Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,167 Article Results

Composite Nonlinear Feedback with Disturbance Observer for Active Front Steering

10.11591/ijeecs.v7.i2.pp434-441
Sarah 'Atifah Saruchi , Hairi Zamzuri , Noraishikin Zulkarnain , Norbaiti Wahid , Mohd Hatta Mohammed Ariff
One of the dominant virtue of Steer-By-Wire (SBW) vehicle is its capability to enhance handling performance by installing Active Front Steering (AFS) system without the driver’s interferences. Hence, this paper introduced an AFS control strategy using the combination of Composite Nonlinear Feedback (CNF) controller and Disturbance Observer (DOB) to achieve fast yaw rate tracking response which is also robust to the existence of disturbance. The proposed control strategy is simulated in J-curve and Lane change manoevres with the presence of side wind disturbance via Matlab/Simulink sotware. Futhermore, comparison with Proportional Integral Derivative (PID) and Linear Quadratic Regulator (LQR) controllers are also conducted to evaluate the effectiveness of the proposed controller. The results showed that the combined CNF and DOB strategy achieved the fastest yaw rate tracking capability with the least impact of disturbance in the AFS system installed in SBW vehicle.
Volume: 7
Issue: 2
Page: 434-441
Publish at: 2017-08-01

Design and Analysis of Lagrangian Algorithm for Power Flow System using Renewable Energy Resources

10.11591/ijeecs.v7.i2.pp348-355
Subramani Rajamanickam , Vijayalakshmi C
This paper mainly deals with the implementation of an Lagrangian Relaxation (LR) technique through a Supervisory Control and Data Acquisition (SCADA) system. Maintaining Power Station is not an easy task which to achieve its demand such as regulating inputs monitoring energy losses. In this paper we have introduced novel SCADA based decentralized approach to minimize the loss of the system and optimize the total generation cost. Due to the nonlinearities of Electricity demand and scheduling time, the problem is not solvable with the usual optimization techniques. For getting appropriate solution LR technique has been formulated as a nonlinear programming problem with respect to optimal energy constraints. Based on the numerical calculations and graphical representations the renewable energy sources are optimally allocated in individual and hybrid configurations, which leads to effective production.
Volume: 7
Issue: 2
Page: 348-355
Publish at: 2017-08-01

Analysis of Competition Fronting the Popularity of Content in Social Networks

10.11591/ijict.v6i2.pp86-94
Siham Hafidi , Mohamed Baslam , Rachid El Ayachi
In recent years, on the Internet, there is a real phenomenon: the development of social networks that are becoming more popular and more used. Social networks have millions of users worldwide. This provides an opportunity for companies to reach out a large and diverse audience for their advertising campaigns. They do this by creating and spreading content across the social network, which will increase the chance of visibility for their contents, which for them is the assurance of being popular. Every content requires time to reach a specific destination on the networks. In this article, we study competition between several contents that look for attracting more consultations, each characterized by some given popularity. There is competition between the contents of a limited set of destinations. We first model our system, we then study the competition between contents by using the game theory to analyze this behavior. We finally provide numerical results, which provide insights into the effect of various parameters of the system.
Volume: 6
Issue: 2
Page: 86-94
Publish at: 2017-08-01

XMapDB-Sim: Performance Evalaution on Model-based XML to Relational Database Mapping Choices

10.11591/ijeecs.v7.i2.pp551-566
Haw Su-Cheng , Emyliana Song , Nur Amirah Azhar , Aisyah Amin
XML has emerged as the standard for information representation over the Internet. However, most enterprises today have long secured the use of relational databases. Thus, it is crucial to map XML data into relational data to provide seamless integration between these database infrastructures. Many mapping techniques have been proposed, yet, none has provides a unified view on these techniques. Ultimately, understanding how these techniques work is important especially if one needs to decide which technique to adopt in their organization. This paper (i) reviews on some existing model-based mapping schemes focusing on how the mapping technique works, the advantages and the disadvantages, (ii) present the simulation engine to evaluate the performance of selected mapping schemes, (iii) highlight the future direction of the related area.
Volume: 7
Issue: 2
Page: 551-566
Publish at: 2017-08-01

Distributed Generation Integration to Grid using Multi-Level CHB Inverter

10.11591/ijeecs.v7.i2.pp312-321
Velishala Ramu , P. Satish Kumar , G. N Sreenivas
Environmental conditions, electrical modeling and developments in industries led to new power generation epoch where fat section of power required for load section is fed through extensive induction of distributed resources generally known as distributed generation [DG]. Distributed generation reduces the risk of environmental pollution and distance criterion posed from conventional power generation. This paper presents grid integration scheme of distributed generation using five-level cascaded H-Bridge (CHB) inverter. Reference currents used to produce pulses for switches in CHB are generated using a simple control strategy. Performance of the system was evaluated when only active power is fed from distributed generation to grid and also when both active and reactive powers were fed to grid from distributed generation. Proposed system was developed using MATLAB/SIMULINK software and results are presented.
Volume: 7
Issue: 2
Page: 312-321
Publish at: 2017-08-01

Sign Detection Vision Based Mobile Robot Platform

10.11591/ijeecs.v7.i2.pp524-532
Hairol Nizam Mohd Shah , Mohd Zamzuri Ab Rashid , Zalina Kamis , Mohd Shahrieel Mohd Aras , Nursabillilah Mohd Ali , Faizil Wasbari , Tengku Muhammad Mahfuz Tengku Anuar
Vision system applied in electrical power generated mobile robot to provide a comfortable ride while providing comfort to tourist to interact with visitors. The camera is placed in front of the mobile robot to snap the images along in pathways. The system can recognized the sign which are right, left and up by using Harris corner algorithms and will be display in Graphical User Interface (GUI). A sign can be determined from the vertex coordinates according to the degree to distinguish the direction of the sign. The system will be tested in term of percentage of success in Harris point detection and availability to detect sign with different range. The result show the even though not all Harris point in an image can be detected but most of the images possible to recognise it sign direction.
Volume: 7
Issue: 2
Page: 524-532
Publish at: 2017-08-01

Qualitative Analysis of Recognition-based Graphical Password Authentication Schemes for Accessing the Cloud

10.11591/ijeecs.v7.i2.pp507-513
K Gangadhara Rao , Vijayakumari Rodda , B Basaveswara Rao
Cloud computing is increasingly becoming popular as many enterprise applications and data are moving into cloud platforms. However, a major barrier for cloud application is real and perceived lack of security. There are many security mechanisms exercised to utilize cloud services. Amongst them the prominent and primitive security mechanism is the Authentication System. Traditional text based passwords are susceptible to threats. Tough passwords are hard to recall and easily recalled passwords are simple and predictable. Graphical passwords are introduced as the better alternative. Two types of graphical passwords are there – recall based and recognition based. This research reviews several Recognition-Based Graphical Password methods and analyses their security based on the estimation criteria. Moreover, the research defines a metric called a 14-point scale that would make it possible for the qualitative analysis of the graphical passwords schemes. 
Volume: 7
Issue: 2
Page: 507-513
Publish at: 2017-08-01

Energy Optimization of Routing Protocols in Wireless Sensor Networks

10.11591/ijict.v6i2.pp76-85
Fatima Es-sabery , Hicham Ouchitachen , Abdellatif Hair
The hierarchical routing of data in WSNs is a specific class of routing protocols it encompasses solutions that take a restructuring of the physical network in a logical hierarchy system for the optimization of the consum-ption of energy. Several hierarchical routing solutions proposed, namely: the protocol LEACH (Low Energy Adaptive Clustering Hierarchy) consist of dividing the network in distributed clusters at one pop in order of faster data delivery and PEGASIS protocol (Power-Efficient Gathering in Sensor Information Systems) which uses the principle of constructing a chain’s sensor node. Our contribution consists of a hierarchical routing protocol, which is the minimization of the energy consumption by reducing the transmission distance of data and reducing the data delivery time. Our solution combines the two hierarchical routing approaches: chain based approach and the cluster based approach. Our approach allows for multi-hop communications, intra- and intercluster, and a collaborative aggregation of data in each Cluster, and a collaborative aggregation of data at each sensor node.
Volume: 6
Issue: 2
Page: 76-85
Publish at: 2017-08-01

An Efficient Environmental Channel Modelling in 802.11p MAC Protocol for V2I

10.11591/ijeecs.v7.i2.pp404-414
Neelambike S , Chandrika J
Recent development in communication of wireless communication for automobile industry have aided the growth of SITS (Smart Intelligent Transport System) which solves numerous vehicular based communication service concerns like traffic congestion, accidental mishap etc. VANET (Vehicular Ad-hoc Network) a characteristic class of MANET (Mobile ad-hoc Network) which is a fundamental element of SITS in which the moving vehicles inter connected and communicates with each other remotely. Wireless technologies play an important part in assisting both Vehicle to Infrastructure (V2I) and Vehicle to Vehicle (V2V) correspondence in VANET. The existing scheduling technique does not consider the environmental factor which affects the throughput performance and increases packet drop rate which result in degradation of service quality. Here in this work the author propose a RHU (Rural, Highway and Urban) environment model considering the environmental factor. The efficient environmental model algorithm is incorporated into slotted aloha in IEEE 802.11p MAC protocols which aided as a spine for assisting both safety application and non-Safety applications. Experiments are conducted for collision and throughput efficiency for varied traffic load and speed of vehicle. The experimental result shows the proposed environmental model impact on collision and throughput efficiency for varied environment and thus helps improving QoS for VANET application.
Volume: 7
Issue: 2
Page: 404-414
Publish at: 2017-08-01

Mobile Ad Hoc Networks in Presence of Black Hole Attack

10.11591/ijeecs.v7.i2.pp577-582
Anshu Prakash Murdan , Anshuman Bhowon
This paper analyses three performance metrics namely average throughput, average network load and average video conferencing packet end-to-end delays under the influence of black hole attack in a Mobile Ad Hoc Network, using the ad hoc on-demand distance vector routing protocol. The simulation was carried out on Riverbed Modeler Academic Edition software. Simulation results show that the average throughput, average network load and average video conferencing packet end-to-end delay decreases as the number of black hole attack nodes is increased. Also, the effects of the influence of black hole attack nodes tend to decrease due to mobility of the nodes. It was observed that when the destination nodes move closer to the source nodes and get in to the latter’s transmission range, the effects of the black hole attack is greatly minimized.
Volume: 7
Issue: 2
Page: 577-582
Publish at: 2017-08-01

The Study of User Acceptance Toward E-Learning System in Higher Education

10.11591/ijeecs.v7.i2.pp466-473
Dana Indra Sensuse , Darmawan Baginda Napitupulu
E-learning is a model of delivering learning content electronically with the help of computers and multimedia. ABC University has implemented the e-learning system for two (2) years in order to improve the quality of teaching and learning process. This study aims to determine the level of user acceptance, especially from the perspective of students. In other words, this study also wants to evaluate the implementation of e-learning systems in higher education as well as identifying any factors that encourage students to use e-learning system especially in ABC University. The research method used was survey with the approach of TAM (Technology Acceptance Model) as the technology acceptance evaluation model consisting of two main factors: perceived ease of use and perceived usefulness. The results showed perceived usefulness significantly positive influence on user acceptance, while perceived ease of use did not significantly influence on user acceptance. The perceived ease of use also significantly positive influence perceived usefulness. The variance of user acceptance could be explained by two factors about 50.5%. 
Volume: 7
Issue: 2
Page: 466-473
Publish at: 2017-08-01

Modeling of 6 to 4 Switched Reluctance Motor using Coefficient Method and Analytical Method

10.11591/ijeecs.v7.i2.pp373-380
Kasrul Abd Karim , N. Abdullah , M. Nazri Othman , Auzani Jidin , RN Firdaus
Electric kick scooter field has become famous this lately, and become another solution for electric vehicle. Switched Reluctance Motor has been choosen as the propulsion system in this application due to the advantages of this motor. Meanwhile, the issue of lack experience in electrical motor design is one of the hollow subjects in machine design field. Through design aspects, the Switched Reluctance motor is developed using a simple technique which is coefficients method. This method is to provide the easiest ways for other non-academic designer for those who has lack experience in motor design. A set of a coefficient to determine motor dimension is being set. Then, this technique will be refered to the existing analytical method to provide a design guideline and to validate this coefficient as the quick references to design the SRM. The aim is not to make a comparison between the methods but intend to provide another easiest solution to design the SRM motor. The modelling has been test using RMxprt tools The expectation from this method is the outcomes will be compatible with existing design.
Volume: 7
Issue: 2
Page: 373-380
Publish at: 2017-08-01

A Range Based Localization Error Minimization Technique for Wireless Sensor Network

10.11591/ijeecs.v7.i2.pp395-403
Sudha H. Thimmaiah , Mahadevan G
Wireless sensor network (WSN) is composed of low cost, tiny sensor that communicates with each other and transmit sensory data to its base station/sink. The sensor network has been adopted by various industries and organization for their ease of use and is considered to be the most sorted future paradigm. The sensor devices are remotely deployed and powered by batteries. Preserving the energy of sensor devices is most desired. To preserve the battery efficient routing technique is needed. Most routing technique required prior knowledge of sensor nodes location in order to provide energy efficiency. Many existing technique have been proposed in recent time to determine the position of sensor nodes. The existing technique proposed so for suffers in estimating the likelihood of localization error. Reducing the error in localization is most desired. This work present a (Time-of-Arrival) based localization technique and also present adaptive information estimation model to reduce/approximate the localization error in wireless sensor network. The author compares our proposed localization model with existing protocol and analyses its efficiency.
Volume: 7
Issue: 2
Page: 395-403
Publish at: 2017-08-01

A New Design of a Wideband Miniature Antenna Array

10.11591/ijece.v7i4.pp1850-1857
Oulhaj Otman , Naima A. Touhami , Mohamed Aghoutane , Abdelmounaim Belbachir Kchairi
In this work, we present a new configuration of a new miniature microstrip antenna array having a wide frequency band and with a circular polarization. The bandwidth is about 2GHz for a reflection coefficient under -10dB and centered on the ISM ‘Industrial Scientific Medical’ band at 5.8 GHz. To design such array, we have started the design by validating one antenna element at 10 GHz and after that by using the technique of defected ground, we have validated the antenna array in the frequency band [4 GHz -6 GHz] which will permit to miniature the dimensions. The final fabricated antenna array is mounted on an FR4 substrate, the whole area is 102.48 X 31.39 mm2  with a gain of 5dBi at 4GHz.
Volume: 7
Issue: 4
Page: 1850-1857
Publish at: 2017-08-01

Asymptotic Stability of Quaternion-based Attitude Control System with Saturation Function

10.11591/ijece.v7i4.pp1994-2001
Harry Septanto , Djoko Suprijanto
In the design of attitude control, rotational motion of the spacecraft is usually considered as a rotation of rigid body. Rotation matrix parameterization using quaternion can represent globally attitude of a rigid body rotational motions. However, the representation is not unique hence implies difficulties on the stability guarantee. This paper presents asymptotically stable analysis of a continuous scheme of quaternion-based control system that has saturation function. Simulations run show that the designed system applicable for a zero initial angular velocity case and a non-zero initial angular velocity case due to utilization of deadzone function as an element of the defined constraint in the stability analysis.
Volume: 7
Issue: 4
Page: 1994-2001
Publish at: 2017-08-01
Show 1493 of 1945

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration