Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

23,598 Article Results

Sensor Temperature Compensation Technique Simulation Based on BP Neural Network

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/2361
Xiangwu Wei
Innovatively, neural network function programming in the BPNN (BP neural network) tool boxes from MATLAB are applied, and data processing is done about CYJ-101 pressure sensor, and the problem of the sensor temperature compensation is solved. The paper has made the pressure sensors major sensors and temperature sensor assistant sensors, input the voltage signal from the two sensors into the established BP neural network model, and done the simulation under the NN Toolbox environment of MATLAB. From the compensation result, it has be found that the temperature interference variable effects on the pressure output identity has dropped from 22% to 1.1%,greatly improved the pressure sensor measurement precision and anti-interference ability. DOI: http://dx.doi.org/10.11591/telkomnika.v11i6.2687
Volume: 11
Issue: 6
Page: 3304-3313
Publish at: 2013-06-01

Radio Frequency Propagation Mechanisms and Empirical Models for Hilly Areas

https://ijece.iaescore.com/index.php/IJECE/article/view/5461
Famoriji John O , Olasoji Yekeen O
Achieving better network performance is a paramount concern in wireless networks. This paper provides a survey of the basic mechanisms which influence the propagation of electromagnetic waves in hilly areas. Three empirical models: COST231-Hata, Okumura-Hata and Egli which are suitable for path loss prediction for such area are presented. By using these propagation models the broadcast signal strength are predicted for this type of environment. Measurement results of signal strength in UHF band obtained in Idanre Town of Ondo State Nigeria are presented and compared with the results predicted by using the propagation models. A modified COST231-Hata radiowave propagation model was developed and implemented with Matlab GUI (Graphical User Interface) for simulation. The model developed has 93.8% accuracy.DOI:http://dx.doi.org/10.11591/ijece.v3i3.2519
Volume: 3
Issue: 3
Page: 372-376
Publish at: 2013-06-01

Numerical Simulation of 1-D and 2-D Continuous Geo-electrical Magnetotelluric Forward

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/2376
Cao Chuang Hua , Liu Jian Xin , Tong Xiao Zhong , Gao Da Wei
Finite element technology in one-dimensional layered media of the continuous electro-media and the two-dimensional continuous electrical is displayed in ways of the special matrix equations in the variation formula and split technical conditions. To achieve a one-dimensional layered continuous electrical finite element numerical simulation of the media, the introduction of the secondary triangulation rectangular subdivision has been used to the two-dimensional numerical simulation, and using the rectangular center to set up the virtual point method to reduce the computational workload in calculation. Then design a meaningful manner electric model, the base power model analysis of electromagnetic waves in the rock, they all provide the guidance for the actual production. DOI: http://dx.doi.org/10.11591/telkomnika.v11i6.2717
Volume: 11
Issue: 6
Page: 3414-3421
Publish at: 2013-06-01

Soft-Sensing Modeling Method of Vinyl Acetate Polymerization Rate

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/2384
Jiangping Huang , Wenzhi Luo , Anan Liu
In the procedure of polyvinyl alcohol production, it is hardly accurate measuring the Vinyl Acetate (VAC) polymerization rate. To solve this awkward situation, this paper adopt Genetic Algorithm-Back Propagation (GA-BP) Neural Network to fit the nonlinear relation of the variables which derives from the production process by setting the VAC polymerization rate as the master variable and the initiator addition ratio, methanol ratio, polymerization temperature and VAC activity degree as auxiliary variables. Establish VAC polymerization rate soft-sensing model based on GA-BP network which the connection weights optimized by genetic algorithm. The comparison results with BP network based on the actual measured data show that the model this paper constructed is accurate and effective. DOI: http://dx.doi.org/10.11591/telkomnika.v11i6.2724
Volume: 11
Issue: 6
Page: 3473-3478
Publish at: 2013-06-01

A Unified Codec Scheme for reduction of Area and Crosstalk in RC and RLC Modeled Interconnects using both Bus Encoding and Shielding Insertion Technique

https://ijece.iaescore.com/index.php/IJECE/article/view/5445
Dhriti Duggal , Gurmohan Singh , Manjit Kaur
This paper presents a unified codec scheme for reduction of area and crosstalk in RC and RLC modeled interconnects using both bus encoding and shielding insertion technique. It is based upon bus invert method and focuses on 4 bit coupled lines. Previously used codec scheme focused independently on either RC or RLC models and they considered coupling between 5 bit coupled lines i.e. 4 bit data lines and 1 bit control line. However, our proposed codec scheme focuses on all types of couplings i.e. Type-0 to Type-4 and demonstrates an overall reduction in area as well as crosstalk considering coupling between 4 bit coupled lines and isolating the control signal using redundant shielding thus reducing the cases of coupling drastically. The proposed work has been implemented using both Semi Custom and Full Custom design approaches. The model has been described, synthesized and simulated in hardware description language VHDL along with its FPGA implementation. The power consumption has been calculated using Xpower tool of Xilinx. Same model has also been implemented using Cadence Virtuoso Analog Design Suite in 0.18um CMOS technology and the corresponding power, delay and area has been computed. The proposed scheme demonstrates an overall reduction of 76.68% in crosstalk delay and 56.33% in chip area and transistor count. 79.58% power reduction is achieved in full-custom design implementation as compared to semi-custom design implementation.DOI:http://dx.doi.org/10.11591/ijece.v3i4.3173
Volume: 3
Issue: 4
Page: 524-532
Publish at: 2013-05-25

Fault Detection Approaches to Power System: State-of-the-Art Article Reviews for Searching a New Approach in the Future

https://ijece.iaescore.com/index.php/IJECE/article/view/5450
Pituk Bunnoon
This paper proposes the state-of-the-art of fault detection approach a power system. Severalarticles presented it in each implementation and method from the last to present (2013). Theadvantage of the approach would be developed to the new detection in the future. Manyinterested topics used for detection of fault in the power system. In this research can beclassified into two types interesting in fault detection. This review of many paper will beused to develop the research or find the new method for an appropriate fault detection in thepower system.DOI:http://dx.doi.org/10.11591/ijece.v3i4.3195
Volume: 3
Issue: 4
Page: 553-560
Publish at: 2013-05-25

Complex Network Framework Based Comparative Study of Power Grid Centrality Measures

https://ijece.iaescore.com/index.php/IJECE/article/view/5448
A. B. M. Nasiruzzaman , H. R. Pota
New closeness and betweenness based centrality measures have been evaluated in this paper. Power grid is modeled as a directed graph. The graph is analyzed in terms of complex network theory to identify influential nodes which control power flow pattern throughout the whole grid and as a result can create cascade if removed unintentionally or targetedly. Various measures of impacts have been analyzed to show that power grid has scale-free network characteristics, i.e., it is very much vulnerable to targeted node removal. Measures of impacts include characteristic path length, connectivity loss and blackout size. Rank similarity analysis have been carried out to show that nominal condition of power system gives critical nodes which remain critical with changes in system operating conditions as well.DOI:http://dx.doi.org/10.11591/ijece.v3i4.3312
Volume: 3
Issue: 4
Page: 543-552
Publish at: 2013-05-25

Enforcing Multi-user Security Policies in Cloud Computing

https://ijece.iaescore.com/index.php/IJECE/article/view/5442
Shubhada Parashar Mone , Sunita S. Dhotre
The user can access data from any server with unlimited data with the security. Multi-user tendency will cost lesser than the expected cost in the single user environment. While dealing with cloud computing, confidential data can be secured from the unauthorized access and internal threats. Cloud servers use smart techniques for achieving this requirement like encryption and decryption of data. The database is stored in the encrypted format on the server & a complex query can be fired on it. Cloud server will maintain the access control policies to reveal the data from the database that are in the encrypted format. In the access control policies, we use KMA (Key Management Authority) which provides the keyset for encryption & decryption of the database. The attributes entered by the user will create one public key which is cipher text based. So this technique is called as cipher text based technique. This key is used for encryption. While registering, user will choose the policy and select the attributes on which security policy is based. Because of this it is called as cipher text policy attribute based encryption (CP-ABE). To achieve this complex encryption, we can use many algorithms like AES or DES encryption algorithms with CPABE algorithm. This scheme allows making SQL-like queries on encrypted database in multiuser environment while at the same time, the database owner assign different access rights to users that defines a specific policy for the database. The major use of this encryption is privacy, access control and data confidentiality and multi-user access control.DOI:http://dx.doi.org/10.11591/ijece.v3i4.3061
Volume: 3
Issue: 4
Page: 504-508
Publish at: 2013-05-25

An Optimal State Feedback Controller Based Neural Networks for Synchronous Generator Excitation Control System

https://ijece.iaescore.com/index.php/IJECE/article/view/5452
Moath Hasan Al-qatamin
In this paper, an artificial neural network (ANN) is designed to optimize thematrix gain of state feedback controller. A linear mathematical model of asynchronous generator with excitation system is used as controlled system.The conventional methods that used to find the matrix gain need tediouscalculations with compared to neural networks. The simulation proves thatthe proposed feedback controller based neural network optimization method has the better result in order to prove the dynamic performance of a single machine connected to infinite bus system(SMIB). The robustness of the proposed controller is tested by disturbance in excitation voltage. The results are compared with results of controller based on conventional methods. Thepotentials of the proposed technique are investigated using MATLAB software.DOI:http://dx.doi.org/10.11591/ijece.v3i4.3125
Volume: 3
Issue: 4
Page: 561-567
Publish at: 2013-05-25

Adjusting WiMAX for a Dedicated Surveillance Network

https://ijece.iaescore.com/index.php/IJECE/article/view/5441
Suherman Suherman , Marwan Al-Akaidi
WiMAX (Worldwide Interoperability for Microwave Access) devices have been used widely in the market. WiMAX-based video surveillance products have also been available. The acceptance of WiMAX in the market, as well as the availability of WiMAX products, contributes to the possibility of implementing it for dedicated video surveillance application. However, since WiMAX is designed to accommodate various applications with different quality of service (QoS) requirements, WiMAX–based dedicated surveillance network may not achieve optimum performance, as all SSs generate the same QoS requirements. The scheduler cannot implement traffic type priority; therefore, service classification does not work as expected. This paper proposes WiMAX adjustment to transform a multi-purpose WiMAX network into a network dedicated to video surveillance. NS-2 simulations show that the proposed adjustment is able to deliver low delay and high quality video surveillance.DOI:http://dx.doi.org/10.11591/ijece.v3i4.3181
Volume: 3
Issue: 4
Page: 492-503
Publish at: 2013-05-25

A Novel Small Sierpenski Antennas

https://ijece.iaescore.com/index.php/IJECE/article/view/5429
Abdelhak Ferchichi , Gharsallah Ali
In This paper, new small antenna is described and it is designed to be used in RFID applications at microwave frequencies. This structure represents a new version of sierpenski antenna. The reduction of size by more than 75% gives this patch a great inters.  Two equivalent resonant models are presented based on a model of triangular and sierpenski patch antennas.DOI:http://dx.doi.org/10.11591/ijece.v3i4.2580
Volume: 3
Issue: 4
Page: 436-440
Publish at: 2013-05-24

Defect Detection of Tiles Based On High Frequency Distortion

https://ijece.iaescore.com/index.php/IJECE/article/view/5440
Afsaneh Fathi , Ahmad Reza Eskandari
Quality control in Tiles Industry is of great importance. Therefore, it is effective to improve an automatic inspection system, instead of manpower, to increase accuracy and velocity and decrease costs. To this end, a new method to segment tile surfaces is offered in this study. This method aims at detecting defective areas in a tile, based on extracting features of edge defects. This method is based on the idea that human eye can better perceive the defects in a tile by looking at its edges. In the proposed method, first, in order to extract frequency characteristics resistant against transference, Undecimated Discrete Wavelet Packets transform is applied on images. Later, by computing local entropy values on high-frequency sub-bands images, those which appropriately include images defects are chosen to extract statistical features. Finally, Back propagation neural network method is used to determine segmented images containing defective areas. The obtained results, both visually and computationally indicates the higher efficacy of this method compared with the related state of the art methods.DOI:http://dx.doi.org/10.11591/ijece.v3i4.3014
Volume: 3
Issue: 4
Page: 483-491
Publish at: 2013-05-24

Alert Correlation through a Multi Components Architecture

https://ijece.iaescore.com/index.php/IJECE/article/view/5434
Saeid Dadkhah , M. R. KhaliliShoja , Hassan Taheri
Alert correlation is a process that analyzes the raw alerts produced by one or more intrusion detection systems, reduces nonrelevant ones, groups together alerts based on similarity and causality relationships between them and finally makes aconcise and meaningful view of occurring or attempted intrusions. Unfortunately, most correlation approaches use just a few components that aim only specific correlation issues and so cause reduction in correlation rate. This paper uses a general correlation model that has already been presented in [9] and is consisted of a comprehensive set of components. Then some changes are applied in the component that is related to multi-step attack scenario to detect them better and so to improve semantic level of alerts. The results of experiments with DARPA 2000 data set obviously show the effectiveness of the proposed approach.DOI:http://dx.doi.org/10.11591/ijece.v3i4.2771
Volume: 3
Issue: 4
Page: 461-466
Publish at: 2013-05-24

All-Optical NOT Logic Gate Based on Photonic Crystals

https://ijece.iaescore.com/index.php/IJECE/article/view/5438
Majid Ghadrdan , Mohammad Ali Mansouri-Birjandi
A novel scheme for implementation of all-optical NOT logic gate based on photonic crystal ring resonator has been proposed. Photonic crystal is comprised of two-dimensional square lattice of dielectric rods in air substrate. Indium phosphide with a refractive index of 3.1 is adopted as the material of the rods. The finite different time domain (FDTD) and plane wave Expansion (PWE) methods are used to analyze the behavior of the structure. The simulation results show that the contrast ratio is 10.97dB for NOT gate. Moreover, the operational wavelength of the input ports is 1.55µm. Since the structure has a simple geometric shape with clear operating principle, it is potentially applicable for photonic integrated circuits.DOI:http://dx.doi.org/10.11591/ijece.v3i4.2909
Volume: 3
Issue: 4
Page: 478-482
Publish at: 2013-05-24

Design and Analysis of Tripple Band Koch Fractal Yagi Uda Antenna

https://ijece.iaescore.com/index.php/IJECE/article/view/5432
Satyandra Singh Lodhi , P.K. Singhal , V.V. Thakare
The proposed antenna is Koch fractal printed Yagi-Uda antenna fed by SMA connector. The radiation characteristics of the antenna are simulated by CST Microwave Studio and analysed with the help of simulated results. The antenna's currents distribution becomes more uniform after being fractal, which is conducive to increase the antenna’s radiation directivity. The proposed Koch fractal Yagi-Uda antenna resonance at frequency of 7.81 GHz, 8.54 GHz and 9.42 GHz with gain of 9.67 dB, 10.4 dB and 10.61dB respectively. Parameter of antenna such as return loss, input impedance, smith chart, radiation pattern is analyzed for performance evaluation of Koch fractal Yagi-Uda antenna.DOI:http://dx.doi.org/10.11591/ijece.v3i4.2572
Volume: 3
Issue: 4
Page: 456-460
Publish at: 2013-05-24
Show 1498 of 1574

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration