Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

28,593 Article Results

PDC Analysis of LLDPE-NR Nanocomposite for Effect of Moisture Absorption

10.11591/ijece.v7i6.pp3133-3139
N. A. M. Jamail , M. A. M. Piah , N. A. Muhammad , Q. E. Kamarudin
The properties of insulation have been improved by many research and the ability of nanocomposite material that composes the characteristic of improving electrical performance due to the addition of nanofiller into the based material gets serious attention. Polarization and Depolarization Current (PDC) measurement that has the ability to assess the condition of HV insulations with the initial periods after a DC step voltage application was favoured compared to other non-destructive monitoring techniques. This paper presents the works on moisture absorption in LLDPE-NR nanocomposite with different amount and percentage of nanofillers. The study of PDC level of the LLDPE-NR compound, filled with different amount of SiO2, TiO2 and MMT nanofiller using Polarization and Depolarization Current (PDC) measurement technique is the main objective of this research. These results show that sample A1 has the lowest polarization current value and sample B5 has the lowest depolarization current value.
Volume: 7
Issue: 6
Page: 3133-3139
Publish at: 2017-12-01

S-Bend Silicon-On-Insulator (SOI) Large Cross-Section Rib Waveguide for Directional Coupler

10.11591/ijece.v7i6.pp3299-3305
Nurdiani Zamhari , Abang Annuar Ehsan , Mohd Syuhaimi Abdul Rahman
S-bend contributes the high losses in the silicon-on-insulator (SOI) large cross-section rib waveguide (LCRW). The objective of this work is to investigate S-bend SOI LCRW with two different single-mode dimensions named symmetrical and asymmetrical. The S-bend SOI LCRW has been simulating using beam propagation method in OptiBPM software. The asymmetrical waveguide with two different dimension arc given the best performance if compared to others dimension with 3 µm of waveguide spacing. It achieved 92.24% and 91.10% of normalized output power (NOP) for 1550 nm and 1480 nm wavelength respectively. Moreover, the minimum of S-bend spacing between the two cores is 0.9 µm for both 1550 nm and 1480 nm. Therefore, asymmetrical waveguide with two different dimension arc and 0.9 µm of S-bend spacing are chosen. This analysis is important to determine the right parameter in order to design the SOI passive devices. However, future work should be done to see the performance by designing the coupler and implement in the real system.
Volume: 7
Issue: 6
Page: 3299-3305
Publish at: 2017-12-01

A Reliable Peer-to-Peer Platform for Adding New Node Using Trust Based Model

10.11591/ijece.v7i6.pp3515-3520
Vimal S. , Srivatsa S K.
In order to evaluate the trustworthiness of participating peers in unstructured peer-to-peer networks, Reputation aggregation methods are used in this method. Each and every peer of the network will collect the local scores of each transaction and will compute global scores by aggregating all the local scores with the help of global scores, each individual peer can interact with its suitable peers. But the existing method will not consider the score of the new peer. In this condition, requests are handled by existing peers who leads to failure in downloading process. To rectify this, NP-TRUST model is used to distribute the request to all peers including the newly joined peers. The proposed method is compared with gossip and DFR-TRUST model in Transaction Success rate and variation in file request.
Volume: 7
Issue: 6
Page: 3515-3520
Publish at: 2017-12-01

Fog Computing: Issues, Challenges and Future Directions

10.11591/ijece.v7i6.pp3669-3673
Prakash P , Darshaun K. G. , Yaazhlene. P , Medidhi Venkata Ganesh , Vasudha B
In Cloud Computing, all the processing of the data collected by the node is done in the central server. This involves a lot of time as data has to be transferred from the node to central server before the processing of data can be done in the server. Also it is not practical to stream terabytes of data from the node to the cloud and back. To overcome these disadvantages, an extension of cloud computing, known as fog computing, is introduced. In this, the processing of data is done completely in the node if the data does not require higher computing power and is done partially if the data requires high computing power, after which the data is transferred to the central server for the remaining computations. This greatly reduces the time involved in the process and is more efficient as the central server is not overloaded. Fog is quite useful in geographically dispersed areas where connectivity can be irregular. The ideal use case requires intelligence near the edge where ultra-low latency is critical, and is promised by fog computing. The concepts of cloud computing and fog computing will be explored and their features will be contrasted to understand which is more efficient and better suited for real-time application.
Volume: 7
Issue: 6
Page: 3669-3673
Publish at: 2017-12-01

Ultra-Wideband Monostatic Antenna for behind the Wall Detection

10.11591/ijece.v7i6.pp2936-2941
Jawad Ali , Roshayati Yahya , Noorsaliza Abdullah , Syarfa Zahirah Sapuan
This article introduces an ultra-wideband (UWB) shifted arc antenna, designed using Rogers RT-5880 Duroid substrate for the human detection behind the wall. The frequency for this proposed antenna ranges from 2.8 - 15.6 GHz with the gain of around 6.05 dB. A high gain for antenna has been achieved by the implementation of defected ground structure (DGS) method to make it a suitable configuration for through wall detection applications. For the verification of through wall detection configuration, a simulation-based experiment using ground penetrating radar (GPR) technology has been conducted. The results showed that proposed single antenna can act as a monostatic transceiver in order to detect human skin behind the concrete wall. Later, the reflections received from the target have been analyzed to detect and identify the antenna, wall and target for distance calculation.
Volume: 7
Issue: 6
Page: 2936-2941
Publish at: 2017-12-01

Pedestrian Detection using Triple Laser Range Finders

10.11591/ijece.v7i6.pp3037-3045
Abdul Hadi Abd Rahman , Khairul Akram Zainol Ariffinv , Nor Samsiah Sani , Hairi Zamzuri
Pedestrian detection is one of the important features in autonomous ground vehicle (AGV). It ensures the capability for safety navigation in urban environment. Therefore, the detection accuracy became a crucial part which leads to implementation using Laser Range Finder (LRF) for better data representation. In this study, an improved laser configuration and fusion technique is introduced by implementation of triple LRFs in two layers with Pedestrian Data Analysis (PDA) to recognize multiple pedestrians. The PDA integrates various features from feature extraction process for all clusters and fusion of multiple layers for better recognition. The experiments were conducted in various occlusion scenarios such as intersection, closed-pedestrian and combine scenarios. The analysis of the laser fusion and PDA for all scenarios showed an improvement of detection where the pedestrians were represented by various detection categories which solve occlusion issues when low numberof laser data were obtained.
Volume: 7
Issue: 6
Page: 3037-3045
Publish at: 2017-12-01

Multi-Machine Stability Using Dynamic Inversion Technique

10.11591/ijece.v7i6.pp3176-3189
Abha Tripathi , K. Uma Rao , L. Venkatesha
Stability studies of multi machine system are a major concern to power system engineers due to the increasing complexity involved. This paper deals with the application of a nonlinear technique called Dynamic Inversion, to TCSC for the improvement of stability of multi-machine system. The transient stability studies for various cases: without any controller, with 75% line compensation and with Dynamic Inversion technique, are compared. The critical clearing time as well as the maximum loading ability is also discussed. The result for the nonlinear controller is found to be better than all the other cases.
Volume: 7
Issue: 6
Page: 3176-3189
Publish at: 2017-12-01

Power Consumption Modeling and Analysis of Integrated Optical-Wireless Access Network

10.11591/ijece.v7i6.pp3475-3483
A. Ramli , N. Zulkifli , S. M. Idrus
The integration of optical and wireless technologies at access networks are considered as a future solution which provide both high bandwidth and high mobility in an efficient way. GPON is a suitable candidate for optical backhaul due to the combination of higher data rates, greater split ratio and support for triple play services hence it offers maximum flexibility and cost advantages. On the other hand, recent developments of new radio access technologies and introduction of femtocell base stations provide the potential of offering broadband services and applications to everyone and everywhere. However, the power consumption of this network demands a particular attention because access networks are the largest contributor the network related electricity consumption. Therefore, in this paper we evaluate the power consumption of integrated optical-wireless access network which is based on independent ONU-BS architecture. We proposed a power consumption model for such network and the assessment has been done under different simulation scenarios. The constructed model will provide insight of the energy performance of the integrated access network so that in the network design process, focus can be done to the most energy saving strategies.
Volume: 7
Issue: 6
Page: 3475-3483
Publish at: 2017-12-01

Fuzzy-Set Based Privacy Preserving Access Control Techniques in Cloud (FB-PPAC)

10.11591/ijai.v6.i4.pp143-149
Sushmita Kumari , Sudha S , Brindha K
The word “Cloud” refers to network or internet. It is present at.remote location. Cloud computing is a latest mechanism used now-a-days for accessing, manipulating and configuring applications online via internet. It allows users for online data storage, various applications and infrastructure. There are few downsides of cloud computing like in public cloud sharing of data, selected data shared with users of various level without confidentiality and privacy of data. Different methods were used to fix this problem like encryption of attribute; encryption of access control but they have their own problems related to big computation for accquiring access structure, invoking and behavior management. So for removing these weakness, the combination of fuzzy-set theory and RSA algorithm has been introduced. Fuzzy-set is used for clustering the data based on their points. Further for privacy, I have included RSA for encryption and decryption of data which is used to store in cloud database. The analysis of my experiment shows the system is efficient, flexible and provides confidentiality of the data.
Volume: 6
Issue: 4
Page: 143-149
Publish at: 2017-12-01

Efficient End-to-End Secure Key Management Protocol for Internet of Things

10.11591/ijece.v7i6.pp3622-3631
Yamina Benslimane , Khelifa BenAhmed
Internet of things (IoT) has described a futurevision of internetwhere users, computing system, and everyday objects possessing sensing and actuating capabilities are part of distributed applications and required to support standard internet communication with more powerful device or internet hosts. This vision necessitates the security mechanisms for end-to-end communication. A key management protocol is critical to ensuring the secure exchange of data between interconnecting entities, but due to the nature of this communication system where a high resource constrained node may be communicating with node with high energy makes the application of existing key management protocols impossible. In this paper, we propose a new lightweight key management protocol that allows the constrained node in 6loWPAN network to transmit captured data to internet host in secure channel. This protocol is based on cooperation of selected 6loWPAN routers to participate in computation of highly consuming cryptographic primitives. Our protocol is assessed with AVISPA tool, the results show that our scheme ensured security properties.
Volume: 7
Issue: 6
Page: 3622-3631
Publish at: 2017-12-01

Reduction of Total Harmonic Distortion in Cascaded H-Bridge Inverter by Pattern Search Technique

10.11591/ijece.v7i6.pp3292-3298
Suresh N. , R. Samuel Rajesh Babu
Pattern Search technique can be used to find the solution for the optimization problem. In this paper, pattern search algorithm has been utilized to calculate the switching angles for the cascaded H-bridge inverter with  the consideration of minimizing total harmonic distortion. Mathematical equations for the optimization problem were formulated by fourier analysis technique. Lower order harmonics such as third, fifth, seventh, ninth and eleventh order harmonics were taken into account to mitigate the total harmonic distortion of the inverter. Simulations have been carried out for thirteen level, fifteen level and seventeen level cascaded H-bridge inverter using matlab software. Total harmonic distortion of voltage and current for resistive load, resistive-inductive load and motor load were analyzed.
Volume: 7
Issue: 6
Page: 3292-3298
Publish at: 2017-12-01

Study on the Effect of the Ambient Temperature toward the Quality of Sleep

10.11591/ijece.v7i6.pp2986-2992
Wira Hidayat bin Mohd Saad , Khoo Chin Wuen , Masrullizam bin Mat Ibrahim , Nor Hashimah Binti Mohd Saad , Syafeeza Binti Ahmad Radz , Ahmad Sayuthi bin Mohamad Shokri , Mohd Safirin bin Karis
Getting enough sleep at the right times can help in improving quality of life and protect mental and physical health. This study proposes a portable sleep monitoring device to determine the relationship between the ambient temperature and quality of sleep. Body condition parameter such as heart rate, body temperature and body movement was used to determine quality of sleep. All readings will be log into database so that users can review back and hence analyze quality of sleep. The functionality of the overall system is designed for a better experience with a very minimal intervention to the user. The simple test on the body condition (body temperature and heart rate) while asleep with several different ambient temperatures are varied and the result shows that someone has a better sleep for the temperature range of 23 to 28 degree Celsius. This can prove by lower body temperature and lower heart rate.
Volume: 7
Issue: 6
Page: 2986-2992
Publish at: 2017-12-01

Planning and Conducting Magnetic Field Level Measurement from Overhead Transmission Line

10.11591/ijece.v7i6.pp3124-3132
H.M. Luqman , M.N.R. Baharom , H. Ahmad , Irshad Ullah
Human population and power consumption keeps on growing with each year. In order to satisfy electricity demand, more electrical energy has to be supplied, resulting in higher magnetic field level radiation. In rapid urbanization country, lack of space will force civilization to be built near overhead transmission line that sparks public concern on adverse health effects due to the magnetic field radiation. A new UTHM hostel residential area was built near OTLs that shared the same concern. Thus a proper planning to conduct magnetic field level measurement was done to examine the maximum magnetic field level radiated that covered the hostel residential area. The results were far from reaching the maximum permissible magnetic field level proposed by ICNIRP. Though, the steps taken and the methods used might be suitable guidelines for others that encounter similar situations.
Volume: 7
Issue: 6
Page: 3124-3132
Publish at: 2017-12-01

Design of Android Based Smart Car

10.11591/ijeecs.v8.i3.pp648-650
D. Wilfred Shiju
Android smart car is designed with safety in mind. A simple and sensitiveline, included steering wheels and new voice events, this is designed to reduceinterruption so you can stay focused on the highway.This car which can be controlling using an Android APP for smart phones.A car is regularly an electronic mechanic machine that is guide by computer and electronic controlling programming. The innovation of the Smart Car technology to developing based on remote connection using android application can control the car movements. This system use Bluetooth device controller to control the mobile App. This Bluetooth device interface with UART communication. The UART receive the command via the Bluetooth device.   This design is may helps to our rural citifies. This system is developing to help to self driving vehicles.
Volume: 8
Issue: 3
Page: 648-650
Publish at: 2017-12-01

Modeling and Simulation of a Photovoltaic Field for 13 kW

10.11591/ijece.v7i6.pp3271-3281
Salah Eddine Mankour , Ahmed Wahid Belarbi , Mohammed Tarik Benmessaoud
In the future solar energy will be very important source of energy. More than 45% of needed energy in the world will be generated by photovoltaic module. Therefore it is necessary to concentrate our efforts in order to reduce the application costs .This work investigates on the modeling of a Stand Alone Power System focusing on Photovoltaic energy systems. We introduce the models of the system components Therefore a maximum power point tracking (MPPT) technique is needed to track the peak power in order to make full utilization of PV array output power under varying conditions. This paper presents two widely-adopted MPPT algorithms, perturbation & observation (P&O) and incremental conductance (IC).A complete characterization and simulation model was implemented in the Matlab-Simulink environment. Design complete system is done to analyze its behavior for a typical year, with the aim to evaluate their energetic effectiveness.
Volume: 7
Issue: 6
Page: 3271-3281
Publish at: 2017-12-01
Show 1425 of 1907

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration