modules generating DC power cannot be directly connected to the electrical infrastructure as most of the grid infrastructure uses either 230volt or 120 volt. Therefore power electronic device most be connected (inverter) between PV and grid. In order to make a competitive market between the renewable generated power and conventional way of generating the power it is required to design a cost effective inverter, qualitative output which is pure sinusoidal and harmonics free. In this paper a comparative analysis among the various linear controllers are presented. Proposed Optimised PID Controller is Presented through MATLAB Simulink based environment.
Volume: 8
Issue: 1
Page: 513-520
Publish at: 2018-02-01

Force Multiplier Effect of Futuristic Battlefield Preparedness by Adapting the Internet of Things (IoT) Concept

10.11591/ijeecs.v9.i2.pp316-321
G Kannan , N Manoharan
The present-day Battlefield environment depicts a scenario wherein various heterogeneous warfighting vehicles/equipment are conglomerated, and the high command takes a decision based on the different inputs and data received from the warfighting entities.  This aspect generates voluminous data and communication directives occupying the complete frequency spectrum and moving up and down. This paper proposes a scheme based on the Internet of Things (IoT) philosophy.  The primary focus will be to deploy ubiquitous sensing enabled technologies (IoT) in all the battlefield fighting entities. This medium in effect means the interconnection of uniquely identifiable embedded computing-like devices and formulation of an internet infrastructure. The newly proposed IoT devices in all the battlefield fighting entities will gather, infer and understand in-situ commands and data and in turn pass on to the highest decision-making authority. A simple IoT based model will be deployed in the battlefield scenario enhancing the force multiplier effect.
Volume: 9
Issue: 2
Page: 316-321
Publish at: 2018-02-01

UDP Pervasive Protocol Implementation for Smart Home Environment on MyRIO using LabVIEW

10.11591/ijece.v8i1.pp113-123
Wijaya Kurniawan , Mochammad Hannats Hanafi Ichsan , Sabriansyah Rizqika Akbar
Smart Home concept is to connect several devices to perform control and the device to be controlled to help any human needs. So it should have one device being Host and several devices being Client. The environment in this case is a home that there is too much technology that planted technologies that has much influence at human activities is called pervasive computing. The device communication should be has a protocol, at the research used UDP protocol because it doesn't need to negotiate before performing communication like a TCP. With UDP behavior did not use to validate at every send or deliver data because at Smart Home environment doesn't need a large or big data being processed. LabView used at this research based on previous research, but MyRIO has used this research to perform Client and Host performed by PC. So it can measure how usable the design that created. This research proves that LabView and MyRIO successfully implemented with the design that created to perform Pervasive Computing for Smart Home environment. Functional testing scenario conducted by every condition that on system environment, based on design all testing scenario successfully and working as well as expected.
Volume: 8
Issue: 1
Page: 113-123
Publish at: 2018-02-01

Presentation of an Algorithm for Secure Data Transmission based on Optimal Route Selection during Electromagnetic Interference Occurrence

10.11591/ijece.v8i1.pp259-270
A. H. Poursoltan Mohammadi , M. Chehel Amirani , F. Faghihi
This paper proposes a comprehensive algorithm for secure data transmission via communication conductors considering route optimization, shielding and data authentication. Using of appropriate coding method causes more efficiency for suggested algorithm during electromagnetic field attack occurrence. In this paper, MOM simulation via FIKO software is done for field distribution. Due to critical situation of malfunctioning of data transferring, appropriate shield is designed and examined by shielding effectiveness (SE) criterion resulted of MOM simulation; finally to achieve reliability of data security, MAC hash function is used for space with field attack probability, turbo code is employed.
Volume: 8
Issue: 1
Page: 259-270
Publish at: 2018-02-01

Preferences based Customized Trust Model for Assessment of Cloud Services

10.11591/ijece.v8i1.pp304-325
Shilpa Deshpande , Rajesh Ingle
In cloud environment, many functionally similar cloud services are available. But, the services differ in Quality of Service (QoS) levels, offered by them. There is a diversity in user requirements about the expected qualities of cloud services. Trust is a measure to understand whether a cloud service can adequately meet the user requirements. Consequently, trust assessment plays a significant role in selecting the suitable cloud service. This paper proposes preferences based customized trust model (PBCTM) for trust assessment of cloud services. PBCTM takes into account user requirements about the expected quality of services in the form of preferences. Accordingly, it performs customized trust assessment based on the evidences of various attributes of cloud service. PBCTM enables elastic trust computation, which is responsive to dynamically changing user preferences with time. The model facilitates dynamic trust based periodic selection of cloud services according to varying user preferences. Experimental results demonstrate that the proposed preferences based customized trust model outperforms the other model in respect of accuracy and degree of satisfaction.
Volume: 8
Issue: 1
Page: 304-325
Publish at: 2018-02-01

A Sense-based Registration Process for TDMA in IEEE 802.11 Network

10.11591/ijece.v8i1.pp355-359
Rizal Fathoni Aji , Heru Suhartanto , Setiadi Yazid
TDMA implementation offer better fairness and throughput in IEEE 802.11. To implement TDMA, new registration process is needed, because current registration mechanism can disrupt TDMA process. This paper proposes a sense-based TDMA registration process using service slot and random timer. Simulation result shows, by using our mechanism, we can reduce the number of unused timeslot, and for 10 new nodes, each node only need 7 ms to complete the registration process.
Volume: 8
Issue: 1
Page: 355-359
Publish at: 2018-02-01

A Minimum Cloud Cover Mosaic Image Model of the Operational Land Imager Landsat-8 Multitemporal Data using Tile based

10.11591/ijece.v8i1.pp360-371
Ratih Dewanti Dimyati , Projo Danoedoro , Hartono Hartono , Kustiyo Kustiyo
The need for remote sensing minimum cloud cover or cloud free mosaic images is now increasing in line with the increased of national development activities based on one map policy. However, the continuity and availability of cloud and haze free remote sensing data for the purpose of monitoring the natural resources are still low. This paper presents a model of medium resolution remote sensing data processing of Landsat-8 uses a new approach called mosaic tile based model (MTB), which is developed from the mosaic pixel based model (MPB) algorithm, to obtain an annual multitemporal mosaic image with minimum cloud cover mosaic imageries. The MTB model is an approach constructed from a set of pixels (called tiles) considering the image quality that is extracted from cloud and haze free areas, vegetation coverage, and open land coverage of multitemporal imageries. The data used in the model are from Landsat-8 Operational Land Imager (OLI) covering 10 scenes area, with 2.5 years recording period from June 2015 to June 2017; covered Riau, West Sumatra and North Sumatra Provinces. The MTB model is examined with tile size of 0.1 degrees (11x11 km2), 0.05 degrees (5.5x5.5 km2), and 0.02 degrees (2.2x2.2 km2). The result of the analysis shows that the smallest tile size 0.02 gives the best result in terms of minimum cloud cover and haze (or named clear area). The comparison of clear area values to cloud cover and haze for three years (2015, 2016 and 2017) for the three mosaic images of MTB are 68.2%, 78.8%, and 86.4%, respectively.
Volume: 8
Issue: 1
Page: 360-371
Publish at: 2018-02-01

Feature Selection Mammogram based on Breast Cancer Mining

10.11591/ijece.v8i1.pp60-69
Shofwatul Uyun , Lina Choridah
The very dense breast of mammogram image makes the Radiologists often have difficulties in interpreting the mammography objectively and accurately. One of the key success factors of computer-aided diagnosis (CADx) system is the use of the right features. Therefore, this research emphasizes on the feature selection process by performing the data mining on the results of mammogram image feature extraction. There are two algorithms used to perform the mining, the decision tree and the rule induction. Furthermore, the selected features produced by the algorithms are tested using classification algorithms: k-nearest neighbors, decision tree, and naive bayesian with the scheme of 10-fold cross validation using stratified sampling way. There are five descriptors that are the best features and have contributed in determining the classification of benign and malignant lesions as follows: slice, integrated density, area fraction, model gray value, and center of mass. The best classification results based on the five features are generated by the decision tree algorithm with accuracy, sensitivity, specificity, FPR, and TPR of 93.18%; 87.5%; 3.89%; 6.33% and 92.11% respectively.
Volume: 8
Issue: 1
Page: 60-69
Publish at: 2018-02-01

Migration of Virtual Machine to improve the Security of Cloud Computing

10.11591/ijece.v8i1.pp210-219
N. Chandrakala , B. Thirumala Rao
Cloud services help individuals and organization to use data that are managed by third parties or another person at remote locations. With the increase in the development of cloud computing environment, the security has become the major concern that has been raised more consistently in order to move data and applications to the cloud as individuals do not trust the third party cloud computing providers with their private and most sensitive data and information. This paper presents, the migration of virtual machine to improve the security in cloud computing. Virtual machine (VM) is an emulation of a particular computer system. In cloud computing, virtual machine migration is a useful tool for migrating operating system instances across multiple physical machines. It is used to load balancing, fault management, low-level system maintenance and reduce energy consumption. Virtual machine (VM) migration is a powerful management technique that gives data center operators the ability to adapt the placement of VMs in order to better satisfy performance objectives, improve resource utilization and communication locality, achieve fault tolerance, reduce energy consumption, and facilitate system maintenance activities. In the migration based security approach, proposed the placement of VMs can make enormous difference in terms of security levels. On the bases of survivability analysis of VMs and Discrete Time Markov Chain (DTMC) analysis, we design an algorithm that generates a secure placement arrangement that the guest VMs can moves before succeeds the attack.
Volume: 8
Issue: 1
Page: 210-219
Publish at: 2018-02-01

Virtual Machine Allocation Policy in Cloud Computing Environment using CloudSim

10.11591/ijece.v8i1.pp344-354
Taskeen Zaidi , Rampratap Rampratap
Cloud computing has been widely accepted by the researchers for the web applications. During the past years, distributed computing replaced the centralized computing and finally turned towards the cloud computing. One can see lots of applications of cloud computing like online sale and purchase, social networking web pages, country wide virtual classes, digital libraries, sharing of pathological research labs, supercomputing and many more. Creating and allocating VMs to applications use virtualization concept. Resource allocates policies and load balancing polices play an important role in managing and allocating resources as per application request in a cloud computing environment. Cloud analyst is a GUI tool that simulates the cloud-computing environment. In the present work, the cloud servers are arranged through step network and a UML model for a minimization of energy consumption by processor, dynamic random access memory, hard disk, electrical components and mother board is developed. A well Unified Modeling Language is used for design of a class diagram. Response time and internet characteristics have been demonstrated and computed results are depicted in the form of tables and graphs using the cloud analyst simulation tool.
Volume: 8
Issue: 1
Page: 344-354
Publish at: 2018-02-01

Attitude Control of Quadrotor Using PD Plus Feedforward controller on SO(3)

10.11591/ijece.v8i1.pp566-575
Almido H Ginting , Oyas Wahyunggoro , Adha Imam Cahyadi
This paper proposes a simple scheme of Proportional-Derivative (PD) plus Feedforward controller on SO(3) to control the attitude of a quadrotor. This controller only needs the measurement of angular velocity to calculate the exponential coordinates of the rotation matrix. With rotation matrix as an error variable of the controller, the simulation shows that the controller is able to drive the attitude of the quadrotor from hovering condition to desired attitude and from an attitude condition goes to the hovering condition, despite the system is disturbed. When the system is convergent, the rotation error matrix will be a 3x3 identity matrix.
Volume: 8
Issue: 1
Page: 566-575
Publish at: 2018-02-01

Passive Damper Network in a Simple DC Distribution Power System

10.11591/ijece.v8i1.pp544-555
Awang Bin Jusoh , Muhammad Firdaus Abd Razak , Mohamad Hamka Bin Saiful , Tole Sutikno
Distributed power system (DPS) distributes power amongst processing units such as power electronics converters with DC system. Due to the increasing usage of power converters in DPS system, the system becomes unstable and the converter tends to draw constant power needed by the load of the system. Constant power load (CPL) characteristic has negative input impedance that could produce instability problems in the DC bus system. Passive damping network which consists of series RC damping circuit was connected in parallel to the DC bus system with the purpose to reduce the instability. The passive damper was designed, simulated with MATLAB/Simulink and verified experimentally with different values of CPL power levels and input voltage changes. The obtained simulation results show that simple DC system with constant power load was successfully stabilized by the installation of the passive damping network. The experimental set up was also conducted to validate of the proposed technique, and the obtained results were in excellent agreement with the theoretical parts of the project.
Volume: 8
Issue: 1
Page: 544-555
Publish at: 2018-02-01

Concept Drift Identification using Classifier Ensemble Approach

10.11591/ijece.v8i1.pp19-25
Leena Deshpande , M. Narsing Rao
Abstract:-In Internetworking system, the huge amount of data is scattered, generated and processed over the network. The data mining techniques are used to discover the unknown pattern from the underlying data. A traditional classification model is used to classify the data based on past labelled data. However in many current applications, data is increasing in size with fluctuating patterns. Due to this new feature may arrive in the data. It is present in many applications like sensornetwork, banking and telecommunication systems, financial domain, Electricity usage and prices based on its demand and supplyetc .Thus change in data distribution reduces the accuracy of classifying the data. It may discover some patterns as frequent while other patterns tend to disappear and wrongly classify. To mine such data distribution, traditionalclassification techniques may not be suitable as the distribution generating the items can change over time so data from the past may become irrelevant or even false for the current prediction. For handlingsuch varying pattern of data, concept drift mining approach is used to improve the accuracy of classification techniques. In this paper we have proposed ensemble approach for improving the accuracy of classifier. The ensemble classifier is applied on 3 different data sets. We investigated different features for the different chunk of data which is further given to ensemble classifier. We observed the proposed approach improves the accuracy of classifier for different chunks of data.
Volume: 8
Issue: 1
Page: 19-25
Publish at: 2018-02-01
Show 1384 of 1897

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration