Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,082 Article Results

Performance of Pilot-Aided 3D- OFDM Channel Estimation using Different Antenna Configurations

10.11591/ijeecs.v8.i1.pp77-84
Dinesh N. Bhange , Chandrashekhar G. Dethe
This paper aims, a 3D-Pilot Aided Multi-Input Multi-Output Orthogonal Frequency Division Multiplexing (MIMO-OFDM) Channel Estimation (CE) for Digital Video Broadcasting -T2 (DVB-T2)for the 5 different proposed block and comb pilot patterns model and performed on different antenna configuration. The effects of multi-transceiver antenna on channel estimation are addressed with different pilot position in frequency, time and the vertical direction of spatial domain framing. This paper first focus on designing of 5- different proposed spatial correlated pilot pattern model with optimization of pilot overhead. Then it demonstrates the performance comparison of Least Square (LS) &Linear Minimum Mean Square Error (LMMSE), two linear channel estimators for 3D-Pilot Aided patterns on different antenna configurations in terms of Bit Error Rate. The simulation results are shown for Rayleigh fading noise channel environments. Also, 3x4 MIMO configuration is recommended as the most suitable configuration in this noise channel environments.
Volume: 8
Issue: 1
Page: 77-84
Publish at: 2017-10-01

Energy Power Plant in Electric Power Distribution Systems Equipping With Distance Protection

10.11591/ijeecs.v8.i1.pp192-198
Hui Hwang Goh , Sy yi Sim , Dahir Khere Diblawe , Mortar Mohamed Ali , Chin Wan Ling , Qing Shi Chua , Kai Chen Goh
This paper suggests the theory of distance protection criteria in power distribution systems for power plant generation. Multi-developed countries have energy power plants that placed in remote areas which are far from the grid line. Hence, they should be coupled to the low power transportation systems necessarily. While higher-rating relays are adopted to preserve feeders at power substations, fuses are merely obtainable outside on feeder channel. The safe system process, space protection is dispatched to save feeders. In this review, feeders with distance relays are equipped, together with over-current protection relays and fuses. Energy power plant having distance protection system is designed the implemented system was a 6-MW unit of compressed power energy reproduction. The sample feeder was shortened to be equal four-bus experiment feeder for transmitting resolution. The fault currents have chances adopted to form protecting regions of distance relays. Protection of the power line through the designed power plants for distance relaying can decrease problem in relay location because of the impedance-based location of the distance relay. 
Volume: 8
Issue: 1
Page: 192-198
Publish at: 2017-10-01

Assessment of Power System Risk in Cyber-Attacks in View of the Role Protection Systems

10.11591/ijeecs.v8.i1.pp184-191
Hui Hwang Goh , Sy yi Sim , Omar Abdi Mohamed , Ahmed Farah Mohamed , Chin Wan Ling , Qing Shi Chua , Kai Chen Goh
This paper presents a risk assessment method for assessing the cyber security of power systems in view of the role of protection systems. This paper examines the collision of transmission and bus line protection systems positioned in substations on the cyber-physical performance of the power systems. The projected method simulates the physical feedback of power systems to hateful attacks on protection system settings and parameters. The relationship between protection device settings, protection logic, and circuit breaker logic is analyzed. The expected load reduction (ELC) indicator is used in this paper to determine potential losses in the system due to cyber attacks. The Monte Carlo simulation is used to calculate ELC’s account to assess the capabilities of the attackers and bus arrangements are changed. The influence of the projected risk assessment method is illustrated by the use of the 9-bus system and the IEEE-68 bus system.
Volume: 8
Issue: 1
Page: 184-191
Publish at: 2017-10-01

Fault Location Techniques in Electrical Power System-A Review

10.11591/ijeecs.v8.i1.pp206-212
Hui Hwang Goh , Sy yi Sim , Mohamad Amirul Hafiz Mohamed , Abdul Khairi Abdul Rahman , Chin Wan Ling , Qing Shi Chua , Kai Chen Goh
Electric fault is the main challenge in the process of providing continues electric supply. Fault can occur at anytime and anywhere. Due to the fault causes are mainly based on natural disaster or accident. Most fault occurrence hardly predicted nor avoided. Therefore, a quick response fault detection is necessary to ensure that the fault area is maintained to ensure a continuous power supply system. Hence, a system is required to detect and locate the position of the fault in the power system especially in the transmission line and distribution line. This paper will review the type of fault that possibly occurs in an electric power system, the type of fault detection and location technique that are available together with the protection device that can be utilized in the power system to protect the equipment from electric fault. 
Volume: 8
Issue: 1
Page: 206-212
Publish at: 2017-10-01

Multiset Controlled Grammars: A Simple Method in Regulated Rewriting Theory

10.11591/ijeecs.v8.i1.pp36-42
Salbiah Ashaari , Sherzod Turaev , M. Izzuddin M. Tamrin , Abdurahim Okhunov , Tamara Zhukabayeva
This study focus on defining a new variant of regulated grammars called multiset controlled grammars as well as investigating their computational power. We apply a constructive theoretical approach; the intent of which is to provide new theories based on computational methods where the results are appeared in the form of examples, lemmas and theorems. In the study, we have found that multiset is powerful and yet a simple method in regulated rewriting theory. We have proved that multiset controlled grammars are at least as powerful as additive valence grammars, and they are at most powerful as matrix grammars.
Volume: 8
Issue: 1
Page: 36-42
Publish at: 2017-10-01

Chaos Embedded Symbiotic Organisms Search Technique for Optimal FACTS Device Allocation for Voltage Profile and Security Improvement

10.11591/ijeecs.v8.i1.pp146-153
Mohamad Khairuzzaman Mohamad Zamani , Ismail Musirin , Saiful Izwan Suliman , Tarek Bouktir
Due to the ever-increasing energy demand, power system operators have attempted to cope with these demands while keeping the power system remain operable. Economic constraints have forced the power system operator to abandon their effort in expanding the power system. The increased load demand can cause the power system to suffer from voltage instability and voltage collapse, especially during contingency condition. Hence, a strategy is required to maintain the steady state operation of a power system. Various research has been conducted to tackle this problem. Therefore, this paper presents the implementation of Chaos Embedded Symbiotic Organisms Search technique to solve optimal FACTS device allocation problem in power transmission system. Various practical constraints are also considered in the optimisation process to emulate the real-life constraints in power system. The optimisation process is conducted on a 26-bus IEEE RTS has validated that the results obtained has not violated the power system stability. The results provided by the proposed optimisation technique has successfully improved the voltage profile and voltage security in the system. Comparative studies are also conducted involving Particle Swarm Optimization and Evolutionary Programming technique resulting good results agreement and superiority of the proposed technique. Results obtained from this study would be beneficial to the power system operators regarding optimisation in power system operation for the implementation in real power transmission network.
Volume: 8
Issue: 1
Page: 146-153
Publish at: 2017-10-01

Internet of Things: Surveys for Measuring Human Activities from Everywhere

10.11591/ijece.v7i5.pp2474-2482
Amine Rghioui , Abdelmajid Oumnad
The internet of things (IoT), also called internet of all, is a new paradigm that combines several technologies such as computers, the internet, sensors network, radio frequency identification (RFID), communication technology and embedded systems to form a system that links the real worlds with digital worlds. With an increase in the deployment of smart objects, the internet of things should have a significant impact on human life in the near future. To understand the development of the IoT, this paper reviews the current research of the IoT, key technologies, the main applications of the IoT in various fields, and identifies research challenges. A main contribution of this review article is that it summarizes the current state of the IoT technology in several areas, and also the applications of IoT that cause side effects on our environment for monitoring and evaluation of the impact of human activity on the environment around us, and also provided an overview of some of the main challenges and application of IoT. This article presents not only the problems and challenges of IoT, but also solutions that help overcome some of the problems and challenges.
Volume: 7
Issue: 5
Page: 2474-2482
Publish at: 2017-10-01

Raman Pumping as an Energy Efficient Solution for NyWDM Flexible-grid Elastic Optical Networks

10.11591/ijece.v7i5.pp2627-2634
Arsalan Ahmad , Andrea Bianco , Vittorio Curri , Guido Marchetto , Sarosh Tahir
This paper investigates transparent wavelength routed optical networks using three different fiber types NZDSF, SMF and PSCF - and validates the effectiveness of Hybrid Raman/EDFA Fiber Amplification (HFA) with different pumping levels, up to the moderate 60% pumping regime. Nodes operate on the basis of flexible-grid elastic NyWDM transponders able to adapt the modulation format to the quality-of-transmission of the available lightpath, exploiting up to five 12.5 GHz spectral slots. Results consider a 37- node Pan-European network for variable Raman pumping level, span length and average traffic per node. We show that HFA in moderate pumping regime reduces the power consumption and enhances spectral efficiency for all three fiber types with particular evidence in NZDSF. In essence to that, introduction of HFA is also beneficial to avoid blocking for higher traffic loads.
Volume: 7
Issue: 5
Page: 2627-2634
Publish at: 2017-10-01

Hybrid Method HVS-MRMR for Variable Selection in Multilayer Artificial Neural Network Classifier

10.11591/ijece.v7i5.pp2773-2781
Ben-Hdech Adil , Ghanou Youssef , El Qadi Abderrahim
The variable selection is an important technique the reducing dimensionality of data frequently used in data preprocessing for performing data mining. This paper presents a new variable selection algorithm uses the heuristic variable selection (HVS) and Minimum Redundancy Maximum Relevance (MRMR). We enhance the HVS method for variab le selection by incorporating (MRMR) filter. Our algorithm is based on wrapper approach using multi-layer perceptron. We called this algorithm a HVS-MRMR Wrapper for variables selection. The relevance of a set of variables is measured by a convex combination of the relevance given by HVS criterion and the MRMR criterion. This approach selects new relevant variables; we evaluate the performance of HVS-MRMR on eight benchmark classification problems. The experimental results show that HVS-MRMR selected a less number of variables with high classification accuracy compared to MRMR and HVS and without variables selection on most datasets. HVS-MRMR can be applied to various classification problems that require high classification accuracy.
Volume: 7
Issue: 5
Page: 2773-2781
Publish at: 2017-10-01

Optimized High-Utility Itemsets Mining for Effective Association Mining Paper

10.11591/ijece.v7i5.pp2911-2918
K Rajendra Prasad
Association rule mining is intently used for determining the frequent itemsets of transactional database; however, it is needed to consider the utility of itemsets in market behavioral applications. Apriori or FP-growth methods generate the association rules without utility factor of items. High-utility itemset mining (HUIM) is a well-known method that effectively determines the itemsets based on high-utility value and the resulting itemsets are known as high-utility itemsets. Fastest high-utility mining method (FHM) is an enhanced version of HUIM. FHM reduces the number of join operations during itemsets generation, so it is faster than HUIM. For large datasets, both methods are very expenisve. Proposed method addressed this issue by building pruning based utility co-occurrence structure (PEUCS) for elimatination of low-profit itemsets, thus, obviously it process only optimal number of high-utility itemsets, so it is called as optimal FHM (OFHM). Experimental results show that OFHM takes less computational runtime, therefore it is more efficient when compared to other existing methods for benchmarked large datasets.
Volume: 7
Issue: 5
Page: 2911-2918
Publish at: 2017-10-01

Multi Objective Directed Bee Colony Optimization for Economic Load Dispatch With Enhanced Power Demand and Valve Point Loading

10.11591/ijece.v7i5.pp2382-2391
S.K. Gachhayat , Saroj Kumar Dash , Priyambada Ray
Earlier economic emission dispatch methods for optimizing emission level comprising carbon monoxide, nitrous oxide and sulpher dioxide in thermal generation, made use of soft computing techniques like fuzzy,neural network,evolutionary programming,differential evolution and particle swarm optimization etc..The above methods incurred comparatively more transmission loss.So looking into the nonlinear load behavior of unbalanced systems following differential load pattern prevalent in tropical countries like India,Pakistan and Bangladesh etc.,the erratic variation of enhanced power demand is of immense importance which is included in this paper vide multi objective directed bee colony optimization with enhanced power demand to optimize transmission losses to a desired level.In the current dissertation making use of multi objective directed bee colony optimization with enhanced power demand technique the emission level versus cost of generation has been displayed vide figure-3 & figure-4 and this result has been compared with other dispatch methods using valve point loading(VPL) and multi objective directed bee colony optimization with & without transmission loss.
Volume: 7
Issue: 5
Page: 2382-2391
Publish at: 2017-10-01

A New Approach of Iris Detection and Recognition

10.11591/ijece.v7i5.pp2530-2536
Rubel Biswas , Jia Uddin , Md. Junayed Hasan
This paper proposes an IRIS recognition and detection model for measuring the e-security. This proposed model consists of the following blocks: segmentation and normalization, feature encoding and feature extraction, and classification. In first phase, histogram equalization and canny edge detection is used for object detection. And then, Hough Transformation is utilized for detecting the center of the pupil of an IRIS. In second phase, Daugmen’s Rubber Sheet model and Log Gabor filter is used for normalization and encoding and as a feature extraction method GNS (Global Neighborhood Structure) map is used, finally extracted feature of GNS is feed to the SVM (Support Vector Machine) for training and testing. For our tested dataset, experimental results demonstrate 92% accuracy in real portion and 86% accuracy in imaginary portion for both eyes. In addition, our proposed model outperforms than other two conventional methods exhibiting higher accuracy.
Volume: 7
Issue: 5
Page: 2530-2536
Publish at: 2017-10-01

Identity-Based Blind Signature Scheme with Message Recovery

10.11591/ijece.v7i5.pp2674-2682
Salome James , T. Gowri , G.V. Ramesh Babu , P. Vasudeva Reddy
Blind signature allows a user to obtain a signature on a message without revealing anything about the message to the signer. Blind signatures play an important role in many real world applications such as e-voting, e-cash system where anonymity is of great concern. Due to the rapid growth in popularity of both wireless communications and mobile devices, the design of secure schemes with low-bandwidth capability is an important research issue. In this paper, we present a new blind signature scheme with message recovery in the ID-based setting using bilinear pairings over elliptic curves. The proposed scheme is unforgeable with the assumption that the Computational Diffie-Hellman problem is hard. We compare our scheme with the related schemes in terms of computational and communicational point of view.
Volume: 7
Issue: 5
Page: 2674-2682
Publish at: 2017-10-01

Insights to Problems, Research Trend and Progress in Techniques of Sentiment Analysis

10.11591/ijece.v7i5.pp2818-2822
Kumar P. K. , Nandagopalan S.
The research-based implementations towards Sentiment analyses are about a decade old and have introduced many significant algorithms, techniques, and framework towards enhancing its performance. The applicability of sentiment analysis towards business and the political survey is quite immense. However, we strongly feel that existing progress in research towards Sentiment Analysis is not at par with the demand of massively increasing dynamic data over the pervasive environment. The degree of problems associated with opinion mining over such forms of data has been less addressed, and still, it leaves the certain major scope of research. This paper will brief about existing research trends, some important research implementation in recent times, and exploring some major open issues about sentiment analysis. We believe that this manuscript will give a progress report with the snapshot of effectiveness borne by the research techniques towards sentiment analysis to further assist the upcoming researcher to identify and pave their research work in a perfect direction towards considering research gap.
Volume: 7
Issue: 5
Page: 2818-2822
Publish at: 2017-10-01

Economic Dispatch Using Quantum Evolutionary Algorithm in Electrical Power System Involving Distributed Generators

10.11591/ijece.v7i5.pp2365-2373
Ni Ketut Aryani , Adi Soeprijanto , I Made Yulistya Negara , Mat Syai’in
Unpredictable increase in power demands will overload the supply subsystems and insufficiently powered systems will suffer from instabilities, in which voltages drop below acceptable levels. Additional power sources are needed to satisfy the demand. Small capacity distributed generators (DGs) serve for this purpose well. One advantage of DGs is that they can be installed close to loads, so as to minimise loses. Optimum placements and sizing of DGs are critical to increase system voltages and to reduce loses. This will finally increase the overall system efficiency. This work exploits Quantum Evolutionary Algorithm (QEA) for the placements and sizing. This optimisation targets the cheapest generation cost. Quantum Evolutionary Algorithm is an Evolutionary Algorithm running on quantum computing, which works based on qubits and states superposition of quantum mechanics. Evolutionary algorithm with qubit representation has a better characteristic of diversity than classical approaches, since it can represent superposition of states.
Volume: 7
Issue: 5
Page: 2365-2373
Publish at: 2017-10-01
Show 1466 of 1939

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration