Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,393 Article Results

High Potential of Magnet on the Performance of Dual Piezoelectric Fans in Electronics Cooling System

10.11591/ijeecs.v10.i2.pp469-479
Abdul Razak Fadhilah , Robiah Ahmad , Sarip Shamsul
Recently, piezoelectric fan has gained attention as potential active cooling method for electronics devices. Even though the piezoelectric requires high voltage, there are findings to overcome the shortcomings. Adding on a magnet at the tip of the piezoelectric fan to activate other magnetic passive fans is one of the methods to increase the total amplitude generated by the fans. This paper will discuss on the performance of integrated piezoelectric fan with passive fans (later refer to magnetic fans) to enhance the heat transfer in cooling system. A repulsive force produced by the magnets will cause the magnetic blades to oscillate together with the piezoelectric fan. The paper will focus on the optimization parameters of the magnets for selected dimension of piezoelectric fan. The parameters under investigation are the position of the magnet on the piezoelectric fan, number of magnets on each blades and orientation of blades with respect to adjacent blade. Results show that the magnet at middle location of extensive blade with double magnets generate the largest amplitude, 80% better than fan without magnet and for dual integrated piezoelectric fan with magnetic fan, radial orientation gives better result by 25%. By increasing the total amplitude using magnetic force, power consumption can be reduced while the heat transfer performance can be enhanced. it shows a good agreement for positive heat transfer and thermal resistance improvement compared to natural convection.
Volume: 10
Issue: 2
Page: 469-479
Publish at: 2018-05-01

Improving the Cost Factor of DLBCA Lightweight Block Cipher Algorithm

10.11591/ijeecs.v10.i2.pp786-791
Sufyan Salim Mahmood AlDabbagh , Alyaa Ghanim Sulaiman , Imad Fakhri Taha Al Shaikhli , Khalid Abdulkareem Al-Enezi , Abdulrahman Yousef Alenezi
The needing to secure information in restricted environments is very important so that lightweight block cipher algorithm is suitable for these environments. This paper improved DLBCA algorithm by decreasing the cost factor through using the less number of S-boxes. Also, differential and boomerang attacks have been applied in this paper. Finally, all the results have been presented
Volume: 10
Issue: 2
Page: 786-791
Publish at: 2018-05-01

Edge Dissimilarity Reduced-Reference Quality Metric with Low Overhead Bitrate

10.11591/ijeecs.v10.i2.pp631-640
Farah Diyana Abdul Rahman , Dimitris Agrafiotis , Ahmad Imran Ibrahim
In multimedia transmission, it is important to rely on an objective quality metric which accurately represents the subjective quality of processed images and video sequences. Reduced-reference metrics make use of side-information that is transmitted to the receiver for estimating the quality of the received sequence with low complexity. In this paper, an Edge-based Dissimilarity Reduced-Reference video quality metric with low overhead bitrate is proposed. The metric is evaluated by finding the dissimilarity between the edge information of original and distorted sequences. The edge degradation can be detected in this manner as perceived video quality is highly associated with edge structural. Due to the high overhead using the Soergel distance, it is pertinent to find a way to reduce the overhead while maintaining the edge information that can convey the quality measure of the sequences. The effects of different edge detection operator, video resolution and file compressor are investigated. The aim of this paper is to significantly reduce the bitrate required in order to transmit the side information overhead as the reduced reference video quality metric. From the results obtained, the side information extracted using Sobel edge detector maintained consistency throughout the reduction of spatial and temporal down-sample.
Volume: 10
Issue: 2
Page: 631-640
Publish at: 2018-05-01

A Effective Cross Layer Multi-Hop Routing Protocol for Heterogeneous Wireless Sensor Network

10.11591/ijeecs.v10.i2.pp664-671
Manisha R. Dhage , Srikanth Vemuru
In today’s scenario to solve the real world problem heterogeneous wireless sensor is necessary. It consists of different sensor with different sensing capability and different energy level. Routing is important task in HWSN from energy dissipation point of view. In HWSN many routing protocols were proposed but many protocols are for single hop communication between cluster head and sink. Here we have designed multi-hop routing protocol for HWSN, which will be energy efficient and also solve the problem of hot spot using unequal clustering. To make this protocol more energy efficient cross layer information exchange approach is used. Using cross layer communication this protocol will get residual energy, quality of link and neighboring nodes information and this information is used in cluster head selection. Moreover there is no need to do broadcast of residual energy for every round because of RDA (regular data acquisition) nodes. We can predict the energy consumption of node, which will conserve the energy using Energy Efficient Fuzzy Based Cross Layer Protocol (EEFCLP). This proposed protocol can achieve longer sensor lifetime and more energy efficiency.
Volume: 10
Issue: 2
Page: 664-671
Publish at: 2018-05-01

Multivariable Parametric Modeling of a Greenhouse by Minimizing the Quadratic Error

10.12928/telkomnika.v16i2.8486
Mohamed; University of Sultan Essahafi , Mustapha Ait; University of Sultan Lafkih
This paper concerns the identification of a greenhouse described in a multivariable linear system with two inputs and two outputs (TITO). The method proposed is based on the least squares identification method, without being less efficient, presents an iterative calculation algorithm with a reduced computational cost. Moreover, its recursive character allows it to overcome, with a good initialization, slight variations of parameters, inevitable in a real multivariable process. A comparison with other methods recently proposed in the literature demonstrates the advantage of this method. Simulations obtained will be exposed to showthe effectiveness and application of the method on multivariable systems.
Volume: 16
Issue: 2
Page: 641-647
Publish at: 2018-04-18

Qualitative Assessment on Effectiveness of Security Approaches towards Safeguarding NFC Devices & Services

10.11591/ijece.v8i2.pp1214-1221
Anusha R , Veena Devi Shastrimat V
The increasing pace in the wireless communication taking momentum in the market of commercial application where a significant trade-off between user-experience and security demands exists. The Near Field Communication or NFC is one such communication trend which is effectively adopted by the user worldwide to make touchless operation using their mobile device. Although, it is claimed that NFC incorporates some of the standard encryption but existing researchers fails to prove that their electromagnetic signals are not so difficult to compromise to result in collateral damage to user's resources. Thus, there exist research work towards strengthing security system, but there is yet to report on any standard security protocol or framework to ensure the highest resiliency. This paper provides a comprehensive visualization towards the effectiveness of existing research approaches to formulate the research trend and gap.
Volume: 8
Issue: 2
Page: 1214-1221
Publish at: 2018-04-01

Workflow Scheduling Techniques and Algorithms in IaaS Cloud: A Survey

10.11591/ijece.v8i2.pp853-866
K. Kalyana Chakravarthi , Vaidhehi Vijayakumar
In the modern era, workflows are adopted as a powerful and attractive paradigm for expressing/solving a variety of applications like scientific, data intensive computing, and big data applications such as MapReduce and Hadoop. These complex applications are described using high-level representations in workflow methods. With the emerging model of cloud computing technology, scheduling in the cloud becomes the important research topic. Consequently, workflow scheduling problem has been studied extensively over the past few years, from homogeneous clusters, grids to the most recent paradigm, cloud computing. The challenges that need to be addressed lies in task-resource mapping, QoS requirements, resource provisioning, performance fluctuation, failure handling, resource scheduling, and data storage. This work focuses on the complete study of the resource provisioning and scheduling algorithms in cloud environment focusing on Infrastructure as a service (IaaS). We provided a comprehensive understanding of existing scheduling techniques and provided an insight into research challenges that will be a possible future direction to the researchers.
Volume: 8
Issue: 2
Page: 853-866
Publish at: 2018-04-01

Routing Design Issues in Heterogeneous Wireless Sensor Network

10.11591/ijece.v8i2.pp1028-1039
Manisha R. Dhage , Srikanth Vemuru
WSN has important applications such as habitat monitoring, structural health monitoring, target tracking in military and many more. This has evolved due to availability of sensors that are cheaper and intelligent but these are having battery support. So, one of the major issues in WSN is maximization of network life. Heterogeneous WSNs have the potential to improve network lifetime and also provide higher quality networking and system services than the homogeneous WSN. Routing is the main concern of energy consumption in WSN. Previous research shows that performance of the network can be improve significantly using protocol of hierarchical HWSN. However, the appropriateness of a particular routing protocol mainly depends on the capabilities of the nodes and on the application requirements. This study presents different aspects of Heterogeneous Wireless Sensor network and design issues for routing in heterogeneous environment. Different perspectives from different authors regarding energy efficiency based on resource heterogeneity for heterogeneous wireless sensor networks have been presented.
Volume: 8
Issue: 2
Page: 1028-1039
Publish at: 2018-04-01

A New Scheme of Group-based AKA for Machine Type Communication over LTE Networks

10.11591/ijece.v8i2.pp1169-1181
Mariya Ouaissa , A. Rhattoy
Machine Type Communication (MTC) is considered as one of the most important approaches to the future of mobile communication has attracted more and more attention. To reach the safety of MTC, applications in networks must meet the low power consumption requirements of devices and mass transmission device. When a large number of MTC devices get connected to the network, each MTC device must implement an independent access authentication process according to the 3GPP standard, which will cause serious traffic congestion in the Long Term Evolution (LTE) network. In this article, we propose a new group access authentication scheme, by which a huge number of MTC devices can be simultaneously authenticated by the network and establish an independent session key with the network respectively. Experimental results show that the proposed scheme can achieve robust security and avoid signaling overload on LTE networks
Volume: 8
Issue: 2
Page: 1169-1181
Publish at: 2018-04-01

Ontological MobiHealth System

10.11591/ijeecs.v10.i1.pp309-319
Nasim Khozouie , Faranak Fotouhi-Ghazvini , Behrouz Minaei-Bidgoli
MobiHealth systems are tele-monitoring systems based on BAN (Body Area Network) and mobile health care (m-health) service platform utilizing next generation public wireless networks.  Smart phone applications have self-monitoring and sensing capabilities and are used in health interventions and disease prevention. In this study, a prototype mobile sensing platform was introduced for m-Health and telemedicine applications, which medical sensors on patient body reports biological signals and environmental sensors send environment raw data to base station (smart phone). Then raw data were preprocessed and necessary features (situations) were extracted. In order to context computation and respond with adaptability, we have used ontology-based model.   
Volume: 10
Issue: 1
Page: 309-319
Publish at: 2018-04-01

Non-integer IMC based PID Design for Load Frequency Control of Power System Through Reduced Model Order

10.11591/ijece.v8i2.pp837-844
Idamakanti Kasireddy , Abdul Wahid Nasir , Arun Kumar Singh
This paper deals with non-integer internal model control (FIMC) based proportional-integral-derivative(PID) design for load frequency control (LFC) of single area non-reheated thermal power system under parameter divergence and random load disturbance. Firstly, a fractional second order plus dead time(SOPDT) reduced system model is obtained using genetic algorithm through step error minimization. Secondly, a FIMC based PID controller is designed for single area power system based on reduced system model. Proposed controller is equipped with single area non-reheated thermal power system. The resulting controller is tested using MATLAB/SIMULINK under various conditions. The simulation results show that the controller can accommodate system parameter uncertainty and load disturbance. Further, simulation shows that it maintains robust performance as well as minimizes the effect of load fluctuations on frequency deviation. Finally, the proposed method applied to two area power system to show the effectiveness.
Volume: 8
Issue: 2
Page: 837-844
Publish at: 2018-04-01

Type-2 Fuzzy Logic in Pair Formation

10.11591/ijeecs.v10.i1.pp94-99
Lakshmi Shrinivasan , J. l R. Rao
This paper gives an overview of Type-2 Fuzzy sets (T2FSs) and Type-2 fuzzy Logic system (T2FLS) considering one aviation scenario. The existing type-1 Fuzzy system has limited capability to handle the uncertainty directly. In order to overcome the limitations of Type-1 fuzzy Logic system (T1FLS), a next level of fuzzy set is introduced, that is known as T2FSs. Here we will discuss about: Type-2 fuzzy sets, type-2 membership functions, inference engine, type reduction and defuzzification. Pair formation is the undertaken aviation scenario which is very critical in a fighting situation. Crisp data are taken by the sensors of aircraft and with the techniques of data fusion, a constant decision is passed whether two aircrafts can achieve pair formation or not. Experiments are evaluated and performance is compared with ground truth and existing T1FLS, which proves better in terms of decision making while a certain amount of uncertainty is present.
Volume: 10
Issue: 1
Page: 94-99
Publish at: 2018-04-01

Algorithm for Fault Location and Classification on Parallel Transmission Line using Wavelet based on Clarke’s Transformation

10.11591/ijece.v8i2.pp699-710
Makmur Saini , A. A. Mohd Zin , M. W. Mustafa , A. R. Sultan , Rusdi Nur
This paper proposed a new algorithm for fault location and classification using wavelet based on Clarke’s transformation to obtain the fault current. This novel method of fault current approach is studied by comparing the use of the glide path of the fault voltage. The current alpha and beta (Current Mode) were used to transform the signal using discrete wavelet transform (DWT). The fault location was determined by using the Clarke’s transformation, and then turned into a wavelet, which was very precise and thorough. The most accurate was the mother wavelet Db4 which had the fastest time and smallest error detection when compared with the other wavelet mothers. In this study, the Clarke’s transformation is also compared with the Karenbauer’s, which has produced results with similar error percentage. The simulation results using PSCAD / EMTDC software showed that the proposed algorithm could distinguish internal and external faults to get the current signal in the transformation of a signal fault.
Volume: 8
Issue: 2
Page: 699-710
Publish at: 2018-04-01

A Comprehensive Analysis of Partial Shading Effect on Output Parameters of a Grid-connected PV System

10.11591/ijece.v8i2.pp749-762
H. Rahimi Mirazizi , M. A. Shafiyi
One of the issues of grid-connected photovoltaic systems is the effect of the partial shading on the key parameters and performance of the system. In practice, a share of the entire PV panel may shadded because of the various reasons, inevitably. In this case, the key parameters of the system output are affected with respect to the shading extent and paradigm. In this paper, the effects of the various partial shading patterns on the ouput of the system are examined. This is performed by deriving relevant equations and appropriate modeling of the system and defining different scenarios. The analysis on the system performance is carried out on the dominant output parameters including panel voltage, panel power, and total harmonic distortion (THD) of the inverter. Also, the study considers the effect of using bypass diodes in the panels or not. Addintionally, to compare derived conclusions, the study is implementd on a practical system. The set up is made up of a 7-level multi-level inverter, a Z-source converter, and 1 kW lateral circuitry. The real world test results of the study demonstrate a negligible deviation compared to the simulation results.
Volume: 8
Issue: 2
Page: 749-762
Publish at: 2018-04-01

Image Denoising by using Modified SGHP Algorithm

10.11591/ijece.v8i2.pp971-978
Sreedhar Kollem , K. Ramalinga Reddy , D. Sreenivasa Rao
In real time applications, image denoising is a predominant task. This task makes adequate preparation for images looks prominent. But there are several denoising algorithms and every algorithm has its own distinctive attribute based upon different natural images. In this paper, we proposed a perspective that is modified parameter in S-Gradient Histogram Preservation denoising method. S-Gradient Histogram Preservation is a method to compute the structure gradient histogram from the noisy observation by taking different noise standard deviations of different images. The performance of this method is enumerated in terms of peak signal to noise ratio and structural similarity index of a particular image. In this paper, mainly focus on peak signal to noise ratio, structural similarity index, noise estimation and a measure of structure gradient histogram of a given image.
Volume: 8
Issue: 2
Page: 971-978
Publish at: 2018-04-01
Show 1422 of 1960

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration