Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

28,451 Article Results

Performance Analysis of 3-Level 5-Phase Multilevel Inverter Topologies

10.11591/ijece.v7i4.pp1696-1705
B. Jyothi , M. Venu Gopala Rao
Now a day’s many industrial applications requires high power. Some other appliances may require intermediate power either more or less depending upon their operation. With these consequences, MULTI LEVEL INVERTERS are introduced in 1975.for above intermediate voltage applications. The name MULTI LEVEL began with the three-level converter.By enormous advancement in power semiconductor switches, in electric drives increasing the phase number greater than the conventional three phase especially in locomotives, naval, aerospace, and electrical vehicles industry has many advantages than three phase. In this view, here five phase VSI has developed. This paper aims at comparing the performance of conventional two level inverter Diode clamped and Capacitor clamped topologies of 5-phase multilevel inverter (3-level) using sinusoidal pulse width modulation. SPWM is highly economical, has more efficiency, controllability. These circuits are analyzed by using simulation software package such as MATLAB.
Volume: 7
Issue: 4
Page: 1696-1705
Publish at: 2017-08-01

Security Enhancement in Networked Embedded System

10.11591/ijece.v7i4.pp1867-1873
Pradip Ram Selokar , P T Karule
In the developed system ARM9 is a master and Two ARM7s are slaves. The peripherals are being controlled by two ARM7 boards. The Peripherals are connected to the ARM7 through Complex Programmable Logic Device (CPLD). The CPLD is in turn connected to the ARM7 using Serial Peripheral Interface (SPI). The ARM7 boards collect the information from the peripherals and send it to the ARM9 board. The communication between ARM7 and ARM9 is via UART (Universal Asynchronous Receiver Transmitter) over CAN (Controller Area Network). The ARM9 board has got the software intelligence. The ARM9 behaves as a master and two ARM7 boards behave as slaves. Being master ARM9 passes tokens to ARM7 which in turn returns (Acknowledges) the token. The ARM9 is further connected to Proxy via Ethernet. The proxy is further connected to the service platform (server) via Ethernet. So subsequently any decisions at any stage can be changed at server level. Further these commands can be passed on to ARM9 which in turn controls the peripherals through ARM7. (a) The system which we have developed consists of ARM9 as a master, Two ARM7 as Slaves. The communication between ARM9-ARM7 is via UART over a CAN, (b) Each ARM7 further communicates serially (RS232) with the two 8051 Microcontroller nodes, (c)Thus a networked Embedded System is developed wherein the serial data is brought over Ethernet. The ARM7 board, which is directly linked with the peripherals, can be modified of its functionality as and when required. The functionality of ARM7 can be modified by upgrading its firmware. To upgrade the firmware same communication link has been used. ARM7 receives the new firmware via same ARM9-ARM7 communication link. The Flash Write operation is performed using the source code to write the new firmware. Bootloader application for the ARM7 has been developed. The signature has been incorporated to assure authenticity of the new Firmware. Intel Hex File Format is used to parse the hex file.
Volume: 7
Issue: 4
Page: 1867-1873
Publish at: 2017-08-01

RC Hovercraft: An I-Bylogical Enzyme (I-BE) Biosensor Carrier

10.11591/ijece.v7i4.pp2002-2007
Rinta Kridalukmana , Budi Cahyo S.P. , Deddy Kurniawan W , Fahmi Arifan
In this research, a hovercraft was developed as a transportation tool to carry an I-Bylogical Enzyme (I-BE) biosensor. The main function of the biosensor is to measure the level of dangerous chemical materials from factory’s liquid waste. Hence, fiber and acrylic materials, that widely known for its resistance to chemical reaction, are needed to build the hovercraft. By using Atmega 8535 microcontroller and Arduino Uno board, a remote control was choosen to navigate hovercraft’s movement with support of 6 channels Transmitter Receiver. As a result, after series of tests that were carried out, indicate that the hovercraft’s prototype was found to meet design and requirements expectation.
Volume: 7
Issue: 4
Page: 2002-2007
Publish at: 2017-08-01

Classification with Single Constraint Progressive Mining of Sequential Patterns

10.11591/ijece.v7i4.pp2142-2151
Regina Yulia Yasmin , Putri Saptawati , Benhard Sitohang
Classification based on sequential pattern data has become an important topic to explore. One of research has been carried was the Classify-By-Sequence, CBS. CBS classified data based on sequential patterns obtained from AprioriLike sequential pattern mining. Sequential patterns obtained were called CSP, Classifiable Sequential Patterns. CSP was used as classifier rules or features for the classification task. CBS used AprioriLike algorithm to search for sequential patterns. However, AprioriLike algorithm took a long time to search for them. Moreover, not all sequential patterns were important for the user. In order to get the right and meaningful features for classification, user uses a constraint in sequential pattern mining. Constraint is also expected to reduce the number of sequential patterns that are short and less meaningful to the user. Therefore, we developed CBS_CLASS* with Single Constraint Progressive Mining of Sequential Patterns or Single Constraint PISA or PISA*. CBS_Class* with PISA* was proven to classify data in faster time since it only processed lesser number of sequential patterns but still conform to user’s need. The experiment result showed that compared to CBS_CLASS, CBS_Class* reduced the classification execution time by 89.8%. Moreover, the accuracy of the classification process can still be maintained. 
Volume: 7
Issue: 4
Page: 2142-2151
Publish at: 2017-08-01

A Big Data Security using Data Masking Methods

10.11591/ijeecs.v7.i2.pp449-456
Archana R A , Ravindra S Hegadi , Manjunath T N
Due to Internet of things and social media platforms, raw data is getting generated from systems around us in three sixty degree with respect to time, volume and type. Social networking is increasing rapidly to exploit business advertisements as business demands. In this regard there are many challenges for data management service providers, security is one among them. Data management service providers need to ensure security for their privileged customers in providing accurate and valid data. Since underlying transactional data have varying data characteristics such huge volume, variety and complexity, there is an essence of deploying such data sets on to the big data platforms which can handle structured, semi-structured and un-structured data sets. In this regard we propose a data masking technique for big data security. Data masking ensures proxy of original dataset with a different dataset which is not real but looks realistic. The given data set is masked using modulus operator and the concept of keys. Our experiment advocates enhanced modulus based data masking is better with respect to execution time and space utilization for larger data sets when compared to modulus based data masking. This work will help big data developers, quality analysts in the business domains and provides confidence for end-users in providing data security.
Volume: 7
Issue: 2
Page: 449-456
Publish at: 2017-08-01

Learning from a Class Imbalanced Public Health Dataset: a Cost-based Comparison of Classifier Performance

10.11591/ijece.v7i4.pp2215-2222
Rohini R Rao , Krishnamoorthi Makkithaya
Public health care systems routinely collect health-related data from the population. This data can be analyzed using data mining techniques to find novel, interesting patterns, which could help formulate effective public health policies and interventions. The occurrence of chronic illness is rare in the population and the effect of this class imbalance, on the performance of various classifiers was studied. The objective of this work is to identify the best classifiers for class imbalanced health datasets through a cost-based comparison of classifier performance. The popular, open-source data mining tool WEKA, was used to build a variety of core classifiers as well as classifier ensembles, to evaluate the classifiers’ performance. The unequal misclassification costs were represented in a cost matrix, and cost-benefit analysis was also performed.  In another experiment, various sampling methods such as under-sampling, over-sampling, and SMOTE was performed to balance the class distribution in the dataset, and the costs were compared. The Bayesian classifiers performed well with a high recall, low number of false negatives and were not affected by the class imbalance. Results confirm that total cost of Bayesian classifiers can be further reduced using cost-sensitive learning methods. Classifiers built using the random under-sampled dataset showed a dramatic drop in costs and high classification accuracy.
Volume: 7
Issue: 4
Page: 2215-2222
Publish at: 2017-08-01

Energy Optimization of Routing Protocols in Wireless Sensor Networks

10.11591/ijict.v6i2.pp76-85
Fatima Es-sabery , Hicham Ouchitachen , Abdellatif Hair
The hierarchical routing of data in WSNs is a specific class of routing protocols it encompasses solutions that take a restructuring of the physical network in a logical hierarchy system for the optimization of the consum-ption of energy. Several hierarchical routing solutions proposed, namely: the protocol LEACH (Low Energy Adaptive Clustering Hierarchy) consist of dividing the network in distributed clusters at one pop in order of faster data delivery and PEGASIS protocol (Power-Efficient Gathering in Sensor Information Systems) which uses the principle of constructing a chain’s sensor node. Our contribution consists of a hierarchical routing protocol, which is the minimization of the energy consumption by reducing the transmission distance of data and reducing the data delivery time. Our solution combines the two hierarchical routing approaches: chain based approach and the cluster based approach. Our approach allows for multi-hop communications, intra- and intercluster, and a collaborative aggregation of data in each Cluster, and a collaborative aggregation of data at each sensor node.
Volume: 6
Issue: 2
Page: 76-85
Publish at: 2017-08-01

Design and Simulation of Automatic Temperature Control and Alert System Based PIC16F887

10.11591/ijict.v6i2.pp95-104
Jabbar Shaati Jahlool
In this research, the design and simulation of an automatic system for temperature control using embedded system in order to automatically control of multi appliances depend on the temperature value. The appliances will be controlled are ventilation, cooling, heating and alert. this is an order to avoid or reduce to human intervention and increase system reliability. An important feature of this automation process is to reduce or eliminate the possibility of relying on the human factor operator for industries, warehouses and laboratories, and to improve working and performance environments. The system in this paper used the microcontroller PIC16F887 as the central control unit, LM35 temperature sensor as a temperature source,16x2 liquid crystal display (LCD) as indicator to display the different system working status an addition to some of drivers, relay and light emitting diodes (LED) as indicators to display the corresponding working appliance driver. The implementation and simulation of the system work has been achieved by using proteus professional software v8.0 and mikroc pro for pic v .6.6.1 software to write the equivalent program and generate .hex file for system working. The result shows in figures 5, 6, 7, and 8 that explain the system working cases
Volume: 6
Issue: 2
Page: 95-104
Publish at: 2017-08-01

A Review on Constant Switching Frequency Techniques for Direct Torque Control of Induction Motor

10.11591/ijeecs.v7.i2.pp364-372
Auzani Jidin , Kasrul Abdul Karim , Khairi Rahim , Logan Raj Lourdes Victor Raj , Sundram Ramahlingam , Tole Sutikno
The Direct Torque Control (DTC) of induction machine has received wide acceptance in many Variable Speed Drive (VSD) applications due to its simple control structure and excellent torque dynamic control performances. However, the conventional DTC which employs a two-level inverter and hysteresis controllers produces two major drawbacks, namely, larger torque ripple and variable switching frequency, which might produce a very high switching frequency (or power loss), particularly at a very low speed operation. This paper highlight the common methods used to provide the constant switching frequency for DTC drives for Induction Motor that able to minimize the power losses and reduced the torque ripple.
Volume: 7
Issue: 2
Page: 364-372
Publish at: 2017-08-01

Efficient Proximity Coupled Feed Rectangular Microstrip Patch Antenna with Reduced Harmonic Radiation

10.11591/ijeecs.v7.i2.pp500-506
Dawit Fistum
This paper presents an efficient proximity coupled feed rectangular microstrip patch antenna with reduced harmonic radiation. The proposed antenna resonates in S-band at frequency of 2.45 GHz with bandwidth of 88.5 MHz. A very good return loss of -47.0546 dB is obtained for the Microstrip patch antenna. The antenna matching can be achieved with an appropriate line-patch overlap, but with a careful design consideration. Not only the good matching of the fundamental mode, but also the effect on the harmonic radiation from the other patch modes has been considered. Varying the length & location of the microstrip feed line and introducing a defect in the ground plane- the harmonic radiation from the other patch mode is reduced to minimum.
Volume: 7
Issue: 2
Page: 500-506
Publish at: 2017-08-01

EV-SIFT - An Extended Scale Invariant Face Recognition for Plastic Surgery Face Recognition

10.11591/ijece.v7i4.pp1923-1933
Archana H. Sable , Sanjay N. Talbar , Haricharan Amarsing Dhirbasi
Automatic recognition of people faces many challenging problems which has experienced much attention due to many applications in different fields during recent years. Face recognition is one of those challenging problem which does not have much technique to solve all situations like pose, expression, and illumination changes, and/or ageing. Facial expression due to plastic surgery is one of the additional challenges which arise recently. This paper presents a new technique for accurate face recognition after the plastic surgery. This technique uses Entropy based SIFT (EV-SIFT) features for the recognition purpose. The corresponding feature extracts the key points and volume of the scale-space structure for which the information rate is determined. This provides least effect on uncertain variations in the face since the entropy is the higher order statistical feature. The corresponding EV-SIFT features are applied to the Support vector machine for classification. The normal SIFT feature extracts the key points based on the contrast of the image and the V- SIFT feature extracts the key points based on the volume of the structure. But the EV- SIFT method provides the contrast and volume information. This technique provides better performance when compare with PCA, normal SIFT and V-SIFT based feature extraction.
Volume: 7
Issue: 4
Page: 1923-1933
Publish at: 2017-08-01

A Markov Decision Model for Area Coverage in Autonomous Demining Robot

10.11591/ijict.v6i2.pp105-116
Abdelhadi Larach , Cherki Daoui , Mohamed Baslam
A review of literature shows that there is a variety of works studying coverage path planning in several autonomous robotic applications. In this work, we propose a new approach using Markov Decision Process to plan an optimum path to reach the general goal of exploring an unknown environment containing buried mines. This approach, called Goals to Goals Area Coverage on-line Algorithm, is based on a decomposition of the state space into smaller regions whose states are considered as goals with the same reward value, the reward value is decremented from one region to another according to the desired search mode. The numerical simulations show that our approach is promising for minimizing the necessary cost-energy to cover the entire area.
Volume: 6
Issue: 2
Page: 105-116
Publish at: 2017-08-01

Stator Inter-turn Fault Detection in Inverter Fed Induction Motor Drives

10.11591/ijape.v6.i2.pp89-102
Khadim Moin Siddiqui , Kuldeep Sahay , V. K. Giri
The Squirrel Cage Induction Motor (SCIM) with advanced power electronic inverters presents the greater advantages on cost and energy efficiency as compared with other industrial solutions for varying speed applications. In recent, the inverter fed induction motors are being popular in the industries. These inverter fed-motors are recently gathering great recognition for multimegawatt industrial drive applications. In this present paper, a dynamic simulation model of PWM inverter fed SCIM with direct torque control jointly has been presented and analyzed in the recent MATLAB/Simulink environment. From the proposed simulation model, the transient behavior of SCIM has been analysed for healthy as well as for stator inter-turn fault condition. The dynamic simulation of induction motor is one of the key steps in the validation of design process of the electric motor and drive system. It is extremely needed for eliminating probable faults beforehand due to inadvertent design mistakes and changes during operation. The simulated model gives encouraging results with reduced harmonics [1]. By using the model, the successful detection of stator inter-turn fault of the SCIM is carried out in the transient condition. Therefore, early stator fault detection is possible and may avoid the motor to reach in the catastrophic conditions. Therefore, may save millions of dollars for industries.
Volume: 6
Issue: 2
Page: 89-102
Publish at: 2017-08-01

A Fast Strategy to determine the Physical and Electrical Parameters of Photovoltaic Silicon Cell

10.11591/ijape.v6.i2.pp103-112
El Hadi Chahid , Mohammed Idali Oumhand , Abdessamad Malaoui
This paper proposes a fast strategy to extract and exploit the electrical parameters of photovoltaic cell using the double-diode model. The polycrystalline silicon (poly-Si) junction is chosen in this work due to the importance of its proprieties in industrial and economic fields. The proposed method to extract the solar cell electrical parameters contains two steps. The first is based on the graphical adjustments to choose the initial values of these parameters, and the second is numerical, using Modified Newton-Raphson’s algorithm. The obtained parameters extractions values are compared to the others methods and give a considerable agreement. Furthermore, we have developed a complementary analytical method to deduce both the minority’s carrier’s lifetime and the diffusion lengths through the diffusion and recombination current densities. The found values of these parameters are precisely comparable with theoretical models, and give very useful informations on the intrinsic quality of the studied cell.
Volume: 6
Issue: 2
Page: 103-112
Publish at: 2017-08-01

Survey of Detection SIP Malformed Messages

10.11591/ijeecs.v7.i2.pp457-465
Mourade Azrour , Mohammed Ouanan , Yousef Farhaoui
Session Initiation Protocol (SIP) is an application layer protocol designed to control and establish multimedia sessions over internet. SIP gaining more and more popularity as it is used by numerous applications such as telephony over IP(ToIP). SIP is a text based protocol built on the base of the HTTP and SMTP protocols. SIP suffers from certain security threats which need to be resolved in order to make it a more efficient signaling protocol. In this work, we review the proposed works aimed to detect SIP malformed messages that can cause security problem. Then, we classify the type of malformed SIP message and compare between the mechanisms used to reinforce the detection of malformed SIP message attack.
Volume: 7
Issue: 2
Page: 457-465
Publish at: 2017-08-01
Show 1443 of 1897

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration