Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

25,002 Article Results

Noise Analysis of wet Multi-disc Brake Used Complex Eigenvalue

10.11591/ijeecs.v12.i11.pp7668-7680
Tian-hong Luo , Ting-qiong Cui , De-shan Li , Wen-jun Luo , Chao Lin
This paper proposed an analysis model and a complex-eigenvalue-based algorithm of wet multiple disc brake (WMDB) noise. Firstly, the damping and stiffness between the brake disc and the friction plate were introduced based on the consideration of the slight rotation of the braking system and damping characteristics of brake oil. Then, the friction coupling mathematical model and the finite element model (FEM) of the braking system were established. The occurrence tendency of brake squeal was judged according to the real part (positive or negative value) of characteristic roots of the complex eigenvalue. The relative error between the numerical analysis results and the finite element analysis results was 4%, indicating that braking speed and braking pressure had little effect on brake noise. During the braking system design, under the premise that the braking performance is not affected, the friction material with the lower stiffness should be used as possible. Moreover, properly decreasing the friction coefficient between the friction linings and dual steel disc will reduce the brake noise. Therefore, the proper combination of the parameters was deduced to obtain the stable frequency response of the braking system.
Volume: 12
Issue: 11
Page: 7668-7680
Publish at: 2014-11-01

High Limit Penetration in Wind Power Research and Analysis of Static Voltage Stability Characteristics of the Regional Grid

10.11591/ijeecs.v12.i11.pp7571-7577
Luo Qing , Chao Qin , Luo Jian-chun , Luo Jun , Xiao Liang-jian
This paper established the high limit penetration power of a certain area including wind power grid model in 30.084% value, in the high limit penetration power transmission network by small disturbance voltage influence. Through the power flow calculation power flow distribution of the viewing area, with the reactive power compensation voltage were optimized. The impact on the system voltage load disturbance by PV-QV curve analysis. And its system reactive power margin and other issues. By the above calculation, the grid is analyzed in access high wind power penetration limit under the feasibility and reliability of operation, and its impact on the static voltage grid system analysis. Make wind power grid reliable access high penetration power frontier research.
Volume: 12
Issue: 11
Page: 7571-7577
Publish at: 2014-11-01

Design of AES Pipelined Architecture for Image Encryption/Decryption Module

10.11591/ijres.v3.i3.pp114-118
Pravin V. Kinge , S.J. Honale , C.M. Bobade
The relentless growth of Internet and communication technologies has made the extensive use of images unavoidable. The specific characteristics of image like high transmission rate with limited bandwidth, redundancy, bulk capacity and correlation among pixels makes standard algorithms not suitable for image encryption. In order to overcome these limitations for real time applications, design of new algorithms that require less computational power while preserving a sufficient level of security has always been a subject of interest. Here Advanced Encryption Standard (AES),as the most widely used encryption algorithm in many security applications. AES standard has different key size variants, where longer bit keys provide more secure ciphered text output. The available AES algorithm is used for  data and it is also suitable for image encryption and decryption to protect the confidential image from an unauthorized access. This project proposes a method in which the image data is an input to Pipelined AES algorithm through Textio, to obtain the encrypted image. and the encrypted image is the input to Pipelined AES Decryption to get the original image. This project proposed to implement the 128,192 & 256 bit Pipelined AES algorithm for image encryption and decryption, also to compare the latency , efficiency, security, frequency & throughput . The proposed work will be synthesized and simulated on FPGA family of Xilink ISE 13.2 and Modelsim tool respectively in Very high speed integrated circuit Hardware Description Language.
Volume: 3
Issue: 3
Page: 114-118
Publish at: 2014-11-01

Development of Wireless Sensor Network for Traffic Monitoring Systems

10.11591/ijres.v3.i3.pp119-132
Sanket Suresh Naik Dessai
Traffic congestion has been a major problem on roads around the world. In addition, there is increase in volume of traffic vehicle density at a steady rate. Thus traffic on major roads has to be controlled to keep the traffic flowing at an acceptable rate. Several schemes for replacing the predominantly used Round Robin (RR) scheme for reducing congestion at traffic junctions have been proposed. Dynamic traffic control schemes adapt to the changing traffic by monitoring the state (such as the number queued up on each lane.). These need appropriate sensing and monitoring systems. In this paper a traffic monitoring and control system based on AMR (Anistropic Magneto Resistive) vehicle sensors, wireless sensor network and a proiritised Weighted Round Robin (WRR) scheduling technique, is developed.AMR sensors installed in road pavement detect the number of vehicles waiting in a traffic lane. The AMR sensors are connected to the master controller to form a Zigbee based sensor network. The master node consists of an ARM processor integrated with a Zigbee masternode. The traffic control algorithm is implemented at master node which is responsible for taking traffic signaling decision. It receives sensor data from all the lanes. A two level priority algorithm with weighted round robin scheduling, where first and second maximum weighted lane are to pass the signal is developed, To avoid starving the least loaded lanes, a cycle of normal round robin scheduling is performed after four rounds of proiritised weighted round robin schedule. The proposed algorithm is simulated and compared with the standard round robin algorithm. The developed algorithm decreases the average waiting time for a commuter while maintaining the average throughput up to average loads. The development traffic monitoring system is successfully demonstrated for a four lane junction.
Volume: 3
Issue: 3
Page: 119-132
Publish at: 2014-11-01

Design and Implementation of an Ethernet MAC IP Core for Embedded Applications

10.11591/ijres.v3.i3.pp85-97
Sanket Suresh Naik Dessai
An IP (intellectual property) core is a block of logic or data that is used in making a field programmable gate array (FPGA) or application-specific integrated circuit (ASIC) for a product. As essential elements of design reuse, IP cores are part of the growing electronic design automation (EDA) industry trend towards repeated use of previously designed components. Ethernet continues to be one of the most popular LAN technologies. Due to the robustness resulting from its wide acceptance and deployment, there has been an attempt to build Ethernet-based real-time control networks for manufacturing automation. There is a growing demand for low cost, power efficient MAC IP Core for various embedded applications. In this paper a project is discussed to design an Ethernet MAC IP Core solution for such embedded applications. The proposed 10_100_1000 Mbps tri-mode Ethernet MAC implements a MAC controller conforming to IEEE 802.3 specification. It is designed to use less than 2000 LCs/LEs to implement full function. It will use inferred RAMs and PADs to reduce technology dependence. To increase the flexibility, three optional modules can be added to or removed from the project. A GUI configuration interface, created by Tcl/tk script language, is convenient for configuring optional modules, FIFO depth and verification parameters. Furthermore, a verification system was designed with Tcl/tk user interface, by which the stimulus can be generated automatically and the output packets can be verified with CRC-32 checksum. A solution which would consume a smaller part of the targeted FPGA, and thus giving room for other on-chip peripherals or enable the use of a smaller sized FPGA. To employ a smaller FPGA is desirable since it would reduce power consumption and device price.
Volume: 3
Issue: 3
Page: 85-97
Publish at: 2014-11-01

Robust Multiple Ship Tracking in Inland Waterway CCTV System

10.11591/ijeecs.v12.i11.pp7772-7777
Fei Teng , Qing Liu
In recent years, single object tracking has been extensively studied and achieved much development. However, multiple objects tracking is still an issue that remains to be addressed. Generally speaking, existing multiple objects tracking methods employ a manner of simultaneously tracking each object respectively. In this paper, we develop a multiple ship tracking algorithm based on deformable part model to accomplish multiple ship tracking in inland waterway CCTV (Closed-Circuit Television) automated surveillance. Our method utilizes HOG features to construct the appearance models of ships. Then by taking full advantages of the spatial constrains between ships, we can successfully explore mutual relations for multiple ships, thus accomplishing multiple ship tracking in its true sense. Moreover, structured learning method is used to learn how to update the model parameters. Numerous experimental results on challenging inland waterway CCTV video sequences demonstrate that our method can effectively and accurately perform robust multiple ship tracking.
Volume: 12
Issue: 11
Page: 7772-7777
Publish at: 2014-11-01

Robustness Estimation of Wireless MEMS Vibration Test under Harsh Environment

10.11591/ijeecs.v12.i11.pp7697-7704
Changjian Deng
Robustness estimation is important issue to ensure stability, reliability, and precision of Wireless MEMS vibration test under harsh environment stressing. Although the robustness of vibration test is limited mainly by the embedded electronics and sensors, how to obtain precise and robust data by using energy effective and resources constrained wireless sensor nodes is still a problem. Paper uses the multivariate uncertainty statistics method to estimate robustness of online test data under harsh environment, and uses Fisher information distance to estimate transmitting robustness in its complication communication process. Experiments and simulation are designed to analyze the robustness and precise of wireless MEMS nodes in numerical value, results show estimation methods and model are effective.
Volume: 12
Issue: 11
Page: 7697-7704
Publish at: 2014-11-01

Bilinear Interpolation Image Scaling Processor for VLSI Architecure

10.11591/ijres.v3.i3.pp104-113
Pawar Ashwini Dilip , K Rameshbabu , Kanase Prajakta Ashok , Shital Arjun Shivdas
We introduce image scaling processor using VLSI technique. It consist of Bilinear interpolation, clamp filter and  a sharpening spatial filter. Bilinear interpolation algorithm is popular due to its computational efficiency and  image quality. But resultant image consist of blurring edges and aliasing artifacts after scaling. To reduce the blurring and aliasing artifacts sharpening spatial filter and clamp filters are used as pre-filter. These filters are realized by using T-model and inversed T-model convolution kernels. To reduce the memory buffer and computing resources for proposed image processor design two T-model or inversed T-model filters are combined into combined filter which requires only one line buffer memory. Also, to reduce hardware cost Reconfigurable calculation unit (RCU)is invented. The VLSI architecture in this work can achieve 280 MHz with 6.08-K gate counts, and its core area is 30 378 μm2 synthesized by a 0.13-μm CMOS process.
Volume: 3
Issue: 3
Page: 104-113
Publish at: 2014-11-01

An Improved Constrained Engineering Optimization Design Algorithm

10.11591/ijeecs.v12.i11.pp7079-7978
Yuxin Sun , Qinghua Wu , Xuesong Yan
Many engineering optimization problems can be state as function optimization with constrained, intelligence optimization algorithm can solve these problems well. Particle Swarm Optimization (PSO) algorithm was developed under the inspiration of behavior laws of bird flocks, fish schools and human communities. In this paper, aim at the disadvantages of standard Particle Swarm Optimization algorithm like being trapped easily into a local optimum, we improves the standard PSO and proposes a new algorithm to solve the overcomes of the standard PSO. The new algorithm keeps not only the fast convergence speed characteristic of PSO, but effectively improves the capability of global searching as well. Experiment results reveal that the proposed algorithm can find better solutions when compared to other heuristic methods and is a powerful optimization algorithm for engineering optimization problems.
Volume: 12
Issue: 11
Page: 7079-7978
Publish at: 2014-11-01

Color Difference Evaluation Model on Partly Changed Complex Images

10.11591/ijeecs.v12.i11.pp7863-7868
Zi dong Zhang , Jiemin Zhang , Yongmei Li
Since there has been a strong demand from industry to have an efficient way of managing color image quality presented in different media, by specifically investigating partly changed complex images, this article proposed a revision to existing CIE color difference model which cannot give a proper color difference assessment on partly changed complex images. The key method applied is to find out weight coefficients of color attributes such as lightness, hue and chroma in color difference prediction.
Volume: 12
Issue: 11
Page: 7863-7868
Publish at: 2014-11-01

Design of Intelligent PID Controller for AVR System Using an Adaptive Neuro Fuzzy Inference System

https://ijece.iaescore.com/index.php/IJECE/article/view/5519
Kamal Yavarian , Farid Hashemi , Amir Mohammadian
This paper presents a hybrid approach involving signal to noise ratio (SNR) and particle swarm optimization (PSO) for design the optimal and intelligent proportional-integral-derivative (PID) controller of an automatic voltage regulator (AVR) system with uses an adaptive neuro fuzzy inference system (ANFIS). In this paper determined optimal parameters of PID controller with SNR-PSO approach for some events and use these optimal parameters of PID controller for design the intelligent PID controller for AVR system with ANFIS.  Trial and error method can be used to find a suitable design of anfis based an intelligent controller. However, there are many options including fuzzy rules, Membership Functions (MFs) and scaling factors to achieve a desired performance. An optimization algorithm facilitates this process and finds an optimal design to provide a desired performance. This paper presents a novel application of the SNRPSO approach to design an intelligent controller for AVR. SNR-PSO is a method that combines the features of PSO and SNR in order to improve the optimize operation. In order to emphasize the advantages of the proposed SNR-PSO PID controller, we also compared with the CRPSO PID controller. The proposed method was indeed more efficient and robust in improving the step response of an AVR system and numerical simulations are provided to verify the effectiveness and feasibility of PID controller of AVR based on SNRPSO algorithm.DOI:http://dx.doi.org/10.11591/ijece.v4i5.6521
Volume: 4
Issue: 5
Page: 703-718
Publish at: 2014-10-01

Security of Biometric Data Using Compressed Watermarking Technique

https://ijece.iaescore.com/index.php/IJECE/article/view/5535
Rohit Thanki , Komal Borisagar
This paper has focus on biometric data security over open communication channel of biometric system. Here biometric data is encoded using cs theory and wavelet based embedding technique. The biometric data is convert into encoded sparse measurements which is generating using SVD, random seed and uniform quantization process. Then these encoded sparse measurements are embedding into the host color biometric data using wavelet based watermarking technique. This proposed technique has explored dimension reduction and computational security provided by compressive sensing. This proposed technique has also helps to compressed and to send secret data over noisy communication channel of biometric system against various attacks. The proposed technique provides more security compare to existed technique in literature due to CS theory. The novelty of proposed technique is that, watermark iris image information is compressed and encoded using CS theory and uniform quantization.DOI:http://dx.doi.org/10.11591/ijece.v4i5.6646
Volume: 4
Issue: 5
Page: 758-766
Publish at: 2014-10-01

Optimal Design of a 3-Phase Core Type Distribution Transformer Using Modified Hooke and Jeeves Method

10.11591/ijeecs.v12.i10.pp7114-7122
Raju Basak , Arabinda Das , Amarnath Sanyal
Hooke and Jeeves method is de facto a pattern search technique, which can be employed for getting an optimal solution. In this paper the method, in a modified form, has been applied for the design optimization of a distribution transformer. It is a constrained multi-variable optimization problem. The solution is obtained by choosing an initial point in the world map of the key variables and by making a local search (exploratory in all directions in the hyper surface formed by the variables. After recognizing the pattern, its advantage is taken by moving towards a lower cost point, using an acceleration factor for faster convergence. The step length is adjusted as we proceed to expedite improvement. The method has been applied to two different cost functions: the cost of production and the cost against production plus capitalized running losses. In both the cases, the problem has converged to a solution and the results are both interesting and illuminating.
Volume: 12
Issue: 10
Page: 7114-7122
Publish at: 2014-10-01

Fingerprint Direct-Access Strategy Using Local-Star-Structure-based Discriminator Features: A Comparison Study

https://ijece.iaescore.com/index.php/IJECE/article/view/5551
G. Indrawan , S. Akbar , B. Sitohang
This paper describes a comparison study of the proposed fingerprint direct-access strategy using local-star-topology-based discriminator features, including internal comparison among different concerned configurations, and external comparison to the other strategies. Through careful minutiae-based feature extraction, hashing-based indexing-retrieval mechanism, variable-threshold-on-score-ratio-based candidate-list reduction technique, and hill-climbing learning process, this strategy was considered promising, as confirmed by the experiment results. For particular aspect of external accuracy comparison, this strategy outperformed the others over three public data sets, i.e. up to Penetration Rate (PR) 5%, it consistently gave lower Error Rate (ER). By taking sample at PR 5%, this strategy produced ER 4%, 10%, and 1% on FVC2000 DB2A, FVC2000 DB3A, and FVC2002 DB1A, respectively. Another perspective if accuracy performance was based on area under curve of graph ER and PR, this strategy neither is the best nor the worst strategy on FVC2000 DB2A and FVC2000 DB3A, while on FVC2002 DB1A it outperfomed the others and even it gave impressive results for index created by three impressions per finger (with or without NT) by ideal step down curve where PR equal to 1% can always be maintained for smaller ER.DOI:http://dx.doi.org/10.11591/ijece.v4i5.6589
Volume: 4
Issue: 5
Page: 817-830
Publish at: 2014-10-01

Fuzzy-PI Torque and Flux Controllers for DTC with Multilevel Inverter of Induction Machines

https://ijpeds.iaescore.com/index.php/IJPEDS/article/view/5062
N. M. Nordin , N. R. N. Idris , N. A. Azli , M. Z. Puteh , T. Sutikno
In this paper the performance of flux and torque controller for a Direct Torque Control of Cascaded H-bridge Multilevel Inverter (DTC-CMLI) fed induction machines are investigated. A Fuzzy-PI with fixed switching frequency is proposed for both torque and flux controller to enhance the DTC-CMLI performance.  The operational concepts of the Fuzzy-PI with the fixed switching frequency controller of a DTC-MLI system followed by the simulation results and analysis are presented. The performance of the proposed system is verified via MATLAB/Simulink©. The proposed system significantly improves the DTC drive in terms of dynamic performance, smaller torque and flux ripple, and lower total harmonic distortion (THD).DOI: http://dx.doi.org/10.11591/ijpeds.v5i2.6581
Volume: 5
Issue: 2
Page: 268-282
Publish at: 2014-10-01
Show 1444 of 1667

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration