Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,734 Article Results

Qualitative Assessment on Effectiveness of Security Approaches towards Safeguarding NFC Devices & Services

10.11591/ijece.v8i2.pp1214-1221
Anusha R , Veena Devi Shastrimat V
The increasing pace in the wireless communication taking momentum in the market of commercial application where a significant trade-off between user-experience and security demands exists. The Near Field Communication or NFC is one such communication trend which is effectively adopted by the user worldwide to make touchless operation using their mobile device. Although, it is claimed that NFC incorporates some of the standard encryption but existing researchers fails to prove that their electromagnetic signals are not so difficult to compromise to result in collateral damage to user's resources. Thus, there exist research work towards strengthing security system, but there is yet to report on any standard security protocol or framework to ensure the highest resiliency. This paper provides a comprehensive visualization towards the effectiveness of existing research approaches to formulate the research trend and gap.
Volume: 8
Issue: 2
Page: 1214-1221
Publish at: 2018-04-01

Workflow Scheduling Techniques and Algorithms in IaaS Cloud: A Survey

10.11591/ijece.v8i2.pp853-866
K. Kalyana Chakravarthi , Vaidhehi Vijayakumar
In the modern era, workflows are adopted as a powerful and attractive paradigm for expressing/solving a variety of applications like scientific, data intensive computing, and big data applications such as MapReduce and Hadoop. These complex applications are described using high-level representations in workflow methods. With the emerging model of cloud computing technology, scheduling in the cloud becomes the important research topic. Consequently, workflow scheduling problem has been studied extensively over the past few years, from homogeneous clusters, grids to the most recent paradigm, cloud computing. The challenges that need to be addressed lies in task-resource mapping, QoS requirements, resource provisioning, performance fluctuation, failure handling, resource scheduling, and data storage. This work focuses on the complete study of the resource provisioning and scheduling algorithms in cloud environment focusing on Infrastructure as a service (IaaS). We provided a comprehensive understanding of existing scheduling techniques and provided an insight into research challenges that will be a possible future direction to the researchers.
Volume: 8
Issue: 2
Page: 853-866
Publish at: 2018-04-01

Routing Design Issues in Heterogeneous Wireless Sensor Network

10.11591/ijece.v8i2.pp1028-1039
Manisha R. Dhage , Srikanth Vemuru
WSN has important applications such as habitat monitoring, structural health monitoring, target tracking in military and many more. This has evolved due to availability of sensors that are cheaper and intelligent but these are having battery support. So, one of the major issues in WSN is maximization of network life. Heterogeneous WSNs have the potential to improve network lifetime and also provide higher quality networking and system services than the homogeneous WSN. Routing is the main concern of energy consumption in WSN. Previous research shows that performance of the network can be improve significantly using protocol of hierarchical HWSN. However, the appropriateness of a particular routing protocol mainly depends on the capabilities of the nodes and on the application requirements. This study presents different aspects of Heterogeneous Wireless Sensor network and design issues for routing in heterogeneous environment. Different perspectives from different authors regarding energy efficiency based on resource heterogeneity for heterogeneous wireless sensor networks have been presented.
Volume: 8
Issue: 2
Page: 1028-1039
Publish at: 2018-04-01

A New Scheme of Group-based AKA for Machine Type Communication over LTE Networks

10.11591/ijece.v8i2.pp1169-1181
Mariya Ouaissa , A. Rhattoy
Machine Type Communication (MTC) is considered as one of the most important approaches to the future of mobile communication has attracted more and more attention. To reach the safety of MTC, applications in networks must meet the low power consumption requirements of devices and mass transmission device. When a large number of MTC devices get connected to the network, each MTC device must implement an independent access authentication process according to the 3GPP standard, which will cause serious traffic congestion in the Long Term Evolution (LTE) network. In this article, we propose a new group access authentication scheme, by which a huge number of MTC devices can be simultaneously authenticated by the network and establish an independent session key with the network respectively. Experimental results show that the proposed scheme can achieve robust security and avoid signaling overload on LTE networks
Volume: 8
Issue: 2
Page: 1169-1181
Publish at: 2018-04-01

Ontological MobiHealth System

10.11591/ijeecs.v10.i1.pp309-319
Nasim Khozouie , Faranak Fotouhi-Ghazvini , Behrouz Minaei-Bidgoli
MobiHealth systems are tele-monitoring systems based on BAN (Body Area Network) and mobile health care (m-health) service platform utilizing next generation public wireless networks.  Smart phone applications have self-monitoring and sensing capabilities and are used in health interventions and disease prevention. In this study, a prototype mobile sensing platform was introduced for m-Health and telemedicine applications, which medical sensors on patient body reports biological signals and environmental sensors send environment raw data to base station (smart phone). Then raw data were preprocessed and necessary features (situations) were extracted. In order to context computation and respond with adaptability, we have used ontology-based model.   
Volume: 10
Issue: 1
Page: 309-319
Publish at: 2018-04-01

Non-integer IMC based PID Design for Load Frequency Control of Power System Through Reduced Model Order

10.11591/ijece.v8i2.pp837-844
Idamakanti Kasireddy , Abdul Wahid Nasir , Arun Kumar Singh
This paper deals with non-integer internal model control (FIMC) based proportional-integral-derivative(PID) design for load frequency control (LFC) of single area non-reheated thermal power system under parameter divergence and random load disturbance. Firstly, a fractional second order plus dead time(SOPDT) reduced system model is obtained using genetic algorithm through step error minimization. Secondly, a FIMC based PID controller is designed for single area power system based on reduced system model. Proposed controller is equipped with single area non-reheated thermal power system. The resulting controller is tested using MATLAB/SIMULINK under various conditions. The simulation results show that the controller can accommodate system parameter uncertainty and load disturbance. Further, simulation shows that it maintains robust performance as well as minimizes the effect of load fluctuations on frequency deviation. Finally, the proposed method applied to two area power system to show the effectiveness.
Volume: 8
Issue: 2
Page: 837-844
Publish at: 2018-04-01

Type-2 Fuzzy Logic in Pair Formation

10.11591/ijeecs.v10.i1.pp94-99
Lakshmi Shrinivasan , J. l R. Rao
This paper gives an overview of Type-2 Fuzzy sets (T2FSs) and Type-2 fuzzy Logic system (T2FLS) considering one aviation scenario. The existing type-1 Fuzzy system has limited capability to handle the uncertainty directly. In order to overcome the limitations of Type-1 fuzzy Logic system (T1FLS), a next level of fuzzy set is introduced, that is known as T2FSs. Here we will discuss about: Type-2 fuzzy sets, type-2 membership functions, inference engine, type reduction and defuzzification. Pair formation is the undertaken aviation scenario which is very critical in a fighting situation. Crisp data are taken by the sensors of aircraft and with the techniques of data fusion, a constant decision is passed whether two aircrafts can achieve pair formation or not. Experiments are evaluated and performance is compared with ground truth and existing T1FLS, which proves better in terms of decision making while a certain amount of uncertainty is present.
Volume: 10
Issue: 1
Page: 94-99
Publish at: 2018-04-01

Algorithm for Fault Location and Classification on Parallel Transmission Line using Wavelet based on Clarke’s Transformation

10.11591/ijece.v8i2.pp699-710
Makmur Saini , A. A. Mohd Zin , M. W. Mustafa , A. R. Sultan , Rusdi Nur
This paper proposed a new algorithm for fault location and classification using wavelet based on Clarke’s transformation to obtain the fault current. This novel method of fault current approach is studied by comparing the use of the glide path of the fault voltage. The current alpha and beta (Current Mode) were used to transform the signal using discrete wavelet transform (DWT). The fault location was determined by using the Clarke’s transformation, and then turned into a wavelet, which was very precise and thorough. The most accurate was the mother wavelet Db4 which had the fastest time and smallest error detection when compared with the other wavelet mothers. In this study, the Clarke’s transformation is also compared with the Karenbauer’s, which has produced results with similar error percentage. The simulation results using PSCAD / EMTDC software showed that the proposed algorithm could distinguish internal and external faults to get the current signal in the transformation of a signal fault.
Volume: 8
Issue: 2
Page: 699-710
Publish at: 2018-04-01

A Comprehensive Analysis of Partial Shading Effect on Output Parameters of a Grid-connected PV System

10.11591/ijece.v8i2.pp749-762
H. Rahimi Mirazizi , M. A. Shafiyi
One of the issues of grid-connected photovoltaic systems is the effect of the partial shading on the key parameters and performance of the system. In practice, a share of the entire PV panel may shadded because of the various reasons, inevitably. In this case, the key parameters of the system output are affected with respect to the shading extent and paradigm. In this paper, the effects of the various partial shading patterns on the ouput of the system are examined. This is performed by deriving relevant equations and appropriate modeling of the system and defining different scenarios. The analysis on the system performance is carried out on the dominant output parameters including panel voltage, panel power, and total harmonic distortion (THD) of the inverter. Also, the study considers the effect of using bypass diodes in the panels or not. Addintionally, to compare derived conclusions, the study is implementd on a practical system. The set up is made up of a 7-level multi-level inverter, a Z-source converter, and 1 kW lateral circuitry. The real world test results of the study demonstrate a negligible deviation compared to the simulation results.
Volume: 8
Issue: 2
Page: 749-762
Publish at: 2018-04-01

Image Denoising by using Modified SGHP Algorithm

10.11591/ijece.v8i2.pp971-978
Sreedhar Kollem , K. Ramalinga Reddy , D. Sreenivasa Rao
In real time applications, image denoising is a predominant task. This task makes adequate preparation for images looks prominent. But there are several denoising algorithms and every algorithm has its own distinctive attribute based upon different natural images. In this paper, we proposed a perspective that is modified parameter in S-Gradient Histogram Preservation denoising method. S-Gradient Histogram Preservation is a method to compute the structure gradient histogram from the noisy observation by taking different noise standard deviations of different images. The performance of this method is enumerated in terms of peak signal to noise ratio and structural similarity index of a particular image. In this paper, mainly focus on peak signal to noise ratio, structural similarity index, noise estimation and a measure of structure gradient histogram of a given image.
Volume: 8
Issue: 2
Page: 971-978
Publish at: 2018-04-01

Tool Use Learning for a Real Robot

10.11591/ijece.v8i2.pp1230-1237
Handy Wicaksono , Claude Sammut
A robot may need to use a tool to solve a complex problem. Currently, tool use must be pre-programmed by a human. However, this is a difficult task and can be helped if the robot is able to learn how to use a tool by itself. Most of the work in tool use learning by a robot is done using a feature-based representation. Despite many successful results, this representation is limited in the types of tools and tasks that can be handled. Furthermore, the complex relationship between a tool and other world objects cannot be captured easily. Relational learning methods have been proposed to overcome these weaknesses [1, 2]. However, they have only been evaluated in a sensor-less simulation to avoid the complexities and uncertainties of the real world. We present a real world implementation of a relational tool use learning system for a robot. In our experiment, a robot requires around ten examples to learn to use a hook-like tool to pull a cube from a narrow tube.
Volume: 8
Issue: 2
Page: 1230-1237
Publish at: 2018-04-01

Centeral Electric Field and Threshold Voltage in Accumulation Mode Junctionless Cylindrical Surrounding Gate MOSFET

10.11591/ijece.v8i2.pp673-679
Hakkee Jung
Transfer characteristics is presented using analytical potential distribution of accumulation-mode junctionless cylindrical surrounding-gate (JLCSG) MOSFET, and deviation of center electric field at threshold voltage is analyzed for channel length and oxide thickness. Threshold voltages presented in this paper is good agreement with results of other compared papers, and transfer characteristics is agreed with those of two-dimensional simulation. The most important factor to determine threshold voltage is center electric field at source because the greater part of electron flows through center axis of JLCSG MOSFET. As a result of analysis for center electric field at threshold voltage, center electric field is decreased with reduction of channel length due to drain induced barrier lowering. Center electric field is increased with decrease of oxide thickness, and deviation of center electric field for channel length is significantly occurred with decrease of oxide thickness.
Volume: 8
Issue: 2
Page: 673-679
Publish at: 2018-04-01

Pornography Addiction Detection based on Neurophysiological Computational Approach

10.11591/ijeecs.v10.i1.pp138-145
Norhaslinda Kamaruddin , Abdul Wahab Abdul Rahman , Dini Handiyani
The rise of Internet access, social media and availability of smart phones intensify the epidemic of pornography addiction especially among younger teenagers. Such scenario may offer many side effects to the individual such as alteration of the behavior, changes in moral value and rejection to normal community convention. Hence, it is imperative to detect pornography addiction as early as possible. In this paper, a method of using brain signal from frontal area captured using EEG is proposed to detect whether the participant may have porn addiction or otherwise. It acts as a complementary approach to common psychological questionnaire. Experimental results show that the addicted participants had low alpha waves activity in the frontal brain region compared to non-addicted participants. It can be observed using power spectra computed using Low Resolution Electromagnetic Tomography (LORETA). The theta band also show there is disparity between addicted and non-addicted. However, the distinction is not as obvious as alpha band. Subsequently, more work need to be conducted to further test the validity of the hypothesis. It is envisaged that with more participants and further investigation, the proposed method will be the initial step to groundbreaking way of understanding the way porn addiction affects the brain.
Volume: 10
Issue: 1
Page: 138-145
Publish at: 2018-04-01

Model to Evaluate the Performance of Building Integrated Photovoltaic Systems using Matlab/Simulink

10.11591/ijece.v8i2.pp680-688
Julian Andres Camacho Castro , Andres Julian Aristizabal Cardona
This article describes a mathematical model implemented in Matlab/Simulink to evaluate the performance of building integrated photovoltaic systems (BIPVS). The proposed methodology allows to model independently the solar panel, the photovoltaic (pv) generator, inverter and the grid to integrate them into a single model in Simulink in order to evaluate the performance of the complete system. The validation of the model was made on a BIPV system of 6 kWp installed in a building at the Universidad de Bogotá Jorge Tadeo Lozano in Bogota, Colombia. The results indicate that there is a correlation greater than 0.9 between DC and AC power generated by the BIPV system and calculated by the model proposed for any weather condition.
Volume: 8
Issue: 2
Page: 680-688
Publish at: 2018-04-01

Experimental Validation of Shared Inverter Topology to Drive Multi AC-Loads

10.11591/ijece.v8i2.pp793-805
Saher Albatran , Issam A. Smadi , Mohammad A. Alsyouf
Many reduced-switch-count (RSC) inverter topologies have been proposed in the literature. As the number of switches required to produce a set of voltages in RSC inverters are less than that in conventional inverter, as a result utilizing RSC inverters in a certain system reduces its size and cost. In this paper, a novel RSC shared inverter topology consisting of fifteen switches and capable of driving four three-phase AC-loads independently is proposed and experimentally verified. A carrier-based pulse width modulation (PWM) technique that employs the zero-sequence-signal injection principle is developed to drive the proposed inverter along with adequate DC voltage bus utilization between the shared loads for common frequency (CF) as well as different frequency (DF) modes. The structure and the principle of operation of the proposed inverter are introduced and intensively verified using simulation and field-programmable-gate-array (FPGA)-in-the-loop simulation under linear and nonlinear loads. Then, Inverter prototype was built and the proposed inverter has been verified experimentally. The experimental results verify the applicability of the proposed inverter and the employed PWM.
Volume: 8
Issue: 2
Page: 793-805
Publish at: 2018-04-01
Show 1445 of 1983

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration