Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,820 Article Results

Data-Driven Impedance Matching in Multilateral Teleoperation Systems

10.11591/ijeecs.v10.i2.pp713-724
Mohd Syakirin Ramli , Hamzah Ahmad
This paper addresses a tuning approach to improve transparency between master and slave manipulators in a multilateral teleoperation system. The slave manipulators comprised of multi-agents of simple mass are converted into a bilateral system through the passive decomposition technique. There are two main operations being considered, namely; grasping and handling. The object grasping is achieved through consensus control. For handling, an equalizer constructed by a Laguerre function connected in-feedback-loop to the master manipulator is chosen and tuned to achieve impedance matching between both sides of teleoperation. Fictitious Reference Iterative Tuning (FRIT) is adopted to properly tune the selected equalizer. The result shows that by introducing an optimally tuned equalizer, the overall impedance matching and transparency between the single master and multi-slave manipulators are improved. Finally, the effectiveness of the proposed tuning algorithm is presented through a numerical example.
Volume: 10
Issue: 2
Page: 713-724
Publish at: 2018-05-01

Security Mandated Analytics based Route Processing with Digital Signature [SMARPDS] - Pseudonymous Mobile Ad Hoc Routing Protocol

10.11591/ijeecs.v10.i2.pp763-769
K. Vinayakan , M. V. Srinath
There are a lot of speculations going on about the interests for privacy in mobile network. Many research works have been proposed in the aspect and these works concentrate more on the anonymity part and there are quite a few implementations of these research works on some applications. Ad hoc routing protocols must have provision for both anonymity providing nature and restriction of information collection from unauthorized nodes. Till recent times, there are a number of ad hoc routing protocols that have been introduced. But, they have lack security features or authentication features or in some cases both. The lack of proper security features leads to a state of vulnerability which at any given point, will act as a threat element. In this paper, we propose Security Mandated Analytics based Route Processing with Digital Signature protocol [SMARPDS]. It is an anonymous and authentication providing routing protocol in Mobile Ad hoc network. In addition, routes are discovered based on analytics done on the node and its present location in the network. SMARPDS provides authentication during the route discovery and transmission process by employing digital signatures on node front and also on packets front.
Volume: 10
Issue: 2
Page: 763-769
Publish at: 2018-05-01

Robust Vision-based Multiple Moving Object Detection and Tracking from Video Sequences

10.11591/ijeecs.v10.i2.pp817-826
Othman Omran Khalifa , Norun Abdul Malek , Kazi Istiaque Ahmed
Detection of Moving Objects and Tracking is one of the most concerned issue and is being vastly used at home, business and modern applications. It is used to identify and track of an entity in a significant way. This paper illustrates the way to detect multiple objects using background subtraction methods and extract each object features by using Speed-Up Robust Feature algorithm and track the features through k-Nearest Neighbor processing from different surveillance videos sequentially. In the detection of object of each frame, pixel difference is calculated with respect to the reference background frame for the detection of an object which is only suitable for any ideal static condition with the consideration of lights from the environment. Thus, this method will detect the complete object and the extracted feature will be carried out for the tracking of the object in the multiple videos by one by one video. It is expected that this proposed method can commendably abolish the impact of the changing of lights
Volume: 10
Issue: 2
Page: 817-826
Publish at: 2018-05-01

Performance of Cuk-KY Converter Fed Multilevel Inverter for Hybrid Sources

10.11591/ijeecs.v10.i2.pp436-445
V. Vasudevan , K. Balaji
Distributed energy source based electricity generation is an essential factor for the economic growth and development of a country. The photovoltaic, fuel cell and battery based power generation offer a high voltage gain. The DC-DC CUK converter based on both buck and boost mode of operation is proposed for high gain dc link voltage. The hybrid CUK –KY Converter based multilevel inverter is designed and implemented. Here, the main advantages of hybrid boost mode operation of Cuk converter, step up configuration is used which will result in improve conversion voltage ratio and better damping of oscillations. The DC-DC converter voltage has regulated by the maximum power point tracking and PI control based method is used. The cascaded multilevel inverter in hybrid renewable energy production integrating with switched capacitor method is designed. The proposed converter is designed and implemented in MATLAB/SIMULINK environment.
Volume: 10
Issue: 2
Page: 436-445
Publish at: 2018-05-01

A Novel Approach Certificate Revocation in MANET using Fuzzy logic

10.11591/ijeecs.v10.i2.pp654-663
Jayanthi. E , Mohammed Ali Hussain
Due to the advent developments in the Information and Communication Technology (ICT) based environment, Mobile ad hoc networks (MANETs) have fascinated much concentration because of their mobility and easy deployment. At the same time, their wireless and vibrant features make them susceptible to wide range of types of security attacks when compared to the traditional wired networks. The prime challenge is to assure security in the network components and services. To work out the challenge, novel security measures are put forward for effective and secured communication. In our proposed work, we discuss the need for Security in MANET, focusing on certificate revocation. Providing security is challenging tasks due to its key features. Different authentication techniques, Digital certificate and components of Public Key Infrastructure are also discussed. The certificate revocation is a challenging task in MANETs due to absence of centralized repositories and trusted authorities. The different methods of certificate revocation using cluster based mechanism is analyzed and compared. The principle, advantages and disadvantages of certificate revocation are also compared. And the novel Certificate revocation techniques using fuzzy is discussed with reduced overhead.
Volume: 10
Issue: 2
Page: 654-663
Publish at: 2018-05-01

IoT: Electrocardiogram (ECG) Monitoring System

10.11591/ijeecs.v10.i2.pp480-489
Kristine Joyce P. Ortiz , John Peter O. Davalos , Elora S. Eusebio , Dominic M. Tucay
Internet of Things (IoT) has many applications in the medical field. With remote-information gathering, healthcare professionals can evaluate, diagnose and treat patients in remote locations using telecommunications technology. This study aimed to develop a small-scale electrocardiogram (ECG) monitoring device that will measure heart rates and waveforms and send the data in a database and a web server. An ECG acquisition device was developed using a single-lead heart rate monitor sensor and an Arduino microcontroller. A program, which will process, analyze and upload the ECG data is coded using MATLAB and C# programs. The collected information is viewed in a Graphical User Interface (GUI) display, coded using C# and in a webpage. Rapid Application Technology (RAD) was used in the methodology, which began with a quick design of the system. The hardware and software systems underwent a prototyping cycle for development. Once finished, the integration of the system is conducted to construct a complete IoT-based ECG monitoring system. For testing using t-test, a sample size of 18 and a a= 0.05 is used. Testing resulted into t-test values that lie in the non-critical zone for all ECG parameters, denoting that there is no significant difference between the gathered data. The device’s percent reliability in detecting ECG conditions such as normal sinus rhythm, sinus tachycardia, sinus bradycardia and flatline, is 83.33%. The percent difference for the heart rate is 0.35 %, which falls within the acceptable medical standard of 99% accuracy. The device was deemed functional and reliable.
Volume: 10
Issue: 2
Page: 480-489
Publish at: 2018-05-01

A Review on the Reclamation Technologies for Service-Aged Transformer Insulating Oils

10.11591/ijeecs.v10.i2.pp426-435
Sharin Ab Ghani , Zulkarnain Ahmad Noorden , Nor Asiah Muhamad , Hidayat Zainuddin , Mohd Aizam Talib
Power transformers are the backbone of electricity transmission and distribution systems throughout the world. The price of power transformers is exorbitant (costing millions of dollars per unit) and therefore, frequent maintenance is necessary to ensure that these systems are highly reliable during their operation. The service life of mineral insulating oils is typically 30 to 40 years for power transformer applications. However, all insulating oils (regardless of their type) are subjected to thermal, electrical and chemical degradation, which will deteriorate the oil-paper insulating system and consequently reduce the capability of the oil as an electrical insulator. For these reasons, service-aged insulating oils are treated by two types of processes (i.e. reclamation and reconditioning) in order to prolong the service life of these oils. Reclamation (regeneration) is used to treat insulating oils with high levels of acidity and sludge. In this paper, a brief review on the reclamation technologies used to treat service-aged insulating oils is presented, covering various aspects such as the standard test methods that need to be complied with, the types of adsorbents used to reduce acidity and sludge of the used insulating oils, as well as the findings of several key studies related to the evaluation of the effectiveness of the reclamation process. This review will indeed benefit researchers and practitioners in this field since it provides an overall picture of the recent progress in reclamation technologies for service-aged transformer insulating oils
Volume: 10
Issue: 2
Page: 426-435
Publish at: 2018-05-01

Design and Specific Absorption Rate of 2.6 GHz Rectangular-Shaped Planar Inverted-F Antenna

10.11591/ijeecs.v10.i2.pp741-747
Nurul Inshirah Mohd Razali , Norhudah Seman , Nur Ilham Aliyaa Ishak
This article presents the investigation of specific absorption rate (SAR) of a rectangular-shaped planar inverted-F antenna (PIFA) at frequency of 2.6 GHz. Initially, the design antenna is presented with parametric study concerning the dimensions of antenna patch length, shorting plate, ground plane and substrate. The proposed PIFA antenna has -20.46 dB reflection coefficient and 2.383 dB gain. The PIFA’s SAR is correlated with the antenna gain and excitation power. The analysis shows that higher gain contributes to a lower SAR value. While, the higher excitation power causes a higher SAR value. All the design and analysis are performed using the CST Microwave Studio
Volume: 10
Issue: 2
Page: 741-747
Publish at: 2018-05-01

Disparities in the Induced Rain Attenuation between Beacon (Narrowband) and Broadband Satellite Links in Tropical Zones

10.11591/ijeecs.v10.i2.pp687-695
Idrissa Abubakar , Jafri Din , Hong Yin Lam
The utilisation of higher frequency bands above 10 GHz by the satellite industries to provide the bandwidth (BW) required for broadband multimedia services, video conferencing, direct-to-home TV programmes and IP data requires the understanding of atmospheric losses and good link planning for satellite-to-earth links. The trade-off between the service availability, data rate and BW determine the type of modulation scheme and error corrections to be employed. These services also depend on the link performance under adverse atmospheric conditions, especially rain-induced attenuation. In this research, study measurements were conducted on space-to-earth satellite links using the beacon narrowband and broadband IP carrier signals of a Nigcomsat-1R satellite operating at 42.5°E. A VSAT receiving terminal at a latitude of 7.4°N, longitude of 9.04°E and altitude of 334 m above sea level was utilised to quantify the rain-induced attenuation of both the beacon and broadband signals during rain events. The measurements were then compared with the link performance under clear sky conditions. The performance revealed that, when compared with the broadband signal, the induced rain attenuation on beacon signal presented a disparity in the responses, resulting in significant variations of 10.14 dB in the carrier-to-noise ratio (C/N) and 17.42 dB in the received signal level at a Ku-band frequency of 12.518 GHz. These observations were also compared with the Crane global rain map and ITU-R P.618-12. Both models disagreed with the measurement values for Abuja, Nigeria.
Volume: 10
Issue: 2
Page: 687-695
Publish at: 2018-05-01

Q-switched Erbium Doped Fiber Laser Incorporating Antimony (III) Telluride in Polyvinyl Alcohol as Saturable Absorber

10.11591/ijeecs.v10.i2.pp409-415
Ezzatul Irradah Ismail , S Muhammad Ashraf Zolkopli , Muhammad Quisar Lokman , Hafizal Yahaya , Sulaiman Wadi Harun , Fauzan Ahmad
In this paper, we demonstrated a Q-switched erbium doped fiber laser (EDFL) incorporating Antimony (III) Telluride (Sb2Te3) in polyvinyl alchohol (PVA) as passive saturable absorber.  The saturable absorber were fabricated by dissolving Antimony (III) Telluride powder into PVA solution and dry in the ambient temperature for 48 hours. Then, 1 mm2 x 1 mm2 Sb2Te3-PVA film based saturable absorber were sandwiched in between FC/PC ferrule for Q-switched laser generation. The stable and self-started Q-switched laser operates at center wavelength 1560 nm with 3 dB bandwidth of 0.23 nm. The laser operates at pump power of 29.3 mW until 84.9 mW with repetition rate of 20.99 kHz to 89.29 kHz and pulse width of 13.95 µs to 5.10 µs. At maximum pump power, the laser able to achieve pulse energy of 62.72 nJ and high signal to noise ratio of 71.4
Volume: 10
Issue: 2
Page: 409-415
Publish at: 2018-05-01

Preliminary Study of a New Topology Permanent Magnet Flux Switching Motor for Electric Buses

10.11591/ijeecs.v10.i2.pp446-455
M. F. Omar , E. Sulaiman , M. Z. Ahmad , J. A. Rani , Aravind CV
Electric buses (EBs) as public transit that have been introduced in modern countries recently are an alternative effort to reduce climate change and environmental impacts of fossil fuels. One example of the successfully developed motor for EBs is interior permanent magnet synchronous motor (IPMSM) with merits of heat dissipating, high torque per frame size and reliability influence by absence of brushes. However, the three-phase armature windings are wounded in the form of distributed windings, results in much copper loss, high coil end length and reduced the efficiency. The embedded rectangular magnets inside the rotor make rotor less robust, increased rotor weight and reduced the torque and power density. The present IPMSM has a complex structure which is relatively difficult to manufacture and tough in optimization process. The 7.0 kg volume of PM used in IPMSM is very high, which increases the cost of the machine. Therefore, a new topology of permanent magnet flux switching motor using wedge-shaped PM and single stator structure with the advantages of simple stator design, robust rotor structure, high of torque and power, and high efficiency is proposed. The design, flux linkage, back-emf, cogging torque, average torque, speed, and power of this new topology are investigated by JMAG-Designer version 14.1 via a 2D-FEA. The initial design of proposed motor produces torque and power of 905.9 Nm and 57.75 kW, respectively.
Volume: 10
Issue: 2
Page: 446-455
Publish at: 2018-05-01

Palm Vein Pattern Visual Interpretation Using Laplacian and Frangi-Based Filter

10.11591/ijeecs.v10.i2.pp578-586
Zarina Mohd Noh , Abdul Rahman Ramli , Marsyita Hanafi , M Iqbal Saripan , Ridza Azri Ramlee
Detection of palm vein pattern through image processing techniques is an open problem as performance of each technique is closely related to the sample image gathered for the processing. The detected palm vein pattern is useful for further analysis in biometrics application and medical purpose. This paper aims to investigate the application of Laplacian filter and Frangi-based filter in detecting vein pattern contained in a near infrared illuminated palm image. Both filtering techniques are applied independently to two palm image databases to compare their performance in translating vein pattern in the image visually. Through empirical study, it is observed that Laplacian filter can translate the vein pattern in the image effectively. But pre-processings involved before the application of Laplacian filter need to be performed to accurately translate the vein pattern. The implementation of Frangi-based filter, while simplifying the detection process without the need of extra pre-processing, resulted in only certain vein pattern detected. Using pixel-by-pixel objective assessment, the rate for Laplacian filter in detecting vein pattern are generally more than 85% compared to Frangi-based filter; where it ranges from 60% to 100%.
Volume: 10
Issue: 2
Page: 578-586
Publish at: 2018-05-01

Selective Colligation and Selective Scrambling for Privacy Preservation in Data Mining

10.11591/ijeecs.v10.i2.pp778-785
Ishwarya M. V. , K. Ramesh Kumar
The work is to enhance the time efficiency in retrieving the data from enormous bank database. The major drawback in retrieving data from large databases is time delay. This time   hindrance is owed as the already existing method (SVM), Abstract Data Type (ADT) tree pursues some elongated Sequential steps. These techniques takes additional size and with a reduction of speed in training and testing.  Another major negative aspect of these techniques is its Algorithmic complexity. The classification algorithms have five categories. They are ID3, k-nearest neighbour, Decision tree, ANN, and Naïve Bayes algorithm. To triumph over the drawbacks in SVM techniques, we worn a technique called Naïve Bayes Classification (NBC) Algorithm that works in parallel manner rather than sequential manner. For further enhancement we commenced a Naïve Bayes updatable algorithm which is the advanced version of Naïve Bayes classification algorithm. Thus the proposed technique Naïve bayes algorithm ensures that miner can mine more efficiently from the enormous database.
Volume: 10
Issue: 2
Page: 778-785
Publish at: 2018-05-01

An Efficient & Secure Content Contribution and Retrieval content in Online Social Networks using Level-level Security Optimization & Content Visualization Algorithm

10.11591/ijeecs.v10.i2.pp807-816
Kumaran Umapathy , Neelu Khare
Online Social Networks (OSNs) is currently popular interactive media to establish the communication, share and disseminate a considerable amount of human life data. Daily and continuous communications imply the exchange of several types of content, including free text, image, audio, and video data. Security is one of the friction points that emerge when communications get mediated in Online Social Networks (OSNs). However, there are no content-based preferences supported, and therefore it is not possible to prevent undesired messages. Providing the service is not only a matter of using previously defined web content mining and security techniques. To overcome the issues, Level-level Security Optimization & Content Visualization Algorithm is proposed to avoid the privacy issues during content sharing and data visualization. It adopts level by level privacy based on user requirement in the social network. It evaluates the privacy compatibility in the online social network environment to avoid security complexities. The mechanism divided into three parts namely like online social network platform creation, social network privacy, social network within organizational privacy and network controlling and authentication. Based on the experimental evaluation, a proposed method improves the privacy retrieval accuracy (PRA) 9.13% and reduces content retrieval time (CRT) 7 milliseconds and information loss (IL) 5.33%.
Volume: 10
Issue: 2
Page: 807-816
Publish at: 2018-05-01

Finite Element Analysis of Maximum Electric Field for Air Breakdown under Various Electrode Configurations

10.11591/ijeecs.v10.i2.pp416-425
Nur Farhani Ambo , Hidayat Zainuddin , Muhammad Saufi Kamarudin , Jamaludin Mohd Wari , Ayuamira Zahari
This paper describes the electric field behavior of air breakdown under various electrode configurations and gap length. By using COMSOL Multiphysics, a Finite Element Method (FEM) software, the values of maximum electric field can be determined based on the air breakdown voltage data obtained from the experiment under AC stress. The results show that R0.5-plane configuration provides a very high electric field upon breakdown, compared to R6-plane, R48-plane and plane-plane configurations. In addition, the comparison between the analytical and simulation results of maximum electrical field gives almost identical results for each electrode configuration except for R6-plane.
Volume: 10
Issue: 2
Page: 416-425
Publish at: 2018-05-01
Show 1448 of 1988

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration