Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

28,812 Article Results

Feasibility of Substitution of the Conventional Street Lighting Installation by the Photovoltaic Case Study on a Municipality in Agadir in Morocco

10.11591/ijece.v7i5.pp2287-2299
Fatima Outferdine , Lahoussine Bouhouch , Mustapha Kourchi , Mohamed Ajaamoum , Ali Moudden
In this work, we present a technical and economic study of the solar powered street lighting system of a municipality in the south of Morocco. The state of the conventional street lighting system is first analyzed in a substation of street lighting. Then a sizing method is applied to the photovoltaic installation in the testing area. A financial study, by comparison between conventional and PV-based lighting, is carried out showing the feasibility of the PV street lighting.
Volume: 7
Issue: 5
Page: 2287-2299
Publish at: 2017-10-01

PWM Dimming for High Brightness LED Based Automotive Lighting Applications

10.11591/ijece.v7i5.pp2434-2440
Muhammad Wasif Umar , Norzaihar Yahaya , Zuhairi Baharuddin
In recent years, the use of high brightness LEDs has become increasingly accepted as light sources in mainstream vehicles. However, they are semiconductor devices and their electrical characteristics are completely different to the traditional lamps. The output luminous flux of an LED is determined by the forward current running through it. Hence they cannot be powered directly from the automotive battery using the conventional driving techniques. They require specialised driving circuits which can respond to the changing needs of the LEDs as their electrical properties change, while maintaining the uniform brightness.  This paper discusses the importance of dimming for LED based automotive lighting applications. A boost type DC-DC switching converter with pulse width modulated (PWM) dimming control has been proposed. MATLAB/Simulink simulation package has been used to verify the theoretical predictions hence to provide a useful guide for design engineers and researchers.
Volume: 7
Issue: 5
Page: 2434-2440
Publish at: 2017-10-01

Indian Classical Dance Mudra Classification Using HOG Features and SVM Classifier

10.11591/ijece.v7i5.pp2537-2546
K.V.V. Kumar , P.V.V. Kishore
Digital understanding of Indian classical dance is least studied work, though it has been a part of Indian Culture from around 200BC. This work explores the possibilities of recognizing classical dance mudras in various dance forms in India. The images of hand mudras of various classical dances are collected form the internet and a database is created for this job.  Histogram of oriented (HOG) features of hand mudras input the classifier. Support vector machine (SVM) classifies the HOG features into mudras as text messages. The mudra recognition frequency (MRF) is calculated for each mudra using graphical user interface (GUI) developed from the model. Popular feature vectors such as SIFT, SURF, LBP and HAAR are tested against HOG for precision and swiftness. This work helps new learners and dance enthusiastic people to learn and understand dance forms and related information on their mobile devices.
Volume: 7
Issue: 5
Page: 2537-2546
Publish at: 2017-10-01

Performance of Pilot-Aided 3D- OFDM Channel Estimation using Different Antenna Configurations

10.11591/ijeecs.v8.i1.pp77-84
Dinesh N. Bhange , Chandrashekhar G. Dethe
This paper aims, a 3D-Pilot Aided Multi-Input Multi-Output Orthogonal Frequency Division Multiplexing (MIMO-OFDM) Channel Estimation (CE) for Digital Video Broadcasting -T2 (DVB-T2)for the 5 different proposed block and comb pilot patterns model and performed on different antenna configuration. The effects of multi-transceiver antenna on channel estimation are addressed with different pilot position in frequency, time and the vertical direction of spatial domain framing. This paper first focus on designing of 5- different proposed spatial correlated pilot pattern model with optimization of pilot overhead. Then it demonstrates the performance comparison of Least Square (LS) &Linear Minimum Mean Square Error (LMMSE), two linear channel estimators for 3D-Pilot Aided patterns on different antenna configurations in terms of Bit Error Rate. The simulation results are shown for Rayleigh fading noise channel environments. Also, 3x4 MIMO configuration is recommended as the most suitable configuration in this noise channel environments.
Volume: 8
Issue: 1
Page: 77-84
Publish at: 2017-10-01

Energy Power Plant in Electric Power Distribution Systems Equipping With Distance Protection

10.11591/ijeecs.v8.i1.pp192-198
Hui Hwang Goh , Sy yi Sim , Dahir Khere Diblawe , Mortar Mohamed Ali , Chin Wan Ling , Qing Shi Chua , Kai Chen Goh
This paper suggests the theory of distance protection criteria in power distribution systems for power plant generation. Multi-developed countries have energy power plants that placed in remote areas which are far from the grid line. Hence, they should be coupled to the low power transportation systems necessarily. While higher-rating relays are adopted to preserve feeders at power substations, fuses are merely obtainable outside on feeder channel. The safe system process, space protection is dispatched to save feeders. In this review, feeders with distance relays are equipped, together with over-current protection relays and fuses. Energy power plant having distance protection system is designed the implemented system was a 6-MW unit of compressed power energy reproduction. The sample feeder was shortened to be equal four-bus experiment feeder for transmitting resolution. The fault currents have chances adopted to form protecting regions of distance relays. Protection of the power line through the designed power plants for distance relaying can decrease problem in relay location because of the impedance-based location of the distance relay. 
Volume: 8
Issue: 1
Page: 192-198
Publish at: 2017-10-01

Assessment of Power System Risk in Cyber-Attacks in View of the Role Protection Systems

10.11591/ijeecs.v8.i1.pp184-191
Hui Hwang Goh , Sy yi Sim , Omar Abdi Mohamed , Ahmed Farah Mohamed , Chin Wan Ling , Qing Shi Chua , Kai Chen Goh
This paper presents a risk assessment method for assessing the cyber security of power systems in view of the role of protection systems. This paper examines the collision of transmission and bus line protection systems positioned in substations on the cyber-physical performance of the power systems. The projected method simulates the physical feedback of power systems to hateful attacks on protection system settings and parameters. The relationship between protection device settings, protection logic, and circuit breaker logic is analyzed. The expected load reduction (ELC) indicator is used in this paper to determine potential losses in the system due to cyber attacks. The Monte Carlo simulation is used to calculate ELC’s account to assess the capabilities of the attackers and bus arrangements are changed. The influence of the projected risk assessment method is illustrated by the use of the 9-bus system and the IEEE-68 bus system.
Volume: 8
Issue: 1
Page: 184-191
Publish at: 2017-10-01

Fault Location Techniques in Electrical Power System-A Review

10.11591/ijeecs.v8.i1.pp206-212
Hui Hwang Goh , Sy yi Sim , Mohamad Amirul Hafiz Mohamed , Abdul Khairi Abdul Rahman , Chin Wan Ling , Qing Shi Chua , Kai Chen Goh
Electric fault is the main challenge in the process of providing continues electric supply. Fault can occur at anytime and anywhere. Due to the fault causes are mainly based on natural disaster or accident. Most fault occurrence hardly predicted nor avoided. Therefore, a quick response fault detection is necessary to ensure that the fault area is maintained to ensure a continuous power supply system. Hence, a system is required to detect and locate the position of the fault in the power system especially in the transmission line and distribution line. This paper will review the type of fault that possibly occurs in an electric power system, the type of fault detection and location technique that are available together with the protection device that can be utilized in the power system to protect the equipment from electric fault. 
Volume: 8
Issue: 1
Page: 206-212
Publish at: 2017-10-01

Multiset Controlled Grammars: A Simple Method in Regulated Rewriting Theory

10.11591/ijeecs.v8.i1.pp36-42
Salbiah Ashaari , Sherzod Turaev , M. Izzuddin M. Tamrin , Abdurahim Okhunov , Tamara Zhukabayeva
This study focus on defining a new variant of regulated grammars called multiset controlled grammars as well as investigating their computational power. We apply a constructive theoretical approach; the intent of which is to provide new theories based on computational methods where the results are appeared in the form of examples, lemmas and theorems. In the study, we have found that multiset is powerful and yet a simple method in regulated rewriting theory. We have proved that multiset controlled grammars are at least as powerful as additive valence grammars, and they are at most powerful as matrix grammars.
Volume: 8
Issue: 1
Page: 36-42
Publish at: 2017-10-01

Optimisation of Biochemical Systems Production using Hybrid of Newton Method, Differential Evolution Algorithm and Cooperative Coevolution Algorithm

10.11591/ijeecs.v8.i1.pp27-35
Mohd Arfian Ismail , Vitaliy Mezhuyev , Kohbalan Moorthy , Shahreen Kasim , Ashraf Osman Ibrahim
This paper present a hybrid method of Newton method, Differential Evolution Algorithm (DE) and Cooperative Coevolution Algorithm (CCA). The proposed method is used to solve the optimisation problem in optimise the production of biochemical systems. The problems are maximising the biochemical systems production and simultaneously minimising the total amount of chemical reaction concentration involves. Besides that, the size of biochemical systems also contributed to the problem in optimising the biochemical systems production. In the proposed method, the Newton method is used in dealing biochemical system, DE for optimisation process while CCA is used to increase the performance of DE. In order to evaluate the performance of the proposed method, the proposed method is tested on two benchmark biochemical systems. Then, the result that obtained by the proposed method is compare with other works and the finding shows that the proposed method performs well compare to the other works.
Volume: 8
Issue: 1
Page: 27-35
Publish at: 2017-10-01

Chaos Embedded Symbiotic Organisms Search Technique for Optimal FACTS Device Allocation for Voltage Profile and Security Improvement

10.11591/ijeecs.v8.i1.pp146-153
Mohamad Khairuzzaman Mohamad Zamani , Ismail Musirin , Saiful Izwan Suliman , Tarek Bouktir
Due to the ever-increasing energy demand, power system operators have attempted to cope with these demands while keeping the power system remain operable. Economic constraints have forced the power system operator to abandon their effort in expanding the power system. The increased load demand can cause the power system to suffer from voltage instability and voltage collapse, especially during contingency condition. Hence, a strategy is required to maintain the steady state operation of a power system. Various research has been conducted to tackle this problem. Therefore, this paper presents the implementation of Chaos Embedded Symbiotic Organisms Search technique to solve optimal FACTS device allocation problem in power transmission system. Various practical constraints are also considered in the optimisation process to emulate the real-life constraints in power system. The optimisation process is conducted on a 26-bus IEEE RTS has validated that the results obtained has not violated the power system stability. The results provided by the proposed optimisation technique has successfully improved the voltage profile and voltage security in the system. Comparative studies are also conducted involving Particle Swarm Optimization and Evolutionary Programming technique resulting good results agreement and superiority of the proposed technique. Results obtained from this study would be beneficial to the power system operators regarding optimisation in power system operation for the implementation in real power transmission network.
Volume: 8
Issue: 1
Page: 146-153
Publish at: 2017-10-01

Internet of Things: Surveys for Measuring Human Activities from Everywhere

10.11591/ijece.v7i5.pp2474-2482
Amine Rghioui , Abdelmajid Oumnad
The internet of things (IoT), also called internet of all, is a new paradigm that combines several technologies such as computers, the internet, sensors network, radio frequency identification (RFID), communication technology and embedded systems to form a system that links the real worlds with digital worlds. With an increase in the deployment of smart objects, the internet of things should have a significant impact on human life in the near future. To understand the development of the IoT, this paper reviews the current research of the IoT, key technologies, the main applications of the IoT in various fields, and identifies research challenges. A main contribution of this review article is that it summarizes the current state of the IoT technology in several areas, and also the applications of IoT that cause side effects on our environment for monitoring and evaluation of the impact of human activity on the environment around us, and also provided an overview of some of the main challenges and application of IoT. This article presents not only the problems and challenges of IoT, but also solutions that help overcome some of the problems and challenges.
Volume: 7
Issue: 5
Page: 2474-2482
Publish at: 2017-10-01

Raman Pumping as an Energy Efficient Solution for NyWDM Flexible-grid Elastic Optical Networks

10.11591/ijece.v7i5.pp2627-2634
Arsalan Ahmad , Andrea Bianco , Vittorio Curri , Guido Marchetto , Sarosh Tahir
This paper investigates transparent wavelength routed optical networks using three different fiber types NZDSF, SMF and PSCF - and validates the effectiveness of Hybrid Raman/EDFA Fiber Amplification (HFA) with different pumping levels, up to the moderate 60% pumping regime. Nodes operate on the basis of flexible-grid elastic NyWDM transponders able to adapt the modulation format to the quality-of-transmission of the available lightpath, exploiting up to five 12.5 GHz spectral slots. Results consider a 37- node Pan-European network for variable Raman pumping level, span length and average traffic per node. We show that HFA in moderate pumping regime reduces the power consumption and enhances spectral efficiency for all three fiber types with particular evidence in NZDSF. In essence to that, introduction of HFA is also beneficial to avoid blocking for higher traffic loads.
Volume: 7
Issue: 5
Page: 2627-2634
Publish at: 2017-10-01

Hybrid Method HVS-MRMR for Variable Selection in Multilayer Artificial Neural Network Classifier

10.11591/ijece.v7i5.pp2773-2781
Ben-Hdech Adil , Ghanou Youssef , El Qadi Abderrahim
The variable selection is an important technique the reducing dimensionality of data frequently used in data preprocessing for performing data mining. This paper presents a new variable selection algorithm uses the heuristic variable selection (HVS) and Minimum Redundancy Maximum Relevance (MRMR). We enhance the HVS method for variab le selection by incorporating (MRMR) filter. Our algorithm is based on wrapper approach using multi-layer perceptron. We called this algorithm a HVS-MRMR Wrapper for variables selection. The relevance of a set of variables is measured by a convex combination of the relevance given by HVS criterion and the MRMR criterion. This approach selects new relevant variables; we evaluate the performance of HVS-MRMR on eight benchmark classification problems. The experimental results show that HVS-MRMR selected a less number of variables with high classification accuracy compared to MRMR and HVS and without variables selection on most datasets. HVS-MRMR can be applied to various classification problems that require high classification accuracy.
Volume: 7
Issue: 5
Page: 2773-2781
Publish at: 2017-10-01

Optimized High-Utility Itemsets Mining for Effective Association Mining Paper

10.11591/ijece.v7i5.pp2911-2918
K Rajendra Prasad
Association rule mining is intently used for determining the frequent itemsets of transactional database; however, it is needed to consider the utility of itemsets in market behavioral applications. Apriori or FP-growth methods generate the association rules without utility factor of items. High-utility itemset mining (HUIM) is a well-known method that effectively determines the itemsets based on high-utility value and the resulting itemsets are known as high-utility itemsets. Fastest high-utility mining method (FHM) is an enhanced version of HUIM. FHM reduces the number of join operations during itemsets generation, so it is faster than HUIM. For large datasets, both methods are very expenisve. Proposed method addressed this issue by building pruning based utility co-occurrence structure (PEUCS) for elimatination of low-profit itemsets, thus, obviously it process only optimal number of high-utility itemsets, so it is called as optimal FHM (OFHM). Experimental results show that OFHM takes less computational runtime, therefore it is more efficient when compared to other existing methods for benchmarked large datasets.
Volume: 7
Issue: 5
Page: 2911-2918
Publish at: 2017-10-01

Identity-Based Blind Signature Scheme with Message Recovery

10.11591/ijece.v7i5.pp2674-2682
Salome James , T. Gowri , G.V. Ramesh Babu , P. Vasudeva Reddy
Blind signature allows a user to obtain a signature on a message without revealing anything about the message to the signer. Blind signatures play an important role in many real world applications such as e-voting, e-cash system where anonymity is of great concern. Due to the rapid growth in popularity of both wireless communications and mobile devices, the design of secure schemes with low-bandwidth capability is an important research issue. In this paper, we present a new blind signature scheme with message recovery in the ID-based setting using bilinear pairings over elliptic curves. The proposed scheme is unforgeable with the assumption that the Computational Diffie-Hellman problem is hard. We compare our scheme with the related schemes in terms of computational and communicational point of view.
Volume: 7
Issue: 5
Page: 2674-2682
Publish at: 2017-10-01
Show 1448 of 1921

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration