Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

27,404 Article Results

WWLLN Data Cluster Analysis Methods for Lightning-Caused Forest Fires Monitoring

10.11591/ijece.v6i6.pp3112-3120
Baranovskiy Nikolay , Krechetova Svetlana , Belikova Marina , Perelygin Anton
Storm activity is the main reason for forest fires to occur in remote forested territories. The current article presents the results for cluster analysis of WWLLN data on lightning discharges. It provides the description for clusterization algorithms of lightning discharges over the controlled territory. Research area is Timiryazevskiy forestry of the Tomsk region (Siberia, Russia). We analyzed the applicability of cluster analysis results for monitoring of the forest fire danger caused by storm activity. As a result of the conducted research, we established that the following characteristics of storm activity can be included in deterministic-probabilistic criterion to assess the forest fire danger. The article gives the recommendations how to create new generation information-computer and geoinformation systems for monitoring of the forest fire danger caused by storm activity in the controlled forested territory.
Volume: 6
Issue: 6
Page: 3112-3120
Publish at: 2016-12-01

Combination a Skeleton Filter and Reduction Dimension of Kernel PCA Based on Palmprint Recognition

10.11591/ijece.v6i6.pp3255-3261
Muhammad Kusban , Adhi Susanto , Oyas Wahyunggoro
Palmprint identification is part of biometric recognition, which attracted many researchers, especially when fusion with face identification that will be applied in the airport to hasten knowing individual identity. To accelerate the process of verification feature palms, dimension reduction method is the dominant technique to extract the feature information of palms.The mechanism will boost if the ROI images are processed prior to get normalize image enhancement.In this paper with three sample input database, a kernel PCA method used as a dimension reduction compared with three others and a skeleton filter used as a image enhancement method compared with six others. The final results show that the proposed method successfully achieve the target in terms of the processing time of $ 0.7415 $ second, the EER performance rate of 0.19 % and the success of verification process about 99,82 %.
Volume: 6
Issue: 6
Page: 3255-3261
Publish at: 2016-12-01

Overvoltage Effects on Ground Grid Systems of Single and Two Neighboring High Voltage Substations

10.11591/ijece.v6i6.pp2545-2556
Krung Luewattana , Aphibal Pruksanubal
The power networks with reliable transmission and distribution systems require high voltage substations with effective ground grid systems. Therefore, this study aimed to analyze the effects of overvoltage on ground grid systems within high voltage substations in two cases, including a single substation and the two neighboring substations, by using ATP/EMTP and ANSYS softwares. The simulations were performed to show both graphs and 3D results when the fault current flowed into the ground grids of substations at various positions. In case of the single high voltage substation, the overvoltage was highest when the fault current was injected at the corner of ground grid. However, in case of two neighboring high voltage substations, the levels of overvoltage were similar between that caused by injecting the fault current at the center and at the corner of ground grid. The simulation showed that overvoltage which occurring at the ground grid of high voltage substation A could permeate to the ground grid of nearby high voltage substation B, which nevertheless depending on the how the fault current was injected at different spots. The data from these simulations and analysis can be useful for future designs of ground grid systems with high reliability.
Volume: 6
Issue: 6
Page: 2545-2556
Publish at: 2016-12-01

Face Song Player According to Facial Expressions

10.11591/ijece.v6i6.pp2805-2809
Samule Lee , Seong-Yoon Shin
Contemporary people have highly insufficient time and means of relieving their stress. Provision of a program that can solve such stress in daily life would make one’s life substantially more enjoyable. In this thesis, Face Song Player, which is a system that recognizes the facial expression of an individual and plays music that is appropriate for such person, is presented. It studies information on the facial contour lines and extracts an average, and acquires the facial shape information. MUCT DB was used as the DB for learning. For the recognition of facial expression, an algorithm was designed by using the differences in the characteristics of each of the expressions on the basis of expressionless images. Facial expression is extracted by acquiring information on the eyes, eyebrows, eyelids, mouth, lips and nasal cheeks for expressions of happiness, surprise and sorrow as well as absence of expression. There is an advantage of being able to obtain a substantial effect with very low cost through this system.
Volume: 6
Issue: 6
Page: 2805-2809
Publish at: 2016-12-01

Evaluation of Recognition-Based Graphical Password Schemes in Terms of Usability and Security Attributes

10.11591/ijece.v6i6.pp2939-2948
Touraj Khodadadi , A.K.M. Muzahidul Islam , Sabariah Baharun , Shozo Komaki
User Authentication is a critical component in information security. Several widely used mechanisms for security to protect services from illegal access include alphanumerical usernames passwords. However, there are several drawbacks attached in this method. For instance, the users themselves usually those passwords that are easy to guess. As difficult passwords are difficult to recall. A new alternative is the graphic-based password and there has been a growing trend in the use of such a password. The human psychology study reveals that humans find it easier to remember pictures as opposed to words. There are two main aspects to the graphical password scheme, namely security and usability. This study comprises of a comprehensive research in the current Recognition-Based graphical password schemes. The common usability attributes and possible attacks on the Recognition-Based graphical password are reviewed, identified and examined in detail. There are several previous surveys on the graphical passwords. The latest research review and summarize graphical password systems concisely and at the same time, analyze usability features for every design. However it was found that there is not a single method that has the most resounding usability attributes. Therefore, this research suggests a set of usability attributes that can be applied into a single Recognition-Based graphical password system. In addition, this study examines and compares success rates on login, login time and memorability of existing systems which are the usability measures most often reported in user studies of graphical passwords.  Lastly, a comparison table is revealed to put forth the limitations and strengths of each approach in terms of security and usability.
Volume: 6
Issue: 6
Page: 2939-2948
Publish at: 2016-12-01

Modeling and State Feedback Controller Design of Tubular Linear Permanent Magnet Synchronous Motor

10.11591/ijpeds.v7.i4.pp1410-1419
Hossein Komijani , Saeed Masoumi Kazraji , Ehsan Baneshi , Milad Janghorban Lariche
In this paper a state feedback controller for tubular linear permanent magnet synchronous motor (TLPMSM) containing two gas springs, is presented. The proposed TLPMSM controller is used to control reciprocating motions of TLPMSM. The analytical plant model of TLPMSM is a multi-input multi-output (MIMO) system which is decoupled to some sub single-input single-output (SISO) systems, then, the sub SISO systems are converted to sub-state space models. Indeed, the TLPMSM state space model is decoupled to some sub-state spaces, and then, the gains of state feedback are calculated by linear quadratic regulation (LQR) method for each sub-state space separately. The controller decreases the distortions of the waveforms. The simulation results indicate the validity of the controller.
Volume: 7
Issue: 4
Page: 1410-1419
Publish at: 2016-12-01

Using the Fuzzy Logic to Find Optimal Centers of Clusters of K-means

10.11591/ijece.v6i6.pp3068-3072
Wed Kadhim Oleiwi
Techniques of data mining that used in the medical diagnosis a number of diseases like cancer, diabetes, stroke, and heart disease. The great importance emerging fields for providing diagnosis and a profounder understanding of medical data, its coms from Data mining in medical field .researcher attempts to solve real world health problems in the prognosis and treatment of diseases, by using Healthcare data mining. In this research, the algorithm of k-means is used for grouping medical data, the problem of k-means is to find optimal centers of clusters so, and fuzzy logic is used to get optimal centers of clusters.
Volume: 6
Issue: 6
Page: 3068-3072
Publish at: 2016-12-01

A Novel Approach to GSA, GA and Wavelet Transform to Design Fuzzy Logic Controller for 1ϕ Multilevel Inverter

10.11591/ijpeds.v7.i4.pp1200-1211
Varsha Singh , S. Gupta , S. Pattnaik , Aarti Goyal
This paper proposes a novel approach for obtaining a closed loop control scheme based on Fuzzy Logic Controller to regulate the output voltage waveform of multilevel inverter. Fuzzy Logic Controller is used to guide and control the inverter to synthesize a stepped output voltage waveform with reduced harmonics. In this paper, three different intelligent soft-computing methods are used to design a fuzzy system to be used as a closed loop control system for regulating the inverter output. Gravitational Search Algorithm and Genetic Algorithm are used as optimization methods to evaluate switching angles for different combination of input voltages applied to MLI. Wavelet Transform is used as synthesizing technique to shape stepped output waveform of inverter using orthogonal wavelet sets. The proposed FLC controlled method is carried out for a wider range of input dc voltages by considering ±10% variations in nominal voltage value. A 7-level inverter is used to validate the results of proposed control methods. The three proposed methods are then compared in terms of various parameters like computational time, switching angles and THD to justify the performance and system flexibility. Finally, hardware based results are also obtained to verify the viability of the proposed method.
Volume: 7
Issue: 4
Page: 1200-1211
Publish at: 2016-12-01

Fibonary Spray and Wait Routing in Delay Tolerant Networks

10.11591/ijece.v6i6.pp3205-3216
Priyanka Das , Prosenjit Chowdhury , Bikash Poudel , Tanmay De
Although there has been a tremendous rise in places being connected through the Internet or any other network protocol, there still lie areas, which remain out of reach due to various reasons. For all such places the answer is a Delay Tolerant Network (DTN). A DTN is such a network where there is no fixed or predefined route for messages and no such guarantee whatsoever of all messages being correctly routed. DTN can be considered as a superset of networks wherein other networks such as adhoc, mobile, vehicular etc. form the subset. Therefore routing in DTN is a very chancy affair where one has to maximize on the present network scenarios to get any fruitful result other than depending on past information. Also protocols here need to be less complex and not increase the already high nodal overhead. In this paper we propose a new approach, the Fibonary Spray and Wait, which does exactly this. It forwards copies of a message in a modified Binary Spray and Wait manner so that it performs well even in non independent and identically distributed node structure. We have supported our statements with mathematical as well as simulation analysis.
Volume: 6
Issue: 6
Page: 3205-3216
Publish at: 2016-12-01

Improved Stator Flux Estimation for Direct Torque Control of Induction Motor Drives

10.11591/ijpeds.v7.i4.pp1049-1060
Yahya Ahmed Alamri , Nik Rumzi Nik Idris , Ibrahim Mohd. Alsofyani , Tole Sutikno
Stator flux estimation using voltage model is basically the integration of the induced stator back electromotive force (emf) signal. In practical implementation the pure integration is replaced by a low pass filter to avoid the DC drift and saturation problems at the integrator output because of the initial condition error and the inevitable DC components in the back emf signal. However, the low pass filter introduces errors in the estimated stator flux which are significant at frequencies near or lower than the cutoff frequency. Also the DC components in the back emf signal are amplified at the low pass filter output by a factor equals to . Therefore, different integration algorithms have been proposed to improve the stator flux estimation at steady state and transient conditions. In this paper a new algorithm for stator flux estimation is proposed for direct torque control (DTC) of induction motor drives. The proposed algorithm is composed of a second order high pass filter and an integrator which can effectively eliminates the effect of the error initial condition and the DC components. The amplitude and phase errors compensation algorithm is selected such that the steady state frequency response amplitude and phase angle are equivalent to that of the pure integrator and the multiplication and division by stator frequency are avoided. Also the cutoff frequency selection is improved; even small value can filter out the DC components in the back emf signal. The simulation results show the improved performance of the induction motor direct torque control drive with the proposed stator flux estimation algorithm. The simulation results are verified by the experimental results.
Volume: 7
Issue: 4
Page: 1049-1060
Publish at: 2016-12-01

Transient Phenomena during the Three-Phase 300MVA Transformer Energization on the Transmission Network

10.11591/ijece.v6i6.pp2499-2505
Emir Alibašić , Predrag Marić , Srete N Nikolovski
Connecting the transformer to the network may incur inrush current, which is significantly higher than the rated current of the transformer. The main cause of this phenomenon lies in the nonlinearity of the magnetic circuit. The value of the inrush current depends of the time moment of the energization and the residual magnetism in the transformer core. While connecting, the operating point of the magnetization characteristic can be found deep in the saturation region resulting in occurrence of large transformer currents that can trigger the transformer protection. Tripping of protection immediately after the transformer energization raises doubts about the transformer health. Inrush current can cause a number of other disadvantages such as the negative impact on other transformers connected on the same busbar; the increase of the transformer noise due to the large current value, the increase of the voltage drops in the network. The paper presents a simulation of the 300 MVA transformer energization using the MATLAB/Simulink software.  
Volume: 6
Issue: 6
Page: 2499-2505
Publish at: 2016-12-01

Photovoltaic System with SEPIC Converter Controlled by the Fuzzy Logic

10.11591/ijpeds.v7.i4.pp1283-1293
Meryem Oudda , Abdeldjebar Hazzab
In this work, a fuzzy logic controller is used to control the output voltage of a photovoltaic system with a DC-DC converter; type Single Ended Primary Inductor Converter (SEPIC). The system is designed for 210 W solar PV (SCHOTT 210) panel and to feed an average demand of 78 W. This system includes solar panels, SEPIC converter and fuzzy logic controller. The SEPIC converter provides a constant DC bus voltage and its duty cycle controlled by the fuzzy logic controller which is needed to improve PV panel’s utilization efficiency. A fuzzy logic controller (FLC) is also used to generate the PWM signal for the SEPIC converter. 
Volume: 7
Issue: 4
Page: 1283-1293
Publish at: 2016-12-01

Signature Verification using Normalized Static Features and Neural Network Classification

10.11591/ijece.v6i6.pp2665-2673
Manish Trikha , Manas Singhal , Maitreyee Dutta
Signature verification is very widely used in verification of the identity of any person. Now a days other biometric verification system has been evolved very widely like figure print, iris etc., but signature verification through computer system is still in development phase. The verification system is either through offline mode or online mode in online systems the dynamic information of a signature captured at the time the signature is made while in offline systems based on the scanned image of a signature. In this paper, a method is presented for Offline signatures Verification, for this verification system signature image is first pre-processed and converted into binary image of same size with 200x200 Pixels and then different features are extracted from the image like Eccentricity, Kurtosis, Skewness etc. and that features are used to train the neural network using back-propagation technique. For this verification system 6 different user signatures are taken to make database of the feature and results are analysed. The result demonstrate the efficiency of the proposed methodology when compared with other existing studies. The proposed algorithm gives False Acceptance Rate (FAR) as 5.05% and False Rejection rate (FRR) as 4.25%.
Volume: 6
Issue: 6
Page: 2665-2673
Publish at: 2016-12-01

On Usable Speech Detection by Linear Multi-Scale Decomposition for Speaker Identification

10.11591/ijece.v6i6.pp2766-2772
Wajdi Ghezaiel , Amel Ben Slimane , Ezzedine Ben Braiek
Usable speech is a novel concept of processing co-channel speech data. It is proposed to extract minimally corrupted speech that is considered useful for various speech processing systems. In this paper, we are interested for co-channel speaker identification (SID). We employ a new proposed usable speech extraction method based on the pitch information obtained from linear multi-scale decomposition by discrete wavelet transform. The idea is to retain the speech segments that have only one pitch detected and remove the others. Detected Usable speech was used as input for speaker identification system. The system is evaluated on co-channel speech and results show a significant improvement across various Target to Interferer Ratio (TIR) for speaker identification system.
Volume: 6
Issue: 6
Page: 2766-2772
Publish at: 2016-12-01

Advance Technology in Application of Four Leg Inverters to UPQC

10.11591/ijpeds.v7.i4.pp1153-1160
K. Venkata Rami Reddy , T. Gowri Manohar , B. Chandra Sekhar
This article presents a novel application of four leg inverter with conventional Sinusoidal Pulse Width Modulation (SPWM) Scheme to Unified Power Quality Conditioner (UPQC). The Power Quality problem became burning issues since the starting of high voltage AC transmission system. Hence, in this article it has been discussed to mitigate the PQ issues in high voltage AC systems through a three phase Unified Power Quality Conditioner (UPQC) under various conditions, such as harmonic mitigation scheme, non linear loads, sag and swell conditions as well. Also, it proposes to control harmoincs with various artificial intelligent techniques. Thus application of these control technique such as Artifical Neural Networks, Fuzzy Logic makes the system performance in par with the standards and also compared with existing system. The simulation results based on MATLAB/SIMULINKTM are discussed in detail to support the concept developed in the paper.
Volume: 7
Issue: 4
Page: 1153-1160
Publish at: 2016-12-01
Show 1435 of 1827

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration