Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

28,451 Article Results

X-band Operations Metamaterial Absorber with Extended Circular Ring Topology for Size Reduction

10.11591/ijeecs.v6.i1.pp180-184
M. M. Gajibo , M. K. A. Rahim , N. A. Murad , O. Ayop , B. D. Bala , H. A. Majid
A metamaterial electromagnetic wave absorber consisting of a big circular ring patch with four smaller suppression circular rings is presented in this report. The metamaterial electromagnetic wave absorber introduces the concept of size reduction by suppressing the resonance frequency. An FR4 substrate was used and the incidental wave angles were varied from 00 to 600. Simulations results shows peak absorption of 100% was achieved at 10.7 GHz by the absorber for both TE and TM polarization incident waves. Minimum absorption for both TE and TM mode of 90.6% was achieved under TE mode. The metamaterial absorber was being tested with and Ultra-wide band antenna and the results were reported.
Volume: 6
Issue: 1
Page: 180-184
Publish at: 2017-04-01

Evaluation of the Energy Performance of the Amougdoul Wind Farm, Morocco

10.11591/.v7i2.pp692-705
Asma Ezzaidi , Mustapha Elyaqouti , Lahoussine Bouhouch , Ahmed Ihlal
This paper is concerned with the assessment of the the performance of the Amougdoul wind farm. We have determined the Weibull parameters; namely the scale parameter, c (m/s) and shape parameter, k. After that, we have estimated energy output by a wind turbine using two techniques: the useful power calculation method and the method based on the modeling of the power curve, which is respectively 134.5 kW and 194.19 KW corresponding to 27% and 39% of the available wind energy, which confirm that the conversion efficiency does not exceed 40%.
Volume: 7
Issue: 2
Page: 692-705
Publish at: 2017-04-01

Optimal Allocation of Capacitor Bank in Radial Distribution System using Analytical Approach

10.11591/.v7i2.pp748-753
Sarfaraz Nawaz , M.P. Sharma , Abhishek Gupta
In this paper, a novel analytical technique is proposed for optimal allocation of shunt capacitor bank in radial distribution system. An objective function is formulated to determine the optimal size, number and location of capacitor bank for real & reactive power loss reduction, voltage profile enhancement and annual cost saving. A new constant, Power Voltage Sensitivity Constant (PVSC), has been proposed here. The value of PVSC constant decides the candidate bus location and size. The achievability of the proposed method has been demonstrated on IEEE-69 bus and real distribution system of Jamawaramgarh, Jaipur city. The obtained results are compared with latest optimization techniques to show the effectiveness and robustness of the proposed technique.
Volume: 7
Issue: 2
Page: 748-753
Publish at: 2017-04-01

Image Processing for Rapidly Eye Detection based on Robust Haar Sliding Window

10.11591/.v7i2.pp823-830
Fitri Utaminingrum , Renaldi Primaswara Praetya , Yuita Arum Sari
Object Detection using Haar Cascade Clasifier widely applied in several devices and applications as a medium of interaction between human and computer such as a tool control that utilizes the detection of eye movements. Obviously speed and precision in the detection process such as eyes, has an effect if implemented on a device. If the eye could not detect accurately, controlling device systems could reach bad detection as well. The proposed method can be used as an approach to detect the eye region of eye based on haar classifier method by means of modifying the direction of sliding window. In which, it was initially placed in the middle position of image on facial area by assuming the location of eyes area in the central region of the image. While the window region of conventional haar cascade scan the whole of image start from the left top corner. From the experiment by using our proposed method, it can speed up the the computation time and improve accuracy significantly reach to 92,4%.
Volume: 7
Issue: 2
Page: 823-830
Publish at: 2017-04-01

A Modified Diagonal Mesh Shuffle Exchange Interconnection Network

10.11591/.v7i2.pp1042-1050
Akash Punhani , Pardeep Kumar , Nitin Nitin
Interconnection network is an important part of the digital system. The interconnection mainly describes the topology of the network along with the routing algorithm and flow control mechanism. The topology of the network plays an important role on the performance of the system. Mesh interconnection network was the simplest topology, but has the limited bisection bandwidth on the other hand torus and diagonal mesh was having long links. The Modified diagonal mesh network tried to replace the torodial links but was having more average path length so in proposed topology we have tried to improve the average distance using shuffle exchange network over the boundary node. In this paper, we propose the architecture of Modified Diagonal Mesh Shuffle Exchange Interconnection Network. This Modified Diagonal Mesh Shuffle Exchange Interconnection network have been compared with four popular topologies that are simple 2D Mesh, 2D Torus, Diagonal Mesh and Modified Diagonal Mesh Interconnection Network on the four traffic patterns such as Bit Complement traffic, Neighbor traffic, Tornado traffic and Uniform traffic are used for comparisonand performance analysis. We have performed the analysis with a 5% and 10% of hotspot on the Uniform Traffic. The simulation results shows that the proposed topology is performed better on bit complement traffic and can also handle the other traffic up to certain level.
Volume: 7
Issue: 2
Page: 1042-1050
Publish at: 2017-04-01

Game-Theoretic Channel Allocation in Cognitive Radio Networks

10.11591/.v7i2.pp986-991
Sangsoon Lim
Cognitive radio networks provide dynamic spectrum access techniques to support the increase in spectrum demand. In particular, the spectrum sharing among primary and secondary users can improve spectrum utilization in unused spectrum by primary users. In this paper, we propose a novel game theoretic channel allocation framework to maximize channel utilization in cognitive radio networks. We degisn the utility function based on the co-channel interference among primary and secondary users. In addition, we embed the property of the adjacent channel intererence to consider real wireless environment. The results show that the utility function converges quickly to Nash equilibrium and achieves channel gain by up to 25 dB compared to initial assignment.
Volume: 7
Issue: 2
Page: 986-991
Publish at: 2017-04-01

Video Monitoring Application using Wireless Sensor Node with Various External Antenna

10.11591/ijeecs.v6.i1.pp148-154
Amerrul Zabri , Mohamad Kamal A. Rahim , Farid Zubir , Norsaidah Muhamad Nadzir , Huda A. Majid
Surveillance and monitoring has become very important for security reasons these days. The use of wireless sensor node device offers a variety of platform depends on the attached sensor. When an image sensor is attached, the wireless sensor node is capable of monitoring an area wirelessly. Since wireless environment uses antenna to transmit and receive data, antenna is an important component that affects the video monitoring performance. This paper describes a surveillance system using Raspberry Pi with various external antenna. The Raspberry Pi with Pi Camera module and various types of antennas was used for testing and experimentation in line-of-sight (LOS) and non-line-of-sight (NLOS) condition. The results revealed that the Yagi Uda antenna gives the best output in terms of its signal strength and average Receive (Rx) rate.
Volume: 6
Issue: 1
Page: 148-154
Publish at: 2017-04-01

Optical Humidity Sensor Based on Tapered Fiber with Multi-walled Carbon Nanotubes Slurry

10.11591/ijeecs.v6.i1.pp97-103
Habibah Mohamed , Ninik Irawati , Fauzan Ahmad , Mohd Haniff Ibrahim , Sumiaty Ambran , Mohd Azizi Abdul Rahman , Sulaiman Wadi Harun
We demonstrated performance comparison of optical humidity sensor for bare and Multi-walled carbon nanotubes (MWCNTs) slurry coated tapered optical fiber. The starting material for MWCNTs slurry is MWCNTs- acrylonitrile butadiene styrene (ABS) based fused deposition modeling (FDM) 3D printer filament. The ABS was dissolved using acetone to produce MWCNTs-acetone suspension. The MWCNTs-acetone suspension was drop-casted on the tapered fiber to produce MWCNTs slurry by evaporation process at room temperature, which resulted the MWCNTs slurry attach to the tapered fiber. The MWCNTs slurry acts as the cladding for humidity changes measurement. The experimental works showed improvement of sensitivity from 3.811 μW/% of bare tapered fiber to 5.17 μW/% for the coated tapered fiber with MWCNTs slurry when the humidity varied from 45% to 80%.
Volume: 6
Issue: 1
Page: 97-103
Publish at: 2017-04-01

A Training Monitoring System for Cyclist Based on Wireless Sensor Networks

10.11591/ijeecs.v6.i1.pp80-87
N. M. Abdul Latiff , M. A. Ruslee , S. K. Syed Yusof , M. R. Abdul Rahim , H. Sayuti , K. Mohamad Yusof , M. A. Baharudin
This paper presents a training monitoring system for cyclist that is based on the technology of wireless sensor networks (WSNs). A stable and reliable wireless cyclist monitoring system is vital to establish a smart and efficient sports management program. A training monitoring system has been developed and tested in a real cyclist training environment in a velodrome. The system is designed is such a way that the packet loss rate is minimum. Using TelG mote as the basis, customized sensor nodes that function as a forwarder node and the relay nodes are developed to form the WSN. This WSN is linked to the cloud network on the Internet. The cloud network is then established and end users application for data accessing is designed. Several experiments have been conducted in a real scenario in a velodrome to measure the reliability of the system architecture. It is shown from the experiments that the proposed system is reliable even when the cyclist is moving at a high speed. The packet loss is less than 2% which does not give a huge impact to the data transmission.
Volume: 6
Issue: 1
Page: 80-87
Publish at: 2017-04-01

Maintenance and Safety Requirements of Flameproof and Intrinsically Safe Equipment for Coal Mines

10.11591/ijeecs.v6.i1.pp9-15
B. Ahirwal , Arvind kumar singh , Rajendra kumar vishwakarm
In the generation of the new technology segment, new explosionproof (Ex) equipment are being installed to make systems suitable for use in hazardous areas of mines. Generally, 80-90% equipment having flameproof (Exd) and intrinsic safety (Exi) methodology of protection are used in the mines for safe operation. The maintenance and safety are two vital parameters to improve the system efficiency of installation in the mines. These parameters are also responsible for the productivity of the mines. The minimum breakdown and maximum safety are the prime concerns of the mines to increase the production. Many observations and basic knowledge are necessary of safety parameters of Ex protections while doing maintenance because micro joules energy is sufficient to ignite the hazardous areas of mines. Trained and skilled personals having good knowledge of Ex protections are required to maintain the limitations of ignition energy sources of Ex equipment to prevent explosion in the mines. A regular and organized scheme of inspection and maintenance may ensure continued, satisfactory and safe operation of Ex electrical equipment in mines. The important points for safety and maintenance of Exd and Exi equipment are pondered in this paper.
Volume: 6
Issue: 1
Page: 9-15
Publish at: 2017-04-01

Vertical Information System: A Case Study of Civil Servant Teachers’ Data in Manado City

10.11591/ijeecs.v6.i1.pp42-49
Julyeta P.A. Runtuwene , Irene R.H.T Tangkawarow
Information systems have become important factors in a company, where information systems are useful in providing useful information for the company itself. The information system helps companies implement corporate activities at the beginning of the process until the decision making. In the concept Information system, we know the term of vertical information system, which is another strategy for increasing vertical information capacity. Vertical information system includes the periodic report, written information, and computer-based communications distributed to managers. In this article, discusses the approach in the development of vertical information system which will be preceded by comparison of operational systems, management information systems, and business intelligence systems. We will give explanations about the role in the BI system in an organization, the challenges faced in the implementation of vertical information systems, approaches in vertical information systems, approaches that we choose, and how it implement in  civil servant teachers data in Manado City. 
Volume: 6
Issue: 1
Page: 42-49
Publish at: 2017-04-01

Low-rank Matrix Optimization for Video Segmentation Research

10.11591/ijeecs.v6.i1.pp36-41
Caiyun Huang , Guojun Qin
This paper investigates how to perform robust and efficient unsupervised video segmentation while suppressing the effects of data noises and/or corruptions. The low-rank representation is pursued for video segmentation. The supervoxels affinity matrix of an observed video sequence is given, low-rank matrix optimization seeks a optimal solution by making the matrix rank explicitly determined. We iteratively optimize them with closed-form solutions. Moreover, we incorporate a discriminative replication prior into our framework based on the obervation that small-size video patterns, and it tends to recur frequently within the same object. The video can be segmented into several spatio-temporal regions by applying the Normalized-Cut algorithm with the solved low-rank representation. To process the streaming videos, we apply our algorithm sequentially over a batch of frames over time, in which we also develop several temporal consistent constraints improving the robustness. Extensive experiments are on the public benchmarks, they demonstrate superior performance of our framework over other approaches.
Volume: 6
Issue: 1
Page: 36-41
Publish at: 2017-04-01

A Compact CPW-Fed Curved Meander Line Monopole Antenna (MLMA) for GSM Application

10.11591/ijeecs.v6.i1.pp207-211
Nor Afifah Borhan , Noor Asniza Murad
Monopole antenna is widely used in many communication systems especially in broadcasting where omnidirectional pattern allow the 360-degree coverage. However, at low frequency the conventional design may require miniaturization to fit in versatile spaces. Thus, this paper discusses a low cost, compact CPW-fed curved meander line monopole antenna (MLMA) designed to operate at 0.9 GHz GSM band. The overall dimension is 25mm x 80mm. The antenna is well matched at required GSM band with the bandwidth from 0.88 GHz to 0.93 GHz. Comparison between the conventional MLMA and curved (MLMA) is made in term of return loss and gain. It was found that the curved MLMA has a better gain compared to the conventional MLMA which is 1.472 dB.
Volume: 6
Issue: 1
Page: 207-211
Publish at: 2017-04-01

Recursive Subspace Identification Algorithm using the Propagator Based Method

10.11591/ijeecs.v6.i1.pp172-179
Irma Wani Jamaludin Wani Jamaludin , Norhaliza Abdul Wahab
Subspace model identification (SMI) method is the effective method in identifying dynamic state space linear multivariable systems and it can be obtained directly from the input and output data. Basically, subspace identifications are based on algorithms from numerical algebras which are the QR decomposition and Singular Value Decomposition (SVD). In industrial applications, it is essential to have online recursive subspace algorithms for model identification where the parameters can vary in time. However, because of the SVD computational complexity that involved in the algorithm, the classical SMI algorithms are not suitable for online application. Hence, it is essential to discover the alternative algorithms in order to apply the concept of subspace identification recursively. In this paper, the recursive subspace identification algorithm based on the propagator method which avoids the SVD computation is proposed. The output from Numerical Subspace State Space System Identification (N4SID) and Multivariable Output Error State Space (MOESP) methods are also included in this paper.
Volume: 6
Issue: 1
Page: 172-179
Publish at: 2017-04-01

Exploring the Design Space of HEVC Inverse Transforms with Dataflow Programming

10.11591/ijeecs.v6.i1.pp104-109
Khoo Zhi Yion , Ab Al-Hadi Ab Rahman
This paper presents the design space exploration of the hardware-based inverse fixed-point integer transform for High Efficiency Video Coding (HEVC). The designs are specified at high-level using CAL dataflow language and automatically synthesized to HDL for FPGA implementation. Several parallel design alternatives are proposed with trade-off between performance and resource. The HEVC transform consists of several independent components from 4x4 to 32x32 discrete cosine transform and 4x4 discrete sine transform. This work explores the strategies to efficiently compute the transforms by applying data parallelism on the different components. Results show that an intermediate version of parallelism, whereby the 4x4 and 8x8 are merged together, and the 16x16 and 32x32 merged together gives the best trade-off between performance and resource. The results presented in this work also give an insight on how the HEVC transform can be designed efficiently in parallel for hardware implementation.
Volume: 6
Issue: 1
Page: 104-109
Publish at: 2017-04-01
Show 1474 of 1897

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration