Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

30,033 Article Results

Fabricating Modish Mobile Application for a Visionless Citizen to Act as a Visioned Citizen

10.11591/ijeecs.v10.i2.pp623-630
Jananee V , Shalini P , Dhivya S
Technology has its wide range of applications in every field potentially even on the Mobile technology. One of the technologies which accomplish the blind person in android mobile is Virtual Reality. In spite of virtual reality is engaged to effectuate the operations, the blind person attention is one of the most important statistics. Although mobile devices include operative features available for amaurotic users, the user interface of the greater part of the mobile apps is designed for sighted people. If they carry out any mistakes to use the apps it may lead to a wrong call. So, one may think of a technology that diminishes the anxiety of a blind person for using apps. The proposed system converts the text into audio for giving the directions to the blind person about the gestures inferred. For such conversion a technique called speech synthesizer is used. Assorted innovative tools are used in mobile phones. Blind people need to confide in normal person for creating and updating a contact. Our project incorporates the gestures from the blind people and confirms the gestures through voice. Gesture conversion is accomplished by using haptic technology. An amaurotic person can create a new contact and they can invoke the contact by using this voice confirmation. During calling if there is multiple contact list, caller setting are initialized and ask the preference from the blind people, progress the voice call.
Volume: 10
Issue: 2
Page: 623-630
Publish at: 2018-05-01

Adaptive Interference Mitigation with User Grouping for Fast Transmission in Cellular Networks

10.11591/ijeecs.v10.i2.pp702-712
Hadhrami Ab. Ghani , Azlan Abd Aziz , Azizul Azizan , Salwani Mohd Daud
Designing uplink systems which group users with adaptive interference mitigation techniques is the objective of this research. Reduction in error rates and improvement in the energy efficiency is expected with this approach in addition to spectral efficiency. This paper reports a study on interference mitigation and transmission designs for groups of users in the uplinks. New formulations for the interference mitigation are produced based on the minimum mean square error and successive interference cancellation approach. By reducing the interference, the energy efficiency can be maintained and improved although the number of users per group increases. The measured error rates of this approach with user grouping achieve gains between 1 to 3 dB against that of the existing approach. With reduced complexity, the proposed scheme should be viable for practical deployment.
Volume: 10
Issue: 2
Page: 702-712
Publish at: 2018-05-01

Resource Allocation in Downlink of LTE using Bandwidth Prediction Through Statistical Information

10.11591/ijeecs.v10.i2.pp680-686
S. Gayathri , R. Sabitha
Long Term Evolution (LTE) is the technology used in modern third and fourth generation mobile wireless cellular networks. Due to the presence of large number of users, mobility and varying channel conditions, proper resource allocation is essential to provide a good user experience and improve the system throughput. In this paper, a resource allocation algorithm is implemented that will use the probabilistic models to predict the channel condition and allocate resources accordingly. Also, the algorithm will support QoS requirements. During the resource allocation, the channel quality information is collected and analyzed to predict the future channel conditions and resource allocation vectors are configured accordingly. The performance of the algorithm is analyzed based upon the data collected. The algorithm is able to provide a reasonable success rate for channel prediction. By using the resource allocation vectors and channel prediction, the algorithm performance also is improved considerably due to the lesser space and time complexity required.
Volume: 10
Issue: 2
Page: 680-686
Publish at: 2018-05-01

Data-Driven Impedance Matching in Multilateral Teleoperation Systems

10.11591/ijeecs.v10.i2.pp713-724
Mohd Syakirin Ramli , Hamzah Ahmad
This paper addresses a tuning approach to improve transparency between master and slave manipulators in a multilateral teleoperation system. The slave manipulators comprised of multi-agents of simple mass are converted into a bilateral system through the passive decomposition technique. There are two main operations being considered, namely; grasping and handling. The object grasping is achieved through consensus control. For handling, an equalizer constructed by a Laguerre function connected in-feedback-loop to the master manipulator is chosen and tuned to achieve impedance matching between both sides of teleoperation. Fictitious Reference Iterative Tuning (FRIT) is adopted to properly tune the selected equalizer. The result shows that by introducing an optimally tuned equalizer, the overall impedance matching and transparency between the single master and multi-slave manipulators are improved. Finally, the effectiveness of the proposed tuning algorithm is presented through a numerical example.
Volume: 10
Issue: 2
Page: 713-724
Publish at: 2018-05-01

Security Mandated Analytics based Route Processing with Digital Signature [SMARPDS] - Pseudonymous Mobile Ad Hoc Routing Protocol

10.11591/ijeecs.v10.i2.pp763-769
K. Vinayakan , M. V. Srinath
There are a lot of speculations going on about the interests for privacy in mobile network. Many research works have been proposed in the aspect and these works concentrate more on the anonymity part and there are quite a few implementations of these research works on some applications. Ad hoc routing protocols must have provision for both anonymity providing nature and restriction of information collection from unauthorized nodes. Till recent times, there are a number of ad hoc routing protocols that have been introduced. But, they have lack security features or authentication features or in some cases both. The lack of proper security features leads to a state of vulnerability which at any given point, will act as a threat element. In this paper, we propose Security Mandated Analytics based Route Processing with Digital Signature protocol [SMARPDS]. It is an anonymous and authentication providing routing protocol in Mobile Ad hoc network. In addition, routes are discovered based on analytics done on the node and its present location in the network. SMARPDS provides authentication during the route discovery and transmission process by employing digital signatures on node front and also on packets front.
Volume: 10
Issue: 2
Page: 763-769
Publish at: 2018-05-01

Robust Vision-based Multiple Moving Object Detection and Tracking from Video Sequences

10.11591/ijeecs.v10.i2.pp817-826
Othman Omran Khalifa , Norun Abdul Malek , Kazi Istiaque Ahmed
Detection of Moving Objects and Tracking is one of the most concerned issue and is being vastly used at home, business and modern applications. It is used to identify and track of an entity in a significant way. This paper illustrates the way to detect multiple objects using background subtraction methods and extract each object features by using Speed-Up Robust Feature algorithm and track the features through k-Nearest Neighbor processing from different surveillance videos sequentially. In the detection of object of each frame, pixel difference is calculated with respect to the reference background frame for the detection of an object which is only suitable for any ideal static condition with the consideration of lights from the environment. Thus, this method will detect the complete object and the extracted feature will be carried out for the tracking of the object in the multiple videos by one by one video. It is expected that this proposed method can commendably abolish the impact of the changing of lights
Volume: 10
Issue: 2
Page: 817-826
Publish at: 2018-05-01

Performance of Cuk-KY Converter Fed Multilevel Inverter for Hybrid Sources

10.11591/ijeecs.v10.i2.pp436-445
V. Vasudevan , K. Balaji
Distributed energy source based electricity generation is an essential factor for the economic growth and development of a country. The photovoltaic, fuel cell and battery based power generation offer a high voltage gain. The DC-DC CUK converter based on both buck and boost mode of operation is proposed for high gain dc link voltage. The hybrid CUK –KY Converter based multilevel inverter is designed and implemented. Here, the main advantages of hybrid boost mode operation of Cuk converter, step up configuration is used which will result in improve conversion voltage ratio and better damping of oscillations. The DC-DC converter voltage has regulated by the maximum power point tracking and PI control based method is used. The cascaded multilevel inverter in hybrid renewable energy production integrating with switched capacitor method is designed. The proposed converter is designed and implemented in MATLAB/SIMULINK environment.
Volume: 10
Issue: 2
Page: 436-445
Publish at: 2018-05-01

A Novel Approach Certificate Revocation in MANET using Fuzzy logic

10.11591/ijeecs.v10.i2.pp654-663
Jayanthi. E , Mohammed Ali Hussain
Due to the advent developments in the Information and Communication Technology (ICT) based environment, Mobile ad hoc networks (MANETs) have fascinated much concentration because of their mobility and easy deployment. At the same time, their wireless and vibrant features make them susceptible to wide range of types of security attacks when compared to the traditional wired networks. The prime challenge is to assure security in the network components and services. To work out the challenge, novel security measures are put forward for effective and secured communication. In our proposed work, we discuss the need for Security in MANET, focusing on certificate revocation. Providing security is challenging tasks due to its key features. Different authentication techniques, Digital certificate and components of Public Key Infrastructure are also discussed. The certificate revocation is a challenging task in MANETs due to absence of centralized repositories and trusted authorities. The different methods of certificate revocation using cluster based mechanism is analyzed and compared. The principle, advantages and disadvantages of certificate revocation are also compared. And the novel Certificate revocation techniques using fuzzy is discussed with reduced overhead.
Volume: 10
Issue: 2
Page: 654-663
Publish at: 2018-05-01

IoT: Electrocardiogram (ECG) Monitoring System

10.11591/ijeecs.v10.i2.pp480-489
Kristine Joyce P. Ortiz , John Peter O. Davalos , Elora S. Eusebio , Dominic M. Tucay
Internet of Things (IoT) has many applications in the medical field. With remote-information gathering, healthcare professionals can evaluate, diagnose and treat patients in remote locations using telecommunications technology. This study aimed to develop a small-scale electrocardiogram (ECG) monitoring device that will measure heart rates and waveforms and send the data in a database and a web server. An ECG acquisition device was developed using a single-lead heart rate monitor sensor and an Arduino microcontroller. A program, which will process, analyze and upload the ECG data is coded using MATLAB and C# programs. The collected information is viewed in a Graphical User Interface (GUI) display, coded using C# and in a webpage. Rapid Application Technology (RAD) was used in the methodology, which began with a quick design of the system. The hardware and software systems underwent a prototyping cycle for development. Once finished, the integration of the system is conducted to construct a complete IoT-based ECG monitoring system. For testing using t-test, a sample size of 18 and a a= 0.05 is used. Testing resulted into t-test values that lie in the non-critical zone for all ECG parameters, denoting that there is no significant difference between the gathered data. The device’s percent reliability in detecting ECG conditions such as normal sinus rhythm, sinus tachycardia, sinus bradycardia and flatline, is 83.33%. The percent difference for the heart rate is 0.35 %, which falls within the acceptable medical standard of 99% accuracy. The device was deemed functional and reliable.
Volume: 10
Issue: 2
Page: 480-489
Publish at: 2018-05-01

Design and Specific Absorption Rate of 2.6 GHz Rectangular-Shaped Planar Inverted-F Antenna

10.11591/ijeecs.v10.i2.pp741-747
Nurul Inshirah Mohd Razali , Norhudah Seman , Nur Ilham Aliyaa Ishak
This article presents the investigation of specific absorption rate (SAR) of a rectangular-shaped planar inverted-F antenna (PIFA) at frequency of 2.6 GHz. Initially, the design antenna is presented with parametric study concerning the dimensions of antenna patch length, shorting plate, ground plane and substrate. The proposed PIFA antenna has -20.46 dB reflection coefficient and 2.383 dB gain. The PIFA’s SAR is correlated with the antenna gain and excitation power. The analysis shows that higher gain contributes to a lower SAR value. While, the higher excitation power causes a higher SAR value. All the design and analysis are performed using the CST Microwave Studio
Volume: 10
Issue: 2
Page: 741-747
Publish at: 2018-05-01

Disparities in the Induced Rain Attenuation between Beacon (Narrowband) and Broadband Satellite Links in Tropical Zones

10.11591/ijeecs.v10.i2.pp687-695
Idrissa Abubakar , Jafri Din , Hong Yin Lam
The utilisation of higher frequency bands above 10 GHz by the satellite industries to provide the bandwidth (BW) required for broadband multimedia services, video conferencing, direct-to-home TV programmes and IP data requires the understanding of atmospheric losses and good link planning for satellite-to-earth links. The trade-off between the service availability, data rate and BW determine the type of modulation scheme and error corrections to be employed. These services also depend on the link performance under adverse atmospheric conditions, especially rain-induced attenuation. In this research, study measurements were conducted on space-to-earth satellite links using the beacon narrowband and broadband IP carrier signals of a Nigcomsat-1R satellite operating at 42.5°E. A VSAT receiving terminal at a latitude of 7.4°N, longitude of 9.04°E and altitude of 334 m above sea level was utilised to quantify the rain-induced attenuation of both the beacon and broadband signals during rain events. The measurements were then compared with the link performance under clear sky conditions. The performance revealed that, when compared with the broadband signal, the induced rain attenuation on beacon signal presented a disparity in the responses, resulting in significant variations of 10.14 dB in the carrier-to-noise ratio (C/N) and 17.42 dB in the received signal level at a Ku-band frequency of 12.518 GHz. These observations were also compared with the Crane global rain map and ITU-R P.618-12. Both models disagreed with the measurement values for Abuja, Nigeria.
Volume: 10
Issue: 2
Page: 687-695
Publish at: 2018-05-01

A Review on the Reclamation Technologies for Service-Aged Transformer Insulating Oils

10.11591/ijeecs.v10.i2.pp426-435
Sharin Ab Ghani , Zulkarnain Ahmad Noorden , Nor Asiah Muhamad , Hidayat Zainuddin , Mohd Aizam Talib
Power transformers are the backbone of electricity transmission and distribution systems throughout the world. The price of power transformers is exorbitant (costing millions of dollars per unit) and therefore, frequent maintenance is necessary to ensure that these systems are highly reliable during their operation. The service life of mineral insulating oils is typically 30 to 40 years for power transformer applications. However, all insulating oils (regardless of their type) are subjected to thermal, electrical and chemical degradation, which will deteriorate the oil-paper insulating system and consequently reduce the capability of the oil as an electrical insulator. For these reasons, service-aged insulating oils are treated by two types of processes (i.e. reclamation and reconditioning) in order to prolong the service life of these oils. Reclamation (regeneration) is used to treat insulating oils with high levels of acidity and sludge. In this paper, a brief review on the reclamation technologies used to treat service-aged insulating oils is presented, covering various aspects such as the standard test methods that need to be complied with, the types of adsorbents used to reduce acidity and sludge of the used insulating oils, as well as the findings of several key studies related to the evaluation of the effectiveness of the reclamation process. This review will indeed benefit researchers and practitioners in this field since it provides an overall picture of the recent progress in reclamation technologies for service-aged transformer insulating oils
Volume: 10
Issue: 2
Page: 426-435
Publish at: 2018-05-01

Q-switched Erbium Doped Fiber Laser Incorporating Antimony (III) Telluride in Polyvinyl Alcohol as Saturable Absorber

10.11591/ijeecs.v10.i2.pp409-415
Ezzatul Irradah Ismail , S Muhammad Ashraf Zolkopli , Muhammad Quisar Lokman , Hafizal Yahaya , Sulaiman Wadi Harun , Fauzan Ahmad
In this paper, we demonstrated a Q-switched erbium doped fiber laser (EDFL) incorporating Antimony (III) Telluride (Sb2Te3) in polyvinyl alchohol (PVA) as passive saturable absorber.  The saturable absorber were fabricated by dissolving Antimony (III) Telluride powder into PVA solution and dry in the ambient temperature for 48 hours. Then, 1 mm2 x 1 mm2 Sb2Te3-PVA film based saturable absorber were sandwiched in between FC/PC ferrule for Q-switched laser generation. The stable and self-started Q-switched laser operates at center wavelength 1560 nm with 3 dB bandwidth of 0.23 nm. The laser operates at pump power of 29.3 mW until 84.9 mW with repetition rate of 20.99 kHz to 89.29 kHz and pulse width of 13.95 µs to 5.10 µs. At maximum pump power, the laser able to achieve pulse energy of 62.72 nJ and high signal to noise ratio of 71.4
Volume: 10
Issue: 2
Page: 409-415
Publish at: 2018-05-01

Preliminary Study of a New Topology Permanent Magnet Flux Switching Motor for Electric Buses

10.11591/ijeecs.v10.i2.pp446-455
M. F. Omar , E. Sulaiman , M. Z. Ahmad , J. A. Rani , Aravind CV
Electric buses (EBs) as public transit that have been introduced in modern countries recently are an alternative effort to reduce climate change and environmental impacts of fossil fuels. One example of the successfully developed motor for EBs is interior permanent magnet synchronous motor (IPMSM) with merits of heat dissipating, high torque per frame size and reliability influence by absence of brushes. However, the three-phase armature windings are wounded in the form of distributed windings, results in much copper loss, high coil end length and reduced the efficiency. The embedded rectangular magnets inside the rotor make rotor less robust, increased rotor weight and reduced the torque and power density. The present IPMSM has a complex structure which is relatively difficult to manufacture and tough in optimization process. The 7.0 kg volume of PM used in IPMSM is very high, which increases the cost of the machine. Therefore, a new topology of permanent magnet flux switching motor using wedge-shaped PM and single stator structure with the advantages of simple stator design, robust rotor structure, high of torque and power, and high efficiency is proposed. The design, flux linkage, back-emf, cogging torque, average torque, speed, and power of this new topology are investigated by JMAG-Designer version 14.1 via a 2D-FEA. The initial design of proposed motor produces torque and power of 905.9 Nm and 57.75 kW, respectively.
Volume: 10
Issue: 2
Page: 446-455
Publish at: 2018-05-01

Palm Vein Pattern Visual Interpretation Using Laplacian and Frangi-Based Filter

10.11591/ijeecs.v10.i2.pp578-586
Zarina Mohd Noh , Abdul Rahman Ramli , Marsyita Hanafi , M Iqbal Saripan , Ridza Azri Ramlee
Detection of palm vein pattern through image processing techniques is an open problem as performance of each technique is closely related to the sample image gathered for the processing. The detected palm vein pattern is useful for further analysis in biometrics application and medical purpose. This paper aims to investigate the application of Laplacian filter and Frangi-based filter in detecting vein pattern contained in a near infrared illuminated palm image. Both filtering techniques are applied independently to two palm image databases to compare their performance in translating vein pattern in the image visually. Through empirical study, it is observed that Laplacian filter can translate the vein pattern in the image effectively. But pre-processings involved before the application of Laplacian filter need to be performed to accurately translate the vein pattern. The implementation of Frangi-based filter, while simplifying the detection process without the need of extra pre-processing, resulted in only certain vein pattern detected. Using pixel-by-pixel objective assessment, the rate for Laplacian filter in detecting vein pattern are generally more than 85% compared to Frangi-based filter; where it ranges from 60% to 100%.
Volume: 10
Issue: 2
Page: 578-586
Publish at: 2018-05-01
Show 1462 of 2003

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration