Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

28,269 Article Results

OFDM System Performance Evaluation under Different Fading Channels and Channel Coding using Matlab Simulink

10.11591/ijeecs.v5.i2.pp260-266
Pratima Manhas , M.K Soni
Orthogonal Frequency Division Multiplexing (OFDM) is a form of Multicarrier Modulation (MCM) technique in which larger bandwidth is divided into parallel narrow bands each of which is modulated by different subcarriers. All the subcarriers are orthogonal to each other and hence it reduces the interference among various subcarriers. OFDM technique is an efficient modulation technique used in certain wired and wireless application. During transmission, the transmitted signal can travel from transmitter to receiver over multiple reflective paths in case of wireless communication system which results to multipath fading and produces variation in amplitude, phase and angle of the received signal. The signal which is transmitted from BTS (base transceiver station) may undergo multiple reflections from the buildings nearby, before reaching the mobile station. This paper discusses the performance of OFDM system using various fading channels and channel coding. The parameter which is known as Bit error rate (BER) is calculated for different fading channels (AWGN, Rayleigh and Rician) for different digital modulation (BPSK, QPSK and QAM) and Channel coding(linear/ Cyclic coding).The tool which is used to evaluate  the BER parameter is Matlab Simulink.
Volume: 5
Issue: 2
Page: 260-266
Publish at: 2017-02-01

Media Access Control in Wireless Sensor Networks using Priority Index

10.11591/ijeecs.v5.i2.pp416-426
Mallanagouda Patil , Rajashekhar C. Biradar
As the nodes in Wireless Sensor Networks (WSNs) have limited power, energy conservation is essential at different layers of the protocol stack to prolong lifetime. In our previous work, ”Priority based slot allocation for media access in wireless sensor networks” (PSAWSN), probability based priority scheme is used to allocate slots to competing nodes. Limitations of this work include 1) It does not handle dynamic and variable slot allocation based on varying requirements of nodes. 2) Error control is not taken into account. To overcome these limitations, we propose a Medium Access Control scheme using Priority Index (MACPI) that generates Priority Index (PI) to allocate varying slots based on parameters: message length (ML), node energy (NE), number of requests (NR) and message urgency (MU). Models have been de- signed for all these parameters and an expert system is proposed that makes decisions based on collective knowledge of these parameters. Analysis and simulation results for various message sizes and error conditions show that there is an improvement in terms of energy efficiency, optimal message length and throughput compared to the ”Reliable data deliveries using packet optimization in multi-hop underwater sensor networks”(RDPSN).
Volume: 5
Issue: 2
Page: 416-426
Publish at: 2017-02-01

Performance Evaluation of Different Backoff Algorithms in IEEE 802.15.4 using Double Sensing

10.11591/ijeecs.v5.i2.pp376-382
Md. Mohibur Rahaman , Mohammad Khairul Islam , Kazi Ashrafuzzaman , Mohammad Sanaullah Chowdhury
The IEEE 802.15.4 is the standard for Low Rate Wireless Personal Area network (LR-WPAN). It is widely used in many application areas. The standard uses Slotted CSMA/CA mechanism in its contention access period (CAP) for the beacon enabled mode. The protocol has two modes - single sensing (SS) and double sensing (DS). The protocol also adopts a binary exponential backoff (BEB) algorithm. In this paper, we explore the saturation throughput, delay and energy consumption of this standard with double sensing (DS) using the existing BEB algorithm. We also investigate three other backoff schemes - exponential increase exponential decrease (EIED), exponential increase linear decrease (EILD) and exponential increase multiplicative decrease (EIMD). From simulation results, it is found that the EIED, EILD, EIMD perform better than the BEB for higher loads. It shows that the EIED, EILD, EIMD have better throughput and lower delay than the BEB. The EIED outperforms the other schemes in terms of throughput, delay and energy for the higher loads.
Volume: 5
Issue: 2
Page: 376-382
Publish at: 2017-02-01

Video Watermarking Scheme Based on Candidates I-frames for Copyright Protection

10.11591/ijeecs.v5.i2.pp391-400
Rakesh Ahuja , Dr. Sarabjeet Singh Bedi
This paper focuses on moving picture expert group ( MPEG) based digital video watermarking scheme for copyright protection services. The present work implemented the video watermarking technique in which discrete cosine transform (DCT) intermediate frequency coefficients from instantaneous decoder refresh (IDR) frames are utilized. The subset of IDR frames as candidate frames are chosen to reduces the probability of temporal synchronization attacks to achieve better robustness and high visual perceptual quality.  A secret key based cryptographic technique is used to enhance the security of embedded watermark. The proposed scheme embedded the watermark directly during the differential pulse code modulation (DPCM) process and extracting through decoding the entropy details. Three keys are required to extract the watermark whereas one of the key is used to stop the extraction process and the remaining two are used to display the watermark. The robustness is evaluated by testing spatial synchronization attacks, temporal synchronization attacks and re-encoding attacks. The present work calculates the simulation results that shows the watermarking scheme achieved high robustness against video processing attacks frequently occur in the real world and perceptibility also obtained without changing the motion vectors during the DPCM process of MPEG-2 encoding scheme.
Volume: 5
Issue: 2
Page: 391-400
Publish at: 2017-02-01

Telecommunication Numbering System Roadmap towards Next Generation Network Era in Indonesia

10.11591/ijeecs.v5.i2.pp363-375
Maman Abdurohman , Bambang Setia Nugroho , Aji Gautama Putrada
The telecommunication numbering system in Indonesia currently complies to the International TelecommunicationUnion (ITU) standard, that is ITU-T E.164. In accordance to both technology development and the growing of network users, ITU has also been designing future infrastructure network concept, namely Next Generation Network Infrastructure (NGNI). In its technical paper, ITU discusses future generation’s specification as well as current network migration scenarios towards Next Gereration Network (NGN) in developing countries and its impact on regulations, business processes, and the numbering system. The scenario described in the concept is yet universal and the implementation would be highly depending on the conditions of ones country. This paper proposes the roadmap of numbering system from the current state into NGN numbering for the case of Indonesia. The method used in this paper are benchmarking with several countries that have started with the transformation process, forecasting with regression method based on the existing trends and descriptive analysis. This paper has proposed the stages of numbering roadmap towards NGN numbering system, the achievement parameters, and the indicators that are suitable for Indonesia.
Volume: 5
Issue: 2
Page: 363-375
Publish at: 2017-02-01

A Control Strategy for DFIM to Minimize DC Bus Voltage Fluctuations and Torque Oscillations

10.11591/ijeecs.v5.i2.pp277-289
G. Venu Madhav , Y. P. Obulesu
The Direct Power Contro; has many advantages like it avoids the usage of integration of PWM voltages which leads to stable operation even at zero rotor frequency, it is position sensor less and hence will not depend on machine parameters like stator or rotor resistance. In case of network unbalance, if the system is operated with constant active and reactive powers, it leads to oscillations in the electromagnetic torque and currents exchange with the grid will become non- sinusoidal, which is not good for the system as it increases the mechanical stress. In this paper, both the rotor connected converter and grid connected converter are fed with DPC strategy along with that a Torque Oscillations Cancellation scheme is applied to RSC and Proportional Integral control based power references generation strategy without calculating the sequence components and with elimination of DC bus voltage oscillations is applied to stator-side converter in order to achieve non-oscillating torque accompanied by quality improved current exchange with the grid. The simulation results of Doubly Fed Induction Generator with and without fault clearly shows that the performance of the proposed scheme is validated.
Volume: 5
Issue: 2
Page: 277-289
Publish at: 2017-02-01

A Blind Identification and Equalization for MC-CDMA Transmission Channel using a New of Adaptive Filter Algorithm

10.11591/ijeecs.v5.i2.pp352-362
ATIFY Elmostafa , Cherki Daoui , Ahmed BOUMEZZOUGH
A review of literature shows that there are a variety of adaptive filters. In this research study, we propose a new type of adaptive filter that increases the diversification used to compensate the channel distortion effect in the MC-CDMA transmission. First, we show expressions of the impulse responses of the filter in the case of a perfect channel. The adaptive filter  was simulated was experienced by blind equalization for different cases of Gaussian white noise in the case of an MC-CDMA transmission  with orthogonal frequency baseband for mobile radio downlink channel Bran A. Simulation Results  of the proposed model shows the performance of the identification and blind equalization algorithm for MC-CDMA transmission chain using IFFT.
Volume: 5
Issue: 2
Page: 352-362
Publish at: 2017-02-01

Performance Characteristics of Six-Phase Induction Generator for Renewable Power Generation

10.11591/ijeecs.v5.i2.pp299-308
Alok Kumar Mohanty , K B Yadav
This paper presents the performance behavior of a multi-phase induction generator operating in six-phase mode. An experimental analysis has been done to determine operating characteristics of the six-phase machine to illustrate the advantageous features of the machine as compared to its three phase counterpart. The machine is configured to operate as a standalone power source in conjunction with a DC prime mover. The multi-phase machine can operate with one three phase capacitor bank which does not lead to complete shutdown of the system during fault conditions across one of its two sets of its stator windings. In the analysis the machine is connected to different capacitor configuration and the influence of these connections on the machine performance during no load and load have been implemented. Experimental results include voltage build up of the machine with different excitation capacitors at both sets of stator windings with changing speed during no load condition, resistive load condition and resistive inductive load condition with simple shunt and short shunt configuration.
Volume: 5
Issue: 2
Page: 299-308
Publish at: 2017-02-01

Mammogram Analysis using League Championship Algorithm Optimized Ensembled FCRN Classifier

10.11591/ijeecs.v5.i2.pp451-461
Saraswathi D , Srinivasan E
An intelligent mammogram diagnosis system can be very helpful for radiologist in detecting the abnormalities earlier than typical screening techniques. This paper investigates a new classification approach for detection of breast abnormalities in digital mammograms using League Championship Algorithm Optimized Ensembled Fully Complex valued Relaxation Network (LCA-FCRN). The proposed algorithm is based on extracting curvelet fractal texture features from the mammograms and classifying the suspicious regions by applying a pattern classifier. The whole system includes steps for pre-processing, feature extraction, feature selection and classification to classify whether the given input mammogram image is normal or abnormal. The method is applied to MIAS database of 322 film mammograms. The performance of the CAD system is analysed using Receiver Operating Characteristic (ROC) curve. This curve indicates the trade-offs between sensitivity and specificity that is available from a diagnostic system, and thus describes the inherent discrimination capacity of the proposed system. The result shows that the area under the ROC curve of the proposed algorithm is 0.985 with a sensitivity of 98.1% and specificity of 92.105%. Experimental results demonstrate that the proposed method can form an effective CAD system, and achieve good classification accuracy.
Volume: 5
Issue: 2
Page: 451-461
Publish at: 2017-02-01

Effect of Measurement Factors on Photovoltaic Cell Parameters Extracting

10.11591/ijece.v7i1.pp50-57
El Hadi Chahid , Mohammed Idali Oumhand , M’barek Feddaoui , Mohammed Erritali , Abdessamad Malaoui
In this paper, we study the influence of external factors on the measurement for the current–voltage (I-V) characteristic of the photovoltaic cell. These factors are the size of the number of measurements, the range of the cell generated voltage and the influence of measures step and mode combination of photovoltaic cells (parallel, serial, or hybrid). The main extracted parameters solar cell are the photocurrent Iph, the reverse diode saturation current I0, the ideality factor of diode n, the series resistance Rs and the shunt resistance Rsh. A method for finding these parameters, according to the single-diode model, was developed by Newton-Raphson’s method using Matlab. To assess the accuracy of this method, measured and calculated I–V characteristics were compared with provided data by the manufacturer at standard test condition (STC). The measurement results showed that these parameters are highly dependent on these four factors.
Volume: 7
Issue: 1
Page: 50-57
Publish at: 2017-02-01

Identity Analysis of Egg Based on Digital and Thermal Imaging: Image Processing and Counting Object Concept

10.11591/ijece.v7i1.pp200-208
Sunardi Sunardi , Anton Yudhana , Shoffan Saifullah
This Research was conducted to analyze the identification of eggs. The research processes use two tools, namely thermal imaging camera and smartphone camera. The identification process was done by using Matlab prototype tools. The image has been acquired by means of proficiency level, then analyzed and applied several methods. Image acquisition results of thermal imaging camera are processed using morphological dilation and do the complement in black and white (BW). While the digital image uses the merger method of morphological dilation and opening, and it doesn't need to be complemented. Labeling process is done, and the process of determining centroid and bounding box. The process has been done and it can be applied for identifying of chicken eggs with the accuracy rate of 100%. There are different methods of both images is obtained area (pixels) which is equivalent to the difference is very small as 6 x 10-3.
Volume: 7
Issue: 1
Page: 200-208
Publish at: 2017-02-01

Selection of the Best Proposal using FAHP: Case of Procurement of IT Master Plan’s Realization

10.11591/ijece.v7i1.pp353-362
Amadou Diabagate , Abdellah Azmani , Mohamed El Harzli
IT master plan, which allows planning and managing the development of the computer systems, derives its importance in the central role of the computer systems in the functioning of organizations. This article focuses on the use of FAHP method for analysis and evaluation of tenders during the awarding of contracts of IT master plan’s realization. For those purposes, a painstaking work was realized for making an inventory of criteria and sub-criteria involved in the evaluation of tenders and for specifying the degrees of preference for each pair of criteria and sub-criteria. To find a provider for the IT master plan’s realization, organizations are increasingly using tendering as the mode of awarding contracts. This paper is an improvement of a previous published paper in which AHP method was used. The goals of this work are to make available to members of tenders committee a decision support tool for evaluating tenders of IT master plan’s realization and endow the organizations with effective IT master plans in order to increase their information systems’ performance.
Volume: 7
Issue: 1
Page: 353-362
Publish at: 2017-02-01

Optimized Active Learning for User’s Behavior Modelling based on Non-Intrusive Smartphone

10.11591/ijece.v7i1.pp505-512
Ika Kusumaning Putri , Deron Liang , Sholeh Hadi Pramono , Rahmadwati Rahmadwati
In order to protect the data in the smartphone, there is some protection mechanism that has been used. The current authentication uses PIN, password, and biometric-based method. These authentication methods are not sufficient due to convenience and security issue. Non-Intrusive authentication is more comfortable because it just collects user’s behavior to authenticate the user to the smartphone. Several non-intrusive authentication mechanisms were proposed but they do not care about the training sample that has a long data collection time. This paper propose a method to collect data more efficient using Optimized Active Learning. The Support Vector Machine (SVM) used to identify the effect of some small amount of training data. This proposed system has two main functionalities, to reduce the training data using optimized stop rule and maintain the Error Rate using modified model analysis to determine the training data that fit for each user. Finally, after we done the experiment, we conclude that our proposed system is better than Threshold-based Active Learning. The time required to collect the data can reduced to 41% from 17 to 10 minutes with the same Error Rate.
Volume: 7
Issue: 1
Page: 505-512
Publish at: 2017-02-01

Improving Efficiency of Power Systems by Demand Side Management Method

10.11591/ijece.v7i1.pp100-106
Tibbie Pon Symon V.A. , I. Jacob Ragland
In the smart grid infrastructure based power systems, it is necessary to consider the demand side management to enhance the energy reduction and system control. In many countries the resources are very less so the available resources have to be used in an efficient manner without any loss. The total loss cannot be avoided but it can be reduced. In the proposed system, the Particle Swarm Optimization (PSO) technique is used to distribute the power in the smart grid. Here, the grids are arranged in such a way that the losses in it are reduced. The load connected to the grid is rearranged according to their use. It uses a new and stochastic scheduling technique to handle the uncertainties in the power system. Solar and wind power are taken in account for twenty four hours and the values are given to the PSO algorithm. The   experiment was conducted by MATLAB and the results show that the efficiency level of wind and solar power systems was increased by an appreciable level. The proposed technique is compared with the normal system without using Demand Side Management (DSM) and it shows that the proposed system gives better results than the existing systems.
Volume: 7
Issue: 1
Page: 100-106
Publish at: 2017-02-01

Improving the Proactive Routing Protocol using Depth First Iterative Deepening Spanning Tree in Mobile Ad Hoc Network

10.11591/ijece.v7i1.pp316-323
Justin Sophia I , N. Rama
Owing to the wireless and mobility nature, nodes in a mobile ad hoc network are not within the transmission range. It needs to transfer data through the multi-intermediate nodes. Opportunistic data forwarding is an assuring solution to make use of the broadcast environment of wireless communication links. Due to absence of source routing capability with efficient proactive routing protocol, it is not widely used. To rectify the problem, we proposed memory and routing efficient proactive routing protocol using Depth-First Iterative-Deepening and hello messaging scheme.  This protocol can conserve the topology information in every node in the network. In experimental analysis and discussion, we implemented the proposed work using NS2 simulator tool and proved that the proposed technique is performed well in terms of average delay, buffer and throughput.
Volume: 7
Issue: 1
Page: 316-323
Publish at: 2017-02-01
Show 1484 of 1885

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration