Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

28,910 Article Results

Sign Detection Vision Based Mobile Robot Platform

10.11591/ijeecs.v7.i2.pp524-532
Hairol Nizam Mohd Shah , Mohd Zamzuri Ab Rashid , Zalina Kamis , Mohd Shahrieel Mohd Aras , Nursabillilah Mohd Ali , Faizil Wasbari , Tengku Muhammad Mahfuz Tengku Anuar
Vision system applied in electrical power generated mobile robot to provide a comfortable ride while providing comfort to tourist to interact with visitors. The camera is placed in front of the mobile robot to snap the images along in pathways. The system can recognized the sign which are right, left and up by using Harris corner algorithms and will be display in Graphical User Interface (GUI). A sign can be determined from the vertex coordinates according to the degree to distinguish the direction of the sign. The system will be tested in term of percentage of success in Harris point detection and availability to detect sign with different range. The result show the even though not all Harris point in an image can be detected but most of the images possible to recognise it sign direction.
Volume: 7
Issue: 2
Page: 524-532
Publish at: 2017-08-01

Qualitative Analysis of Recognition-based Graphical Password Authentication Schemes for Accessing the Cloud

10.11591/ijeecs.v7.i2.pp507-513
K Gangadhara Rao , Vijayakumari Rodda , B Basaveswara Rao
Cloud computing is increasingly becoming popular as many enterprise applications and data are moving into cloud platforms. However, a major barrier for cloud application is real and perceived lack of security. There are many security mechanisms exercised to utilize cloud services. Amongst them the prominent and primitive security mechanism is the Authentication System. Traditional text based passwords are susceptible to threats. Tough passwords are hard to recall and easily recalled passwords are simple and predictable. Graphical passwords are introduced as the better alternative. Two types of graphical passwords are there – recall based and recognition based. This research reviews several Recognition-Based Graphical Password methods and analyses their security based on the estimation criteria. Moreover, the research defines a metric called a 14-point scale that would make it possible for the qualitative analysis of the graphical passwords schemes. 
Volume: 7
Issue: 2
Page: 507-513
Publish at: 2017-08-01

New Optimization Method of the MPPT Algorithm and Balancing Voltage Control of the Three-Level Boost Converter (TLBC)

10.11591/ijape.v6.i2.pp113-122
Hassan Abouobaida , Said El Bied
This paper is dedicated to studying the control of the Three Level Boost Converters (TLBC) and the optimization method of Maximum Power Point Tracking (MPPT) based a variable step. The main objective of the optimization is to find a compromise between the response time and the amplitude of the oscillations around the optimal point. The nonlinear behavior of the TLBC is manifested by the presence of the disturbances. For reasons of simplicity of the control, a linearization based on the dynamic compensation of the disturbance is proposed. On the one hand, a cascaded MPPT algorithm and a simple linear regulator allow adjusting the inductance current and a maximum power operation of the wind system. On the other hand, a second linear regulator ensures balancing of the output voltages. The paper proposes a new approach to the optimization of the Inc-Cond MPPT. The suggested contribution consists of using an exponential function of the power derivative to develop a variable step. The adoption of the variable step size according to the dynamics of the wind system implies a compromise between the response time and the amplitude of the ripples around the optimal point. The simulation results showed that a variable step size, especially in transient conditions and during a very rapid climate change recover the optimum power point within a reasonable time and suitable amplitude of the oscillations. The results achieved in this study show the ability of the proposed approach to extract the maximum power according to the available wind speed while guaranteeing a better efficiency. The developed study is summarized by the following points: (a) modeling the wind conversion systems, (b) detailing the control approach of the TLBC and presenting the variable step method (c) presenting the simulations results and evaluating the perf.
Volume: 6
Issue: 2
Page: 113-122
Publish at: 2017-08-01

Generator Dynamic Response Analysis and Improvement Following Distribution Network Disturbance

10.11591/ijeecs.v7.i2.pp356-363
Mirza Saric
Use of renewable energy sources for the purposes of electricity generation is increasing throughout the world. Connection of new generators, however, introduces significant challenges to power network operators and managers. The power system transient stability is affected by the grid connection of new generation units. The objective of this paper is to investigate asynchronous generator dynamic response issues and capabilities under three phase symmetrical fault conditions and to propose a methodological approach to designing a generator transient stability solutions. Analysis and methodology are introduced through a realistic generator connection example. Simulations show that power system stability can be significantly affected by the connection of new generators and that this phenomena needs to be carefully considered during the connection planning process. This paper is a part of an ongoing research on the distributed generation impact on power network and its aim is to provide two main contributions to the existing body of knowledge. Firstly, it is expected that this paper will contribute toward a better understanding of the influence that generators have on the power system transient stability. Secondly, this paper is expected to contribute towards the practical understanding of fundamental power system transient stability improvement solutions.
Volume: 7
Issue: 2
Page: 356-363
Publish at: 2017-08-01

An Efficient Environmental Channel Modelling in 802.11p MAC Protocol for V2I

10.11591/ijeecs.v7.i2.pp404-414
Neelambike S , Chandrika J
Recent development in communication of wireless communication for automobile industry have aided the growth of SITS (Smart Intelligent Transport System) which solves numerous vehicular based communication service concerns like traffic congestion, accidental mishap etc. VANET (Vehicular Ad-hoc Network) a characteristic class of MANET (Mobile ad-hoc Network) which is a fundamental element of SITS in which the moving vehicles inter connected and communicates with each other remotely. Wireless technologies play an important part in assisting both Vehicle to Infrastructure (V2I) and Vehicle to Vehicle (V2V) correspondence in VANET. The existing scheduling technique does not consider the environmental factor which affects the throughput performance and increases packet drop rate which result in degradation of service quality. Here in this work the author propose a RHU (Rural, Highway and Urban) environment model considering the environmental factor. The efficient environmental model algorithm is incorporated into slotted aloha in IEEE 802.11p MAC protocols which aided as a spine for assisting both safety application and non-Safety applications. Experiments are conducted for collision and throughput efficiency for varied traffic load and speed of vehicle. The experimental result shows the proposed environmental model impact on collision and throughput efficiency for varied environment and thus helps improving QoS for VANET application.
Volume: 7
Issue: 2
Page: 404-414
Publish at: 2017-08-01

Mobile Ad Hoc Networks in Presence of Black Hole Attack

10.11591/ijeecs.v7.i2.pp577-582
Anshu Prakash Murdan , Anshuman Bhowon
This paper analyses three performance metrics namely average throughput, average network load and average video conferencing packet end-to-end delays under the influence of black hole attack in a Mobile Ad Hoc Network, using the ad hoc on-demand distance vector routing protocol. The simulation was carried out on Riverbed Modeler Academic Edition software. Simulation results show that the average throughput, average network load and average video conferencing packet end-to-end delay decreases as the number of black hole attack nodes is increased. Also, the effects of the influence of black hole attack nodes tend to decrease due to mobility of the nodes. It was observed that when the destination nodes move closer to the source nodes and get in to the latter’s transmission range, the effects of the black hole attack is greatly minimized.
Volume: 7
Issue: 2
Page: 577-582
Publish at: 2017-08-01

The Study of User Acceptance Toward E-Learning System in Higher Education

10.11591/ijeecs.v7.i2.pp466-473
Dana Indra Sensuse , Darmawan Baginda Napitupulu
E-learning is a model of delivering learning content electronically with the help of computers and multimedia. ABC University has implemented the e-learning system for two (2) years in order to improve the quality of teaching and learning process. This study aims to determine the level of user acceptance, especially from the perspective of students. In other words, this study also wants to evaluate the implementation of e-learning systems in higher education as well as identifying any factors that encourage students to use e-learning system especially in ABC University. The research method used was survey with the approach of TAM (Technology Acceptance Model) as the technology acceptance evaluation model consisting of two main factors: perceived ease of use and perceived usefulness. The results showed perceived usefulness significantly positive influence on user acceptance, while perceived ease of use did not significantly influence on user acceptance. The perceived ease of use also significantly positive influence perceived usefulness. The variance of user acceptance could be explained by two factors about 50.5%. 
Volume: 7
Issue: 2
Page: 466-473
Publish at: 2017-08-01

Analysis of Competition Fronting the Popularity of Content in Social Networks

10.11591/ijict.v6i2.pp86-94
Siham Hafidi , Mohamed Baslam , Rachid El Ayachi
In recent years, on the Internet, there is a real phenomenon: the development of social networks that are becoming more popular and more used. Social networks have millions of users worldwide. This provides an opportunity for companies to reach out a large and diverse audience for their advertising campaigns. They do this by creating and spreading content across the social network, which will increase the chance of visibility for their contents, which for them is the assurance of being popular. Every content requires time to reach a specific destination on the networks. In this article, we study competition between several contents that look for attracting more consultations, each characterized by some given popularity. There is competition between the contents of a limited set of destinations. We first model our system, we then study the competition between contents by using the game theory to analyze this behavior. We finally provide numerical results, which provide insights into the effect of various parameters of the system.
Volume: 6
Issue: 2
Page: 86-94
Publish at: 2017-08-01

Modeling of 6 to 4 Switched Reluctance Motor using Coefficient Method and Analytical Method

10.11591/ijeecs.v7.i2.pp373-380
Kasrul Abd Karim , N. Abdullah , M. Nazri Othman , Auzani Jidin , RN Firdaus
Electric kick scooter field has become famous this lately, and become another solution for electric vehicle. Switched Reluctance Motor has been choosen as the propulsion system in this application due to the advantages of this motor. Meanwhile, the issue of lack experience in electrical motor design is one of the hollow subjects in machine design field. Through design aspects, the Switched Reluctance motor is developed using a simple technique which is coefficients method. This method is to provide the easiest ways for other non-academic designer for those who has lack experience in motor design. A set of a coefficient to determine motor dimension is being set. Then, this technique will be refered to the existing analytical method to provide a design guideline and to validate this coefficient as the quick references to design the SRM. The aim is not to make a comparison between the methods but intend to provide another easiest solution to design the SRM motor. The modelling has been test using RMxprt tools The expectation from this method is the outcomes will be compatible with existing design.
Volume: 7
Issue: 2
Page: 373-380
Publish at: 2017-08-01

Tiarrah Computing: The Next Generation of Computing

10.11591/ijict.v6i2.pp129-138
Yanish Pradhananga , Pothuraju Rajarajeswari
The evolution of Internet of Things (IoT) brought about several challenges for the existing Hardware, Network and Application development. Some of these are handling real-time streaming and batch bigdata, real- time event handling, dynamic cluster resource allocation for computation, Wired and Wireless Network of Things etc. In order to combat these technicalities, many new technologies and strategies are being developed. Tiarrah Computing comes up with integration the concept of Cloud Computing, Fog Computing and Edge Computing. The main objectives of Tiarrah Computing are to decouple application deployment and achieve High Performance, Flexible Application Development, High Availability, Ease of Development, Ease of Maintenances etc. Tiarrah Computing focus on using the existing opensource technologies to overcome the challenges that evolve along with IoT. This paper gives you overview of the technologies and design your application as well as elaborate how to overcome most of existing challenge.
Volume: 6
Issue: 2
Page: 129-138
Publish at: 2017-08-01

A Range Based Localization Error Minimization Technique for Wireless Sensor Network

10.11591/ijeecs.v7.i2.pp395-403
Sudha H. Thimmaiah , Mahadevan G
Wireless sensor network (WSN) is composed of low cost, tiny sensor that communicates with each other and transmit sensory data to its base station/sink. The sensor network has been adopted by various industries and organization for their ease of use and is considered to be the most sorted future paradigm. The sensor devices are remotely deployed and powered by batteries. Preserving the energy of sensor devices is most desired. To preserve the battery efficient routing technique is needed. Most routing technique required prior knowledge of sensor nodes location in order to provide energy efficiency. Many existing technique have been proposed in recent time to determine the position of sensor nodes. The existing technique proposed so for suffers in estimating the likelihood of localization error. Reducing the error in localization is most desired. This work present a (Time-of-Arrival) based localization technique and also present adaptive information estimation model to reduce/approximate the localization error in wireless sensor network. The author compares our proposed localization model with existing protocol and analyses its efficiency.
Volume: 7
Issue: 2
Page: 395-403
Publish at: 2017-08-01

A New Design of a Wideband Miniature Antenna Array

10.11591/ijece.v7i4.pp1850-1857
Oulhaj Otman , Naima A. Touhami , Mohamed Aghoutane , Abdelmounaim Belbachir Kchairi
In this work, we present a new configuration of a new miniature microstrip antenna array having a wide frequency band and with a circular polarization. The bandwidth is about 2GHz for a reflection coefficient under -10dB and centered on the ISM ‘Industrial Scientific Medical’ band at 5.8 GHz. To design such array, we have started the design by validating one antenna element at 10 GHz and after that by using the technique of defected ground, we have validated the antenna array in the frequency band [4 GHz -6 GHz] which will permit to miniature the dimensions. The final fabricated antenna array is mounted on an FR4 substrate, the whole area is 102.48 X 31.39 mm2  with a gain of 5dBi at 4GHz.
Volume: 7
Issue: 4
Page: 1850-1857
Publish at: 2017-08-01

Asymptotic Stability of Quaternion-based Attitude Control System with Saturation Function

10.11591/ijece.v7i4.pp1994-2001
Harry Septanto , Djoko Suprijanto
In the design of attitude control, rotational motion of the spacecraft is usually considered as a rotation of rigid body. Rotation matrix parameterization using quaternion can represent globally attitude of a rigid body rotational motions. However, the representation is not unique hence implies difficulties on the stability guarantee. This paper presents asymptotically stable analysis of a continuous scheme of quaternion-based control system that has saturation function. Simulations run show that the designed system applicable for a zero initial angular velocity case and a non-zero initial angular velocity case due to utilization of deadzone function as an element of the defined constraint in the stability analysis.
Volume: 7
Issue: 4
Page: 1994-2001
Publish at: 2017-08-01

A Review on Web Application Testing and its Current Research Directions

10.11591/ijece.v7i4.pp2132-2141
D. Rajya Lakshmi , S. Suguna Mallika
Testing is an important part of every software development process on which companies devote considerable time and effort. The burgeoning web applications and their proliferating economic significance in the society made the area of web application testing an area of acute importance. The web applications generally tend to take faster and quicker release cycles making their testing very challenging. The main issues in testing are cost efficiency and bug detection efficiency. Coverage-based   testing is the process of ensuring exercise of specific program elements. Coverage measurement helps determine the “thoroughness” of testing achieved. An avalanche of tools, techniques, frameworks came into existence to ascertain the quality of web applications.  A comparative study of some of the prominent tools, techniques and models for web application testing is presented. This work highlights the current research directions of some of the web application testing techniques.
Volume: 7
Issue: 4
Page: 2132-2141
Publish at: 2017-08-01

Design and Simulation of Automatic Temperature Control and Alert System Based PIC16F887

10.11591/ijict.v6i2.pp95-104
Jabbar Shaati Jahlool
In this research, the design and simulation of an automatic system for temperature control using embedded system in order to automatically control of multi appliances depend on the temperature value. The appliances will be controlled are ventilation, cooling, heating and alert. this is an order to avoid or reduce to human intervention and increase system reliability. An important feature of this automation process is to reduce or eliminate the possibility of relying on the human factor operator for industries, warehouses and laboratories, and to improve working and performance environments. The system in this paper used the microcontroller PIC16F887 as the central control unit, LM35 temperature sensor as a temperature source,16x2 liquid crystal display (LCD) as indicator to display the different system working status an addition to some of drivers, relay and light emitting diodes (LED) as indicators to display the corresponding working appliance driver. The implementation and simulation of the system work has been achieved by using proteus professional software v8.0 and mikroc pro for pic v .6.6.1 software to write the equivalent program and generate .hex file for system working. The result shows in figures 5, 6, 7, and 8 that explain the system working cases
Volume: 6
Issue: 2
Page: 95-104
Publish at: 2017-08-01
Show 1476 of 1928

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration