Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

27,438 Article Results

A Single-Stage Low-Power Double-Balanced Mixer Merged with LNA and VCO

10.11591/ijece.v7i1.pp152-159
Nam-Jin Oh
This paper proposes three types of single stage low-power RF front-end, called double-balanced LMVs, by merging LNA, mixer, and voltage-controlled oscillator (VCO) exploiting a series LC (SLC) network. The low intermediate frequency (IF) or baseband signal can be directly sensed at the drain nodes of the VCO switching transistors by adding a simple resistor-capacitor (RC) low-pass filter (LPF). By adopting a double-balanced mixer topology, the strong leakage of the local oscillator (LO) at the IF output is effectively suppressed. Using a 65 nm CMOS technology, the proposed double-balanced LMVs (DB-LMVs) are designed. Oscillating at around 2.4 GHz ISM band, the phase noise of the proposed three DB-LMVs is −111 dBc/Hz at 1 MHz offset frequency. The simulated voltage conversion gain is larger than 36 dB and the double-side band (DSB) noise figure (NF) is less than 7.7 dB. The DB-LMVs consume only 0.2 mW dc power from 1-V supply voltage.
Volume: 7
Issue: 1
Page: 152-159
Publish at: 2017-02-01

Improved Algorithm for Pathological and Normal Voices Identification

10.11591/ijece.v7i1.pp238-243
Brahim Sabir , Fatima Rouda , Yassine Khazri , Bouzekri Touri , Mohamed Moussetad
There are a lot of papers on automatic classification between normal and pathological voices, but they have the lack in the degree of severity estimation of the identified voice disorders. Building a model of pathological and normal voices identification, that can also evaluate the degree of severity of the identified voice disorders among students. In the present work, we present an automatic classifier using acoustical measurements on registered sustained vowels /a/ and pattern recognition tools based on neural networks. The training set was done by classifying students’ recorded voices based on threshold from the literature. We retrieve the pitch, jitter, shimmer and harmonic-to-noise ratio values of the speech utterance /a/, which constitute the input vector of the neural network. The degree of severity is estimated to evaluate how the parameters are far from the standard values based on the percent of normal and pathological values. In this work, the base data used for testing the proposed algorithm of the neural network is formed by healthy and pathological voices from German database of voice disorders. The performance of the proposed algorithm is evaluated in a term of the accuracy (97.9%), sensitivity (1.6%), and specificity (95.1%). The classification rate is 90% for normal class and 95% for pathological class.
Volume: 7
Issue: 1
Page: 238-243
Publish at: 2017-02-01

Notification of Data Congestion Intimation [NDCI] for IEEE 802.11 Adhoc Network with Power Save Mode

10.11591/ijeecs.v5.i2.pp317-320
Azeem Mohammed Abdul , Syed Umar
IEEE 802.11-power save mode (PSM) independent basic service set (IBSS) Save, the time is divided into intervals of the signals. At the beginning of each interval signal and power saving alarm periodically all open windows (vocals). The station will be in competition with the rest of the frame window frame sent voice data leakage range. Element depends frame transmission IEEE CSMA / CA as defined in 802.11 DCF. A chance of transmit voice frames type of collision energy IBSS success. This article gives an analysis model with a chance of success output transmission window fixed size element. The results of the simulation analysis of the accuracy of the analysis.
Volume: 5
Issue: 2
Page: 317-320
Publish at: 2017-02-01

FDMC: Framework for Decision Making in Cloud for Efficient Resource Management

10.11591/ijece.v7i1.pp496-504
Alexander Ngenzi , Selvarani R , Suchithra R
An effective resource management is one of the critical success factors for precise virtualization process in cloud computing in presence of dynamic demands of the user. After reviewing the existing research work towards resource management in cloud, it was found that there is still a large scope of enhancement. The existing techniques are found not to completely utilize the potential features of virtual machine in order to perform resource allocation. This paper presents a framework called FDMC or Framework for Decision Making in Cloud that gives better capability for the VMs to perform resource allocation. The contribution of FDMC is a joint operation of VM to ensure faster processing of task and thereby withstand more number of increasing traffic. The study outcome was compared with some of the existing systems to find FDMC excels better performance in the scale of task allocation time, amount of core wasted, amount of storage wasted, and communication cost.
Volume: 7
Issue: 1
Page: 496-504
Publish at: 2017-02-01

Data Integrity and Security [DIS] Based Protocol for Cognitive Radio Ad Hoc Networks

10.11591/ijeecs.v5.i1.pp187-195
Azeem Mohammed Abdul , Syed Umar
In the CRN (cognitive Radio Networks) the main issues to be addressed are spectrum scarcity and inadequate usage of spectrum. The CRN can analyse the unused spectrum, so that CRN users can easily occupy the unused spectrum without blocking the existing Primary Users. In a CRN, routing is a complex issue because of channel diversity. The existing system mainly focuses on the performance analysis of Ad hoc On-Demand Distance Vector (AODV) and the Weight Cumulative Expected transmission time (WCETT). The performance of these protocols are measured and compared in various ways such as the throughput of single radio station multi-channels, equal number of radio stations and channels, multi-radio stations multi-channels. The limitation with these protocols is, whenever a route fails, there is issue to get connected with the other nodes, the other being data integrity, which maintains the no loss of data [LOD]. In our proposed DIS – CRAHN system we overcome these limitations by adding data security and integrity. Security is provided using the RSA algorithm while Integrity is ensured using the SHA algorithm. With the data security we can maintain the shortest path from source to destination and if any route failure occurs then immediate route establishment can be done and data encryption and decryption also be implemented using the random key generation. Results show an improved performance in delay with reasonable throughput, making the protocol an ideal choice for CRNs.
Volume: 5
Issue: 1
Page: 187-195
Publish at: 2017-01-01

A Neuro-Fuzzy Controller for Compensation of Voltage Disturbance in SMIB System

10.11591/ijeecs.v5.i1.pp72-80
Budi Srinivasarao , G. Sreenivasan , Swathi Sharma
Since last decade, due to advancement in technology and increasing in the electrical loads and also due to complexity of the devices the quality of power distribution is decreases. A Power quality issue is nothing but distortions in current, voltage and frequency that affect the end user equipment or disoperation; these are main problems of power quality so compensation for these problems by DPFC is presented in this paper. The control circuits for DPFC are designed by using line currents, series reference voltages and these are controlled by conventional Neuro-Fuzzy controllers. The results are observed by MATLAB/SIMULINK model.
Volume: 5
Issue: 1
Page: 72-80
Publish at: 2017-01-01

Parallelizing Multi-featured Content Based Search and Retrieval of Videos through High Performance Computing

10.11591/ijeecs.v5.i1.pp214-219
Azra Nasreen , Shobha G
Video Retrieval is an important technology that helps to design video search engines and allow users to browse and retrieve videos of interest from huge databases. Though, there are many existing techniques to search and retrieve videos based on spatial and temporal features but are unable to perform well resulting in high ranking of irrelevant videos leading to poor user satisfaction. In this paper an efficient multi-featured method for matching and extraction is proposed in parallel paradigm to retrieve videos accurately and quickly from the collection. Proposed system is tested on datasets that contains various categories of videos of varying length such as traffic, sports, nature etc. Experimental results show that around 80% of accuracy is achieved in searching and retrieving video. Through the use of high performance computing, the parallel execution performs 5 times faster in locating and retrieving videos of intrest than the sequential execution.
Volume: 5
Issue: 1
Page: 214-219
Publish at: 2017-01-01

Expert System of Quail Disease Diagnosis using Forward Chaining Method

10.11591/ijeecs.v5.i1.pp206-213
B. Herawan Hayadi , Kasman Rukun , Rizky Ema Wulansari , Tutut Herawan , Dahliyusmanto Dahliyusmanto , David Setaiwan , Safril Safril
Expert system applications were in great demand in various circles since 1950, with a coverage area that was large. Expert System on the organization was aimed at adding value, increasing productivity as well as the area of managerial can make decisions quickly and accurately. Neither with organizations that did business quail, which was very promising, but needed to be alert for the presence of disease in quail healthy, as in the case in birds quail were highly vulnerable to various kinds of diseases caused by viruses or bacteria. the benefits of the expert system that was able to diagnose quickly and accurately to the symptoms of the disease caused was expected to helped the farmers in of anticipation the many losses caused by disease. Required accuracy and the accuracy of the counting in diagnosing the symptoms of the disease in order to summarized the results by using forward chaining method.
Volume: 5
Issue: 1
Page: 206-213
Publish at: 2017-01-01

Fire Tracking and Suppression Mobile Robot - Design and Construction

10.11591/ijeecs.v5.i1.pp159-165
Abdülkadir ÇAKIR , Aqeel bahaa BADRI
Robots is one of the most important devices in the world that work automatically without human intervention. Robot can work for long hours without feeling tired and can be performed work that can be dangerous to human life. Autonomous robots are used today in many areas in our daily lives, for example, industry, Agriculture, Health, Education, scientific explorations and many other fields. Therefore in this research we will going to design autonomous robot that able to find and extinguish fires. In some cases, the dense flames very dangerous to humans live and therefore require intervention of robot. Fire tracking and suppression robot is a robot can automatically find and fighting fire. In this project a camera and flame sensor based on an rotary base was used. It can detect fire in an angle of rotation of 1600. ATmega328 microcontroller based on Arduino Uno board have been used,  to control the robot to do the right work without mistakes, ATmega328 based on Arduini Uno board have been used, and it can be programmed using C language by using arduino IDE.
Volume: 5
Issue: 1
Page: 159-165
Publish at: 2017-01-01

Non-convex Economic Load Dispatch using Cuckoo Search Algorithm

10.11591/ijeecs.v5.i1.pp48-57
N. Karthik , A.K. Parvathy , R. Arul
This paper presents cuckoo search algorithm (CSA) for solving non-convex economic load dispatch (ELD) problems of fossil fuel fired generators considering transmission losses and valve point loading effect. CSA is a new meta-heuristic optimisation technique inspired from the obligate brood parasitism of some cuckoo species by laying their eggs in the nests of other host birds of other species. The strength of the proposed meta-heuristic optimization technique CSA has been tested and validated on the standard IEEE 14-bus, 26-bus and 30-bus system with several heuristic load patterns. The results have indicated that the proposed approach is able to obtain significant economic load dispatch solutions than those of Firefly Algorithm (FFA) and other soft computing techniques reported in the literature.
Volume: 5
Issue: 1
Page: 48-57
Publish at: 2017-01-01

Packet Delay Distribution Model for Investigating Delay of Network Speech Recognition

10.11591/ijeecs.v5.i1.pp11-18
Asril Jarin , Suryadi Suryadi , Kalamullah Ramli
Unlike multimedia streaming applications that require a smooth playback at the client, application of network speech recognition (NSR) that recognizes speech signal in a sentence-by-sentence manner might tolerate an acceptable delay. The acceptable delay is a user-defined time in which the entire sentence data should be received by the server. We proposed a calculation method to investigate the acceptable delay of network speech recognition that employs a speech segmenter to send speech signal sentence-by-sentence over TCP channel to the server. The calculation multiplies the mean packet delay of TCP flow at steady-state with the number of created packets. For validation we implemented a MATLAB program and solved it using 2500 Indonesian speech sentences. The results were then compared with the results of our previous model that used a transient analysis method. It was found that this calculation method is not appropriate due to the transient behavior of the streaming sentences.
Volume: 5
Issue: 1
Page: 11-18
Publish at: 2017-01-01

Attacks of Denial-of-Service on Networks Layer of OSI Model and Maintaining of Security

10.11591/ijeecs.v5.i1.pp181-186
Azeem Mohammed Abdul , Syed Umar
The emergence of wireless sensor networks as one of the technology trends in the coming years, and some special tests of safety. The event will be thousands of tiny sensors that cheap devices, memory, radio and make, in most cases, no access to the production and energy. Some great challenges of sensor networks are different; we focus on security in the form of wireless sensor networks. To some network wireless sensor network in order to optimize use of the sensor, so that the network can be as long as possible. But the management of the important mission of the sensor network, denial of service (DoS) attacks against the destruction of the efficient use of network resources and the vital functions of the network. DoS attacks can be one of the greatest threats to security threats be considered. In fact, there are many different layers of the OSI-DOS.
Volume: 5
Issue: 1
Page: 181-186
Publish at: 2017-01-01

Optical Properties of Cadmium Oxide (CdO) Thin Films

10.11591/ijeecs.v5.i1.pp81-84
Hadaate Ullah , Ridoanur Rahaman , Shahin Mahmud
Cadmium (Cd) is a soft, silver-white or blue lustrous metal typically found in mineral deposits with lead, zinc and copper. Cadmium Oxide thin films have been prepared on a glass substrate at 3500C temperature by implementing the Spray Pyrolysis method. The direct and indirect band gap energies are determined using spectral data. The direct and indirect band gap energies decrease with the increasing film thickness. It is noted that for the same film thickness the direct band gap energy is greater than indirect band gap energy. The transmittance increases with the increasing wavelength for annealed and deposited films. It is also noted that for the same wavelength the transmittance for deposited films is greater than the transmittance for annealed films.
Volume: 5
Issue: 1
Page: 81-84
Publish at: 2017-01-01

Investigating Thermal Effect on a Cross Linked Polyethylene Power Cable

10.11591/ijeecs.v5.i1.pp33-40
Emna Khouildi , Rabah Attia , Rafik Cherni
One of the agents responsible of the degradation of power cables in electrical distribution network is the temperature. In this paper, numerical modelling of temperature effect on the cross linked polyethylene (XLPE) insulation of a medium voltage cable containing internal defects, which are air void cavity and water tree cavities, is developed by using the finite element method and simulated by COMSOL Multiphysics Software. The experimental investigation is conducted through studying parial discharge inception voltages in XLPE insulation before and after 23 heating cycles of a 7 meters sample of a medium voltage cable at 100°C and 120°C temperatures. Partial discharge inception voltages detection were performed using the IEC60270 test method. The simulation results and experimental measurements assessed the thermal effect on the degradation of XLPE insulation.
Volume: 5
Issue: 1
Page: 33-40
Publish at: 2017-01-01

Physicians’ and Users’ Perceptions towards Wearable Health Devices

10.11591/ijeecs.v5.i1.pp234-242
Narassima M Seshadri , Anbuudayasankar S P , Shriram Kris Vasudevan , Abhinavaram J
Healthcare plays a vital role in economic development of a country, and has a major impact on the entire wellness of humankind. One of the biggest issues of all times, Blood Pressure is prevailing in patients of all countries.  In developing countries like India, it is prevalent among people of diverse age groups, which somehow permeates into their wellness, reflecting and slowing down the growth of the country as well as that of an individual. As Blood Pressure is identified as one of the major contributors to Cardio Vascular Diseases, there is an urge to educate people about the consequences. The research focuses on various factors and their levels of impact on acceptance of Mobile Health Management Services. Appropriate tests have been carried out for validating this hypothesis. All the details are presented in the results’ section with clear discussion and description.
Volume: 5
Issue: 1
Page: 234-242
Publish at: 2017-01-01
Show 1430 of 1830

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration