Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

30,033 Article Results

Improvement of Data Security Using Mixcolumn

10.11591/ijeecs.v9.i2.pp361-364
Singh Poja Ramesh , Santhosh Kumar Singh
Advanced Encryption Standard is the security based algorithm used to protect the data from the attackers.In this paper, Optimized Inverse MixColumn transformation has been designed with the help of Xtime multiplication process. Xtime multiplication performs the multiplication function for ‘m X m’ data; results will be m-bit data. Further the complexity of Xtime multiplication process has been identified and re-designed with the help of effective CSE techniques. Developed Reduced Xtime based optimized Inverse MixColumn transformation provide better performances than traditional Xtime based Inverse MixColumn multiplication.
Volume: 9
Issue: 2
Page: 361-364
Publish at: 2018-02-01

Efficient Data Assumption and Optimization of Analog Response Communication Systems

10.11591/ijeecs.v9.i2.pp269-270
Prasanna Moorthi N , V Mathivanan
This paper is focused on the examination of connection between the premier remote reason exactitude of transmission information and qualities for driving edge correspondence structures and straightforward data cesium (AFCS) identified with transmission of signs from fundamental sources. It's displayed that the mean sq. oversight of transmission picks information properties of AFCS. Varieties between the cutoff purposes of AFCS thought of as summed up correspondence channel and their forward channel square measure investigated. The new impacts appearing in incredible AFCS and in DCS working near Shannon's cutoff square measure thought of also. Amid this works advanced and essential correspondence frameworks were thought of with none inclinations and no confirmation that the use of simple cesium is frequently less able than modernized correspondence structures had been given start inside the no in this way far off past. The secured comes about unambiguously showed the capacity of simple data cesium to transmit the signs while not committal to composing with to a little degree rate up to the uttermost ranges of the forward control.
Volume: 9
Issue: 2
Page: 269-270
Publish at: 2018-02-01

Performance Of Full-Duplex One-Way And Two-Way Cooperative Relaying Networks

10.11591/ijeecs.v9.i2.pp526-538
Arunmozhi Sinouvassane , Nagarajan G
The wireless research requires concurrent transmission and reception in a single time/frequency channel with good spectral efficiency. The Full duplex system is the alternate for the conventional half duplex systems. An investigation on the need for a full duplex two way (FD-TWR) and one way relaying (FD-OWR) to improve the performance of outage probability and average rate employing amplify-and-forward (AF) and decode-and-forward (DF) protocol is considered. Further the relaying systems performance under the network coding schemes is taken into consideration. The outage probability and average rate of FD-TWR and FD-OWR using a physical layer network coding was performed. In contrast to “straightforward” network coding which performs arithmetic function on digital bit streams after information have been received. The result shows the DF protocol achieves better outage probability and average rate, when compared to the AF protocol. And comparing the full duplex schemes like FD-TWR and FD-OWR, it is found that the FD-TWR achieves better outage probability and average rate, when compared to the FD-OWR. The performance was extended with different loop interference among the relay antennas. The performance show that FD-TWR performs well even in spite of loop interference. 
Volume: 9
Issue: 2
Page: 526-538
Publish at: 2018-02-01

Performance Analysis of Uplink Scheduling Algorithms in LTE Networks

10.11591/ijeecs.v9.i2.pp373-379
Shafinaz Bt Ismail , Darmawaty Bt Mohd Ali , Norsuzila Ya’acob
Scheduling is referring to the process of allocating resources to User Equipment based on scheduling algorithms that is located at the LTE base station. Various algorithms have been proposed as the execution of scheduling algorithm, which represents an open issue in Long Term Evolution (LTE) standard. This paper makes an attempt to study and compare the performance of three well-known uplink schedulers namely, Maximum Throughput (MT), First Maximum Expansion (FME), and Round Robin (RR). The evaluation is considered for a single cell with interference for three flows such as Best effort, Video and VoIP in a pedestrian environment using the LTE-SIM network simulator. The performance evaluation is conducted in terms of system throughput, fairness index, delay and packet loss ratio (PLR). The simulations results show that RR algorithm always reaches the lowest PLR, delivering highest throughput for video and VoIP flows among all those strategies. Thus, RR is the most suitable scheduling algorithm for VoIP and video flows while MT and FME is appropriate for BE flows in LTE networks.
Volume: 9
Issue: 2
Page: 373-379
Publish at: 2018-02-01

Active and Reactive Power Scheduling Optimization using Firefly Algorithm to Improve Voltage Stability under Load Demand Variation

10.11591/ijeecs.v9.i2.pp365-372
Mohamad Khairuzzaman Mohamad Zamani , Ismail Musirin , Halim Hassan , Sharifah Azwa Shaaya , Shahril Irwan Sulaiman , Nor Azura Md. Ghani , Saiful Izwan Suliman
This paper presents active and reactive power scheduling using firefly algorithm (FA) to improve voltage stability under load demand variation. The study involves the development of firefly optimization engine for power scheduling process involving the active and reactive power for wind generator. The scheduling optimization of wind generator is tested by using IEEE 30-Bus Reliability Test System (RTS). Voltage stability of the system is assessed based in a pre-developed voltage stability indicator termed as fast voltage stability index (FVSI). This study also considers the effects on the loss and voltage profile of the system resulted from the optimization, where the FVSI value at the observed line, minimum voltage of the system and loss were monitored during the load increment. Results obtained from the study are convincing in addressing the scheduling of power in wind generator. Implementation of FA approach to solve power scheduling revealed its flexibility and feasible for solving larger system within different objective functions.This paper presents active and reactive power scheduling using firefly algorithm (FA) to improve voltage stability under load demand variation. The study involves the development of firefly optimization engine for power scheduling process involving the active and reactive power for wind generator. The scheduling optimization of wind generator is tested by using IEEE 30-Bus Reliability Test System (RTS). Voltage stability of the system is assessed based in a pre-developed voltage stability indicator termed as fast voltage stability index (FVSI). This study also considers the effects on the loss and voltage profile of the system resulted from the optimization, where the FVSI value at the observed line, minimum voltage of the system and loss were monitored during the load increment. Results obtained from the study are convincing in addressing the scheduling of power in wind generator. Implementation of FA approach to solve power scheduling revealed its flexibility and feasible for solving larger system within different objective functions.
Volume: 9
Issue: 2
Page: 365-372
Publish at: 2018-02-01

Full C-Band Tunable V-Cavity-Laser based TOSA and SFP Transceiver Modules

10.11591/ijeecs.v9.i2.pp327-331
Saravanan K , V Mathivanan
We report the latest development in tunable transmitter optical sub-assembly (TOSA) and small form-factor pluggable (SFP) transceivers based on simple and compact V-cavity laser (VCL), aiming for low-cost deployment in metro, access and data center networks. The VCL employs a half-wave coupler to achieve high side-mode suppression ratio (SMSR) and the Vernier effect to achieve a wide wavelength tuning range. Full C-band tuning from 1529.55-nm to 1566.31-nm with SMSR above 36 dB is demonstrated. Since the laser does not involve any grating or epitaxial regrowth, and has a simple tuning algorithm, it allows simpler processes for fabrication and testing as compared to other widely tunable laser structures. Compact TOSAs and SFP transceiver modules have been developed for full C-band tuning with up to 93 channels at 50 GHz spacing. Transmission experiments are carried out for direct modulation with data rates from 2.5 Gbps to 8.5 Gbps. The results of reliability tests of the modules are also presented.
Volume: 9
Issue: 2
Page: 327-331
Publish at: 2018-02-01

Heuristic Based Power Consumption Minimisation and Optimisation on Smartphones

10.11591/ijeecs.v9.i2.pp345-346
Suresh G B , D Mathivanan
In the direction of capable save the energy of battery life in Smartphone accurate with sensible influence form of Wi-Fi data communication in infrastructure mode. The network environment parameters like still time in a 3G system the network throughput and the convey pattern have been accepted all through measurement study the collective impact of an issue has not been systematical.
Volume: 9
Issue: 2
Page: 345-346
Publish at: 2018-02-01

A Survey: Space Vector PWM (SVPWM) in 3φ Voltage Source Inverter (VSI)

10.11591/ijece.v8i1.pp11-18
Shalini Vashishtha , K.R. Rekha
Since last decades, the pulse width modulation (PWM) techniques have been an intensive research subject. Also, different kinds of methodologies have been presented on inverter switching losses, inverter output current/ voltage total harmonic distortion (THD), inverter maximum output of DC bus voltage. The Sinusoidal PWM is generally used to control the inverter output voltage and it helps to maintains drive performance. The recent years have seen digital modulation mechanisms based on theory of space vector i.e. Space vector PWM (SVPWM). The SVPWM mechanism offers the enhanced amplitude modulation indexes (MI) than sinusoidal PWM along with the reduction in the harmonics of inverter output voltage and reduced communication losses. Currently, the digital control mechanisms have got more attention than the analog counterparts, as the performance and reliability of microprocessors has increased. Most of the SVPWM mechanisms are performed by using the analog or digital circuits like microcontrollers and DSPs. From the recent study, analysis gives that use of Field Programmable Gate Arrays (FPGA) can offer more efficient and faster solutions. This paper discusses the numerous existing research aspects of FPGA realization for voltage source inverter (VSI) along with the future line of research.
Volume: 8
Issue: 1
Page: 11-18
Publish at: 2018-02-01

Computer Aided Diagnosis for Screening the Shape and Size of Leukocyte Cell Nucleus based on Morphological Image

10.11591/ijece.v8i1.pp150-158
Retno Supriyanti , Alfin Chrisanty , Yogi Ramadhani , Wahyu Siswandari
Hematology tests are examinations that aim to know the state of blood and its components, one of which is leukocytes. Hematologic examinations such as the number and morphology of blood generally still done manually, especially by a specialist pathologist. Despite the fact that today there is equipment that can identify morphological automatically, but for developing countries like Indonesia, it can only be done in the capital city. Low accuracy due to the differences identified either by doctors or laboratory staff, makes a great reason to use computer assistance, especially with the rapid technological developments at this time. In this paper, we will emphasize our experiment to screen leucocyte cell nucleus by identifying the contours of the cell nucleus, diameter, circumference and area of these cells based on digital image processing techniques, especially using the morphological image. The results obtained are promising for further development in the development of computer-aided diagnosis for identification of leukocytes based on a simple and inexpensive equipment.
Volume: 8
Issue: 1
Page: 150-158
Publish at: 2018-02-01

Performance Evaluation of Smart Home System using Internet of Things

10.11591/ijece.v8i1.pp400-411
Teddy Surya Gunawan , Intan Rahmithul Husna Yaldi , Mira Kartiwi , Hasmah Mansor
Nowadays, many researches have been conducted on smart home. Smart home control system (SHCS) can be integrated into an existing home appliances to reduce the need for human intervention, increase security and energy efficiency. We have proposed a smart home system using internet of things and four types of sensors, including PIR, temperature, ultrasonic, and smoke gas sensor for automatic environmental control and intrustion detection. In this paper, the performance of the previously developed prototype of smart home system will be evaluated. First, experiments on various sensors will be conducted. Next, the communicaton channel using wireless and Ethernet modules will be discussed. Moreover, the overall SHCS will be evaluated in terms of hardware and software performance. Additionaly, solar charger enhances the availability of our prototype system. Results showed the effectiveness of our proposed smart home system in the prototype and real life experiments.
Volume: 8
Issue: 1
Page: 400-411
Publish at: 2018-02-01

Analytical Model of Cage Induction Machine Dedicated to the Study of the Inner Race Bearing Fault

10.11591/ijece.v8i1.pp458-471
Marouane Hadjami , Hubert Razik , Mohamed El Kamel Oumaamar , Abdelmamek Kezzar
This paper presents a new analytical model for inner bearing raceway defect. The model is based on the presentation of different machine inductances as Fourier series without any kind of reference frame transformation. The proposed approach shows that this model is able to give important features on the state of the motor. Simulation based on spectral analysis of stator current signal using Fast Fourier Transform (FFT) and experimental results are given to shed light on the usefulness of the proposed model.
Volume: 8
Issue: 1
Page: 458-471
Publish at: 2018-02-01

Efficient and Energy Scheme for Wireless Rechargeable Sensor Network

10.11591/ijeecs.v9.i2.pp265-266
S V Saravanan
The wireless rechargeable sensor network is attractive crucial and important in recent years for the advancement of wireless energy communication skill. The previous explore shown that not all of sensors can be recharged due to the limitation of power capacity to mobile chargers can carry. If a sensor playing a critical role in a sensing task cannot function as usual due to the exhausted energy, then the sensing task will be interrupted. Therefore, this paper proposes a novel recharging mechanism taking the priorities of sensors into consideration such that mobile chargers can recharge the sensor with a higher priority and the network lifetime can be efficiently sustained. The priority of each sensor depends on its contribution to the sensing task, including the coverage and connectivity capabilities. Based on the priority, the sensor with a higher priority will be properly recharged to extend the network lifetime. Simulation results show that the proposed mechanism performs better against the related work in network lifetime.
Volume: 9
Issue: 2
Page: 265-266
Publish at: 2018-02-01

Improving the Performance of Viterbi Decoder using Window System

10.11591/ijece.v8i1.pp611-621
Rekkal Kahina , Abdesselam Bassou
An efficient Viterbi decoder is introduced in this paper; it is called Viterbi decoder with window system. The simulation results, over Gaussian channels, are performed from rate 1/2, 1/3 and 2/3 joined to TCM encoder with memory in order of 2, 3. These results show that the proposed scheme outperforms the classical Viterbi by a gain of 1 dB. On the other hand, we propose a function called RSCPOLY2TRELLIS, for recursive systematic convolutional (RSC) encoder which creates the trellis structure of a recursive systematic convolutional encoder from the matrix “H”. Moreover, we present a comparison between the decoding algorithms of the TCM encoder like Viterbi soft and hard, and the variants of the MAP decoder known as BCJR or forward-backward algorithm which is very performant in decoding TCM, but depends on the size of the code, the memory, and the CPU requirements of the application.
Volume: 8
Issue: 1
Page: 611-621
Publish at: 2018-02-01

Emotion Recognition from Facial Expression Based on Fiducial Points Detection and using Neural Network

10.11591/ijece.v8i1.pp52-59
Fatima Zahra Salmam , Abdellah Madani , Mohamed Kissi
The importance of emotion recognition lies in the role that emotions play in our everyday lives. Emotions have a strong relationship with our behavior. Thence, automatic emotion recognition, is to equip the machine of this human ability to analyze, and to understand the human emotional state, in order to anticipate his intentions from facial expression. In this paper, a new approach is proposed to enhance accuracy of emotion recognition from facial expression, which is based on input features deducted only from fiducial points. The proposed approach consists firstly on extracting 1176 dynamic features from image sequences that represent the proportions of euclidean distances between facial fiducial points in the first frame, and faicial fiducial points in the last frame. Secondly, a feature selection method is used to select only the most relevant features from them. Finally, the selected features are presented to a Neural Network (NN) classifier to classify facial expression input into emotion. The proposed approach has achieved an emotion recognition accuracy of 99% on the CK+ database, 84.7% on the Oulu-CASIA VIS database, and 93.8% on the JAFFE database.
Volume: 8
Issue: 1
Page: 52-59
Publish at: 2018-02-01

Reversed-Trellis Tail-Biting Convolutional Code (RT-TBCC) Decoder Architecture Design for LTE

10.11591/ijece.v8i1.pp198-209
Trio Adiono , Ahmad Zaky Ramdani , Rachmad Vidya Wicaksana Putra
Tail-biting convolutional codes (TBCC) have been extensively applied in communication systems. This method is implemented by replacing the fixed-tail with tail-biting data. This concept is needed to achieve an effective decoding computation. Unfortunately, it makes the decoding computation becomes more complex. Hence, several algorithms have been developed to overcome this issue in which most of them are implemented iteratively with uncertain number of iteration. In this paper, we propose a VLSI architecture to implement our proposed reversed-trellis TBCC (RT-TBCC) algorithm. This algorithm is designed by modifying direct-terminating maximum-likelihood (ML) decoding process to achieve better correction rate. The purpose is to offer an alternative solution for tail-biting convolutional code decoding process with less number of computation compared to the existing solution. The proposed architecture has been evaluated for LTE standard and it significantly reduces the computational time and resources compared to the existing direct-terminating ML decoder. For evaluations on functionality and Bit Error Rate (BER) analysis, several simulations, System-on-Chip (SoC) implementation and synthesis in FPGA are performed.
Volume: 8
Issue: 1
Page: 198-209
Publish at: 2018-02-01
Show 1491 of 2003

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration