Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

28,188 Article Results

Source based Security Issues in WDM Systems

10.11591/ijece.v7i4.pp2101-2108
A. Antwiwaa , A. Kumar , A. K Jaiswal
The issue of security has become a bigger heddle for all telecommunication companies to climb in this era where information hungry customers are increasing daily. Unauthorized users are finding novel ways of accessing information of others and thereby attacking the requisite legitimate users’ information accounting to security threats. In this work, two forms of WDM system attacks will be considered. These attacks include a clone source based attack where the adversary tries to replicate the transmitted signal of the legitimate user by transmitting at the same wavelength and power and the different wavelength source based attack where the adversary transmit at a wavelength different from that of the legitimate user thereby creating interaction effects igniting security issues. Finally, a simulation of the outcome will be considered and the resulting output will be analyzed
Volume: 7
Issue: 4
Page: 2101-2108
Publish at: 2017-08-01

Energy Optimization of Routing Protocols in Wireless Sensor Networks

10.11591/ijict.v6i2.pp76-85
Fatima Es-sabery , Hicham Ouchitachen , Abdellatif Hair
The hierarchical routing of data in WSNs is a specific class of routing protocols it encompasses solutions that take a restructuring of the physical network in a logical hierarchy system for the optimization of the consum-ption of energy. Several hierarchical routing solutions proposed, namely: the protocol LEACH (Low Energy Adaptive Clustering Hierarchy) consist of dividing the network in distributed clusters at one pop in order of faster data delivery and PEGASIS protocol (Power-Efficient Gathering in Sensor Information Systems) which uses the principle of constructing a chain’s sensor node. Our contribution consists of a hierarchical routing protocol, which is the minimization of the energy consumption by reducing the transmission distance of data and reducing the data delivery time. Our solution combines the two hierarchical routing approaches: chain based approach and the cluster based approach. Our approach allows for multi-hop communications, intra- and intercluster, and a collaborative aggregation of data in each Cluster, and a collaborative aggregation of data at each sensor node.
Volume: 6
Issue: 2
Page: 76-85
Publish at: 2017-08-01

A Simplified Speed Control of Induction Motor based on a Low Cost FPGA

10.11591/ijece.v7i4.pp1760-1769
Lotfi charaabi , Ibtihel Jaziri
This paper investigates the development of a simplified speed control of induction motor based on indirect field oriented control (FOC). An original PI-P controller is designed to obtain good performances for speed tracking. Controller coefficients are carried out with analytic approach. The algorithm is implemented using a low cost Field Programmable Gate Array (FPGA). The implementation is followed by an efficient design methodology that offers considerable design advantages. The main advantage is the design of reusable and reconfigurable hardware modules for the control of electrical systems. Experimental results carried on a prototyping platform are given to illustrate the efficiency and the benefits of the proposed approach.
Volume: 7
Issue: 4
Page: 1760-1769
Publish at: 2017-08-01

FPGA-based Design System for a Two-Segment Fibonacci LFSR Random Number Generator

10.11591/ijece.v7i4.pp1882-1891
Zulfikar Zulfikar , Yuwaldi Away , Rafiqa Shahnaz Noor
For a long time, random numbers have been used in many fields of application. Much work has been conducted to generate truly random numbers and is still in progress. A popular method for generating random numbers is a linear-feedback shift register (LFSR). Even though a lot of work has been done using this method to search for truly random numbers, it is an area that continues to attract interest. Therefore, this paper proposes a circuit for generating random numbers. The proposed circuit is designed to produce different sequences of numbers. Two segments of Fibonacci LFSR are used to form a generator that can produce more varied random numbers. The proposed design consists of blocks: segment 1, segment 2, and a clock controller. The system produces random numbers based on an external clock. The clock signal for the first segment is that of the external clock, whereas that for the second segment is modified by the clock controller. The second stage (segment 2) is executed only after every 2n1−1 clock cycles. The proposed design can generate different sequences of random numbers compare to those of the conventional methods. The period of the proposed system is less than that of the original Fibonacci LFSR. However, the period is almost equal to the original one when the system is realized in 32-bit or 64-bit form. Finally, the proposed design is implemented on a field-programmable gate array (FPGA). It occupies more area and runs at a lower frequency compared with the original Fibonacci LFSR. However, the proposed design is more efficient than the segmented leap-ahead method concerning space occupancy.
Volume: 7
Issue: 4
Page: 1882-1891
Publish at: 2017-08-01

A Novel Method based on Gaussianity and Sparsity for Signal Separation Algorithms

10.11591/ijece.v7i4.pp1906-1914
Abouzid Houda , Chakkor Otman
Blind source separation is a very known problem which refers to finding the original sources without the aid of information about the nature of the sources and the mixing process, to solve this kind of problem having only the mixtures, it is almost impossible , that why using some assumptions is needed in somehow according to the differents situations existing in the real world, for exemple, in laboratory condition, most of tested algorithms works very fine and having good performence because the  nature and the number of the input signals are almost known apriori and then the mixing process is well determined for the separation operation.  But in fact, the real-life scenario is much more different and of course the problem is becoming much more complicated due to the the fact of having the most of the parameters of the linear equation are unknown. In this paper, we present a novel method based on Gaussianity and Sparsity for signal separation algorithms where independent component analysis will be used. The Sparsity as a preprocessing step, then, as a final step, the Gaussianity based source separation block has been used to estimate the original sources. To validate our proposed method, the FPICA algorithm based on BSS technique has been used.
Volume: 7
Issue: 4
Page: 1906-1914
Publish at: 2017-08-01

Energy-Efficient Hybrid K-Means Algorithm for Clustered Wireless Sensor Networks

10.11591/ijece.v7i4.pp2054-2060
Aziz Mahboub , Mounir Arioua , El Mokhtar En-Naimi
Energy efficiency is the most critical challenge in wireless sensor network. The transmission energy is the most consuming task in sensor nodes, specifically in large distances. Clustered routing techniques are efficient approaches used to lower the transmission energy and maximize the network’s lifetime. In this paper, a hybrid clustered routing approach is proposed for energy optimization in WSN. This approach is based on K-Means clustering algorithm and LEACH protocol. The simulation results using MATLAB tool have shown that the proposed hybrid approach outperforms LEACH protocol and optimizes the nodes energy and the network lifetime.
Volume: 7
Issue: 4
Page: 2054-2060
Publish at: 2017-08-01

Real-Time Video Scaling Based on Convolution Neural Network Architecture

10.11591/ijeecs.v7.i2.pp381-394
S Safinaz , AV Ravi kumar
In recent years, video super resolution techniques becomes mandatory requirements to get high resolution videos. Many super resolution techniques researched but still video super resolution or scaling is a vital challenge. In this paper, we have presented a real-time video scaling based on convolution neural network architecture to eliminate the blurriness in the images and video frames and to provide better reconstruction quality while scaling of large datasets from lower resolution frames to high resolution frames. We compare our outcomes with multiple exiting algorithms. Our extensive results of proposed technique RemCNN (Reconstruction error minimization Convolution Neural Network) shows that our model outperforms the existing technologies such as bicubic, bilinear, MCResNet and provide better reconstructed motioning images and video frames. The experimental results shows that our average PSNR result is 47.80474 considering upscale-2, 41.70209 for upscale-3 and 36.24503 for upscale-4 for Myanmar dataset which is very high in contrast to other existing techniques. This results proves our proposed model real-time video scaling based on convolution neural network architecture’s high efficiency and better performance.
Volume: 7
Issue: 2
Page: 381-394
Publish at: 2017-08-01

Energy Efficient WSN by Optimizing the Packet Failure in Network

10.11591/ijeecs.v7.i2.pp415-425
Madhu Patil , Chirag Sharma
Wireless sensor network (WSN) has attained enormous growth in recent times due to availability of tiny and low cost sensor devices. The sensor network is been adopted by various organization for various application services such environment monitoring, surveillance etc.. The WSN are powered by batteries and are deployed in non-rechargeable remote location. Preserving batteries of these devices is most desired. Many methodologies have been proposed in recent time to improve the lifespan of sensor network among them clustering technique is the most sorted out technique. The drawback of existing technique the cluster head energy degrades very fast due to long transmission which requires amplification as a result energy is lost to the node that is surrounding the cluster head. They did not consider the packet failure likelihood among inter and intra as a results there exist scheduling bottleneck and degrades the energy of sensor devices. To overcome this work present a packet failure estimation model and hop selection optimization model for inter cluster transmission. Experiments are conducted for lifetime efficiency for varied sensor devices for proposed and existing. The result shows that the proposed model performs better than existing in term of network lifetime and energy efficiency.
Volume: 7
Issue: 2
Page: 415-425
Publish at: 2017-08-01

Performance Analysis of 3-Level 5-Phase Multilevel Inverter Topologies

10.11591/ijece.v7i4.pp1696-1705
B. Jyothi , M. Venu Gopala Rao
Now a day’s many industrial applications requires high power. Some other appliances may require intermediate power either more or less depending upon their operation. With these consequences, MULTI LEVEL INVERTERS are introduced in 1975.for above intermediate voltage applications. The name MULTI LEVEL began with the three-level converter.By enormous advancement in power semiconductor switches, in electric drives increasing the phase number greater than the conventional three phase especially in locomotives, naval, aerospace, and electrical vehicles industry has many advantages than three phase. In this view, here five phase VSI has developed. This paper aims at comparing the performance of conventional two level inverter Diode clamped and Capacitor clamped topologies of 5-phase multilevel inverter (3-level) using sinusoidal pulse width modulation. SPWM is highly economical, has more efficiency, controllability. These circuits are analyzed by using simulation software package such as MATLAB.
Volume: 7
Issue: 4
Page: 1696-1705
Publish at: 2017-08-01

Security Enhancement in Networked Embedded System

10.11591/ijece.v7i4.pp1867-1873
Pradip Ram Selokar , P T Karule
In the developed system ARM9 is a master and Two ARM7s are slaves. The peripherals are being controlled by two ARM7 boards. The Peripherals are connected to the ARM7 through Complex Programmable Logic Device (CPLD). The CPLD is in turn connected to the ARM7 using Serial Peripheral Interface (SPI). The ARM7 boards collect the information from the peripherals and send it to the ARM9 board. The communication between ARM7 and ARM9 is via UART (Universal Asynchronous Receiver Transmitter) over CAN (Controller Area Network). The ARM9 board has got the software intelligence. The ARM9 behaves as a master and two ARM7 boards behave as slaves. Being master ARM9 passes tokens to ARM7 which in turn returns (Acknowledges) the token. The ARM9 is further connected to Proxy via Ethernet. The proxy is further connected to the service platform (server) via Ethernet. So subsequently any decisions at any stage can be changed at server level. Further these commands can be passed on to ARM9 which in turn controls the peripherals through ARM7. (a) The system which we have developed consists of ARM9 as a master, Two ARM7 as Slaves. The communication between ARM9-ARM7 is via UART over a CAN, (b) Each ARM7 further communicates serially (RS232) with the two 8051 Microcontroller nodes, (c)Thus a networked Embedded System is developed wherein the serial data is brought over Ethernet. The ARM7 board, which is directly linked with the peripherals, can be modified of its functionality as and when required. The functionality of ARM7 can be modified by upgrading its firmware. To upgrade the firmware same communication link has been used. ARM7 receives the new firmware via same ARM9-ARM7 communication link. The Flash Write operation is performed using the source code to write the new firmware. Bootloader application for the ARM7 has been developed. The signature has been incorporated to assure authenticity of the new Firmware. Intel Hex File Format is used to parse the hex file.
Volume: 7
Issue: 4
Page: 1867-1873
Publish at: 2017-08-01

RC Hovercraft: An I-Bylogical Enzyme (I-BE) Biosensor Carrier

10.11591/ijece.v7i4.pp2002-2007
Rinta Kridalukmana , Budi Cahyo S.P. , Deddy Kurniawan W , Fahmi Arifan
In this research, a hovercraft was developed as a transportation tool to carry an I-Bylogical Enzyme (I-BE) biosensor. The main function of the biosensor is to measure the level of dangerous chemical materials from factory’s liquid waste. Hence, fiber and acrylic materials, that widely known for its resistance to chemical reaction, are needed to build the hovercraft. By using Atmega 8535 microcontroller and Arduino Uno board, a remote control was choosen to navigate hovercraft’s movement with support of 6 channels Transmitter Receiver. As a result, after series of tests that were carried out, indicate that the hovercraft’s prototype was found to meet design and requirements expectation.
Volume: 7
Issue: 4
Page: 2002-2007
Publish at: 2017-08-01

Classification with Single Constraint Progressive Mining of Sequential Patterns

10.11591/ijece.v7i4.pp2142-2151
Regina Yulia Yasmin , Putri Saptawati , Benhard Sitohang
Classification based on sequential pattern data has become an important topic to explore. One of research has been carried was the Classify-By-Sequence, CBS. CBS classified data based on sequential patterns obtained from AprioriLike sequential pattern mining. Sequential patterns obtained were called CSP, Classifiable Sequential Patterns. CSP was used as classifier rules or features for the classification task. CBS used AprioriLike algorithm to search for sequential patterns. However, AprioriLike algorithm took a long time to search for them. Moreover, not all sequential patterns were important for the user. In order to get the right and meaningful features for classification, user uses a constraint in sequential pattern mining. Constraint is also expected to reduce the number of sequential patterns that are short and less meaningful to the user. Therefore, we developed CBS_CLASS* with Single Constraint Progressive Mining of Sequential Patterns or Single Constraint PISA or PISA*. CBS_Class* with PISA* was proven to classify data in faster time since it only processed lesser number of sequential patterns but still conform to user’s need. The experiment result showed that compared to CBS_CLASS, CBS_Class* reduced the classification execution time by 89.8%. Moreover, the accuracy of the classification process can still be maintained. 
Volume: 7
Issue: 4
Page: 2142-2151
Publish at: 2017-08-01

The Evaluated Measurement of a Combined Genetic Algorithm and Artificial Immune System

10.11591/ijece.v7i4.pp2071-2084
Pongsarun Boonyopakorn , Phayung Meesad
This paper demonstrates a hybrid between two optimization methods which are the Artificial Immune System (AIS) and Genetic Algorithm (GA). The novel algorithm called the immune genetic algorithm (IGA), provides improvement to the results that enable GA and AIS to work separately which is the main objective of this hybrid. Negative selection which is one of the techniques in the AIS, was employed to determine the input variables (populations) of the system. In order to illustrate the effectiveness of the IGA, the comparison with a steady-state GA, AIS, and PSO were also investigated. The testing of the performance was conducted by mathematical testing, problems were divided into single and multiple objectives. The five single objectives were then used to test the modified algorithm, the results showed that IGA performed better than all of the other methods. The DTLZ multiobjective testing functions were then used. The result also illustrated that the modified approach still had the best performance.
Volume: 7
Issue: 4
Page: 2071-2084
Publish at: 2017-08-01

A Big Data Security using Data Masking Methods

10.11591/ijeecs.v7.i2.pp449-456
Archana R A , Ravindra S Hegadi , Manjunath T N
Due to Internet of things and social media platforms, raw data is getting generated from systems around us in three sixty degree with respect to time, volume and type. Social networking is increasing rapidly to exploit business advertisements as business demands. In this regard there are many challenges for data management service providers, security is one among them. Data management service providers need to ensure security for their privileged customers in providing accurate and valid data. Since underlying transactional data have varying data characteristics such huge volume, variety and complexity, there is an essence of deploying such data sets on to the big data platforms which can handle structured, semi-structured and un-structured data sets. In this regard we propose a data masking technique for big data security. Data masking ensures proxy of original dataset with a different dataset which is not real but looks realistic. The given data set is masked using modulus operator and the concept of keys. Our experiment advocates enhanced modulus based data masking is better with respect to execution time and space utilization for larger data sets when compared to modulus based data masking. This work will help big data developers, quality analysts in the business domains and provides confidence for end-users in providing data security.
Volume: 7
Issue: 2
Page: 449-456
Publish at: 2017-08-01

Design and Simulation of Automatic Temperature Control and Alert System Based PIC16F887

10.11591/ijict.v6i2.pp95-104
Jabbar Shaati Jahlool
In this research, the design and simulation of an automatic system for temperature control using embedded system in order to automatically control of multi appliances depend on the temperature value. The appliances will be controlled are ventilation, cooling, heating and alert. this is an order to avoid or reduce to human intervention and increase system reliability. An important feature of this automation process is to reduce or eliminate the possibility of relying on the human factor operator for industries, warehouses and laboratories, and to improve working and performance environments. The system in this paper used the microcontroller PIC16F887 as the central control unit, LM35 temperature sensor as a temperature source,16x2 liquid crystal display (LCD) as indicator to display the different system working status an addition to some of drivers, relay and light emitting diodes (LED) as indicators to display the corresponding working appliance driver. The implementation and simulation of the system work has been achieved by using proteus professional software v8.0 and mikroc pro for pic v .6.6.1 software to write the equivalent program and generate .hex file for system working. The result shows in figures 5, 6, 7, and 8 that explain the system working cases
Volume: 6
Issue: 2
Page: 95-104
Publish at: 2017-08-01
Show 1425 of 1880

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration