Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

28,451 Article Results

Dual Input Z-Source Inverter Fed PMSM Based Renewable Energy

10.11591/ijeecs.v9.i2.pp257-261
V Karthikeyan
The proposed paper produces the high gain and low harmonic content in the permanent magnet synchronous motor fed Z-source inverter. The hybrid solar and fuel-based motor produces more power by using the direct torque control. The control based PMSM fed inverter for continuous power production. The dc bus voltage is regulated by using the DTC based PMSM. The speed of a permanent magnet synchronous motor is regulated, and the proposed DTC is minimizing the torque and flux ripple. In order to produce maximum power at the dc link and also improve the performance of PMSM in Matlab/ Simulink software.
Volume: 9
Issue: 2
Page: 257-261
Publish at: 2018-02-01

Explanatory Server Protection Problem for Automated Wireless System

10.11591/ijeecs.v9.i2.pp302-305
Singh Poja Ramesh , Santhosh Kumar Singh
Many sorts of servers exists which incorporates both openly available servers and inside servers, for example, mail servers, web servers, application servers, assemble and test servers and so forth., that store numerous private and delicate data. Giving security to such servers has turned out to be one of the center necessities in this day and age as they are under danger of assault. The information put away on the server can go from hierarchical data, for example, classified client related records, extend subtle elements, company's product source code to private media data, individual information, national security related data, patients database, address papers of the focused exams and so forth. On the off chance that such delicate information gets into wrong hands, it can be abused. Along these lines the business and the notoriety of the association would beat stake. It can likewise posture risk to countries. The fundamental reasons of security break in servers is because of the utilization of versatile stockpiling gadgets, for example, pen drives, hard circles, and so on., which can be potential transporters of malware and Trojans. At the point when tainted by such infection, these compact stockpiling gadgets can bring about serious harm. Physically keeping up and securing servers would be extremely troublesome and can likewise prompt tremendous authoritative overhead. Henceforth the requirement for computerized security system to distinguish, keep and shield the servers from the aggressors. Security strategies assume a critical part in keeping the trade off of system security which would influence the server security.
Volume: 9
Issue: 2
Page: 302-305
Publish at: 2018-02-01

The Indonesia Public Information Disclosure Act (UU-KIP): Its Challenges and Responses

10.11591/ijece.v8i1.pp94-103
Muharman Lubis , Tien Fabrianti Kusumasari , Lukmanul Hakim
Information Public Disclosure is one of the regulation that has purpose to encourage good governance for public service and citizen participation in national development. The enactment of Act No.14/2008 (UU KIP) has been strengthen the mandate to enforce the necessity of information disclosure in actualizing transparency and accountability in resource management and budget uses. It also become the primary instrument to prevent corruption, monopolistic competition and information disputes. However, there are certain provinces has not yet established information committee nor when it will be as entrusted by the regulation. Meanwhile, the remedies in term of jail duration and fines, arguably, it could not create deterrent effect to the perpetrator. Furthermore, the concern from ministry and public institution also in question in regard their roles of responsibility, lack of cooperation and continuous support. Thus, human resource, technology infrastructure, public participation, supervision and socialization become crucial factor to increase the awareness and satisfaction towards this regulatory compliance. This study is a qualitative research to evaluate the implementation of this Act by observing its consideration, background, principles and relevant article verses as primary sources through content analysis based on number of legal experts.
Volume: 8
Issue: 1
Page: 94-103
Publish at: 2018-02-01

Traffic Light Signal Parameters Optimization using Modification of Multielement Genetic Algorithm

10.11591/ijece.v8i1.pp246-253
I Gede Pasek Suta Wijaya , Keeichi Uchimura , Gou Koutaki
A strategy to optimize traffic light signal parameters is presented for solving traffic congestion problem using modification of the Multielement Genetic Algorithm (MEGA). The aim of this method is to improve the lack of vehicle throughput (FF ) of the works called as traffic light signal parameters optimization using the MEGA and Particle Swarm Optimization (PSO). In this case, the modification of MEGA is done by adding Hash-Table for saving some best populations for accelerating the recombination process of MEGA which is shortly called as H-MEGA. The experimental results show that the H-MEGA based optimization provides better performance than MEGA and PSO based methods (improving the FF of both MEGA and PSO based optimization methods by about 10.01% (from 82,63% to 92.64%) and 6.88% (from 85.76% to 92.64%), respectively). In addition, the H-MEGA improve significantly the real FF of Ooe Toroku road network of Kumamoto City, Japan about 21.62%.
Volume: 8
Issue: 1
Page: 246-253
Publish at: 2018-02-01

A Unified Approach for Performance Degradation Analysis from Transistor to Gate Level

10.11591/ijece.v8i1.pp412-420
Izhar Hussain , Marco Vacca , Fabrizio Riente , Mariagrazia Graziano
In this paper, we present an extensive analysis of the performance degradation in MOSFET based circuits. The physical effects that we consider are the random dopant fluctuation (RDF), the oxide thickness fluctuation (OTF) and the Hot-carrier-Instability (HCI). The work that we propose is based on two main key points: First, the performance degradation is studied considering BULK, Silicon-On-Insulator (SOI) and Double Gate (DG) MOSFET technologies. The analysis considers technology nodes from 45nm to 11nm. For the HCI effect we consider also the time-dependent evolution of the parameters of the circuit. Second, the analysis is performed from transistor level to gate level. Models are used to evaluate the variation of transistors key parameters, and how these variation affects performance at gate level as well.The work here presented was obtained using TAMTAMS Web, an open and publicly available framework for analysis of circuits based on transistors. The use of TAMTAMS Web greatly increases the value of this work, given that the analysis can be easily extended and improved in both complexity and depth.
Volume: 8
Issue: 1
Page: 412-420
Publish at: 2018-02-01

Enhanced Automaton Monitoring Method on Satellite Receiving Position

10.11591/ijeecs.v9.i2.pp289-293
Upadhyay Anand Trilokinath , Santhosh Kumar Singh
Security is an essential need of system and it is one of center innovation of remote controlled system. Robot checking arrangement of sea remote detecting satellite getting station incorporates robot, distributed computing system and remote terminals. Robot procures continuous picture of controlled system and works it; distributed computing system fabricate visual choice subsystem to recognize the objective utilizing wavelet change calculation, neural system calculation and learning database of components video of particular natural; utilizing remote terminal manager watches the controlled system through its scene test system and control robot to work it remotely. Utilizing innovation of the pseudo-irregular number secret word, innovation of shared verification to counteract cloning site, innovation of change between the picture of controlled system and its status code and innovation of transformation between operation codes and operation guidelines, the security quality of the robot observing system is enhanced incredibly.
Volume: 9
Issue: 2
Page: 289-293
Publish at: 2018-02-01

MalayIK: An Ontological Approach to Knowledge Transformation in Malay Unstructured Documents

10.11591/ijece.v8i1.pp1-10
Fatimah Sidi , Iskandar Ishak , Marzanah A. Jabar
The number of unstructured documents written in Malay language is enormously available on the web and intranets. However, unstructured documents cannot be queried in simple ways, hence the knowledge contained in such documents can neither be used by automatic systems nor could be understood easily and clearly by humans. This paper proposes a new approach to transform extracted knowledge in Malay unstructured document using ontology by identifying, organizing, and structuring the documents into an interrogative structured form. A Malay knowledge base, the MalayIK corpus is developed and used to test the MalayIK-Ontology against Ontos, an existing data extraction engine. The experimental results from MalayIK-Ontology have shown a significant improvement of knowledge extraction over Ontos implementation. This shows that clear knowledge organization and structuring concept is able to increase understanding, which leads to potential increase in sharable and reusable of concepts among the community.
Volume: 8
Issue: 1
Page: 1-10
Publish at: 2018-02-01

Classification of The NTEV Problems on The Commercial Building

10.11591/ijeecs.v9.i2.pp380-386
Mohd Abdul Talib Mat Yusoh , Saidatul Habsah Asman , Zuhaila Mat Yasin , Ahmad Farid Abidin
Neutral to Earth Voltage (NTEV) is one of power quality (PQ) problems in the commercial building that need to be resolved.  The classification of the NTEV problems is a method to identify the source types of disturbance in alleviating the problems.  This paper presents the classification of NTEV source in the commercial building which is known as the harmonic, loose termination, and lightning.  The Euclidean, City block, and Chebyshev variables for K-Nearest Neighbor (K-NN) classifying are being utilized in order to identify the best performance for classifying the NTEV problems.  Then, S-Transform (ST) is applied as a pre-processing signal to extract the desired features of NTEV problem for classifier input.  Furthermore, the performance of K-NN variables is validated by using the confusion matrix and linear regression.  The classification results show that all the K-NN variables capable to identify the NTEV problems. While the K-NN results show that the Euclidean and City block variables are well performed rather than the Chebyshev variable.  However, the Chebyshev variable is still reliable as the confusion matrix shows minor misclassification. Then, the linear regression outperformed the percentage close to a perfect value which is hundred percent.
Volume: 9
Issue: 2
Page: 380-386
Publish at: 2018-02-01

A Simplified Design and Modeling of Boost Converter for Photovoltaic Sytem

10.11591/ijece.v8i1.pp141-149
Arjyadhara Pradhan , Bhagabat Panda
The Photovoltaic standalone system is gaining its high importance mostly for rural application like pv water pumping, solar lighting, battery charging etc.Considering environmental effects and scarcity of fossil fuel the trend has developed towards the use of more and more renewable energy.In this paper a basic circuit of boost converter is designed in MATLAB/Simulink with constant dc source voltage. However a comparative study has also been done for the converter connected with pv system directly with the converter connected with mppt tracking technique. Perturb and Observance (P&O) algorithm is implemented for providing the necessary duty pulse and makes the system operate at maximum power point.The boost converter connected with PV system without mppt operates at any other point other then the maximum power point and hence the output voltage decreases.But with mppt the proposed system performs better.
Volume: 8
Issue: 1
Page: 141-149
Publish at: 2018-02-01

Development of Quranic Reciter Identification System using MFCC and GMM Classifier

10.11591/ijece.v8i1.pp372-378
Teddy Surya Gunawan , Nur Atikah Muhamat Saleh , Mira Kartiwi
Nowadays, there are many beautiful recitation of Al-Quran available. Quranic recitation has its own characteristics, and the problem to identify the reciter is similar to the speaker recognition/identification problem. The objective of this paper is to develop Quran reciter identification system using Mel-frequency Cepstral Coefficient (MFCC) and Gaussian Mixture Model (GMM). In this paper, a database of five Quranic reciters is developed and used in training and testing phases. We carefully randomized the database from various surah in the Quran so that the proposed system will not prone to the recited verses but only to the reciter. Around 15 Quranic audio samples from 5 reciters were collected and randomized, in which 10 samples were used for training the GMM and 5 samples were used for testing. Results showed that our proposed system has 100% recognition rate for the five reciters tested. Even when tested with unknown samples, the proposed system is able to reject it.
Volume: 8
Issue: 1
Page: 372-378
Publish at: 2018-02-01

Hybrid Microstrip Diplexer Design for Multi-band WiMAX Application in 2.3 and 3.5 GHz Bands

10.11591/ijece.v8i1.pp576-584
M. A. Sazali , N. A. Shairi , Z. Zakaria
In this paper, a design of hybrid microstrip diplexer is proposed for multi-band Worldwide Interoperability for Microwave Access (WiMAX) application in 2.3 and 3.5 GHz bands. The diplexer consists of a combination of two different filter designs. These filters were designed based on microstripline coupling techniques in order to obtain minimum insertion losses and achieve the desired frequency bandwidth. Therefore, a coupled open loop ring resonator was chosen for the filter design in 2.3 GHz band and a folded coupled line resonator was chosen for the filter design in 3.5 GHz band. Then, these filters were combined with a ring manifold matching network to be a hybrid microstrip diplexer. Based on the results, good agreements were achieved between the simulation and measurement results in terms of insertion loss, return loss and bandwidth in the 2.3 and 3.5 GHz bands.
Volume: 8
Issue: 1
Page: 576-584
Publish at: 2018-02-01

Solar Photovoltaic Power Forecasting in Jordan using Artificial Neural Networks

10.11591/ijece.v8i1.pp497-504
Mohammad H. Alomari , Jehad Adeeb , Ola Younis
In this paper, Artificial Neural Networks (ANNs) are used to study the correlations between solar irradiance and solar photovoltaic (PV) output power which can be used for the development of a real-time prediction model to predict the next day produced power. Solar irradiance records were measured by ASU weather station located on the campus of Applied Science Private University (ASU), Amman, Jordan and the solar PV power outputs were extracted from the installed 264KWp power plant at the university. Intensive training experiments were carried out on 19249 records of data to find the optimum NN configurations and the testing results show excellent overall performance in the prediction of next 24 hours output power in KW reaching a Root Mean Square Error (RMSE) value of 0.0721. This research shows that machine learning algorithms hold some promise for the prediction of power production based on various weather conditions and measures which help in the management of energy flows and the optimisation of integrating PV plants into power systems.
Volume: 8
Issue: 1
Page: 497-504
Publish at: 2018-02-01

A Study of Superconducting Transformer with Short-Circuit Current Limitation

10.11591/ijece.v8i1.pp505-512
V.Z. Manusov , D.A. Pavlyuchenko , J.S. Ahyoev
The paper presents physico-mathematical models for analyzing transient processes in electrical networks having transformers with a high temperature superconducting winding. One of the main purposes of the study is the investigation of the short circuit current limitation process with the use of a transformer with a high temperature superconducting winding, that allows the combination of two series-connected elements, transformer and reactor, in one device. The efficiency of this method for short circuit current limitation is provided by the fact that the critical value of superconducting winding temperature is exceeded under short circuit current flowing, then it passes into the normal state with a high impedance winding, thus limiting a short circuit current. It is important to know the moment when superconducting material passes into the normal state with the loss of superconductivity. For this purpose, the program for calculating the quantity of heat under short circuit current flowing before its interruption was developed. If a 40 MVA transformer with a high temperature superconducting winding is considered, short circuit should be cleared after 100 ms without transformer disconnection. It is proposed to use a hybrid winding in addition to the main winding for short circuit current limitation. Conducted investigations showed that the return of a winding into the superconducting state depends primarily on the ratio between a short circuit current and a rated load current. This represents the criterion for returning or not returning into the superconducting state for transformer windings.
Volume: 8
Issue: 1
Page: 505-512
Publish at: 2018-02-01

Efficient and Secure Resource Allocation and Data Forwarding in Cellular Network

10.11591/ijeecs.v9.i2.pp267-268
Sudha Mishra , A Arivazhagan
Data sharing in networks are now days a challenging one where the source is sending a file to destination, major problem is interference. Once the router is set to search for a path takes too time for identifying a better path to transmit data. The performance is affected due to the time delay of searching path and the interference cause data loss or interruption of transmission. We proposed an overlay router which search better path in short period of time with the help of BJP router. When a sender sends the data, the overlay router contact with BJP router to analyze existing path used to transmit. To ensure a better path and low travelling time will be an efficient way to share the data between source and destination without any interference, low performance and time delay. BJP searches the existing routes that will be low processing time to forward the data sent by the source and received on time by the destination. Whenever a data is been shared between these two: source and destination, overlaying protocol is user to find the shortest path among the existing path search. By using overlay router and BJP router the performance is increased, avoid interference, path identification is solved within short time and provide a better solution for the current environment.
Volume: 9
Issue: 2
Page: 267-268
Publish at: 2018-02-01

Ant Colony Optimization (ACO) based Data Hiding in Image Complex Region

10.11591/ijece.v8i1.pp379-389
Sahib Khan
This paper presents data an Ant colony optimization (ACO) based data hiding technique. ACO is used to detect complex region of cover image and afterward, least significant bits (LSB) substitution is used to hide secret information in the detected complex regions’ pixels. ACO is an algorithm developed inspired by the inborn manners of ant species. The ant leaves pheromone on the ground for searching food and provisions. The proposed ACO-based data hiding in complex region establishes an array of pheromone, also called pheromone matrix, which represents the complex region in sequence at each pixel position of the cover image. The pheromone matrix is developed according to the movements of ants, determined by local differences of the image element’s intensity. The least significant bits of complex region pixels are substituted with message bits, to hide secret information. The experimental results, provided, show the significance of the performance of the proposed method.
Volume: 8
Issue: 1
Page: 379-389
Publish at: 2018-02-01
Show 1392 of 1897

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration