Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

28,451 Article Results

System Diagnosis of Coronary Heart Disease using A Combination of Dimensional Reduction and Data Mining Techniques: A Review

10.11591/ijeecs.v7.i2.pp514-523
Wiharto Wiharto , Hari Kusnanto , Herianto Herianto
Coronary heart disease is a disease with the highest mortality rates in the world. This makes the development of the diagnostic system as a very interesting topic in the field of biomedical informatics, aiming to detect whether a heart is normal or not. In the literature there are diagnostic system models by combining dimension reduction and data mining techniques. Unfortunately, there are no review papers that discuss and analyze the themes to date. This study reviews articles within the period 2009-2016, with a focus on dimension reduction methods and data mining techniques, validated using a dataset of UCI repository. Methods of dimension reduction use feature selection and feature extraction techniques, while data mining techniques include classification, prediction, clustering, and association rules.
Volume: 7
Issue: 2
Page: 514-523
Publish at: 2017-08-01

Asymptotic Stabilization of Delayed Systems with Input and Output Saturations

10.11591/ijape.v6.i2.pp63-72
Adel Mahjoub , Nabil Derbel
We consider in this paper the problem of controlling an arbitrary linear delayed system with saturating input and output. We study the stability of such a system in closed-loop with a given saturating regulator. Using inputoutput stability tools, we formulated sufficient conditions ensuring global asymptotic stability.
Volume: 6
Issue: 2
Page: 63-72
Publish at: 2017-08-01

Power System Performance Improvement by Optimal Placement and Sizing of SVC using Genetic Algorithm

10.11591/ijape.v6.i2.pp55-62
Prasanth Duraisamy , Arul Ponnusamy
The power system loss minimization becomes more important as the need of power generation is more recent days. The loss minimization improves the voltage profile which improves the loadability of the system. In many types of flexible AC transmission system (FACTS) devices static var compensators (SVC) are cost vise it is affordable and it improves the system performance with lesser size. Here SVC is optimally placed in a test system of 30 bus system. Genetic algorithm is used to find the optimal results.
Volume: 6
Issue: 2
Page: 55-62
Publish at: 2017-08-01

New Optimization Method of the MPPT Algorithm and Balancing Voltage Control of the Three-Level Boost Converter (TLBC)

10.11591/ijape.v6.i2.pp113-122
Hassan Abouobaida , Said El Bied
This paper is dedicated to studying the control of the Three Level Boost Converters (TLBC) and the optimization method of Maximum Power Point Tracking (MPPT) based a variable step. The main objective of the optimization is to find a compromise between the response time and the amplitude of the oscillations around the optimal point. The nonlinear behavior of the TLBC is manifested by the presence of the disturbances. For reasons of simplicity of the control, a linearization based on the dynamic compensation of the disturbance is proposed. On the one hand, a cascaded MPPT algorithm and a simple linear regulator allow adjusting the inductance current and a maximum power operation of the wind system. On the other hand, a second linear regulator ensures balancing of the output voltages. The paper proposes a new approach to the optimization of the Inc-Cond MPPT. The suggested contribution consists of using an exponential function of the power derivative to develop a variable step. The adoption of the variable step size according to the dynamics of the wind system implies a compromise between the response time and the amplitude of the ripples around the optimal point. The simulation results showed that a variable step size, especially in transient conditions and during a very rapid climate change recover the optimum power point within a reasonable time and suitable amplitude of the oscillations. The results achieved in this study show the ability of the proposed approach to extract the maximum power according to the available wind speed while guaranteeing a better efficiency. The developed study is summarized by the following points: (a) modeling the wind conversion systems, (b) detailing the control approach of the TLBC and presenting the variable step method (c) presenting the simulations results and evaluating the perf.
Volume: 6
Issue: 2
Page: 113-122
Publish at: 2017-08-01

Distributed Cache with Utilizing Squid Proxy Server and LRU Algorithm

10.11591/ijeecs.v7.i2.pp474-482
Abdul Ghofir , Rikip Ginanjar
In relation to the dissemination of information, the Internet is one of the fastest media to do so. The internet’s presence is growing very swiftly and rapidly, so it has become recognized by people from all walks of life. For that, the people need the appropriate way to maintain effectiveness in the use of the Internet. The following paper describes a study of the distribution of the cache, which is performed by the squid proxy server by creating a storage network design on Linux. Cache documents that are stored in the proxy server will be distributed to another over a network storage server. The process of caching on the proxy server is using the Least Recently Used (LRU) Algorithm. This research was carried out by developing the existing method of caching server process, then it is to be added a unit as a backup storage device for the data that must be erased because of the replacement policy applied to the squid proxy server. This study is looking at how the hit ratio and byte hit ratio after adding the storage server compared to not having a storage server. At the end of this research, it is concluded that the distributed cache processes a hit ratio and byte hit ratio higher than the cache on the current proxy server.
Volume: 7
Issue: 2
Page: 474-482
Publish at: 2017-08-01

Comparison of Instantaneous Reactive and Notch Filter Algorithms Seven Level Parallel Active Filter

10.11591/ijece.v7i4.pp1779-1788
Farouk Hadj Benali , Fouad Azzouz
This work focused on the association of a seven level Neutral Point Clamped inverter and a parallel active filter. In order to test the efficiency of the 7 level parallel active filter, two reference current generating algorithms are used. The instantaneous reactive power algorithm and the notch filter algorithm. In this study, the instantaneous reactive power method and the notch filter method are presented. Than a section which gives a recall of the NPC multilevel inverter and PWM strategy. A comparison between the two reference current generating algorithms is made. The subjects of comparison are the total harmonic distortion (THD) and the fundamental value of the source current. The obtained simulation results have proved that the instantaneous reactive power technique is better than the notch filter technique. Simulations are carried out by PSIM program.
Volume: 7
Issue: 4
Page: 1779-1788
Publish at: 2017-08-01

The Analysis of Performace Model Tiered Artificial Neural Network for Assessment of Coronary Heart Disease

10.11591/ijece.v7i4.pp2183-2191
Wiharto Wiharto , Harianto Herianto , Hari Kusnanto
The assessment model of coronary heart disease is so much developed in line with the development of information technology, particularly the field of artificial intelligence. Unfortunately, the assessment models developed mostly do not use such an approach made by the clinician, the tiered approach. This study aims to analyze the performance of a tiered model assessment. The method used for each level is, preprocessing, building architecture artificial neural network (ANN), conduct training using the Levenberg-Marquardt algorithm and one step secant, as well as testing the system. The study is divided into the terms of the stages in the examination procedure. The test results showed the influence of each level, both when the output level of the previous positive or negative, were tested back at the next level. The performance evaluation may indicate that the top level provides performance improvement and or reinforce the previous level. 
Volume: 7
Issue: 4
Page: 2183-2191
Publish at: 2017-08-01

A Markov Decision Model for Area Coverage in Autonomous Demining Robot

10.11591/ijict.v6i2.pp105-116
Abdelhadi Larach , Cherki Daoui , Mohamed Baslam
A review of literature shows that there is a variety of works studying coverage path planning in several autonomous robotic applications. In this work, we propose a new approach using Markov Decision Process to plan an optimum path to reach the general goal of exploring an unknown environment containing buried mines. This approach, called Goals to Goals Area Coverage on-line Algorithm, is based on a decomposition of the state space into smaller regions whose states are considered as goals with the same reward value, the reward value is decremented from one region to another according to the desired search mode. The numerical simulations show that our approach is promising for minimizing the necessary cost-energy to cover the entire area.
Volume: 6
Issue: 2
Page: 105-116
Publish at: 2017-08-01

Quantum Key-Policy Attribute-based Encryption

10.11591/ijeecs.v7.i2.pp542-550
Gabriela Mogos
Attribute-Based Encryption is a relatively new concept in the field of cryptography, and it allows only the authorized entities to decrypt a message. This type of encryption is the mechanism by which the users may encrypt and decrypt data based on user attributes. This paper proposes the first quantum alternative of the scheme Key-Policy Attribute-Based Encryption, where the information, the encryption/decryption key, and the attributes are made of qutrits.
Volume: 7
Issue: 2
Page: 542-550
Publish at: 2017-08-01

A Novel Approach to Study the Effects of Anesthesia on Respiratory Signals by using the EEG Signals

10.11591/ijict.v6i2.pp117-122
Mohd Suhaib Kidwai , S. Hasan Saeed
General anesthesia plays a crucial role in many surgical procedures. It is a drug-induced, reversible state characterized by unconsciousness, anti-nociception or analgesia, immobility and amnesia. On rare occasions, however, the patient can remain unconscious longer than intended, or may regain awareness during surgery. There are no precise measures for maintaining the correct dose of anesthetic, and there is currently no fully reliable instrument to monitor depth of anesthesia. Although a number of devices for monitoring brain function or sympathetic output are commercially available, the anesthetist also relies on clinical assessment and experience to judge anesthetic depth. The undesirable consequences of overdose or unintended awareness might in principle be ameliorated by improved control if we could understand better the changes in function that occur during general anesthesia. Coupling functions prescribe the physical rule specifying how the inter-oscillator interactions occur. They determine the possibility of qualitative transitions between the oscillations, e.g. routes into and out of phase synchronization. Their decomposition can describe the functional contribution from each separate subsystem within a single coupling relationship. In this way, coupling functions offer a unique means of describing mechanisms in a unified and mathematically precise way. It is a fast growing field of research, with much recent progress on the theory and especially towards being able to extract and reconstruct the coupling functions between interacting oscillations from data, leading to useful applications in cardio respiratory interactions.In this paper, a novel approach has been proposed for detecting the changes in synchronism of brain signals, taken from EEG machine. During the effect of anesthesia, there are certain changes in the EEG signals. Those signals show changes in their synchronism. This phenomenon of synchronism can be utilized to study the effect of anesthesia on respiratory parameters like respiration rate etc, and hence the quantity of anesthesia can be regulated, and if any problem occurs in breathing during the effect of anesthesia on patient, that can also be monitored
Volume: 6
Issue: 2
Page: 117-122
Publish at: 2017-08-01

Theoretical Analysis of Gap Coupled Microstrip Patch Antenna

10.11591/ijeecs.v7.i2.pp567-576
Akanksha Gupta , D K Srivastava , J.P. Saini
When a patch is placed close to the fed patch, get excited due to parasitic coupling between the two elements. This proposed work presents theoretical analysis of rectangular gap coupled microstrip patch antenna (R-GCMSA) using circuit concept model, and the effect of gap(g), feed width (Wf), and feed length on performance of the impedance bandwidth is also studied, it is observe as the gap between the parasitic element is increased resonant frequency shifted towards the parasitic patch resonant frequency for broadening the impedance bandwidth. The maximum impedance bandwidth for the proposed antenna design is 12.7% in the frequency range of 3.24-3.7GHz measured, with rectangular shape ground plane size 6030m.m2.the highest directivity achieved is 4dBi.The proposed design is simple in structure and compact in size, proposed design is simulated on IE3D Microwave simulator, the simulated result is in good agreement with obtained theoretical and measured results.
Volume: 7
Issue: 2
Page: 567-576
Publish at: 2017-08-01

A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters in WSN

10.11591/ijece.v7i4.pp2232-2240
Pooja Singh , R.K. Chauhan
The Wireless Sensor Networks (WSNs) have spread its roots in almost every application. Owing to their scattered nature of sensor nodes, they are more prone to attacks. There are certain applications e.g. military, where sensor data’s confidentiality requirement during transmission is essential. Cryptography has a vital role for achieving security in WSNs.WSN has resource constraints like memory size, processing speed and energy consumption which bounds the applicability of existing cryptographic algorithms for WSN. Any good security algorithms has higher energy consumption by the nodes, so it’s a need to choose most energy-efficient cryptographic encryption algorithms for WSNs. This paper surveys different asymmetric algorithms such as RSA, Diffie-Hellman, DSA, ECC, hybrid and DNA cryptography. These algorithms are compared based on their key size, strength, weakness, attacks and possible countermeasures in the form of table.
Volume: 7
Issue: 4
Page: 2232-2240
Publish at: 2017-08-01

Commonly Used Wind Generator Systems: A Comparison Note

10.11591/ijeecs.v7.i2.pp299-311
Prashanth N.A , P Sujatha
Amongst all renewable energy generation sources, wind power exhibits fastest growth rate. The increasing number of wind farm installations worldwide demand low maintenance, cost and failure rates with high efficiency. Determining the optimal drive train configuration amongst various configurations available for wind turbines is a challenge. In this paper commonly used, doubly fed induction generator with single stage gear box (GDFIG), doubly fed induction generator with multi stage gear box (DFIG) and the direct-drive permanent-magnet generator (DDPMG) are compared. Modelling of wind turbine with efficiency computations is presented. Considering common wind turbine parameters, performance of GDFIG, DFIG and DDPMG is compared through an experimental study. Considering a reference 5 MW variable speed wind turbine, efficiency of DDPMG is 96% when compared to 93.58%, 93.12% for DFIG and GDFIG. The experimental results presented prove that the DDPMG is a preferable solution considering low cost and high efficiency.
Volume: 7
Issue: 2
Page: 299-311
Publish at: 2017-08-01

Composite Nonlinear Feedback with Disturbance Observer for Active Front Steering

10.11591/ijeecs.v7.i2.pp434-441
Sarah 'Atifah Saruchi , Hairi Zamzuri , Noraishikin Zulkarnain , Norbaiti Wahid , Mohd Hatta Mohammed Ariff
One of the dominant virtue of Steer-By-Wire (SBW) vehicle is its capability to enhance handling performance by installing Active Front Steering (AFS) system without the driver’s interferences. Hence, this paper introduced an AFS control strategy using the combination of Composite Nonlinear Feedback (CNF) controller and Disturbance Observer (DOB) to achieve fast yaw rate tracking response which is also robust to the existence of disturbance. The proposed control strategy is simulated in J-curve and Lane change manoevres with the presence of side wind disturbance via Matlab/Simulink sotware. Futhermore, comparison with Proportional Integral Derivative (PID) and Linear Quadratic Regulator (LQR) controllers are also conducted to evaluate the effectiveness of the proposed controller. The results showed that the combined CNF and DOB strategy achieved the fastest yaw rate tracking capability with the least impact of disturbance in the AFS system installed in SBW vehicle.
Volume: 7
Issue: 2
Page: 434-441
Publish at: 2017-08-01

Formal Specification of QoS Negotiation in ODP System

10.11591/ijece.v7i4.pp2045-2053
Abdessamad Jarrar , Youssef Balouki , Taoufiq Gadi
The future of Open Distributed Processing systems (ODP) will see an increasing of components number, these components are sharing resources. In general, these resources are offering some kind of services. Due to the huge number of components, it is very difficult to offer the optimum Quality of service (QoS). This encourages us to develop a model for QoS negotiation process to optimize the QoS in an ODP system. In such system, there is a High risk of software or hardware failure. To ensure good performance of a system based on our model, we develop it using a formal method. In our case, we will use Event-B to get in the end of our development a system correct by construction.
Volume: 7
Issue: 4
Page: 2045-2053
Publish at: 2017-08-01
Show 1444 of 1897

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration