Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,325 Article Results

A Study of Secured Enabled Passive Optical Network Enabling RoF

10.11591/ijeecs.v9.i1.pp43-48
M. Deepak
Innovation is an incorporation of radio sign in optical fiber transmission inside of system foundations that are thought to be financially savvy, pragmatic and moderately adaptable framework setup for whole deal transport remote signs. This venture proposes a Next era PON construction modeling backings RoF and OFDMA signal coordination without WDM lasers, and exhibit that 10-Gb/s OFDMA and three RF signals at 2.1GHz are transmitted more than 20km SMF in a 32-ONU in both upstream and downstream bearing. A security control unit and an optical switch are utilized associating four Optical Line Terminations (OLTs) with everyone serving just 32 Optical Network Units (ONUs). Insurance control unit gathers data of ONUs served by each OLT, and when an OLT falls flat, it will educate an active OLT to help its unique ONUs together with the burden served by the fizzled OLT.
Volume: 9
Issue: 1
Page: 43-48
Publish at: 2018-01-01

A Semi-Autonomous Coal Mine Monitoring Security System Based On Wireless Control Using RTOS

10.11591/ijeecs.v9.i1.pp33-35
Singh Omkar Ramabhilash , Santosh Kumar Singh
Novel coal mine administration framework to tackle the ongoing observing and profoundly effective safeguard issues of underground work stages. In this paper proposing a robot that has the fitness to identify the covered mine and let the client control it remotely to stay away from others conscious causalities. The robot is outfitted with exceptional wheels controlled by H-Bridge module, enabling it to move in every single conceivable bearing. In this venture we concentrate on the security of people and the robot; the robot is outfitted with unique range sensors that assistance in staying away from the snags in the field by extraordinarily recognizing the position of obstructions. For the manufacture of the venture, a unique model made of lightweight temperature safe metal is utilized on which every one of the articles is conveyed. Gas immediate, mischance help ask for, video gushing and voice declaration are the extra components of this framework. Advance, a remote ZigBee is added to the robot, which gets the constant estimations of flame, temperature. ARM microcontroller charges the robot. The camcorder connection to the gadget will transmit the picture in the Motion-JPEG arrange alongside a speaker who will enable us to send the crisis charge with the assistance of the voice message device. The application firmware keeps running on top of a RTOS to deal with multitasking prerequisites of the framework. This strategy has a down to earth profit if diminishing the quantity of causalities, after the execution of the procedure; the robot can be controlled productively with slightest buffering time.
Volume: 9
Issue: 1
Page: 33-35
Publish at: 2018-01-01

Controlling Pornography Over The Web

10.11591/ijeecs.v9.i1.pp104-106
Archenaa J , E. A. Mary Anitha
This investigation analyzed the degree to which youngsters are protected on the web with an emphasis on web erotica. The goals of this investigation incorporate (a) to find out the degree to which kids peer connections impact their web get to; (b) to decide the effect of sex on understudy utilization of web for long range informal communication; (c) to test whether sex have huge impact on understudy utilization of web for texting; (d) to test whether sex affect on understudy utilization of web for Email; (e) to decide the commitment of sex understudy utilization of web for video posting/seeing; (f) to test whether sex have huge commitment on understudy utilization of web for their homework; and (g) to discover the degree of youngsters open to erotica on the web. Essential wellspring of information gathering was utilized in this investigation and the factual devices utilized for information examination incorporate the Chi-square test measurement, Bar outline, Pie diagram and rate circulation. The outcome got was that greater part of kids don't approach web through associate connections which suggests that the degree to which youngsters peer connections impact their web get to is low. It was uncovered that understudies utilize the web for long range interpersonal communication, video posting/review, and Emailing yet don't utilize it for texting and in getting their work done. It was discovered that dominant part of the kids are not presented to online erotica, in opposite it ought to be noticed that the couple of kids who utilize the web for these exercises are at danger of being presented to obscenity on the web.
Volume: 9
Issue: 1
Page: 104-106
Publish at: 2018-01-01

Cryptographic Hashing Method using for Secure and Similarity Detection in Distributed Cloud Data

10.11591/ijeecs.v9.i1.pp107-110
A. Mohamed Divan Masood , S. K. Muthusundar
The explosive increase of data brings new challenges to the data storage and supervision in cloud settings. These data typically have to be processed in an appropriate fashion in the cloud. Thus, any improved latency may originanimmense loss to the enterprises. Duplication detection plays a very main role in data management. Data deduplication calculates an exclusive fingerprint for each data chunk by using hash algorithms such as MD5 and SHA-1. The designed fingerprint is then comparing against other accessible chunks in a database that dedicates for storing the chunks. As an outcome, Deduplication system improves storage consumption while reducing reliability. Besides, the face of privacy for responsive data also arises while they are outsourced by users to cloud. Aiming to deal with the above security challenges, this paper makes the first effort to honor the notion of distributed dependable Deduplication system. We offer new distributed Deduplication systems with privileged reliability in which the data chunks are distributed across a variety of cloud servers. The protection needs an different of using convergent encryption as in foregoing Deduplication systems.
Volume: 9
Issue: 1
Page: 107-110
Publish at: 2018-01-01

Analysis on Modified Fuzzy Logic Toolbox for Marine Navigation Applications

10.11591/ijeecs.v9.i1.pp73-76
P. Palanichamy
Programmed marine navigation and control is a vital piece of savvy vehicle control framework. It incorporates course keeping, and the course is evolving. Its primary design is to guarantee that boats cruise in the provided guidance consequently disregarding changes in ocean conditions, wind and different, unsettling influences. Fuzzy control is the verifiable truth that Fuzzy rationale frameworks require no exact scientific models of the framework under control. Expansion rationale, given expansion set, is to explore the different issue. The blend of development hypothesis and control theory brought another sort of wise control augmentation control. This paper presents Fuzzy augmentation control strategy for marine directing. The paper set up the model of Fuzzy augmentation control framework and concentrated the outline of Fuzzy augmentation controller. Recreation comes about show that the control strategy is profitable.
Volume: 9
Issue: 1
Page: 73-76
Publish at: 2018-01-01

Natural Dyes from Roselle Flower as a Sensitizer in Dye-Sensitized Solar Cell (DSSC)

10.11591/ijeecs.v9.i1.pp191-197
Dayang Suriani , Muhammad Irwanto Misrun , Gomesh Nair , Baharuddin Ismail
Hibiscus Sabdariffa L. well known as Roselle flower was used as sensitizers for Dye-Sensitized Solar Cell (DSSC). The dyes were extracted using distilled water (DI) and ethanol (E) extract solvent in an ultrasonic cleaner for 30 minutes with a frequency of 37 Hz by using ‘degas’ mode at the temperature of 30°. Doctor blade method was applied in the fabrication of titanium dioxide (TiO2) on ITO glass. Absorption spectra of Roselle dye with different extract solvent were tested using Evolution 201 UV-Vis Spectrophotometer. Fourier-Transform Infrared (FTIR) was used to identify the functional active group in extract dye. Based on FTIR result, the broad absorption at peak 2889 cm-1, 2976 cm-1, and 3366 cm-1 attributed to the O-H stretching which is the presence of hydroxyl group. The use Field Emission Scanning Electron Microscopy (FESEM) and Energy-Dispersive Spectroscopy (EDS) analysis are to characterize the surface morphology and element in the TiO2 thin film.
Volume: 9
Issue: 1
Page: 191-197
Publish at: 2018-01-01

A Novel Hydro Powered Online Power Converter for Marine Lighting Applications

10.11591/ijeecs.v9.i1.pp15-19
Sinu KJ , G. Ranganathan
This paper presents a new hydro energy based dc-dc PFC sepic based buck converter for marine lighting applications. The major advantage of the proposed power converter is high power factor and low THD with higher efficiency. SEPIC converter produces continuous smooth ripple free current because of two inductors in series in line in its circuit. Sepic converter produces lower switching losses because of lower voltage stress on power switch employed compared to other buck-boost converter topologies. Tidal wave energy is converted into mechanical energy with the help of a hydro turbine which drives a permanent magnet synchronous generator to produce three phase ac output voltage. It produces a low ac voltage which is converted into DC using passive diode rectifier and fed to sepic converter for voltage regulation as well as to improve quality of power supply such as high power factor, low THD. The proposed sepic based power converter for marine lighting application is simulated in MATLAB/Simulink environment for verifying the performance of proposed scheme.
Volume: 9
Issue: 1
Page: 15-19
Publish at: 2018-01-01

A Smart Method for Monitoring and Scheming Of Road Luminosity Using GSM Equipment

10.11591/ijeecs.v9.i1.pp36-38
Ravichandran G , Krishnamurthy M
In our modern life, energy wastage in Streetlight is a big problem faced in walkways and roads during dawn and dusk. These days, the present road light structures are wired which are hard to make and has poor adaptability. During the daytime, the battery gets charged by sun rays, and the energy can be used to power the road lights at night time. The structure regards sun situated cell foundation. It is like manner delineates the usage of remote sensor frameworks using GSM for streetlight checking and control. This system would give remote access to streetlight upkeep and monitoring. It likewise talks about a perceptive framework that takes programmed choices for sparkling control (ON/OFF/DIMMING) considering encompassing light power and time both at a similar minute. The data collected from the sensor is given to the microcontroller of one unit, and at the same time, the SMS is sent through GSM to the Raspberry PI microcontroller to monitor and control the street light.
Volume: 9
Issue: 1
Page: 36-38
Publish at: 2018-01-01

Assault Discovery and Localizing Adversary in Remote Networks

10.11591/ijeecs.v9.i1.pp81-84
Patel KalpanaDhanji , Santhoshkumarsingh Santhoshkumarsingh
Remote Systems are presently prevalent worldwide to help individuals and machines to speak with each other regardless of their area, where it has an unending mission for expanded limit and enhanced quality. Despite the fact that there are many points of interest yet regardless it have a few burdens. This paper manages the vulnerabilities in the remote frameworks. The vulnerabilities show in the remote innovation that is generally identified with dangers and dangers. Despite the fact that much defencelessness are in the remote frameworks this paper for the most part manages the parodying assaults. In remote frameworks the foes can dispatch any kind of assaults to take the information and to lull the execution of the system. The fundamental driver of this paper is to pass on that remote frameworks require a more grounded instrument. So we likewise propose to perform equipment execution utilizing a Zig honey bee handset which utilizes the standard (802.15.4) chiefly in view of Zigbee convention Stack.
Volume: 9
Issue: 1
Page: 81-84
Publish at: 2018-01-01

Investigating Thermal Comfort for the Classroom Environment using IoT

10.11591/ijeecs.v9.i1.pp157-163
Nurshahrily Idura Ramli , Mohd Izani Mohamed Rawi , Ahmad Zahid Hijazi , Abdullah Hayyan Kunji Mohammed
In this modern century where fine comfort is a necessity especially in buildings and occupied space, the study to satisfy one aspect of human comfort is a must. This study encompasses of exploring the physiological and environmental factors in achieving thermal comfort which specifically considering the clothing insulation and metabolic rate of students as well as the deployment of dry-bulb temperature, mean radiant temperature, humidity, and air movement in order to obtain the level of comfort students are experiencing in class. The level of comfort are detected by using ASHRAE 55 to determine the average thermal sensation response through the Predicted Mean Vote (PMV) value. An android application were developed to read input of recognizing clothing level (thickness of clothing) and capturing metabolic rate to cater the inputs for physiological factors, while radiant temperature, humidity and air movement are captured through static sensors set up in the classroom space. This paper analyses both the physiological and environmental factors in affecting students in class and further determine their comfort levels that is a major influencing factor of focus in learning. Through cross referencing collected data from IoT enabled nodes, it is found that both physiological and environmental factors, and the combination of them greatly influence in getting the most comfortable state with PMV value of 0.
Volume: 9
Issue: 1
Page: 157-163
Publish at: 2018-01-01

The Application of S-Transform to Reduce Border Distortion Effect Based on Window Length

10.11591/ijeecs.v9.i1.pp177-182
S. Habsah Asman , M. A. Talib Mat Yusoh , A. Farid Abidin
The enhancement of powerful signal processing  tools has broadened the scope research in power quality analysis.The necessity of processing tools to compute the signals accurately without border distortion effect presence has demanded nowadays. Hence, S-Transform has been selected in this paper as a time-frequency analysis tools for power disturbance detection and localization as it capable to extract features and high resolution to deal with border distortion effect. Various window length signal has been analyzed to overcome the border distortion effect in S-Transform.To ascertain validity of the proposed scheme, it is  validated with IEEE 3 bus test system and simulation results show that the proposed technique can minimize the border effect  while detecting transient and voltage sag during fault system. As a result, the longest window length which is four cycle, outperform the least MSE value which indicate the best performance. While, the shortest window length resulting highest MSE value which indicate the worst performance.
Volume: 9
Issue: 1
Page: 177-182
Publish at: 2018-01-01

Adaptive Link Aware on-demand Multicast Routing Scheme in MANET

10.11591/ijeecs.v9.i1.pp56-59
Ruban Chakravarthy , G. Ranganathan
The main objective of this paper is to propose a new multicast routing scheme to adopt with the dynamic topology of MANET at the same time to provide high multicast efficiency and packet delivery ratio. The proposed scheme is named as Link Aware on Demand Multicast Routing (LAOMR) scheme. In this scheme, initially the source node forms the multicast group by announcing itself as a multicast source agent to all the nodes in the network. The nodes which are eager to join in the group are sending the join request to the source node. Then the source node finds the route to reach the multicast group through some intermediate nodes. The intermediate nodes are not interested to hear the multicast message but they are act as the routers to forward the packets to the multicast group. The intermediate nodes are chosen based on the link residual life (LRL) of the nodes. The node which has the highest LRL and closer to the multicast group is selected as the forwarder node. So, the proposed scheme reduces the link failure in the multicast route and increases the multicast efficiency, throughput. The performance is evaluated by using the simulation results obtained from NS2 Simulator.
Volume: 9
Issue: 1
Page: 56-59
Publish at: 2018-01-01

Determining Hotspots of Road Accidents using Spatial Analysis

10.11591/ijeecs.v9.i1.pp146-151
S.Sarifah Radiah Shariff , Hamdan Abdul Maad , Nursyaza Narsuha Abdul Halim , Zuraidah Derasit
Road accidents continuously become a major problem in Malaysia and consequently cause loss of life or property. Due to that, many road accident data have been collected by highway concessionaries or build–operate–transfer operating companies in the country meant for coming up with proper counter measures. Several analyses can be done on the accumulated data in order to improve road safety. In this study the reported road accidents cases in North South Expressway (NSE) from Sungai Petani to Bukit Lanjan during 2011 to 2014 period is analyzed. The aim is to determine whether the pattern is clustered at certain area and to identify spatial pattern of hot spots across this longest controlled-access expressway in Malaysia as hotspot represents the location of the road which is considered high risk and the probability of traffic accidents in relation to the level of risk in the surrounding areas. As no methodology for identifying hotspot has been agreed globally yet; hence this study helped determining the suitable principles and techniques for determination of the hotspot on Malaysian highways. Two spatial analysis techniques were applied, Nearest Neighborhood Hierarchical (NNH) Clustering and Spatial Temporal Clustering, using CrimeStat® and visualizing in ArcGIS™ software to calculate the concentration of the incidents and the results are compared based on their accuracies. Results identified several hotspots and showed that they varied in number and locations, depending on their parameter values. Further analysis on selected hot spot location showed that Spatial Temporal Clustering (STAC) has a higher accuracy index compared to Nearest Neighbor Hierarchical Clustering (NNH). Several recommendations on counter measures have also been proposed based on the details results.
Volume: 9
Issue: 1
Page: 146-151
Publish at: 2018-01-01

Data Spread among Vehicular Networks with Minimal Cost and Privacy

10.11591/ijeecs.v9.i1.pp111-114
Atul Kulkarni , Debajyoti Mukhopadhyay
Currently, choosing a node to carry the files via network is inefficient due to multiple end-users are requesting for packets at the same time. The problem is to identify the shortest path, traffic cost is high, and hackers enter the network to access the file. Whenever user requesting for packets to service provider, it has been carried out via router to provide security and effective way of transmission without any hackers. We proposed a VAN router that manages the transmission process. Once the packet enters router follows: (i) identifies the shortest path to transmit the packets, (ii) analyze the migration cost, (iii) when a hacker enters the network, the details of the hacker is send to the GPS to identify hackers location, (iv) provides the user requested packets back to the user without any modification. GPS work is to identify the hacker location in which node they are trying to access the files and that information has been sent to the user where hacker enters the network. Each packet sent by the service provider via router to end-user, the router intimates service provider with a confirmation message. Finally, VAN router provides security to the end-user by avoiding hackers to access the file and minimizes traffic cost, finds shortest path.
Volume: 9
Issue: 1
Page: 111-114
Publish at: 2018-01-01

A View on Creep Failure in Distribution Transformers

10.11591/ijeecs.v9.i1.pp49-52
R. Elavarasi
This paper insight about reasons of disappointment in distribution transformers. It has been suggested that crawl may be a noteworthy purpose behind such disappointments. The impact of anxiety, temperature, and material on unfaltering state killjoy rate on aluminum and copper wires (utilized as a part of 25 KVA distribution transformers) have been introduced. Proposed study affirms that the disappointment rate of aluminum wound DTs is higher than the disappointment rate of copper injury DTs in force insufficient ranges and poor conveyance systems. The higher disappointment rate of aluminum wound DTs has been credited to the lifted enduring state wet blanket rate of the aluminum wire than copper wire.
Volume: 9
Issue: 1
Page: 49-52
Publish at: 2018-01-01
Show 1453 of 1955

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration