Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,287 Article Results

Driver Drowsiness Detection System Using Sensors

10.11591/ijict.v6i3.pp139-145
Kusuma Kumari B.M , Sampada Sethi , Ramakanth Kumar P , Nishant Kumar , Atulit Shankar
A low-cost and simple distributed sensors model that is particularly suitable for measuring eye blink of the driver, accident and hand position on a steering wheel. These sensors can be used in automotive active safety systems that aim at detecting driver’s fatigue, a major issue to prevent road accidents. The key point of this approach is to design a prototype of sensor units, so that it can serve as platform for integrating different kinds of sensors into the steering wheel. Since the sensors are attached to the steering wheel, therefore they can’t be detached by the driver. It will also detect dangerous stylish driving which may lead to fatal accidents. The major drawback is that the eye blink sensors frame worn by the driver can be removed causing the sensor non-operational. The outcome is that the vibrator attached to eye blink sensor’s frame vibrates if the driver shuts his eyes for approximately 3 seconds and also the LCD displays the respective warning message. The wheel is slowed or stopped depending on the condition. This is accompanied by the vehicle’s owner being notified through the GSM module, so the owner can retrieve the driver’s location, photograph and a list of nearby police stations through an android mobile application. Therefore, driver can be alerted during drowsiness and the owner can be notified simultaneously.
Volume: 6
Issue: 3
Page: 139-145
Publish at: 2017-12-01

Cultural Literacy Based Critical Reading Teaching Material with Active Readerstrategy for Junior High School

10.11591/ijere.v6i4.10775
Vismaia S Damaianti , Lira Fessia Damaianti , Yeti Mulyati
This article describes the findings of a study aimed at producing a set of cultural literacy-oriented critical reading teaching material. This material is developed as a countermeasure to the increasingly thin sensitivity of society, especially the students toward noble values of religion, custom, and culture. With this material student get a significant critical understanding of the discourse with the content of noble value of Indonesian culture. The understanding is attained by students through active reader strategy. There are four important principles developed in understanding the text through this strategy, namely 1) building basic understanding of the text, 2) conducting reading activities in chronological order of the text, 3) identifying the style and language of the text, and 4) critically deepening the understanding of the text. The emphasis on cultural critical understanding became the focus of this research. Thus, critical reading question technique 501 is required. With this technique student can predict causation, establish logical and emotive understanding, and predict the implications of ideas. The implementation of development of this teaching material is based on the stages of Design Based Research. Data is obtained through expert scales and trials to junior high school students in Bandung. The result of this research is a critical reading textbook based on cultural literacy with active reader strategy that is effective to be used for junior high school students. The implication of this research is the acquisition of students' sensitivity toward noble values of religion, custom, and culture that can be internalized in their lives.
Volume: 6
Issue: 4
Page: 312-317
Publish at: 2017-12-01

Design and Implementation of Swam Robotics using Flood Fill Algorithm

10.11591/ijra.v6i4.pp269-276
Mary swarna latha gade , GAjitha GAjitha , Deepthi. S
Swam Intelligence provides a basis with which it is possible to explore collective (or distributed) problem solving without centralized control or the provision of a global model. This paper presents design and implementation of swam robotics in a multi-agent environment. At the beginning, robot agents are ignorant of the maze. The robots are programmed with Flood fill algorithm to solve maze. The robot scans maze and stores the values in EEPROM. The robot agent shares the information to other robot agents through wireless communication. The proposed flood fill algorithm is found to be effective tool for solving maze of moderate size.
Volume: 6
Issue: 4
Page: 269-276
Publish at: 2017-12-01

Application of Unified Power Flow Controller to Improve Steady State Voltage Limit

10.11591/ijra.v6i4.pp277-285
Samina. E. Mubeen , Baseem Khan , R. K. Nema
This paper utilizes the voltage source model of Unified Power Flow Controller (UPFC) and examines its abilities in mitigating the steady state stability margins of electric power system. It analyzes its behavior for different controls strategies and proposes the most efficient mode of controlling the controller for voltage stability enhancement. A systematic analytical methodology based on the concept of modal analysis of the modified load flow equations is employed to identify the area in a power system which is most prone voltage instability. Also to identify the most effective point of placement for the UPFC, a computer program has been developed using MATLAB. The results of analysis on 14 bus system is presented here as a case study.
Volume: 6
Issue: 4
Page: 277-285
Publish at: 2017-12-01

A Discrete Delay N-decomposition Approach for Delay-Dependent Stability of Generator Excitation Control System with Constant Communication Delays

10.11591/ijra.v6i4.pp234-240
S. Manikandan , Priyanka Kokil
This paper deals with problem of delay in stability analysis of network controlled generator excitation system. Delays exist in communication channel in network based control between system and controller. A discrete delay N-decomposition is used to compute delay margin for generator excitation system with constant delay which is easier when compared to analytical method. A Lyapunov krasovskii function is constructed for given time delay generator excitation system and linear matrix inequalities techniques are used. Generator excitation system is employed with proportional integral controller, delay margin calculated for various values of gain of proportional integral controller. Theoretically obtained results are verified using simulation studies.
Volume: 6
Issue: 4
Page: 234-240
Publish at: 2017-12-01

Efficacy of GWO Optimized PI and Lead-lag Controller for Design of UPFC based Supplementary Damping Controller

10.11591/ijra.v6i4.pp241-251
Narayan Nahak , Ranjan Kumar Mallick
On line tuning of FACTS based damping controller is a vital decisive task in power system. In this regard two things need to be addressed, one is selection of a proper controller and another one is selection of a powerful optimization technique. In this work Grey Wolf Optimizer (GWO) technique is proposed to tune parameters of PI and lead lag controller based on UPFC to damp intra plant and inter area electromechanical oscillations with single and multi machine power system. A broad comparison has been performed with eigen value analysis between optimized PI and lead lag damping controller subject to different disturbances in power system. The recently revealed GWO, standard PSO and DE techniques are explicitly employed to tune UPFC based PI and lead-lag controller parameters. The system response predicts that performance of GWO is much better than PSO and DE techniques, and also lead lag controller is a better choice than PI controller pertaining to design of UPFC based damping controller.
Volume: 6
Issue: 4
Page: 241-251
Publish at: 2017-12-01

NFC Secured Offline Password Storage

10.11591/ijeecs.v8.i3.pp730-732
Senthil Kumar , V. Mathivanan
In this paper is all about constructing a device called “One-WORD” that aims to solve this problem. One-word is an offline password keeper aimed at saving and encrypting the passwords in a more secure manner. The main device contains the encrypted passwords while a secure NFC smartcard and a personal pin-code allows the decryption. Even if an attacker is able to get hold the smartcard, or the device it is completely useless without the personal code. 
Volume: 8
Issue: 3
Page: 730-732
Publish at: 2017-12-01

Simulation Analysis for Consistent Path Identification to Refine the Network Lifetime

10.11591/ijeecs.v8.i3.pp674-678
G. Vennila
As the demand for Mobile Ad hoc Network (MANET) applications grows, so does their use of many essential services where node consistent and stability of the communication paths are of great importance. In this scheme, we propose Simulation Analysis for Consistent Path Identification to Refine the Network Lifetime (CPIR). This technique offers more stable path and transmits the data through the consistent nodes. This article is focused on protecting the route from the inconsistent node in mobile communications to improve the network performance and reduce the energy consumption in the network. The simulation results demonstrate that CPIR provided reduce the energy utilization and improved both the longer lifetimes and increased number of packets delivered.
Volume: 8
Issue: 3
Page: 674-678
Publish at: 2017-12-01

The Learning Syntax Through Edmodo in the Beginners Class

10.11591/ijere.v6i4.10773
Sugito Sugito , Sri Mulyani Endang Susilowati , Hartono Hartono , Supartono Supartono
Integrating ICT (Information and Communications Technology) in the learning process is a necessity for a teacher in welcoming the 21st century. Knowledge and modern technology require teachers to learn how to use the technology in their teaching. Edmodo application is a very useful technology product in the learning process. Successful use of Edmodo applications in learning is influenced by: (1) teacher factors that include education, length of teaching, age, gender, frequent training, openness of teachers in accessing information, teaching places (city or village), and participation in the organization teachers and pedagogic competencies of educators in delivering materials, (2) facilities and infrastructure factors: building, room, hardware, software, internet connection, infrastructure to school, and instruction on using Edmodo application (3) learner factors that include motivation, courage to explore using Edmodo, and frequency of use of Edmodo app.
Volume: 6
Issue: 4
Page: 299-305
Publish at: 2017-12-01

Identifying the Optimal Controller Strategy for DC Motors

10.11591/ijra.v6i4.pp252-268
M. R. Qader
The aim of this study is to design a control strategy for the angular rate (speed) of a DC motor by varying the terminal voltage. This paper describes various designs for the control of direct current (DC) motors. We derive a transfer function for the system and connect it to a controller as feedback, taking the applied voltage as the system input and the angular velocity as the output. Different strategies combining proportional, integral, and derivative controllers along with phase lag compensators and lead integral compensators are investigated alongside the linear quadratic regulator. For each controller transfer function, the step response, root locus, and bode plot are analysed to ascertain the behaviour of the system, and the results are compared to identify the optimal strategy. It is found that the linear quadratic controller provides the best overall performance in terms of steady-state error, response time, and system stability. The purpose of the study that took place was to design the most appropriate controller for the steadiness of DC motors. Throughout this study, analytical means like tuning methods, loop control, and stability criteria were adopted. The reason for this was to suffice the preconditions and obligations. Furthermore, for the sake of verifying the legitimacy of the controller results, modelling by MATLAB and Simulink was practiced on every controller.
Volume: 6
Issue: 4
Page: 252-268
Publish at: 2017-12-01

Islanding Detection in a Distribution System with Modified DG Interface Controller

10.11591/ijape.v6.i3.pp133-141
Abbineni Sai Subhadra , P. Linga Reddy , Shailesh B. Modi
Islanding detection of Distributed Generation (DG) is considered as one of the most important aspects when interconnecting DGs to the distribution system. It was the crucial problem in distributed generation. This detection phenomenon having a great importance. These detection methods are divided into active and passive islanding detection. These two methods are based on changing in parameters such as frequency, voltage and current harmonics. But these methods have some challenges such as reduction in power quality and large Non Detection Zone (NDZ). In this paper, the proposed method is change of Total Harmonic Distortion (THD) will be studied for islanding detection diagnosis. The studied system was considered by following the standard IEEE-1547 and UL-1741. The system was simulated using MATLAB/ SIMULINK.
Volume: 6
Issue: 3
Page: 133-141
Publish at: 2017-12-01

Research Designs and Methods in Self-assessment Studies: A Content Analysis

10.11591/ijere.v6i4.8921
Serafina Pastore
This paper focuses on self-assessment practices in the higher education field. In the assessment for learning perspective, self-assessment is related to reflection, metacognition, and self-regulation: all these aspects are considered as fundamental prerequisites for students’ future professional development. Despite the recognition of self-assessment educational benefits and implications, research so far lags behind the rise in the rates of align literature review, research design, and methodology. The study attempts to address this gap in the literature. Based on a critical review of institutional changes in the European higher education context, the paper reflected on main issues and problems faced by educational research on self-assessment. It then tried to identify future research pathways on this topic.
Volume: 6
Issue: 4
Page: 257-264
Publish at: 2017-12-01

Execution Evaluation of End-to-end Security Conventions in an Internet of Things

10.11591/ijeecs.v8.i3.pp719-720
Sudha Mishra , A. Arivazhagan
Remote Sensor Networks are bound to assume a crucial part in the cutting edge Internet, which will be described by the Machine-to-Machine worldview, as indicated by which; installed gadgets will effectively trade data, therefore empowering the improvement of creative applications. It will add to declare the idea of Internet of Things, where end to-end security speaks to a key issue. In such setting, it is essential to comprehend which conventions can give the correct level of security without loading the restricted assets of compelled systems. This paper displays an execution examination between two of the most broadly utilized security conventions: IPSec and DTLS. We give the investigation of their effect on the assets of gadgets.
Volume: 8
Issue: 3
Page: 719-720
Publish at: 2017-12-01

Steady State and Transient Analysis of Grid Connected Doubly Fed Induction Generator Under Different Operating Conditions

10.11591/ijape.v6.i3.pp171-192
Sukhwinder Singh Dhillon , Jagdeep Singh Lather , Sanjay Marwaha
This paper present steady state and dynamic (Transient) models of the doubly fed induction generator connected to grid. The steady state model of the DFIAG (doubly fed asynchronous induction generator) has been constructed by referring all the rotor quantities to stator side. With the help of MATLAB programming simulation results are obtained to depict the steady state response of electromechanical torque, rotor speed, stator and rotor currents, stator and rotor fluxes, active and reactive drawn and delivered by Doubly Fed Asynchronous Induction Machine (DFAIM) as it is operating in two modes i.e. generator and motor. The mathematical steady state and transient model of the DFIAM is constructed for three basic reference frames such as rotor, stator and synchronously revolving reference frame using first order deferential equations. The effect of unsaturated and saturated resultant flux on the mutual inductance is also taken into account to deeply understand the dynamic response of the machine. The steady state and dynamic response of the DFAIG are compared for different rotor voltage magnitudes. Also, the effect of variations in mechanical input torque, stator voltage variations are simulated to predict the stator and rotor currents, active and reactive power, electromagnetic torque and rotor speed variations.
Volume: 6
Issue: 3
Page: 171-192
Publish at: 2017-12-01

Finding Knowledge from Indonesian Traditional Medicine using Semantic Web Rule Language

10.11591/ijece.v7i6.pp3674-3682
Ridowati Gunawan , Khabib Mustofa
One of the natural resources in Indonesia is a lot of plants which can be used in healing diseases. Thosekinds of plants can be used in “Jamu”. Jamu is a name given to traditional medicine in Indonesia. Usually Jamu is composed from several plants as ingredients. Particularly, some parts of the plant like the leaves, roots, or branches have different purpose in Jamu. Nowadays the knowledge about Jamu can be known by building Ontology. Ontology can be built and developed to enrich the content. Knowledge in Ontology is built by several rules using Semantic Web Rule Language (SWRL).Knowledge gained from SWRL is easily searchable so that users can double check the results obtained.
Volume: 7
Issue: 6
Page: 3674-3682
Publish at: 2017-12-01
Show 1462 of 1953

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration