Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,287 Article Results

Tentative Route Selection aApproach for Irregular Clustered Wireless Sensor Networks

10.11591/ijeecs.v8.i3.pp715-718
Mahendra Sharma , Santhosh Kumar Singh
Wireless Sensor Networks (WSNs) assume a crucial part in the field of mechanization and control where detecting of data is the initial step before any automated job could be performed. So as to encourage such perpetual assignments with less vitality utilization proportion, clustering is consolidated everywhere to upgrade the system lifetime. Unequal Cluster-based Routing (UCR) [7] is a standout amongst the most productive answers for draw out the system lifetime and to take care of the hotspot issue that is generally found in equivalent clustering method. In this paper, we propose Tentative Route (TRS) Selection approach for irregular Clustered Wireless Sensor Networks that facilitates in decision an efficient next relay to send the data cumulative by Cluster Heads to the Base Station. Simulation analysis is achieved using the network simulator to demonstrate the effectiveness of the TRS method.
Volume: 8
Issue: 3
Page: 715-718
Publish at: 2017-12-01

Neural KDE Based Behaviour Model for Detecting Intrusions in Network Environment

10.11591/ijai.v6.i4.pp166-173
V. Brindha Devi , K.L. Shunmuganathan
Network intrusion is one of the growing concern throughout the globe about the information stealing and data exfiltration. In recent years this was coupled with the data exfiltration and infiltration through the internal threats. Various security encounters have been taken in order to reduce the intrusion and to prevent intrusion, since the stats reveals that every 4 seconds, at least one intrusion is detected in the detection engines. An external software mechanism is required in order to detect the network intrusions. Based on the above stated problem, here we proposed a new hybrid behaviour model based on Neural KDE and correlation method to detect intrusions. The proposed work is splitted into two phases. Initial phase is setup with the Neural KDE as the learning phase and the basic network parameters are profiled for each hosts, here the neural KDE is generated based on the input and learned parameters of the network. Next phase is the detection phase, here the Neural KDE is computed for the identified parameters and the learned KDE feature value is correlated with the present KDE values and correlated values are calculated using cross correlation method. Experimental results show that the proposed model is robust in detecting the intrusions over the network.
Volume: 6
Issue: 4
Page: 166-173
Publish at: 2017-12-01

Mobile based Automated Complete Blood Count (Auto-CBC) Analysis System from Blood Smeared Image

10.11591/ijece.v7i6.pp3020-3029
Cham Ying Kit , Razali Tomari , Wan Nurshazwani Wan Zakaria , Nurmiza Othman , Syadia Nabilah Mohd Safuan , Jacqueline Ang Jie Yi , Nicholas Tan Chun Sheng
Blood cells diagnosis is becoming essential to ensure a proper treatment can be proposed to a blood related disease patient. In current research trending, automated complete blood count analysis system is required for pathologists or researchers to count the blood cells from the blood smeared images. Hence, a portable mobile-based complete blood count (CBC) analysis framework with the aid of microscope is proposed, and the smartphone camera is mounted to the viewing port of the light microscope by adding a smartphone support. Initially, the blood smeared image is acquired from a light microscope with objective zoom of 100X magnifications view the eyepiece zoom of 10X magnification, then captured by the smartphone camera. Next, the areas constitute to the WBC and RBC are extracted using combination of color space analysis, threshold and Otsu procedure. Then, the number of corresponding cells are counted using topological structural analysis, and the cells in clumped region is estimated using Hough Circle Transform (HCT) procedure. After that, the analysis results are saved in the database, and shown in the user interface of the smartphone application. Experimental results show the developed system can gain 92.93% accuracy for counting the RBC whereas 100% for counting the WBC.
Volume: 7
Issue: 6
Page: 3020-3029
Publish at: 2017-12-01

Development of a Home-based Wrist Rehabilitation System

10.11591/ijece.v7i6.pp3153-3163
Radzi Ambar , Muhammad Faiz Zakaria , Muhammad Shukri Ahmad , Siti Zarina Muji , Muhammad Mahadi Abd Jamil
There are several factors that may result to wrist injuries such as athlete injuries and stroke. Most of the patients are unable to undergo rehabilitation at healthcare providers due to cost and logistic constraint. To solve this problem, this project proposes a home-based wrist rehabilitation system. The goal is to create a wrist rehabilitation device that incorporates an interactive computer game so that patients can use it at home without assistance. The main structure of the device is developed using 3D printer. The device is connected to a computer, where the device provides exercises for the wrist, as the user completes a computer game which requires moving a ball to four target positions. Data from an InvenSense MPU-6050 accelerometer is used to measure wrist movements. The accelerometer values are read and used to control a mouse cursor for the computer game. The pattern of wrist movements can be recorded periodically and displayed back as sample run for analysis purposes. In this paper, the usefulness of the proposed system is demonstrated through preliminary experiment of a subject using the device to complete a wrist exercise task based on the developed computer game. The result shows the usefulness of the proposed system.
Volume: 7
Issue: 6
Page: 3153-3163
Publish at: 2017-12-01

A Unique Test Bench for Various System-on-a-Chip

10.11591/ijece.v7i6.pp3318-3322
Sridevi Chitti , P. Chandrasekhar , M. Asharani
This paper discusses a standard flow on how an automated test bench environment which is randomized with constraints can verify a SOC efficiently for its functionality and coverage. Today, in the time of multimillion gate ASICs, reusable intellectual property (IP), and system-on-a-chip (SoC) designs, verification consumes about 70 % of the design effort. Automation means a machine completes a task autonomously, quicker and with predictable results. Automation requires standard processes with well-defined inputs and outputs. By using this efficient methodology it is possible to provide a general purpose automation solution for verification, given today’s technology. Tools automating various portions of the verification process are being introduced. Here, we have Communication based SOC The content of the paper discusses about the methodology used to verify such a SOC-based environment. Cadence Efficient Verification Methodology libraries are explored for the solution of this problem. We can take this as a state of art approach in verifying SOC environments. The goal of this paper is to emphasize the unique testbench for different SOC using Efficient Verification Constructs implemented in system verilog for SOC verification.
Volume: 7
Issue: 6
Page: 3318-3322
Publish at: 2017-12-01

Ternary Tree Based Approach For Accessing the Resources By Overlapping Members in Cloud Computing

10.11591/ijece.v7i6.pp3593-3601
Amar Buchade , Rajesh Ingle
In cloud computing, immediate access of resources is important due to cost incurred to customer by pay per use model of cloud computing. Usually resource is protected by using cryptography technique. The resource may be shared by multiple members in group. There can be overlapping members to access the multiple resources. Group key management is important to form the group key to access the resource. Group key formation time is crucial for immediate access of protected resource in cloud computing. Thus ternary tree based approach is proposed to form the key for overlapping members accessing resources. Membership event such as join and leave also considered. Through the analysis, it is found that computational overhead is reduced by 23% if ternary key trees are combined than independent ternary key trees. It is also observed that combined ternary key tree outperforms the combined binary key tree approach for group key formation by considering overlapping members. Security requirement analysis of group membership for key formation is also provided in the paper.
Volume: 7
Issue: 6
Page: 3593-3601
Publish at: 2017-12-01

Comparison Performances of Indirect Field Oriented Control for Three-Phase Induction Motor Drives

10.11591/ijpeds.v8.i4.pp1682-1692
Hasif Aziri , Fizatul Aini Patakor , Marizan Sulaiman , Zulhisyam Salleh
This paper presents the comparative performances of Indirect Field Oriented Control (IFOC) for the three-phase induction motor. Recently, the interest of widely used the induction motor at industries because of reliability, ruggedness and almost free in maintenance. Thus, the IFOC scheme is employed to control the speed of induction motor. Therefore, P and PI controllers based on IFOC approach are analyzed at differences speed commands with no load condition. On the other hand, the PI controller is tuned based on Ziegler-Nichols method by using PSIM software which is user-friendly for simulations, design and analysis of motor drive, control loop and the power converter in power electronics studies. Subsequently, the simulated of P controller results are compared with the simulated of PI controller results at difference speed commands with no load condition. Finally, the simulated results of speed controllers are compared with the experimental results in order to explore the performances of speed responses by using IFOC scheme for three-phase induction motor drives.
Volume: 8
Issue: 4
Page: 1682-1692
Publish at: 2017-12-01

Designing Automatic Meter Reading System Using Open Source Hardware and Software

10.11591/ijece.v7i6.pp3282-3291
Dragan Mlakić , Srete Nikolovski , Emir Alibašić
The importance of quality of the measured values is very dependent on the device that measures these values: the size of the sample, the time of measurement, periods of measurement, the mobility and the robustness of the device, etc. Contemporary devices intended for the measurement of physical quantities that are on the market vary in price, as well as and the quality of the measured values. The rule "the more expensive the better" is not necessarily always a rule that is valid because it all depends on the characteristics and capabilities of the device, and the customer’s needs. In this paper, a device based on "Open Source" components of hardware and software will be presented. Device was used to measure voltages and currents on low voltage networks, on which a virtually unlimited number of sensors can be added, and the device is assembled of components available on electronic components Internet.
Volume: 7
Issue: 6
Page: 3282-3291
Publish at: 2017-12-01

Identification of Rare Genetic Disorder from Single Nucleotide Variants Using Supervised Learning Technique

10.11591/ijai.v6.i4.pp174-184
Sathyavikasini K , Vijaya M S
Muscular dystrophy is a rare genetic disorder that affects the muscular system which deteriorates the skeletal muscles and hinders locomotion. In the finding of genetic disorders such as Muscular dystrophy, the disease is identified based on mutations in the gene sequence. A new model is proposed for classifying the disease accurately using gene sequences, mutated by adopting positional cloning on the reference cDNA sequence. The features of mutated gene sequences for missense, nonsense and silent mutations aims in distinguishing the type of disease and the classifiers are trained with commonly used supervised pattern learning techniques.10-fold cross validation results show that the decision tree algorithm was found to attain the best accuracy of 100%. In summary, this study provides an automatic model to classify the muscular dystrophy disease and shed a new light on predicting the genetic disorder from gene based features through pattern recognition model.
Volume: 6
Issue: 4
Page: 174-184
Publish at: 2017-12-01

MSPWM Based Implementation of Novel 5-level Inverter with Photovoltaic System

10.11591/ijpeds.v8.i4.pp1494-1502
R. Palanisamy , K. Vijayakumar , D. Selvabharathi
This paper proposes a novel 5-level dc-ac converter circuit using with 6 power semiconductor switches. The proposed multilevel inverter generates five-level ac output voltage by implementing Multi-carrier sinusoidal pulse width modulation (MSPWM) technique with reduced number of switches. The voltage stress on each switching devices and common mode voltage can be minimized from the suggested system. The designed system gives better controlled output current and improved output voltage with diminished total Harmonic Distortion value. The operating principles of the proposed inverter are discussed. DC Input for the proposed system is obtained from PV System. Finally, an experimental prototype of the proposed system with 12-V input voltage and 20 V /5 W output is implemented along with simulation output of the waveform to the load. The efficiency and the reduction of harmonic content are discussed.
Volume: 8
Issue: 4
Page: 1494-1502
Publish at: 2017-12-01

Fuel Cell Emulator with MPPT Technique and Boost Converter

10.11591/ijpeds.v8.i4.pp1852-1862
Maaspaliza Azri , Nur Hidayah Abu Khanipah , Zulkifilie Ibrahim , Nasrudin Abd. Rahim
This paper presents the simulation between fuel cell model and interleaved DC-DC boost converter (IBC) using a constant voltage maximum power point tracking (MPPT) technique. The main advantage of this method is it had the simplest algorithm and can be computed for the high efficiency IBC. The MPPT technique forces the fuel cell to meet the maximum power that the fuel cell can generate. To test the IBC along with the MPPT algorithm, MATLAB/Simulink simulation is carried out. This MPPT method increases the efficiency of power delivered from the fuel cell. The IBC has also chosen for its advantages of reduction of passive component's size, as well as reduced the current ripple that could affect the fuel cell stack. It is envisaged that the MPPT method of constant voltage gives a handful of help in designing a low cost and high efficient fuel cell system along with the interleaved boost converter chosen
Volume: 8
Issue: 4
Page: 1852-1862
Publish at: 2017-12-01

Performance of STATCOM-ES in Mitigating SSR

10.11591/ijpeds.v8.i4.pp1822-1829
Mala R.C , Nagesh Prabhu , Gururaja Rao H.V
One of the advanced power applications using energy storage is the integration of energy storage technologies with VSC-based FACTS controllers. With the support of energy storage device, FACTS controllers will have the ability to exchange active power or energy with the ac network in steady state. This paper discusses the impact of Static Synchronous Compensator incorporating energy storage device (STATCOM-ES) on subsynchronous resonance (SSR). It also proposes the design of an auxiliary SSR damping controller (SSDC) for STATCOM-ES to damp the subsynchronous oscillations which the system is undergoing because of a series capacitor in the transmission system. The system under consideration is IEEE FBM which is modified to incorporate STATCOM-ES at the electrical midpoint. The investigation of SSR characteristics when a STATCOM - ES operating in bus voltage regulation mode is carried out by eigenvalue and damping torque analysis. Transient analysis based on the nonlinear model is also performed to validate the results obtained by conventional methods.
Volume: 8
Issue: 4
Page: 1822-1829
Publish at: 2017-12-01

Effects of Shadowing on LoRa LPWAN Radio Links

10.11591/ijece.v7i6.pp2970-2976
Mohamed Hadi Habaebi , Israth Jahan Chowdhury , Md Rafiqul Islam , Nur Aishah Binti Zainal
LoRaWAN is a long-range, low-power, wireless telecommunications method; expected to play a big role for the Internet of Things. End appliances use LoRaWAN through a single wireless hop to communicate with gateways linked to the Internet that function as transparent bridges relaying messages amongst these end-devices and a central network server. This technology youtes a combination of extended range, low power utilization and protected data communication and is gaining significant traction in IoT networks being deployed by wireless network operators. However, no comprehensive evaluation of the technology exists in the open literature. The main intention of this paper is to investigate the effects of shadowing on LoRaWAN links and analyze the performance in terms of packet loss ratio for different physical layer settings. Results indicate large differences in performance when shadowing is taken into consideration upsetting the expected performance tremendously.
Volume: 7
Issue: 6
Page: 2970-2976
Publish at: 2017-12-01

Electric Filed Intensity of the Lightning Strikes on Lightning Air Terminals Installed on Building Structures

10.11591/ijece.v7i6.pp3105-3113
Irshad Ullah , MNR Baharom , H.M. Luqman , H. Ahmad , Zainab Zainal
Lightning activities are growing up rapidly with global warming. It can affect anything on the earth. All the constructed buildings need proper protection from the harmful effect of lightning. Lightning strike points on different geometrical shapes have been investigated. Lightning strike distribution of different building structure is very important to be studied. In order to analyse the maximum effect of lightning strike pattern is obtained of different air terminals installed on scaled building structures. High voltage impulse generator is used in order to get the impulse voltage. Different numbers of air terminals have been applied to all the shapes in order to see the lightning strike points. Electric field is obtained in order to see its minimum and maximum effect on the entire building structure. Interestingly the phenomenon of lightning air terminal bypasses has been proved in this paper.
Volume: 7
Issue: 6
Page: 3105-3113
Publish at: 2017-12-01

Dielectrophoresis Effect of Dielectric Liquids with Suspended Cellulose Impurities under DC Electric Field

10.11591/ijece.v7i6.pp3254-3261
Muhamad Hafiy Syazwan Zainoddin , Hidayat Zainuddin , Aminudin Aman
For decades, petroleum-based mineral oils are the insulating media conventionally used in the industry, particularly for high voltage (HV) applications. However, due to the disadvantages of mineral oils, there is growing interest in replacing these oils with environmentally friendly alternatives in order to fulfill the demanding requirements of dielectric liquids.  One of the promising substitutes for mineral oils is ester oils. Nevertheless, the implementation of ester oils is not widespread compared with mineral oils due to the lack of understanding on the performance of ester oils in HV applications. Hence, the objective of this study is to investigate the bridging phenomenon of two dielectric liquids with different viscosities: palm fatty acid ester and mineral oil under the influence of direct current electric field. The results show that oil viscosity plays an important role in the formation of cellulose bridge and breakdown behavior.
Volume: 7
Issue: 6
Page: 3254-3261
Publish at: 2017-12-01
Show 1455 of 1953

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration