Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,061 Article Results

Adaptive Interference Mitigation with User Grouping for Fast Transmission in Cellular Networks

10.11591/ijeecs.v10.i2.pp702-712
Hadhrami Ab. Ghani , Azlan Abd Aziz , Azizul Azizan , Salwani Mohd Daud
Designing uplink systems which group users with adaptive interference mitigation techniques is the objective of this research. Reduction in error rates and improvement in the energy efficiency is expected with this approach in addition to spectral efficiency. This paper reports a study on interference mitigation and transmission designs for groups of users in the uplinks. New formulations for the interference mitigation are produced based on the minimum mean square error and successive interference cancellation approach. By reducing the interference, the energy efficiency can be maintained and improved although the number of users per group increases. The measured error rates of this approach with user grouping achieve gains between 1 to 3 dB against that of the existing approach. With reduced complexity, the proposed scheme should be viable for practical deployment.
Volume: 10
Issue: 2
Page: 702-712
Publish at: 2018-05-01

Development of Reconfigurable Antenna for Advanced Tracking Technology

10.11591/ijeecs.v10.i2.pp672-679
N. M. Sahar , M. T. Islam , N. Misran , M. R. Zaman
This paper focuses on the design and fabrication of reconfigurable multiband antenna for RFID and GPS as an advance tracking technology for various applications that achieve a physically compact, planar profile and sufficient bandwidth. The antenna can be reconfigured as single band at 1.275 GHz for GPS applications when the switches are OFF state and dual-band frequencies at 0.915 GHz and 2.4 GHz required in RFID applications when the switches are ON state. The performance of the antenna involves changing the switches to ON or OFF mode by controlling RF switches. RF MEMs RMSW101, Single Pole Single Throw (SPST) switches have been chosen due to the satisfactory RF properties includes low insertion loss, good impedance matching and high isolation. The gain for single and dual band is greater than 2dBi. The design methodology and antenna measurement results are both presented and discussed in this letter.
Volume: 10
Issue: 2
Page: 672-679
Publish at: 2018-05-01

Signal Strength based Self Reconfiguration to Ensure Reliability in Wireless Sensor Networks

10.11591/ijeecs.v10.i2.pp725-732
M.A. Manivasagam , T.V Ananthan
Providing reliability in Wireless sensor networks is considered to be a challenging task, due to the limited capabilities in terms of energy, power and memory. The applications of these systems run in sensors with low level programming abstractions, limited capabilities and routing protocols. In this paper, we propose a strategy to adjust radios in the sensor network depending on the signal strength of the neighboring nodes to ensure reliability using self reconfiguration (S2R2). Redundancy-based reliability is achieved by performing encoding/decoding either at the source and the destination node or each pair of communicating sensor nodes from the source to the destination. Along with the reliability, the link and the stability of the link are checked. The stability of the route makes the route a valid one to send data. Simulation analysis shows that the proposed mechanism performs better in terms of stability and reliability compared to the existing mechanism
Volume: 10
Issue: 2
Page: 725-732
Publish at: 2018-05-01

Survey on Nano Technology

10.11591/ijeecs.v10.i2.pp506-513
Adel Alfoudery , Abdulrahman Alkandari , Samer Moein
Recently, Nanotechnology has become a reality of great concerns all over the world, which seeks constitutes serious about expanding the scope of applications and investments of this technique. In this paper, we have introduced nanotechnology, since it has become the first rank among the priorities of scientific research in the world, where the expanded universities, research centers and institutions seek to employ nanotechnology in new products, industries, and technology.  We have discussed types of Nanomaterials in details and focused on the applications that use Nanotechnology. This paper confirms the view of scientists who look at this technique working as a component of the world's future, and a crucial factor that has led and will continue leading the world to a new industrial revolution
Volume: 10
Issue: 2
Page: 506-513
Publish at: 2018-05-01

Reducing Total Power Consumption and Total Area Techniques for Network-on-Chip Through Disable Cores and Routers Based on Clustering Method

10.11591/ijeecs.v10.i2.pp514-520
Ng Yen Phing , M.N. Mohd Warip , Phaklen Ehkan , S.Y. Teo
Network-on-Chip (NoC) is a promising solution to overcome the communication problem of System-on-Chip (SoC) architecture. The execution of topology, routing algorithm and switching technique is significant because it powerfully affects the overall performance of NoC. In the Network-on-Chip, the total power consumption increasing due to the large scale of network. In order to solve it, a clustering method and disable cores and routers based on clustering method is apply onto mesh based NoC architecture. In the proposed approach, the optimization of total area and total power consumption are the major concern. Experiment results show that the proposed method outperformas the existing work. The clustering-mesh based method reduced the total area by 22% to 40 % and total power consumption by 22% to 56% compare to mesh topology. In addition, the proposed method by disable cores and routers based on clustering-mesh based method has decrease the total area by 45% to 87% and total power consumption by 33% to 75% compare to mesh topology.
Volume: 10
Issue: 2
Page: 514-520
Publish at: 2018-05-01

Development of English Handwritten Recognition Using Deep Neural Network

10.11591/ijeecs.v10.i2.pp562-568
Teddy Surya Gunawan , Ahmad Fakhrur Razi Mohd Noor , Mira Kartiwi
Due to the advanced in GPU and CPU, in recent years, Deep Neural Network (DNN) becomes popular to be utilized both as feature extraction and classifier. This paper aims to develop offline handwritten recognition system using DNN. First, two popular English digits and letters database, i.e. MNIST and EMNIST, were selected to provide dataset for training and testing phase of DNN. Altogether, there are 10 digits [0-9] and 52 letters [a-z, A-Z]. The proposed DNN used stacked two autoencoder layers and one softmax layer. Recognition accuracy for English digits and letters is 97.7% and 88.8%, respectively. Performance comparison with other structure of neural networks revealed that the weighted average recognition rate for patternnet, feedforwardnet, and proposed DNN were 80.3%, 68.3%, and 90.4%, respectively. It shows that our proposed system is able to recognize handwritten English digits and letters with high accuracy.
Volume: 10
Issue: 2
Page: 562-568
Publish at: 2018-05-01

Fabricating Modish Mobile Application for a Visionless Citizen to Act as a Visioned Citizen

10.11591/ijeecs.v10.i2.pp623-630
Jananee V , Shalini P , Dhivya S
Technology has its wide range of applications in every field potentially even on the Mobile technology. One of the technologies which accomplish the blind person in android mobile is Virtual Reality. In spite of virtual reality is engaged to effectuate the operations, the blind person attention is one of the most important statistics. Although mobile devices include operative features available for amaurotic users, the user interface of the greater part of the mobile apps is designed for sighted people. If they carry out any mistakes to use the apps it may lead to a wrong call. So, one may think of a technology that diminishes the anxiety of a blind person for using apps. The proposed system converts the text into audio for giving the directions to the blind person about the gestures inferred. For such conversion a technique called speech synthesizer is used. Assorted innovative tools are used in mobile phones. Blind people need to confide in normal person for creating and updating a contact. Our project incorporates the gestures from the blind people and confirms the gestures through voice. Gesture conversion is accomplished by using haptic technology. An amaurotic person can create a new contact and they can invoke the contact by using this voice confirmation. During calling if there is multiple contact list, caller setting are initialized and ask the preference from the blind people, progress the voice call.
Volume: 10
Issue: 2
Page: 623-630
Publish at: 2018-05-01

Resource Allocation in Downlink of LTE using Bandwidth Prediction Through Statistical Information

10.11591/ijeecs.v10.i2.pp680-686
S. Gayathri , R. Sabitha
Long Term Evolution (LTE) is the technology used in modern third and fourth generation mobile wireless cellular networks. Due to the presence of large number of users, mobility and varying channel conditions, proper resource allocation is essential to provide a good user experience and improve the system throughput. In this paper, a resource allocation algorithm is implemented that will use the probabilistic models to predict the channel condition and allocate resources accordingly. Also, the algorithm will support QoS requirements. During the resource allocation, the channel quality information is collected and analyzed to predict the future channel conditions and resource allocation vectors are configured accordingly. The performance of the algorithm is analyzed based upon the data collected. The algorithm is able to provide a reasonable success rate for channel prediction. By using the resource allocation vectors and channel prediction, the algorithm performance also is improved considerably due to the lesser space and time complexity required.
Volume: 10
Issue: 2
Page: 680-686
Publish at: 2018-05-01

Data-Driven Impedance Matching in Multilateral Teleoperation Systems

10.11591/ijeecs.v10.i2.pp713-724
Mohd Syakirin Ramli , Hamzah Ahmad
This paper addresses a tuning approach to improve transparency between master and slave manipulators in a multilateral teleoperation system. The slave manipulators comprised of multi-agents of simple mass are converted into a bilateral system through the passive decomposition technique. There are two main operations being considered, namely; grasping and handling. The object grasping is achieved through consensus control. For handling, an equalizer constructed by a Laguerre function connected in-feedback-loop to the master manipulator is chosen and tuned to achieve impedance matching between both sides of teleoperation. Fictitious Reference Iterative Tuning (FRIT) is adopted to properly tune the selected equalizer. The result shows that by introducing an optimally tuned equalizer, the overall impedance matching and transparency between the single master and multi-slave manipulators are improved. Finally, the effectiveness of the proposed tuning algorithm is presented through a numerical example.
Volume: 10
Issue: 2
Page: 713-724
Publish at: 2018-05-01

Security Mandated Analytics based Route Processing with Digital Signature [SMARPDS] - Pseudonymous Mobile Ad Hoc Routing Protocol

10.11591/ijeecs.v10.i2.pp763-769
K. Vinayakan , M. V. Srinath
There are a lot of speculations going on about the interests for privacy in mobile network. Many research works have been proposed in the aspect and these works concentrate more on the anonymity part and there are quite a few implementations of these research works on some applications. Ad hoc routing protocols must have provision for both anonymity providing nature and restriction of information collection from unauthorized nodes. Till recent times, there are a number of ad hoc routing protocols that have been introduced. But, they have lack security features or authentication features or in some cases both. The lack of proper security features leads to a state of vulnerability which at any given point, will act as a threat element. In this paper, we propose Security Mandated Analytics based Route Processing with Digital Signature protocol [SMARPDS]. It is an anonymous and authentication providing routing protocol in Mobile Ad hoc network. In addition, routes are discovered based on analytics done on the node and its present location in the network. SMARPDS provides authentication during the route discovery and transmission process by employing digital signatures on node front and also on packets front.
Volume: 10
Issue: 2
Page: 763-769
Publish at: 2018-05-01

Robust Vision-based Multiple Moving Object Detection and Tracking from Video Sequences

10.11591/ijeecs.v10.i2.pp817-826
Othman Omran Khalifa , Norun Abdul Malek , Kazi Istiaque Ahmed
Detection of Moving Objects and Tracking is one of the most concerned issue and is being vastly used at home, business and modern applications. It is used to identify and track of an entity in a significant way. This paper illustrates the way to detect multiple objects using background subtraction methods and extract each object features by using Speed-Up Robust Feature algorithm and track the features through k-Nearest Neighbor processing from different surveillance videos sequentially. In the detection of object of each frame, pixel difference is calculated with respect to the reference background frame for the detection of an object which is only suitable for any ideal static condition with the consideration of lights from the environment. Thus, this method will detect the complete object and the extracted feature will be carried out for the tracking of the object in the multiple videos by one by one video. It is expected that this proposed method can commendably abolish the impact of the changing of lights
Volume: 10
Issue: 2
Page: 817-826
Publish at: 2018-05-01

Performance of Cuk-KY Converter Fed Multilevel Inverter for Hybrid Sources

10.11591/ijeecs.v10.i2.pp436-445
V. Vasudevan , K. Balaji
Distributed energy source based electricity generation is an essential factor for the economic growth and development of a country. The photovoltaic, fuel cell and battery based power generation offer a high voltage gain. The DC-DC CUK converter based on both buck and boost mode of operation is proposed for high gain dc link voltage. The hybrid CUK –KY Converter based multilevel inverter is designed and implemented. Here, the main advantages of hybrid boost mode operation of Cuk converter, step up configuration is used which will result in improve conversion voltage ratio and better damping of oscillations. The DC-DC converter voltage has regulated by the maximum power point tracking and PI control based method is used. The cascaded multilevel inverter in hybrid renewable energy production integrating with switched capacitor method is designed. The proposed converter is designed and implemented in MATLAB/SIMULINK environment.
Volume: 10
Issue: 2
Page: 436-445
Publish at: 2018-05-01

A Novel Approach Certificate Revocation in MANET using Fuzzy logic

10.11591/ijeecs.v10.i2.pp654-663
Jayanthi. E , Mohammed Ali Hussain
Due to the advent developments in the Information and Communication Technology (ICT) based environment, Mobile ad hoc networks (MANETs) have fascinated much concentration because of their mobility and easy deployment. At the same time, their wireless and vibrant features make them susceptible to wide range of types of security attacks when compared to the traditional wired networks. The prime challenge is to assure security in the network components and services. To work out the challenge, novel security measures are put forward for effective and secured communication. In our proposed work, we discuss the need for Security in MANET, focusing on certificate revocation. Providing security is challenging tasks due to its key features. Different authentication techniques, Digital certificate and components of Public Key Infrastructure are also discussed. The certificate revocation is a challenging task in MANETs due to absence of centralized repositories and trusted authorities. The different methods of certificate revocation using cluster based mechanism is analyzed and compared. The principle, advantages and disadvantages of certificate revocation are also compared. And the novel Certificate revocation techniques using fuzzy is discussed with reduced overhead.
Volume: 10
Issue: 2
Page: 654-663
Publish at: 2018-05-01

IoT: Electrocardiogram (ECG) Monitoring System

10.11591/ijeecs.v10.i2.pp480-489
Kristine Joyce P. Ortiz , John Peter O. Davalos , Elora S. Eusebio , Dominic M. Tucay
Internet of Things (IoT) has many applications in the medical field. With remote-information gathering, healthcare professionals can evaluate, diagnose and treat patients in remote locations using telecommunications technology. This study aimed to develop a small-scale electrocardiogram (ECG) monitoring device that will measure heart rates and waveforms and send the data in a database and a web server. An ECG acquisition device was developed using a single-lead heart rate monitor sensor and an Arduino microcontroller. A program, which will process, analyze and upload the ECG data is coded using MATLAB and C# programs. The collected information is viewed in a Graphical User Interface (GUI) display, coded using C# and in a webpage. Rapid Application Technology (RAD) was used in the methodology, which began with a quick design of the system. The hardware and software systems underwent a prototyping cycle for development. Once finished, the integration of the system is conducted to construct a complete IoT-based ECG monitoring system. For testing using t-test, a sample size of 18 and a a= 0.05 is used. Testing resulted into t-test values that lie in the non-critical zone for all ECG parameters, denoting that there is no significant difference between the gathered data. The device’s percent reliability in detecting ECG conditions such as normal sinus rhythm, sinus tachycardia, sinus bradycardia and flatline, is 83.33%. The percent difference for the heart rate is 0.35 %, which falls within the acceptable medical standard of 99% accuracy. The device was deemed functional and reliable.
Volume: 10
Issue: 2
Page: 480-489
Publish at: 2018-05-01

Design and Specific Absorption Rate of 2.6 GHz Rectangular-Shaped Planar Inverted-F Antenna

10.11591/ijeecs.v10.i2.pp741-747
Nurul Inshirah Mohd Razali , Norhudah Seman , Nur Ilham Aliyaa Ishak
This article presents the investigation of specific absorption rate (SAR) of a rectangular-shaped planar inverted-F antenna (PIFA) at frequency of 2.6 GHz. Initially, the design antenna is presented with parametric study concerning the dimensions of antenna patch length, shorting plate, ground plane and substrate. The proposed PIFA antenna has -20.46 dB reflection coefficient and 2.383 dB gain. The PIFA’s SAR is correlated with the antenna gain and excitation power. The analysis shows that higher gain contributes to a lower SAR value. While, the higher excitation power causes a higher SAR value. All the design and analysis are performed using the CST Microwave Studio
Volume: 10
Issue: 2
Page: 741-747
Publish at: 2018-05-01
Show 1397 of 1938

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration