Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,734 Article Results

Automatic Threshold on Current based Anti-pinch Mechanism for Power Windows

10.11591/ijece.v8i4.pp2172-2179
Wahyu Kunto Wibowo , Seok-Kwon Jeong , Sam-Sang You , Lee Jaemin
In this paper, the automotive power window has been integrated with an advanced safety mechanism called anti-pinch system for good protection. Based on a contact method, a new safety mechanism using a low-cost technology has been proposed to set a threshold value as a limit to decide the pinch condition, or automatic threshold method. The electric current information is easily detected by using current sensor installed on a motor driver without incorporating extra device. Then the pinch condition is quickly reflected and calculated by using current information in the system. Since the automatic threshold is decided by analyzing system behavior in advance, the optimal calculation can be guaranteed and then applied it on the safety mechanism in a cost-effective manner. Through extensive experimental tests, the squeezing forces of the proposed anti-pinch system have been verified to satisfy requirements of the FMVSS 118 regulations.
Volume: 8
Issue: 4
Page: 2172-2179
Publish at: 2018-08-01

Brain Tumor Detection Using Wathershed Segmentation Techniques and Area Calculation

10.11591/ijict.v7i2.pp71-76
Meenakshi Pareek , CK Jha , Saurabh Mukherjee , Chandani Joshi
This paper primarily focuses on to employ a novel approach to classify the brain tumor and its area. The Tumor is an uncontrolled enlargement of tissues in any portion of the human body. Tumors are of several types and have some different characteristics. According to their characteristics some of them are avoidable and some are unavoidable. Brain tumor is serious and life threatening issues now days, because of today’s hectic lifestyle. Medical imaging play important role to diagnose brain tumor .In this study an automated system has been proposed to detect and calculate the area of tumor. For proposed system the experiment carried out with 150 T1 weighted MRI images. The edge based segmentation, watershed segmentation has applied for tumor, and watershed segmentation has used to extract abnormal cells from the normal cells to get the tumor identification of involved and noninvolved areas so that the radiologist differentiate the affected area. The experiment result shows tumor extraction and area of tumor find the weather it is benign and malignant.
Volume: 7
Issue: 2
Page: 71-76
Publish at: 2018-08-01

A Review of Electromyography Signal Analysis Techniques for Musculoskeletal Disorders

10.11591/ijeecs.v11.i3.pp1136-1146
T. N. S. Tengku Zawawi , A. R. Abdullah , M.H. Jopri , Tole Sutikno , N.M. Saad , R. Sudirman
Social Security Organisation (SOCSO) Malaysia has reported that the incidence of work related to musculoskeletal disorders (MSDs) has been growing planetary in the manufacturing industry. MSDs are the result of repetitive, forceful or awkward movements on our body and or body parts of bones, joints, ligaments and other soft tissues. Workplace pains and strains can be serious and disabling for workers, causing pain and suffering ranging from discomfort to severe disability. To overcome this problem, Electromyography is proper to use in Health Screening Program (HSP) it to monitor darn diagnose the muscle’s performance for their patient and know the exact localization of muscle pain. The previous researchers has been explore of several in EMG analysis techniques and features proposed in time, frequency and time-frequency domain analysis. This review of common EMG signal processing techniques is proposed by assembling from simple to complex analysis techniques to give the overview information for the other researcher. This is because; the suitable selection of a method and its features settings will ensure readability of the time-frequency representations and reliability of results. The strongest correspond with time-frequency characteristic and resolution also reducing cross term for bilinear will consider it as the optimal method.
Volume: 11
Issue: 3
Page: 1136-1146
Publish at: 2018-07-17

Security Authentication for Student Cards’ Biometric Recognition Using Viola-Jones Algorithm

10.11591/ijeecs.v11.i1.pp241-247
S. Ibrahim , K.R. Jamaluddin , K.A.F.A. Samah
The unauthorized access to the university entrance could be gained by only flashing a student card. This unsecure situation shows the loophole of security authentication in a university. In order to overcome this, a biometric recognition could be the most suitable candidate as it varies uniquely from one person to another. A study on student cards’ biometric recognition using Viola-Jones algorithm is presented as it is proven as a powerful algorithm in terms of superb detection rates and speed.  It is done by comparing the facial structures and features between the student card’s image and the card holder image, thus determining the similarity. The recognition performance is evaluated based on the percentage of similarity using 100 testing images of 50 students. The observation on results obtained the effectiveness of the Viola-Jones features in student cards’ biometric recognition rate.
Volume: 11
Issue: 1
Page: 241-247
Publish at: 2018-07-01

GPS & GSM Based Accident Detection And Auto Intimation

10.11591/ijeecs.v11.i1.pp356-361
S.George Fernandez , R Palanisamy , K. Vijayakumar
The high demand of automobiles has also increased the traffic hazards and the road accidents. Life of the people is under high risk. This is because of the lack of best emergency facilities available in our country. An automatic alarm device for vehicle accidents is introduced in this paper. This design is a system which can detect accidents in significantly less time and sends the basic information to first aid centre within a few seconds covering geographical coordinates, the time and angle in which a vehicle accident had occurred. This alert message is sent to the rescue team in a short time, which will help in saving the valuable lives. A Switch is also provided in order to terminate the sending of a message in rare case where there is no casualty, this can save the precious time of the medical rescue team. When the accident occurs the alert message is sent automatically to the rescue team and to the police station. The message is sent through the GSM module and the location of the accident is detected with the help of the GPS module. 
Volume: 11
Issue: 1
Page: 356-361
Publish at: 2018-07-01

Multibeam RF Antenna Performance for Indoor Coverage in Stadium

10.11591/ijeecs.v11.i1.pp203-208
Suzi Seroja Sarnin , Mohd Yusdee Yusoff , Mohamad Yazid Mohamad , Nani Fadzlin Naim , Norsuzila Yaacob
The objective of the proposal is to address the demand on data over the services provided by telecommunication industries during major events held in Malaysia especially in stadiums. Previously, during most of the events, users will experience bad services in both data and voice transactions. It is not only slow or delayed but almost failed to access the network to connect them to the world. Besides a few solutions that have been introduced such as IBC (In-Building Coverage) and Small Cells, this proposed solution Multibeam RF Antenna, is one of them to address the demand. This solution has been chosen as it is fast in deployment, easy to maintain and cost effective even if it may not cover the whole targeted areas.This paper will provide analysis, evaluation and actual Walk Test (WT) to show the effectiveness of the Multibeam RF Antenna
Volume: 11
Issue: 1
Page: 203-208
Publish at: 2018-07-01

Wireless Monitoring Prototype for Photovoltaic Parameters

10.11591/ijeecs.v11.i1.pp9-17
A. H. Sabry , W. Z. W. Hasan , MZA Ab. Kadir , M. A. M. Radzi , S. Shafie
Photovoltaic (PV) parameters monitoring is very important for the implementation and optimum utilization of solar energy as the electricity source. This work proposes a design of simple, cost-efficient, and low consumption wireless PV monitoring system enhanced by a driving software for recording the PV system parameters. The circuit is designed with a minimum number of components to manage four types of sensors to measure four parameters that are essential for real-time analysis and prediction of PV performance. The only pair of XBee RF modules as an active component, while others are passive, includes resistors and capacitors for PV current, and voltage those for signal conditioning, temperature and irradiance sensors were also involved. The paper presents a prototype system for high voltage series-connected PV array in the range (100-310) V and 3 ampere as a maximum current, while the sampling frequency can be configured up to 14 sample/Sec in applications of the short period for data logging for the four channels. The proposed system succeeds in providing real-time monitoring with lower cost and can be extended for more functions such as controlling tracking system and failure diagnosis. Photovoltaic (PV) parameters monitoring is very important for the implementation and optimum utilisation of solar energy as electricity source. This work proposes a design of simple, cost-efficient, and low consumption wireless PV monitoring system enhanced by a driving software for recording the PV system parameters. The circuit is designed with a minimum number of components to manage four types of sensors to measure four parameters that are essential for real-time analysis and prediction of PV performance. Only pair of XBee RF modules as an active components, while othera are passive, includes resistors and capacitors for PV current, and voltage those for signal conditioning, temperature and irradiance sensors were also involved. The paper presents a prototype system for high voltage series connected PV array in the range (100-310) V and 3 ampere as a maximum current, while the sampling frequency can be configured up to 14 sample/Sec in applications of the short period for data logging for the four channels. The proposed system succeeds in providing real-time monitoring with lower cost and can be extended for more functions such as controlling tracking system and failure diagnosis.
Volume: 11
Issue: 1
Page: 9-17
Publish at: 2018-07-01

A Secure Data Aggregation Technique for Wireless Sensor Networks Using Iterative Filtering

10.11591/ijeecs.v11.i1.pp284-293
Jyothi R , Nagaraj G Cholli
Wireless sensor system are accumulation of sensor hubs which send the detected information to sink hub. As sensor hubs are constrained to computational power and vitality asset, a vitality proficient usage of assets are basic keeping in mind the end goal to utilize organize for longer length. Hence data traffic inside network and large amount of data sending to base station need to be reduced. The main goal of data aggregation is to enhance the network life time by gathering an aggregate data in an energy efficient manner. Iterative Filtering algorithm are more reliable and efficient compared to existing method and it provides the way for aggregating the data at secure level and data trustworthiness. In order to strengthen security levels at cluster head cryptographic algorithm such as RSA algorithm is used to encrypt the aggregated data by   using public key and decrypt data at base station by using its own private key. Where this method is responsible for securing the information that is aggregated at cluster head and also secures the information passed through the networks. The simulation results shows that proposed method consumes less computation time, data transmitting, high security and   has a good storage capacity than compared to existing algorithm.
Volume: 11
Issue: 1
Page: 284-293
Publish at: 2018-07-01

Work Process of Bring Your Own Device to Support Green Computing

10.11591/ijeecs.v11.i1.pp137-143
Mohd Yusri Jusoh , Haryani Haron , Jasber Kaur
Bring Your Own Device (BYOD) is a new approach to optimize the use of Information Technology (IT) devices to carry out their work task. The study of BYOD is focused on work activities that perform by IT worker using IT device in public sector. Work activities can provide important insights into IT device portfolio development, end-user segmentation process and the role of IT workers in public sector. The propose of this study is to explore work process of bringing your own devices to support green computing. A conceptual framework of BYOD work process in public sector through integration of IT devices and end-user segmentation to support green computing was developed based on systematic literature review to highlight the implementation of BYOD. This framework considers that work activities based on IT worker, IT device portfolio and end-user segmentation are the main key for public sector to support green computing. This framework is an initial research for researchers and practitioners to further examine BYOD practices in public sector. In addition, to highlight an important gap, this paper explains how different work activities using different IT device influence the IT worker to select the suitable IT device for BYOD that support green computing.
Volume: 11
Issue: 1
Page: 137-143
Publish at: 2018-07-01

Hybrid Artificial Neural Network with Meta-heuristics for Grid-Connected Photovoltaic System Output Prediction

10.11591/ijeecs.v11.i1.pp121-128
Norfarizani Nordin , Shahril Irwan Sulaiman , Ahmad Maliki Omar
This paper presents the performance evaluation of hybrid Artificial Neural Network (ANN) model with selected meta-heuristics for predicting the AC output power fof a Grid-Connected Photovoltaic (GCPV). The ANN has been hybridized with three meta-heuristics, i.e. Cuckoo Search Algorithm (CSA), Evolutionary Programming (EP) and Firefly Algorithm (FA) separately. These meta-heuristics were used to optimize the number of neurons, learning rate and momentum rate such that the Root Mean Square Error (RMSE) of the prediction was minimized during the ANN training process. The results showed that CSA had outperformed EP and FA in producing the lowest RMSE. Later, Mutated Cuckoo Search Algorithm (MCSA) was introduced by incorporating Gaussian mutation operator in the conventional CSA. Further investigation showed that MSCA performed better prediction when compared with the conventional CSA in terms of RMSE and computation time.
Volume: 11
Issue: 1
Page: 121-128
Publish at: 2018-07-01

Acoustical Comparison between /u/ and /u:/ Arabic Vowels for Non-Native Speakers

10.11591/ijeecs.v11.i1.pp1-8
Ali Abd Almisreb , Nooritawati Md Tahir , Ahmad Farid Abidin , Norashidah Md Din
The articulation of Arabic phonemes is essential for the Malay community since Arabic language is mandatory to perform worship. Hence, in this paper, an acoustical analysis of Arabic phonemes for vowels /u/ and /u:/ is discussed based on tokens pronounced by Malay speakers. The experimental results showed that the Malay speakers are inclined to utter these Arabic phonemes similar to the native speakers and it was also found from the analysis that the vowel /u/ and /u: was articulated as high-back vowels. Conversely, the vowel /u/ was located lower than /u:/ as in the vowel-space. Alternatively results also showed that /u/ and /u:/  is higher than the other vowels specifically /a/ and /a:/. In addition, the statistical analysis showed that the formant frequencies of both short and long dummah for formant frequency F1, F2 and F3 have more variation in terms of /u/ as compare to /u:/. In contrast formant frequency F4 and F5 are more diversity in terms of /u:/.
Volume: 11
Issue: 1
Page: 1-8
Publish at: 2018-07-01

Factors of Adoption Intention for Near Field Communication Mobile Payment

10.11591/ijeecs.v11.i1.pp98-104
Sharidzaly Busu , Norisan Abd Karim , Haryani Haron
Near field communication mobile payment (NMP) is simple to use and beneficial to consumers, yet its adoption among consumers in Malaysia is still at the beginning stage and the adoption rate is relatively lower compared to other countries in the world. The aim of this study is to identify factors that affect the adoption intention of NMP among consumers in Malaysia, by using Faculty of Computer and Mathematical Sciences (FSKM), UiTM Shah Alam as the case study for this research. The quantitative data analysis approach is used in this study. There were 150 questionnaires analyzed using the SPSS. This research identified three factors that affect the adoption intention of NMP which are perceived usefulness, perceived cost and compatibility. By understanding the factors affecting the intention to adopt NMP, financial technology companies can focus to provide the solutions according to market interest, needs and readiness.
Volume: 11
Issue: 1
Page: 98-104
Publish at: 2018-07-01

A Novel M-SEPIC DC-DC Converter for BLDC Pumping System with Active PFC using ANFIS Controller

10.11591/ijeecs.v11.i1.pp386-399
Vamshi Krishna Varma Kshatriya , Ram Kumar A
An exigent consumer related concerns confronted due to utilization of massive front-end AC-DC rectifier in a grid-tied BLDC pumping system. Harmonic distortions are acquired, which prompts the disruption of power quality at utility grid system due to AC-DC conversion. Several factors for enhancing power-quality concerns are ameliorate the grid power-factor along with reduction of harmonic distortions, tightened regulation of DC output voltage. In this way, the DC-DC boost converter plays a unique role; operated in Continuous Conduction Mode. Based on summarizing advantages & disadvantages of classical DC-DC converters, a single switch high voltage gain M-SEPIC DC-DC converter is more suggestive for water pumping system due to non-existence of coupled inductors, low switching loss, low di/dt stress, high efficiency, compact structure, low cost, etc. This work proposes the novel M-SEPIC DC-DC converter fed brushless-DC motor drive is controlled by voltage source inverter and powered by single-phase grid system with improved power-quality features. Moreover, Adaptive Neuro-Fuzzy Inference System is recommended for prediction of optimal switching states to amplify the BLDC motor speed and torque-ripple depreciation. The effectiveness of the proposed scheme is validated under constant speed situations by real-time operating conditions which are evaluated by Matlab /Simulink tool; and simulation results are conferred with attractive comparisons.
Volume: 11
Issue: 1
Page: 386-399
Publish at: 2018-07-01

Recognizing Foreign Object Debris (FOD): False Alarm Reduction Implementation

10.11591/ijeecs.v11.i1.pp41-46
Talha Khan , Muhammad Alam , Kushairy Kadir , Zeeshan Shahid , MS. Mazliham , Sheroz Khan , Mohammad Miqdad
Recognition of foreign object debris (FOD) on ruwanys is mandatory to avert the accidents and emergency. The accurate and precise estimation of FOD is very complex because of the intricated shape and their different tiny sizes as well which are noe easily visilble. For the prompt removal of the FOD from the runways a robust, accurate and precise system is badly needed. Therefore, in our research we have proposed a vigor system comprised of ultrasonic sensor and infrared images capturing device with a combination of fake alerts reduction algorithm based on infrared images distribution and morphological edge identification. After the segmentation and morphological processing, the decision a unifying divider was designed to identify the actual targets. Several approaches have been done for the detailed and rapid investigation of FOD. Testing and validation have proved that our proposed research performed well compared to the other techniques. In this research ultrasonic sensors results are integrated with the processed infrared images.
Volume: 11
Issue: 1
Page: 41-46
Publish at: 2018-07-01

A Novel and Innovative Approach for Image Steganography with Chaos

10.11591/ijeecs.v11.i1.pp263-267
Krishnaveni N , Sudhakar P
Steganography is the art/technique of hiding message data inside a carrier file in such a way that unauthorized or unsolicited personnel is not capable of detecting the presence of data inside the carrier file. The Proposed Method provides improved security and improved high embedding capacity image steganography through the usage of Integer Wavelet Transform (IWT) and Chaotic Logistic map. Least Significant Bit technique is used to replace the bits in the coefficient of detail band. The proposed method offers lossless and unnoticeable change in the image steganography. In this paper we focus on both cryptography and steganography for better confidentiality, security and robustness. We find that the proposed algorithm has a better CMPSNR (Chaotic Logistic mapping) value averaging close to 74 after embedding the secret data, while the existing algorithms have values of around 65.
Volume: 11
Issue: 1
Page: 263-267
Publish at: 2018-07-01
Show 1417 of 1983

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration