Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

27,404 Article Results

A Zone Based Approach for Classification and Recognition Of Telugu Handwritten Characters

10.11591/ijece.v6i4.pp1647-1653
N. Shobha Rani , Sanjay Kumar Verma , Anitta Joseph
Realization of high accuracies and efficiencies in South Indian character recognition systems is one of the principle goals to be attempted time after time so as to promote the usage of optical character recognition (OCR) for South Indian languages like Telugu. The process of character recognition comprises pre-processing, segmentation, feature extraction, classification and recognition. The feature extraction stage is meant for uniquely recognizing each character image for the purpose of classifying it. The selection of a feature extraction algorithm is very critical and important for any image processing application and mostly of the times it is directly proportional to the type of the image objects that we have to identify. For optical technologies like South Indian OCR, the feature extraction technique plays a very vital role in accuracy of recognition due to the huge character sets. In this work we mainly focus on evaluating the performance of various feature extraction techniques with respect to Telugu character recognition systems and analyze its efficiencies and accuracies in recognition of Telugu character set.
Volume: 6
Issue: 4
Page: 1647-1653
Publish at: 2016-08-01

Development of System Tracer of Lost Aircraft

10.11591/ijict.v5i2.pp68-72
Siswayudi Azhari
Today the world has entered the era of modern air transport where human movement needed to support facilities and infrastructure that support for the movement of activity. The number of routes and flights are always growing by leaps and bounds every year.In Indonesia alone by more than 10 of the largest airliner in which two, namely Garuda Indonesia and Lion Airline, based on data in 2012 each have no less than 50 routes per day and more than 4,000 flights per week [1] (web magazine ZonaAero). To support the security and safety of air transport, the government through the aviation authorities are trying to build an adequate infrastructure. A number of local governments and central government together with Angkasa Pura and Airnav Indonesia (LPPNPI) has a lot to develop the airport terminal, lengthen and widen the runway, install instrument flight (radar, DVOR, ILS etc.), and make the regulations more guarantees The good level of a security and aviation safety.However, for things that are not desirable that may occur as aircraft accidents, it is necessary to support the system also prepared to facilitate the search for the location of the accident. Still clear in our memory how when, on May 9, 2012 a plane Sukhoi Superjet 100 has crashed in the promotion and demonstration flights. It takes more than one day to find the crash site in the area around Mount Salak located less than 100 kilometers from the capital city of Jakarta [2] (Indonesia Wikipedia).The distance of time ranging from a loss of communication with the aircraft until the discovery of the accident scene will be very good if it can be reduced to as small as possible. This will help Basarnas and NTSC accelerate the process of investigation and to provide certainty for the families of the victims as well as those of other interested parties.Location tracking system of aircraft accident would be able to find the location of a plane crash just a few moments after the breakdown of communication between the aircraft control tower / flight controller.
Volume: 5
Issue: 2
Page: 68-72
Publish at: 2016-08-01

On the DIBL Reduction Effect of Short Channel Carbon Nanotube Field Effect Transistors

10.11591/ijece.v6i4.pp1514-1521
Khial Aicha , Rechem Djamil , Azizi Chrifa , Zaabat Mourad
The Drain Induced Barrier Lowering (DIBL), in carbon Nanotubes-Fet (CNTFETS), is a challenging study that still needs investigation. Based on a numerical model, the Non-Equilibrium Green’s Function (NEGF) approach was applied to simulate the DIBL effect in CNTFETS. In this study,  the effect of the length gate ranging from 10 to 30 nm, for different temperatures (77K, 15K, 300K and 400K) on the DIBL was investigated. Then the variation of DIBL effect as a function of the nanotubes diameter varying over the following chiralities: (13, 0), (16, 0), (19, 0), (23, 0) and (25, 0) was undertaken. Afterworlds, we conducted the variation of DIBL impact as a function of the oxide thickness with the values: 1.5 nm, 3 nm, 4.5 nm, 6 nm and 7 nm. Moreover, the DIBL effect was carried at depending upon the high-k materials such as:  SiO_2, HfO_2, ZrO_2, 〖Ta〗_2 O_2 and TiO_2. Finally, a conclusion is made basing at the different findings which revealed that the best reduce of DIBL impact was recorded under a liquid Nitrogen temperature of 77 K.
Volume: 6
Issue: 4
Page: 1514-1521
Publish at: 2016-08-01

Finding Hidden Communities in Complex Networks from Chaotic Time Series

10.11591/ijeecs.v3.i2.pp350-355
Jiancheng Sun
Recent works show that complex network theory may be another powerful tool in time series analysis. In this paper, we construct complex networks from the chaotic time series with Maximal Information Coefficient (MIC). Each vector point in the reconstructed phase space is represented by a single vertex and edge determined by MIC. By using the Chua’s circuit system, we illustrate the potential of these complex network measures for the detection of the topology structure of the network. Comparing with the linear relationship measure, we find that the topology structure of the community with MIC reveals the hidden or implied correlation of the network.
Volume: 3
Issue: 2
Page: 350-355
Publish at: 2016-08-01

Impulsive Noise Cancellation from ECG Signal using Adaptive Filters and their Comparison

10.11591/ijeecs.v3.i2.pp369-376
Mihir Narayan Mohanty , Sarthak Panda
Impulsive Noise is the sudden burst noise of short duration. Mostly it causes by electronic devices and electrosurgical noise in biomedical signals at the time of acquisition. In this work, Electrocardiograph (ECG) signal is considered and tried to remove impulsive noise from it. Impulsive noise in ECG signal is random type of noise. The objective of this work is to remove the noise using different adaptive algorithms and comparison is made among those algorithms. Initially the impulsive noise in sinusoidal signal is synthesized and tested for different algorithms like LMS, NLMS, RLS and SSRLS. Further those algorithms are modified in a new way to weight variation. The proposed novel approach is applied in the corrupted ECG signal to remove the noise. The effectiveness of the proposed approach is verified for ECG signal with impulsive noise as compared to the traditional approaches as well as previously proposed approaches. Also the performance of our approach is validated by SNR computation. Significant improvement in SNR is achieved after removal of noise.
Volume: 3
Issue: 2
Page: 369-376
Publish at: 2016-08-01

Hardware Implementation of Cascaded Hybrid Multilevel Inverter with Reduced Number of Switches

10.11591/ijeecs.v3.i2.pp314-322
Chinnapettai Ramalingam Balamurugan , S.P. Natarajan , T.S. Anandhi , R. Bensaraj
This paper presents the comparison of various multicarrier Pulse Width Modulation (PWM) techniques for the Cascaded Hybrid Multi Level Inverter (CHBMLI). Due to switch combination redundancies, there are certain degrees of freedom to generate the five level AC output voltage. This paper presents the use of Control Freedom Degree (CFD) combination. The effectiveness of the PWM strategies developed using CFD are demonstrated by simulation and experimentation.  The simulation results indicate that the chosen five level inverter triggered by the developed Phase Disposition(PD), Phase Opposition and Disposition(POD), Alternate Phase Opposition and Disposition (APOD), Carrier Overlapping (CO), Phase Shift (PS) and Variable Frequency (VF) PWM strategies developed are implemented in real time using FPGA. The simulation and experimental outputs closely match with each other validating the strategies presented.
Volume: 3
Issue: 2
Page: 314-322
Publish at: 2016-08-01

The Research on Intelligent Seating Position Type LED Table Lamp

10.11591/ijeecs.v3.i2.pp331-335
Ling Liu , Qi Wang
Taking STC89C52RC single-chip as control core, this research realizes intelligent control function, which can automatically detect whether there is someone in the room and turn on/off LED table lamp; brightness of LED lamp can be adjusted with manual mode. In addition to that, it also has other functions such as displaying time and date, and posture correction. In general, time, data and brightness can be regulated through key module. 8 high brightness white LED are used in illumination module, among which, light sensitive module is applied for testing luminous intensity of environment; ultrasonic distance measuring module is utilized for detecting the distance from men to table lamp through transmitting and receiving ultrasound. In the evening, light is on when the distance from men to table lamp is within certain range; and light is off when exceeding this range. However, if the distance is lower than the specified minimum distance, buzzer will alarm to warn user that the seating position needs to be corrected. C language programming is employed for the integrated software to achieve the overall control function.
Volume: 3
Issue: 2
Page: 331-335
Publish at: 2016-08-01

An Improved Chaos Electromagnetism Mechanism Algorithm for Path Optimization Problem

10.11591/ijeecs.v3.i2.pp475-480
Shoulin Yin , Jie Liu , Lin Teng
As we all know, traditional electromagnetism mechanism (EM) algorithm has the disadvantage with low solution precision, lack of mining ability and easily falling into precocity. This paper proposes a new chaos electromagnetism mechanism algorithm combining chaotic mapping with limited storage Quasi-Newton Method (EM-CMLSQN). Its main idea is that it adopts limit quasi-Newton operator to replace the local optimization operator in EM algorithm for local searching in the late of algorithm. In the process of algorithm, the chaos mapping is introduced into optimization processes, and it generates new individuals to jump out of local to maintain the population diversity according to characteristics of chaos mapping random traversal. Finally, the experiments show that the new algorithm can effectively jump out of local optimal solution through comparing three continuous space test functions. The new algorithm has obvious advantages in terms of convergence speed compared to traditional EM algorithm, in addition, it is more accuracy than particle swarm optimization (PSO) algorithm. We compare the new chaos electromagnetism mechanism algorithm with ant colony optimization (ACO) algorithm, PSO algorithm, the results represent that new scheme can obtain the optimal path in the path optimization process, which shows that the new method has better applicability in the discrete domain problem.
Volume: 3
Issue: 2
Page: 475-480
Publish at: 2016-08-01

Monitoring Biosensors and Obtaining Data Using GSM Module

10.11591/ijict.v5i2.pp86-88
Hemavathy RM
The main focus of the project is to prevent the loss of human life against the discomfort and death caused by the lack of attention towards the patients due to the improper monitoring systems provided in the hospital. The aim of the project is to monitor the bio sensors attached to the persons in their body either internally or externally. The biosensors which are about to be used in this project are EEG sensor (electro encephalogram sensor). An ECG sensor (electro cardiogram sensor) which is very essential for a critical patient, this project also emphasizes on the extended design of a special type of sensor called the oxygen insensitive microscale biosensor which helps in the monitoring of constant oxygen supply in blood thereby detecting blood cancer at the earliest stage. The data from all the sensors are sent to a central wireless node through wifi. From the main node the data is sent to the control station of the hospital through zigbee as the coverage area of certain hospitals is more than the coverage area of a Bluetooth. The control station segregates the data of different patients and stores in the memory location. If any of the patient data exceeds the standard data fed to the control station by the doctor then a message will be sent to the mobile of the attendee and the doctor using the GSM control system.Keywords: Biosensors, Raspberry pi (controller), GSM, Zigbee 
Volume: 5
Issue: 2
Page: 86-88
Publish at: 2016-08-01

Tuning Methods of PID Controller for DC Motor Speed Control

10.11591/ijeecs.v3.i2.pp343-349
Ashwaq Abdulameer , Marizan Sulaiman , MSM Aras , Dawood Saleem
The traditional PID controllers are used for a long time to control the DC motor for many industrial processes, that because of the simplicity, flexibility, and satisfactory performance of this type of controller. This paper discusses the basic PID tuning method (Ziegler-Nichols) and its modification (Chien-Hrones-Reswick). Also, analysis the speed control DC motor response using the PID controller parameters that result from the tuning methods mentioned earlier. Moreover, explain the advantage and disadvantage of each formula of these methods.  GUL/MATLAB windows used to implementing both methods to create more comfortable and friendly environment for better understanding of the PID controller tuning methods formula for engineering students and practicing engineers.
Volume: 3
Issue: 2
Page: 343-349
Publish at: 2016-08-01

Designing a Multi-purpose GSM Based Interactive Embedded Data-Acquisition System Providing Solutions for Fire Accidents

10.11591/ijece.v6i4.pp1506-1513
P Michael Preetam Raj , Rakesh Tirupathi , P Gopi Krishna , Jasti Sateesh , Vijay Krishna Balachander
The Data-Acquisition systems with remote accessibility are greatly demanded in industry and consumer applications. In this paper, a data-acquisition system which can save lives and property, based on GSM communication, accommodating a wide range of electronic devices is presented. The system has the special ability to automatically quench fire by spraying water during fire accidents, simultaneously informing the local fire station and the responsible persons as well, saving loss of life and property. Also the varying status can be instantaneously recorded and uploaded in internet, for failure analysis. By using a GPS receiver it is possible to acquire and display the images of the locations where there are fire accidents by decoding the text SMS data, which helps in continuously tracking the fire accident location using google maps, helping the fire engine to reach instantly. Also the cost-effectiveness of the overall system is proved. The embedded board acts as the main controller of this system which has a SIM card placed in it and thus communicates using GSM, making it accessible from anywhere in the world, providing a faster two-way data transfer between the Embedded system and the client, in real-time.
Volume: 6
Issue: 4
Page: 1506-1513
Publish at: 2016-08-01

An Investigation Study on Optimizing Enterprise Resource Planning (ERP) Implementation in Emerging Public University: Al Baha University Case Study

10.11591/ijece.v6i4.pp1920-1928
Moh’D Suliman Shakkah , Khaled Alaqeel , Ali Alfageeh , Rahmat Budiarto
This project investigates the correlation between the organizational readiness in Albaha University (ABU) and the respective Critical Success Factors (CSFs) with regards to the Enterprise Resource Planning (ERP) implementation. The investigation also considers some suggestions to improve the ABU’s ERP systems and roadmap towards the self –development strategy and reduce vendor-dependency. A survey regarding ERP to the end-user, expert and developer in ABU was conducted. The analysis of the results in this work confirmed with the results of an existing work. The four significance success factors: Project Management, Business Process Re-engineering (BPR), System Integration, and Training and Education are recommended to be adopted to assure the smooth adoption of ERP at Albaha University
Volume: 6
Issue: 4
Page: 1920-1928
Publish at: 2016-08-01

Accurate Iris Localization Using Edge Map Generation and Adaptive Circular Hough Transform for Less Constrained Iris Images

10.11591/ijece.v6i4.pp1637-1646
Vineet Kumar , Abhijit Asati , Anu Gupta
This paper proposes an accurate iris localization algorithm for the iris images acquired under near infrared (NIR) illuminations and having noise due to eyelids, eyelashes, lighting reflections, non-uniform illumination, eyeglasses and eyebrow hair etc. The two main contributions in the paper are an edge map generation technique for pupil boundary detection and an adaptive circular Hough transform (CHT) algorithm for limbic boundary detection, which not only make the iris localization more accurate but faster also. The edge map for pupil boundary detection is generated on intersection (logical AND) of two binary edge maps obtained using thresholding, morphological operations and Sobel edge detection, which results in minimal false edges caused by the noise. The adaptive CHT algorithm for limbic boundary detection searches for a set of two arcs in an image instead of a full circle that counters iris-occlusions by the eyelids and eyelashes. The proposed CHT and adaptive CHT implementations for pupil and limbic boundary detection respectively use a two-dimensional accumulator array that reduces memory requirements. The proposed algorithm gives the accuracies of 99.7% and 99.38% for the challenging CASIA-Iris-Thousand (version 4.0) and CASIA-Iris-Lamp (version 3.0) databases respectively. The average time cost per image is 905 msec. The proposed algorithm is compared with the previous work and shows better results.
Volume: 6
Issue: 4
Page: 1637-1646
Publish at: 2016-08-01

A Generic Review on Effective Intrusion Detection in Ad hoc Networks

10.11591/ijece.v6i4.pp1779-1784
G. Gopichand , RA.K. Saravanaguru
Ad hoc network is specifically designed for the establishment of a network anywhere and anytime, which does not have any fixed infrastructure in order to support the mobility of the users in the network. The network is established without using any access points or base stations for communication implemented in multi hop schemes. Hence we call an Ad hoc network as a collection of nodes which are mobile in nature with a dynamic network infrastructure and forms a temporary network. Because of dynamic topological changes, these networks are vulnerable at the physical link, and they can easily be manipulated. An intruder can easily attack the Ad hoc network by loading the network resources which are available, such as wireless links and energy (battery) levels of other users, and then starts disturbing all the users. This paper provides a comparative survey on the various existing intrusion detection systems for Ad hoc networks based on the various approaches applied in the intrusion detection systems for providing security to the Ad hoc network.
Volume: 6
Issue: 4
Page: 1779-1784
Publish at: 2016-08-01

Design of 8-point DFT based on Rademacher Functions

10.11591/ijece.v6i4.pp1551-1559
Zulfikar Zulfikar , Hubbul Walidainy
This paper presents a new circuit design for 8-point DFT algorithm based on product of Rademacher functions. The design has been adopted from the famous 8-point DFT decimation in time which is mainly constructs of two 4-point and four 2-point DFTs. However, the operation of the design circuit is different. It utilized the advantage of Rademacher functions simplicity. Therefore, the proposed design is constructed form the previous design 4-point DFT which is based on product of Rademacher functions [6]. Some analysis upon number types and internal connections to achieve a more efficient circuit have been conducted. As a result, instead of four, the proposed design requires only three 2-point DFT. Several output results of the design DFT have been removed since they are equal in terms of magnitude, two negative circuit are required as a compensation. Moreover, the previous 4-point DFT has been replaced to the efficient one. This circuit is special designed for non stand alone used, the circuit must be integrated inside the proposed 8-point DFT.
Volume: 6
Issue: 4
Page: 1551-1559
Publish at: 2016-08-01
Show 1473 of 1827

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration