Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,922 Article Results

Sensor Fusion Algorithm by Complementary Filter for Attitude Estimation of Quadrotor with Low-Cost IMU

10.12928/telkomnika.v16i2.9020
A.; Universiti Teknikal Malaysia Melaka Noordin , M. A. M.; Universiti Teknologi Malaysia Basri , Z.; Universiti Teknologi Malaysia Mohamed
This paper proposes a sensor fusion algorithm by complementary filter technique for attitude estimation of quadrotor UAV using low-cost MEMS IMU. Angular rate from gyroscope tend to drift over a time while accelerometer data is commonly effected with environmental noise. Therefore, high frequency gyroscope signal and low frequency accelerometer signal is fused using complementary filter algorithm. The complementary filter scaling factor K1=0.98 and K2=0.02 are used to merge both gyro and accelerometer. The results show that the smooth roll, pitch and yaw attitude angle can be obtained from the low cost IMU by using proposed sensor fusion algorithm.
Volume: 16
Issue: 2
Page: 868-875
Publish at: 2018-04-01

Analyzing the Sea Weather Effects to the Ship Maneuvering in Vietnam’s Sea from BinhThuan Province to Ca Mau Province Based on Fuzzy Control Method

10.12928/telkomnika.v16i2.7753
Xuan Kien; Ho Chi Minh City University of Transport Dang , Le Anh-Hoang; Ho Chi Minh City University of Transport Ho , Viet-Dung; Ho Chi Minh City University of Transport Do
Vietnam is located in the tropical monsoon climate, so there are many storms affecting the marine environment each year. However, Vietnam’s sea also has distinct characteristics due to the continental shelf factors, salinity, sea currents and viscosity water. In this paper, the sea weather effects to the ship in the sea area from BinhThuan province to Ca Mau province are analyzed. Specifically, wave, wind and current which are the three main factors affecting the safety of ship are thoroughly examined. Importantly, the survey parameters have been built from the actual operating environment. In addition, maintaining the stability of dynamic positioning system in Vietnam weather conditions is the main point of this study.
Volume: 16
Issue: 2
Page: 533-543
Publish at: 2018-04-01

Design Flexural Piezoelectric Acoustic Transducers Array based d33 Mode Polarization

10.11591/ijeecs.v10.i1.pp59-65
K.A. Ahmad , A. Abd Manaf , Z. Hussain Hussain , Z. Janin
Piezoelectric Acoustic Transducer (PAT) is a transducers used in many application such as medical diagnostic, medical ultrasonic imaging and underwater acoustic applications. Latest research, PAT were investigated in marine application and underwater acoustic imaging. Conventional PAT is design based on sensing element, Piezoelectric Material, matching layer and backing layer. But the conventional method still has problem with issues of narrow bandwidth, directivity and low sensitivity. This problem is occurred when the transducer need to increase the image resolution. The size of single element will become smaller to meet the requirement of high resolution. PZT-5H have high piezoelectric constant (d31) and low dielectric loss. It is chosen as sensing element in this design of PAT because it will increase the sensitivity of transducers. The PAT is design based on d33 mode polarization to improve the receiving sensitivity. The fabrication process are included wet etching on Printed Circuit Board (PCB), spin coated Polydimethylsiloxane (PDMS), and baked transducer on hot plate. PAT is characterized using Pulse-Echo method. Pulse-Echo method will determine the sensitivity, directivity and operating bandwidth of acoustic transducers in underwater applications. Open circuit receiving voltage (OCRV) is voltage response to determine the sensitivity of acoustic transducer. The commercial projector and hydrophone will calibrate to obtain the reliability of result. In cross talk test, at some particular frequency, Pin 2 and Pin 3 have low sensitivity value. It is because Pin 2 and Pin 3 received low acoustic wave pressure. The PAT array based d33 mode polarization shows it has more receiving sensitive compared to commercial acoustic transducers. The design transducer has sensitivity at -56 dB re 1V/µPa at resonance frequency, 100kHz and fractional bandwidth at 30%.
Volume: 10
Issue: 1
Page: 59-65
Publish at: 2018-04-01

Kalman Filter Algorithm for Mitigation of Power System Harmonics

10.11591/ijece.v8i2.pp771-779
K. Dhineshkumar , C. Subramani
The maiden application of a variant of Kalman Filter (KF) algorithms known as Local Ensemble Transform Kalman Filter (LET-KF) are used for mitigation and estimation power system harmonics are proposed in this paper. The proposed algorithm is applied for estimating the harmonic parameters of power signal containing harmonics, sub-harmonics and inter-harmonics in presence of random noise. The KF group of algorithms are tested and applied for both stationary as well as dynamic signal containing harmonics. The proposed LET-KF algorithm is compared with conventional KF based algorithms like KF, Ensemble Kalman Filter (En-KF) algorithms for harmonic estimation with the random noise values 0.001, 0.05 and 0.1. Among these three noises, 0.01 random noise results will give better than other two noises. Because the phase deviation and amplitude deviation less in 0.01 random noise. The proposed algorithm gives the better results to improve the efficiency and accuracy in terms of simplicity and computational features. Hence there are less multiplicative operations, which reduce the rounding errors. It is also less expensive as it reduces the requirement of storing large matrices, such as the Kalman gain matrix used in other KF based methods.
Volume: 8
Issue: 2
Page: 771-779
Publish at: 2018-04-01

Anomaly Detection in Log Records

10.11591/ijeecs.v10.i1.pp343-347
Poonam Ghuli
Complex software systems are continuously generating application and server logs for the events which had occurred in the past. These logs generated and can be utilized for anomaly and intrusion detection. These log files can be used for anomaly or outlier detection. Certain types of abnormalities or exceptions such as spikes in HTTP requests, number of exceptions raised in logs, etc. All these events are logged into the log files for further analysis. These types of events are generally used for predicting the anomalies in future. The developed prototype assumes that the user inputs log records in a standard apache log format. At first the user uploads the log file for outlier detection. Next, a prototype is developed to get the number of HTTP requests for outlier detection. Then anomalies in number of HTTP requests are detected using three techniques namely InterQuartileRange method, Moving averages and Median Absolute deviation. Once the outliers are detected, these outliers are removed from the current dataset. This output is given as input to the Multilayer Perceptron model to predict the number of HTTP requests at the next timestamp 
Volume: 10
Issue: 1
Page: 343-347
Publish at: 2018-04-01

Voltage Stability Prediction on Power Networks using Artificial Neural Networks

10.11591/ijeecs.v10.i1.pp1-9
Gitanjali Saha , Kabir Chakraborty , Priyanath Das
 The objective of this paper is to predict the secure or the insecure state of the power system network using a hybrid technique which is a combination of Artificial Neural Network (ANN) and voltage stability indexes. Voltage collapse or an uncontrollable drop in voltage occurs in a system when there is a change in the condition of the system or a system is overloaded. A Transference Index (TI) which acts as a voltage stability indicator has been formulated from the equivalent two-bus network of a multi-bus power system network, which has been tested on a standard IEEE 30-bus system and the result is validated with a standard Fast Voltage Stability Index (FVSI). FACTS devices in the critical bus have been considered for the improvement of the voltage stability of the system. An ANN based supervised learning algorithm has been conferred in this paper alongside Contingency Analysis (CA) for the prediction of voltage security in an  IEEE 30 - bus power system network. 
Volume: 10
Issue: 1
Page: 1-9
Publish at: 2018-04-01

Task Scheduling in Heterogeneous Multiprocessor Environments – An Efficient ACO-Based Approach

10.11591/ijeecs.v10.i1.pp320-329
Nekiesha Edward , Jeffrey Elcock
In heterogeneous computing environments, finding optimized solutions continues to be one of the most important and yet, very challenging problems. Task scheduling in such environments is NP-hard, so efficient mapping of tasks to the processors remains one of the most critical issues to be tackled. For several types of applications, the task scheduling problem is crucial, and across the literature, a number of algorithms with several different approaches have been proposed. One such effective approach is known as Ant Colony Optimization (ACO). This popular optimization technique is inspired by the capabilities of ant colonies to find the shortest paths between their nests and food sources. Consequently, we propose an ACO-based algorithm, called rACS, as a solution to the task scheduling problem. Our algorithm utilizes pheromone and a priority-based heuristic, known as the upward rank value, as well as an insertion-based policy and a pheromone aging mechanism to guide the ants to high quality solutions. To evaluate the performance of our algorithm, we compared our algorithm with the ACS algorithm and the ACO-TMS algorithm using randomly generated directed acyclic graphs (DAGs). The simulation results indicated that our algorithm experienced comparable or even better performance, than the selected algorithms.
Volume: 10
Issue: 1
Page: 320-329
Publish at: 2018-04-01

Ant Based Cross Layered Optimization Protocol for WMSN with Fuzzy Clustering

10.11591/ijeecs.v10.i1.pp295-301
DipaliParag Adhyapak , Sridharan Bhavani , Aparna Pradeep Laturkar
Wireless Multimedia Sensor Network (WMSN) is embedded with large number of Audio, Video and scalar sensor nodes which can able to retrieve the multimedia information from the environment. WMSN has several challenges such as life time of the network, Memory requirement, Coverage, Bandwidth and QoS metrics. Hence selection of routing algorithm is crucial in WMSN. Again interdependencies of the protocol layer cannot be neglected to improve the network performance. Clustering in WMSN is challenging task in order to increase network lifetime and to improve the communication. Hence Fuzzy clustered Ant based cross layer protocol (FCAXL) is proposed. In this paper performance analysis of ant based cross layer optimization protocol with fuzzy clustering based on number of nodes and packet size is done. Simulation results shows that Fuzzy clustered ant based cross layer optimization protocol performs best as compared to AntSenseNet routing protocol, Cross layer routing protocol and Ant based cross layer routing protocol in terms of QoS parameters such as Throughput, Packet delivery ratio and delay. Hence the life time of the network increases.
Volume: 10
Issue: 1
Page: 295-301
Publish at: 2018-04-01

Notice of Retraction Digital Image Steganography Using Bit Flipping

10.11591/ijict.v7i1.pp1-7
Aditya Kumar Sahu , Gandharba Swain
Notice of Retraction-----------------------------------------------------------------------After careful and considered review of the content of this paper by a duly constituted expert committee, this paper has been found to be in violation of IAES's Publication Principles.We hereby retract the content of this paper. Reasonable effort should be made to remove all past references to this paper.The presenting author of this paper has the option to appeal this decision by contacting info@iaesjournal.com.-----------------------------------------------------------------------This article proposes bit flipping method to conceal secret data in the original image. Here a section consists of 2 pixels and there by flipping one or two LSBs of the pixels to hide secret information in it. It exists in 2 variants. The variant-1 and variant-2 both use 7th and 8th bit to conceal the secret data. Variant-1 hides 3 bits per a pair of pixels and the variant-2 hides 4 bits per a pair of pixels. Our proposed method notably raises the capacity as well as bits per pixel that can be hidden in the image compared to existing bit flipping method. The image steganographic parameters such as, peak signal to noise ratio (PSNR), hiding capacity, and the quality index of the proposed techniques has been compared with the existing bit flipping technique
Volume: 7
Issue: 1
Page: 1-7
Publish at: 2018-04-01

Cluttered Traffic Distribution in LoRa LPWAN

10.11591/ijeecs.v10.i1.pp214-223
Nur Aishah Bt. Zainal , Mohamed Hadi Habaebi , Israth Chowdhury , Md Rafiqul Islam
Low Power WAN (LPWAN) is a wireless broad area network technology. It is interconnects using only low bandwidth, less power consumption at long range. This technology is operating in unauthorized spectrum which designed for wireless data communication. To have an insight of such long-range technology, this paper evaluates the performance of LoRa radio links under shadowing effect and realistic smart city utilities clutter grid distribution. Such environment is synonymous to residential, industrial and modern urban centers. The focus is to include the effect of shadowing on the radio links while attempting to study the optimum sink node numbers and their locations for maximum sensor node connectivity. Results indicate that the usual unrealistic random node distribution does not reflect actual real-life scenario where many of these sensing nodes follow the built infrastructure around the city of smart buildings. The system is evaluated in terms of connectivity and packet loss ratio.
Volume: 10
Issue: 1
Page: 214-223
Publish at: 2018-04-01

Face Recognition in the Scrambled Domain Using MK-RDA and ANN

10.11591/ijict.v7i1.pp16-23
Kavita Kadam , C.R Jadhav
Facial look identity is a vital mission by means of human-interacting structures that goal to be aware of versions within the human’s emotional state. the principle challenge or the crucial part in surveillance society is the privacy-shielding era. because the rapid improvement in the internet international it turns into very essential to scramble the pics in the video or files for the duration of transmission. in this the biometric identity of photographs or faces from scrambled pictures plays a completely tough mission. Numbers of various technology are carried out to provide privateness for the duration of surveillance or during transmission of video however they're lack of essential traits, like reversibility or visible fine maintenance. in lots of scrambling methods the faces are covered by a few animation which may additionally or may not cover all faces or it receives hard to recover pics from this technique. Many guide method also are us used by which we will unscramble an photo but they are no longer powerful that a good deal. to overcome all this matters we proposed a novel approach- Many-Kernel Random Discriminate analysis (MK-RDA) to find out discriminative patterns from chaotic indicators. structures get better accuracy bring about best photos. To PIE and ORL datasets has getting above ninety% accuracy.
Volume: 7
Issue: 1
Page: 16-23
Publish at: 2018-04-01

Avoidance of Over Speed Through Intelligent Speed Breaking System

10.11591/ijict.v7i1.pp13-15
M S Satyanarayana , Aruna T M , Divya G N
Accidents have become major issue in Developing countries like India now a day. As per the Surveys 60% of the accidents are happening due to over speed. Though the government has taken so many initiatives like Traffic Awareness & Driving Awareness Week etc.., but still the percentage of accidents are not getting reduced. In this paper a new technique has been introduced in order to reduce the percentage of accidents. The new technique is implemented using the concept of Intelligent Speed Braking System. The Intelligent Speed Braking systems can be implemented any where essential in order to avoid the accidents. The main objective of this system is to calculate the speed of the vehicle at three different locations based on the place where the vehicle speed has to be controlled and if the speed is greater than the designated speed in that road then it will automatically open up the speed breaker to control the speed of the vehicle. If the speed is less or equal to the designated speed in that road then the vehicle will be passed without any disturbance. This system though it won’t avoid 100% accidents at least it will reduce the percentage of accidents. This is system is not only to avoid accidents it will also intelligently controls the speed of the vehicles and creates awareness amongst the drivers.
Volume: 7
Issue: 1
Page: 13-15
Publish at: 2018-04-01

Grid & Force Based Sensor Deployment Methods in WSN using PSO

10.11591/ijeecs.v10.i1.pp271-279
Aparna Pradeep Laturkar , Sridharan Bhavani , DeepaliParag Adhyapak
Wireless Sensor Network (WSN) is emergingtechnology and has wide range of applications, such as environment monitoring, industrial automation and numerous military applications. Hence, WSN is popular among researchers. WSN has several constraints such as restricted sensing range, communication range and limited battery capacity. These limitations bring issues such as coverage, connectivity, network lifetime and scheduling & data aggregation. There are mainly three strategies for solving coverage problems namely; force, grid and computational geometry based. PSO is a multidimensional optimization method inspired from the social behavior of birds called flocking. Basic version of PSO has the drawback of sometimes getting trapped in local optima as particles learn from each other and past solutions. This issue is solved by discrete version of PSO known as Modified Discrete Binary PSO (MDBPSO) as it uses probabilistic approach. This paper discusses performance analysis of random; grid based MDBPSO (Modified Discrete Binary Particle Swarm Optimization), Force Based VFCPSO and Combination of Grid & Force Based sensor deployment algorithms based on interval and packet size. From the results of Combination of Grid & Force Based sensor deployment algorithm, it can be concluded that its performance is best for all parameters as compared to rest of the three methods when interval and packet size is varied.
Volume: 10
Issue: 1
Page: 271-279
Publish at: 2018-04-01

Multi-objective IT Project Selection Model for Improving SME Strategy Deployment

10.11591/ijece.v8i2.pp1102-1111
Abir El Yamami , Khalifa Mansouri , Mohammed Qbadou , El Hossein Illousamen
Due to the limited financial resources of small and Medium-sized enterprises (SMEs), the proven approaches for selecting IT project portfolio for large enterprises may fail to perform in SMEs; SME top management want to make sure that the corporate strategy is carried out effectively by IT project portfolio before investing in such projects. In order to provide automated support to the selection of IT projects, it seems inevitable that a multi-objective approach is required in order to balance possible competing and conflicting objectives. Under such an approach, individual projects would be evaluated not just on their own performance but on the basis of their contribution to balance the overall portfolio. In this paper, we extend and explore the concept of IT project selection to improve SME strategy deployment. In particular, we present a model that assesses an individual project in terms of its contribution to the overall strategic objectives of the portfolio. A simulation using the model illustrates how SME can rapidly achieve maximal business goals by deploying the multi-objective algorithm when selecting IT projects.
Volume: 8
Issue: 2
Page: 1102-1111
Publish at: 2018-04-01

Swarm Based Cross Layer Optimization Protocol for WMSN

10.11591/ijeecs.v10.i1.pp302-308
DeepaliParag Adhyapak , Sridharan Bhavani , Aparna Pradeep Laturkar
Wireless Multimedia Sensor Network (WMSN) is comprised of tiny, low cost multimedia devices such as video cameras and microphones. These networks can transfer scalar as well as multimedia data into real time as well as non-real time applications. However addition of such devices exposes additional challenges on both QoS assurance and energy efficiency for efficient use of resources.  This paper presents cross layer based AntSenseNet protocol to meet various QoS requirements such as throughput, jitter, lifetime and packet delivery ratio in order to improve network lifetime. Cross layer routing protocol utilizes scheduling algorithm and AntSenseNet protocol builds hierarchical structure and able to use multipath routing protocol.  Simulation results shows Cross layer based AntSenseNet protocol outperforms Ant Sense routing protocol and cross layer routing protocol in terms of throughput and packet delivery ratio
Volume: 10
Issue: 1
Page: 302-308
Publish at: 2018-04-01
Show 1468 of 1995

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration