Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

27,860 Article Results

Novel Optimization to Reduce Power Drainage in Mobile Devices for Multicarrier-based Communication

10.11591/ijece.v7i5.pp2401-2410
Shalini Prasad , S Balaji
With increasing adoption of multicarrier-based communications e.g. 3G and 4G, the users are significantly benefited with impressive data rate but at the cost of battery life of their mobile devices. We reviewed the existing techniques to find an open research gap in this regard. This paper presents a novel framework where an optimization is carried out with the objective function to maintain higher level of equilibrium between maximized data delivery and minimized transmit power. An analytical model considering multiple radio antennae in the mobile device is presented with constraint formulations of data quality and threshold power factor. The model outcome is evaluated with respect to amount of power being conserved as performance factor. The study was found to offer maximum energy conservation and the framework also suits well with existing communication system of mobile networks.
Volume: 7
Issue: 5
Page: 2401-2410
Publish at: 2017-10-01

A Novel Approach Based on Decreased Dimension and Reduced Gray Level Range Matrix Features for Stone Texture Classification

10.11591/ijece.v7i5.pp2502-2513
G. S. N. Murthy , Srininvasa Rao. V , T. Veerraju
The human eye can easily identify the type of textures in flooring of the houses and in the digital images visually.  In this work, the stone textures are grouped into four categories. They are bricks, marble, granite and mosaic. A novel approach is developed for decreasing the dimension of stone image and for reducing the gray level range of the image without any loss of significant feature information. This model is named as “Decreased Dimension and Reduced Gray level Range Matrix (DDRGRM)” model. The DDRGRM model consists of 3 stages.  In stage 1, each 5×5 sub dimension of the stone image is reduced into 2×2 sub dimension without losing any important qualities, primitives, and any other local stuff.  In stage 2, the gray level of the image is reduced from 0-255 to 0-4 by using fuzzy concepts.  In stage 3, Co-occurrence Matrix (CM) features are derived from the DDRGRM model of the stone image for stone texture classification.  Based on the feature set values, a user defined algorithm is developed to classify the stone texture image into one of the 4 categories i.e. Marble, Brick, Granite and Mosaic. The proposed method is tested by using the K-Nearest Neighbor Classification algorithm with the derived texture features.  To prove the efficiency of the proposed method, it is tested on different stone texture image databases.  The proposed method resulted in high classification rate when compared with the other existing methods.
Volume: 7
Issue: 5
Page: 2502-2513
Publish at: 2017-10-01

Privacy Preserving Auction Based Virtual Machine Instances Allocation Scheme for Cloud Computing Environment

10.11591/ijece.v7i5.pp2645-2650
Suneeta Mohanty , Prasant Kumar Pattnaik , G. B. Mund
Cloud Computing Environment provides computing resources in the form of Virtual Machines (VMs), to the cloud users through Internet. Auction-based VM instances allocation allows different cloud users to participate in an auction for a bundle of Virtual Machine instances where the user with the highest bid value will be selected as the winner by the auctioneer (Cloud Service Provider) to gain more. In this auction mechanism, individual bid values are revealed to the auctioneer in order to select the winner as a result of which privacy of bid values are lost. In this paper, we proposed an auction scheme to select the winner without revealing the individual bid values to the auctioneer to maintain privacy of bid values. The winner will get the access to the bundle of VM instances. This  scheme relies on a set of cryptographic protocols including Oblivious Transfer (OT) protocol and Yao’s protocol to maintain privacy of bid values.
Volume: 7
Issue: 5
Page: 2645-2650
Publish at: 2017-10-01

Comparison of Emergency Medical Services Delivery Performance using Maximal Covering Location and Gradual Cover Location Problems

10.11591/ijece.v7i5.pp2791-2797
Mohd Hafiz Azizan , Ting Loong Go , W.A. Lutfi W.M. Hatta , Cheng Siong Lim , Soo Siang Teoh
Ambulance location is one of the critical factors that determine the efficiency of emergency medical services delivery. Maximal Covering Location Problem is one of the widely used ambulance location models. However, its coverage function is considered unrealistic because of its ability to abruptly change from fully covered to uncovered. On the contrary, Gradual Cover Location Problem coverage is considered more realistic compared to Maximal Cover Location Problem because the coverage decreases over distance. This paper examines the delivery of Emergency Medical Services under the models of Maximal Covering Location Problem and Gradual Cover Location Problem. The results show that the latter model is superior, especially when the Maximal Covering Location Problem has been deemed fully covered.
Volume: 7
Issue: 5
Page: 2791-2797
Publish at: 2017-10-01

Ant Lion Optimizer for Solving Unit Commitment Problem in Smart Grid System

10.11591/ijeecs.v8.i1.pp129-136
Izni Nadhirah Sam’on , Zuhaila Mat Yasin , Zuhaina Zakaria
This paper proposed the integration of solar energy resources into the conventional unit commitment. The growing concern about the depletion of fossil fuels increased the awareness on the importance of renewable energy resources, as an alternative energy resources in unit commitment operation. However, the present renewable energy resources is intermitted due to unpredicted photovoltaic output. Therefore, Ant Lion Optimizer (ALO) is proposed to solve unit commitment problem in smart grid system with consideration of uncertainties .ALO is inspired by the hunting appliance of ant lions in natural surroundings. A 10-unit system with the constraints, such as power balance, spinning reserve, generation limit, minimum up and down time constraints are considered to prove the effectiveness of the proposed method. The performance of proposed algorithm are compared with the performance of Dynamic Programming (DP). The results show that the integration of solar energy resources in unit commitment scheduling can improve the total operating cost significantly. 
Volume: 8
Issue: 1
Page: 129-136
Publish at: 2017-10-01

Optimal Reactive Power Scheduling Using Cuckoo Search Algorithm

10.11591/ijece.v7i5.pp2349-2356
Surender Reddy Salkuti
This paper solves an optimal reactive power scheduling problem in the deregulated power system using the evolutionary based Cuckoo Search Algorithm (CSA). Reactive power scheduling is a very important problem in the power system operation, which is a nonlinear and mixed integer programming problem. It optimizes a specific objective function while satisfying all the equality and inequality constraints. In this paper, CSA is used to determine the optimal settings of control variables such as generator voltages, transformer tap positions and the amount of reactive compensation required to optimize the certain objective functions. The CSA algorithm has been developed from the inspiration that the obligate brood parasitism of some Cuckoo species lay their eggs in nests of other host birds which are of other species. The performance of CSA for solving the proposed optimal reactive power scheduling problem is examined on standard Ward Hale 6 bus, IEEE 30 bus, 57 bus, 118 bus and 300 bus test systems. The simulation results show that the proposed approach is more suitable, effective and efficient compared to other optimization techniques presented in the literature.
Volume: 7
Issue: 5
Page: 2349-2356
Publish at: 2017-10-01

An Overview of e-Health in Indonesia: Past and Present Applications

10.11591/ijece.v7i5.pp2441-2450
Dwi Cahya Astriya Nugraha , Ismiarta Aknuranda
Indonesia is the largest archipelagic country in the world. There are five major islands and thousands of smaller islands, most of which are in the distance. Therefore, its health services are hardly distributed. E-Health is one of the methods expected to deal with the problem of distance in health services. The development and use of technology in health area has given rise to several studies on the applications of e-Health in Indonesia. Based on a number of studies, we find that e-Health in Indonesia has been applied since 1985. The technologies and features used from time to time were growing in some period of time. However, the study also shows that from that point of time the number and variety of technologies and features provided are decreasing and the focus shifted to further analysis of the problems needed to be solved and provision of technologies and features only relevant to those problems. The development of e-Health applications in Indonesia has given promising results in providing health services, but they are still conducted by certain educational institutions and their uses are not evenly distributed throughout Indonesia.
Volume: 7
Issue: 5
Page: 2441-2450
Publish at: 2017-10-01

Signboard Text Translator: A Guide to Tourist

10.11591/ijece.v7i5.pp2496-2501
Ilaiah Kavati , G Kiran Kumar , Sarika Kesagani , K Srinivasa Rao
The travelers face troubles in understanding the signboards which are written in local language. The travelers can rely on smart phone for traveling purposes. Smart phones become most popular in recent years in terms of market value and the number of useful applications to the users. This work intends to build up a web application that can recognize the English content present on signboard pictures captured using a smart phone, translate the content from English to Telugu, and display the translated Telugu text back onto the screen of the phone. Experiments have been conducted on various signboard pictures and the outcomes demonstrate the viability of the proposed approach.
Volume: 7
Issue: 5
Page: 2496-2501
Publish at: 2017-10-01

Family Relationship Identification by Using Extract Feature of Gray Level Co-occurrence Matrix (GLCM) Based on Parents and Children Fingerprint

10.11591/ijece.v7i5.pp2738-2745
Suharjito Suharjito , Bahtiar Imran , Abba Suganda Girsang
This study aims to find out the relations correspondence by using Gray Level Co-occurrence Matrix (GLCM) feature on parents and children finger print. The analysis is conducted by using the finger print of parents and family in one family There are 30 families used as sample with 3 finger print consists of mothers, fathers, and children finger print. Fingerprints data were taken by fingerprint digital persona u are u 4500 SDK. Data analysis is conducted by finding the correlation value between parents and children fingerprint by using correlation coefficient that gained from extract feature GLCM, both for similar family and different family. The study shows that the use of GLCM Extract Feature, normality data, and Correlation Coefficient could identify the correspondence relations between parents and children fingerprint on similar and different family. GLCM with four features (correlation, homogeneity, energy and contrast) are used to give good result. The four sides (0o, 45o, 90o and 135o) are used. It shows that side 0o gives the higher accurate identification compared to other sides.
Volume: 7
Issue: 5
Page: 2738-2745
Publish at: 2017-10-01

Content an Insight to Security Paradigm for BigData on Cloud: Current Trend and Research

10.11591/ijece.v7i5.pp2873-2882
Chhaya S Dule , Girijamma H. A.
The sucesssive growth of collabrative applications prodcuing Bigdata on timeline leads new opprutinity to setup commodities on cloud infrastructure. Mnay organizations will have demand of an efficient data storage mechanism and also the efficient data analysis. The Big Data (BD) also faces some of the security issues for the important data or information which is shared or transferred over the cloud. These issues include the tampering, losing control over the data, etc. This survey work offers some of the interesting, important aspects of big data including the high security and privacy issue. In this, the survey of existing research works for the preservation of privacy and security mechanism and also the existing tools for it are stated. The discussions for upcoming tools which are needed to be focused on performance improvement are discussed. With the survey analysis, a research gap is illustrated, and a future research idea is presented
Volume: 7
Issue: 5
Page: 2873-2882
Publish at: 2017-10-01

Current Controller Based Power Management Strategy for Interfacing DG Units to Micro Grid

10.11591/ijece.v7i5.pp2300-2308
N. Chaitanya , P. Sujatha , K. Chandra Sekhar
This paper proposes a power management strategy of parallel inveters based system, to enhance the power generation capacity of the existing system with distributed energy sources one has to choose DG source based inverter connected in parallel with the existing system.Two DG sources PV, Fuel cells feeds the DC voltage to two parallel inverters connected to the grid. Fixed band hysteresis current control with Instantaneous p-q power theory is adopted to create an artificial environment. Two parallel inverters are able to deliver the harvested power from PV, FC to grid and able to balance the load Without communication between parallel inverters this controller having the capability of load following, the harmonic components of currents at output of inverter are also very low; this will automatically reduces the circulating currents between parallel inverters. Simulation studies are carried out to investigate the results of PV, FC systems connected to the utility grid.
Volume: 7
Issue: 5
Page: 2300-2308
Publish at: 2017-10-01

Inter-cell Interference Management Technique for Multi-Cell LTE-A Network

10.11591/ijece.v7i5.pp2696-2705
Iskandar Iskandar , I. Setyawan , H. Nuraini
In modern cellular system such as LTE Advanced (LTE-A), frequency reuse scheme is targeted to be applied to fulfill the requirement of high capacity broadband access and high spectrum efficiency. But this kind of frequency planning may lead to the worse inter-cell interference (ICI) level experienced especially by a user located at the cell edge. Soft Frequency Reuse (SFR) is considered as an effective way to mitigate inter-cell interference and maintain capacity. We propose a power division SFR, known as multi level SFR technique to minimize ICI in a designed LTE-A network for sub-urban environment. Service area of LTE-A network was first developed to deploy particular number of eNB by using LTE network planning tools in the frequency of 1800 MHz with the use of SISO (Single Input Single Output) antennas. Coverage dimensioning and propagation consideration determine LTE-A parameters which were used in the simulation. Monte carlo simulation is executed to examine the performance of SFR for LTE-A downlink transmission to address different power ratio and traffic loads problem. Both performance of cell edge users and overall cell performance are evaluated in terms of CINR, BLER, and throughput. Performance with SFR is also compared with the classical frequency reuse one and three.
Volume: 7
Issue: 5
Page: 2696-2705
Publish at: 2017-10-01

Converting UML Class Diagrams into Temporal Object Relational DataBase

10.11591/ijece.v7i5.pp2823-2832
Ain El Hayat Soumiya , Bahaj Mohamed
Number of active researchers and experts, are engaged to develop and implement new mechanism and features in time varying database management system (TVDBMS), to respond to the recommendation of modern business environment..Time-varying data management has been much taken into consideration with either the attribute or tuple time stamping schema. Our main approach here is to try to offer a better solution to all mentioned limitations of existing works in order to provide the non-procedural data definitions, queries of temporal data as complete as possible technical conversion that allow to easily realize and share all conceptual details of the UML class specifications, from conception and design point of view. This paper contributes to represent a logical design schema by UML class diagrams, which are handled by stereotypes to express a temporal object relational database with attribute timestamping.
Volume: 7
Issue: 5
Page: 2823-2832
Publish at: 2017-10-01

Parameter Extraction of PV Module using NLS Algorithm with Experimental Validation

10.11591/ijece.v7i5.pp2392-2400
Alivarani Mohapatra , Byamakesh Nayak , K.B. Mohanty
Photovoltaic (PV) module parameters act an important task in PV system design and simulation. Most popularly used single diode Rsh model has five unknown electrical parameters such as series resistance (Rse), shunt resistance (Rsh), diode quality factor (a), photo-generated current (Ipg) and dark saturation current (Is) in the mathematical model of PV module. The PV module output voltage and current relationship is represented by a transcendental equation and is not possible to solve analytically. This paper proposes nonlinear least square (NLS) technique to extract five unknown parameters. The proposed technique is compared with other two popular techniques available in the literature such as Villalva’s comprehensive technique and modified Newton-Raphson (N-R) technique. Only two parameters Rse and Rsh are estimated by Villalva’s technique, but all single diode unknown electrical parameters can be estimated by the NLS technique. The accuracy of different estimation techniques is compared in terms of absolute percentage errors at MPP and is found the minimum for the proposed technique. The elapsed time for parameter estimation for NLS technique is minimum and much less compared to other two techniques. Extracted parameters of polycrystalline ELDORA-40 PV panel by the proposed technique have been validated through simulation and experimental current-voltage (I-V) and power-voltage (P-V) characteristics.
Volume: 7
Issue: 5
Page: 2392-2400
Publish at: 2017-10-01

A Hybrid Digital Watermarking Approach Using Wavelets and LSB

10.11591/ijece.v7i5.pp2483-2495
V. Ashok Kumar , C. Dharmaraj , Ch. Srinivasa Rao
The present paper proposed a novel approach called Wavelet based Least Significant Bit Watermarking (WLSBWM) for high authentication, security and copyright protection. Alphabet Pattern (AP) approach is used to generate shuffled image in the first stage and Pell’s Cat Map (PCM) is used for providing more security and strong protection from attacks. PCM applied on each 5×5 sub images. A wavelet concept is used to reduce the dimensionality of the image until it equals to the size of the watermark image. Discrete Cosign Transform is applied in the first stage; later N level Discrete Wavelet Transform (DWT) is applied for reducing up to the size of the watermark image. The water mark image is inserted in LHn Sub band of the wavelet image using LSB concept. Simulation results show that the proposed technique produces better PSNR and similarity measure. The experimental results indicate that the present approach is more reliable and secure efficient.The robustness of the proposed scheme is evaluated against various image-processing attacks.
Volume: 7
Issue: 5
Page: 2483-2495
Publish at: 2017-10-01
Show 1387 of 1858

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration