Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

27,438 Article Results

A Prototype of Online Dynamic Scaling Scheduler for Real-Time Task based on Virtual Machine

10.11591/ijece.v6i1.pp205-211
Junho Seo , Kyong Hoon Kim
In this paper, we provide an architecture of power-aware scheduler for real-time virtual machine system using dynamic frequency scaling mechanism This architecture provides that how to manage real-time resource and how to control processor frequency. In addition, we propose two scheduling schemes that utilize slack time to adjust processor frequency without violating tasks deadline. Based on the provided architecture, we implement a virtualization framework with online power-aware scheduler using RT-Xen real-time hypervisor and Litmus-RT real-time OS. Our implementation manages entire of real-time resource and processor frequency depending on system policy. For trasferring real-time requirements, we implement an interface using hypercall mechanism. To evaluate provided system, we analyze performance evaluation in various aspects.
Volume: 6
Issue: 1
Page: 205-211
Publish at: 2016-02-01

Proposed Potential Security Infrastructure in VANETS using Tamper Registered Hardware

10.11591/ijece.v6i1.pp344-348
Shaik Mahaboob Jani , Syed Umar
All over the world many road accidents are occurred due to lack of knowledge of vehicle`s distance and speed. But this issue will be solved by using VANETS through which we can well know about the speed of the vehicle and how much distance it is from other vehicles in all sides. So the VANETS will play a very crucial role in the safety and mostly avoidance of accidents like reacting immediately in dangerous situations. In order to prevent the abuse of VANETS a potential security infrastructure is needed to maintain confidential requirements like message integrity & availability. To achieve this we have proposed a concept called A seperate Potential security infrastructure facilitated with symmetric & Asymmetric cryptography with TRH. Our proposed theory will give very high efficient in terms of Computational Needs for the VANETS users.
Volume: 6
Issue: 1
Page: 344-348
Publish at: 2016-02-01

Issues in Routing Mechanism for Packets Forwarding: A Survey

10.11591/ijece.v6i1.pp421-430
Rohit Nilkanth Devikar , Dipak V. Patil , V. Chandraprakash
Nowadays internet has become more popular to each and every one. It is very sensitive to nodes or links failure due to many known or unknown issues in the network connectivity. Routing is the important concept in wired and wireless network for packet transmission. During the packet transmission many times some of the problems occur, due to this packets are being lost or nodes not able to transmit the packets to the specific destination. This paper discusses various issues and approaches related to the routing mechanism. In this paper, we present a review and comparison of different routing algorithms and protocols proposed recently in order to address various issues. The main purpose of this study is to address issues for packet forwarding like network control management, load balancing, congestion control, convergence time and instability. We also focus on the impact of these issues on packet forwarding.
Volume: 6
Issue: 1
Page: 421-430
Publish at: 2016-02-01

Semantic Similarity/Relatedness for Cross Language Plagiarism Detection

10.11591/ijeecs.v1.i2.pp371-374
Hanane Ezzikouri , Mohammed Erritali , Mohamed Oukessou
Generally utterances in natural language are highly ambiguous, and a unique interpretation can usually be determined only by taking into account the context in the utterance occurred. Automatically determining the correct sense of a polysemous word is a complicated problem especially in multilingual corpuses. This paper presents an application programming interface for several Semantic Relatedness/Similarity metrics measuring semantic  similarity/distance  between multilingual words  and  concepts, in order to use it after for sentences and paragraphs in Cross Language Plagiarism Detection (CLPD); using WordNet for the English-French and English-Arabic multilingual plagiarism cases.
Volume: 1
Issue: 2
Page: 371-374
Publish at: 2016-02-01

The Performance of CSR Mutual Funds and Investment Decision-Making

10.11591/ijeecs.v1.i2.pp229-237
Jen-Der Day , Thuy Mai Trinh Nguyen , Chia Nan Wang , George Yungchih Wang
Nowaday, Corporate Socially Responsible (CSR) mutual funds are becoming a popular investment option for investors. However, no any research confirms whether CSR Mutual fund activity is better than market index or not. Besides, we should have one method can help con sequently investors in making the decision to select appropriate investment funds. In this study, we measure the financial performance of a sample of 15 CSR mutual funds in the world, with the monthly return over the period 2008-2013, then we propose the dession table. We first use the measures to evaluate the performance of mutual funds such as Alpha (α), Sharpe Ratio (SR), and Information Ratio (IR). And then, we use the obtained decision table to evaluate the predictability by each measure. The results indicate that only 3 of the 15 CSR mutual funds achieve good performance results based on the statistical significance of the two measures Sharpe Ratio and Information Ratio. In addition, the IR is suggested to evaluate and make investment decisions in the future and it also is the best one among the three measures. The decision table suggest investors a measure forecast accuracy way.
Volume: 1
Issue: 2
Page: 229-237
Publish at: 2016-02-01

Designing Game-Based Service Desk towards User Engagement Improvement

10.11591/ijeecs.v1.i2.pp381-389
Kridanto Surendro , Sarifah Putri Raflesia
Along the implementation of Information Technology (IT), there are incident, request, problem, and event. According to this, organizations need to implement a function which can be a single point to provide communication between IT service provider and IT users. Information Technology Infrastructure Library (ITIL) mentions service desk as a function to operate solution of  this matter. But, recently organizations find new challenge which is related to service desk staffs’ motivation. The repeated activities which are run by service desk may cause saturation. This situation will affect workplace enviroment and productivity. In this research, we propose a design to help organization build game-like activities as solution to boost service desk’s motivation which can give good impact to service desk’s quality. Our proposed design uses game approach and ITIL practices to ensure that game-based service desk is well designed.
Volume: 1
Issue: 2
Page: 381-389
Publish at: 2016-02-01

Inset Feed Toppled H-Shaped Microstrip Patch Antenna for PCS/WiMAX Application

10.11591/ijeecs.v1.i2.pp365-370
Mohammad Aneesh , Mohd. Gulman Siddiqui , Jamshed Aslam Ansari , Ashish Singh , Km. Kamakshi
In this paper, an inset feed toppled H-shaped microstrip patch antenna with grounded plane is investigated for triple band operation. The simulation of proposed antenna geometry has been performed using IE3D simulation software based on method of moment. The prototype of the proposed antenna has been fabricated and tested to validate the simulation work. The measured results indicate that the reflection coefficient is better than -10dB for 1.8 GHz (PCS), 3.5 GHz (WiMAX), and 5.5 GHz (WiMAX) frequencies.
Volume: 1
Issue: 2
Page: 365-370
Publish at: 2016-02-01

Tuning of PID Controller for Load Frequency Control Problem via Harmony Search Algorithm

10.11591/ijeecs.v1.i2.pp255-263
M. Omar , M. A. Ebrahim , A. M. Abdel Ghany , F. Bendary
In this paper, a new artificial intelligence technique, Harmony Search (HS), will be used for the optimization of a classical order PID for a two-area load frequency control (LFC) model using the participation factor concept. The HS has four main variants, these variants had been used for the optimization of classical order PID controllers in case of centralized control scheme, the results had been compared to select and recommend the best HS variant. Then, this best HS variant had been used for the tuning of PID controllers in case of decentralized scheme.
Volume: 1
Issue: 2
Page: 255-263
Publish at: 2016-02-01

Several Mode-Locked Pulses Generation and Transmission over Soliton Based Optical Transmission Link

10.11591/ijeecs.v1.i2.pp288-293
IS Amiri , SE Alavi
A soliton-based optical communication system is presented to generate and transmits several mode locked laser pulses (generated by fiber laser setup) over 50 km fiber and 120 m wireless link. The passive mode-locking feature of the laser system proposed in this paper is based on nonlinear polarization rotation evolution.
Volume: 1
Issue: 2
Page: 288-293
Publish at: 2016-02-01

On Sparse Compression Complexity of Speech Signals

10.11591/ijeecs.v1.i2.pp329-340
Ahmed Omara , Alaa Hefnawy , Abdelhalim Zekry
In this paper, we have addressed the issue of the sparse compression complexity for the speech signals. First of all, this work illustrated the effect of the signal length on the complexity levels of Matching Pursuit (MP) and Orthogonal Matching Pursuit (OMP) algorithms. Also, this paper introduced a study of possibility to reduce that complexity by exploiting the shared atoms among the contiguous speech compressions. By comparing the shared atoms levels and a threshold level induced by an analytic model based on the both the central and non-central hyper-geometric distributions, we proved the ability of the shared atoms criterion to detect if there is biasing towards a subspace of atoms or not, and to decide if the biasing occurs due to the redundancy in the dictionary of atoms, or due to the redundancy in the signal itself. Moreover, we suggested a subspace bias-based approaches for complexity reduction called "Atoms Reuse" and "Active Cluster". Both methods exploits the higher levels of the shared atoms to reduce the compression complexity by reducing the search space during the pursuit iterations.
Volume: 1
Issue: 2
Page: 329-340
Publish at: 2016-02-01

Travel Angle Control of Quanser Bench-top Helicopter based on Quantitative Feedback Theory Technique

10.11591/ijeecs.v1.i2.pp310-318
A. H. Mohd Hairon , H. Mansor , T. S. Gunawan , S. Khan
A three degree of freedom (3-DOF) bench-top helicopter is a simplified aerial vehicle which is used to study the behaviors of the helicopter as well as testing multiple flight control approaches for their efficiency. Designing helicopter’s dynamic control is a challenging task due to the presence of high uncertainties and non-linear behavior. The main objective of this research is to achieve robust control over the helicopter model regardless parameter variation and disturbances using robust control technique, Quantitative Feedback Theory (QFT). QFT utilizes frequency domain methodology which ensures plant’s stability by considering the feedback of the system and thus removing the effect of disturbances and reducing sensitivity of parameter’s variation. The proposed technique is tested against LQR-tuned PID controller in both simulation and real hardware environment to verify its performance. The results obtained shown us that QFT algorithm managed to reduce settling time and steady state error of about 80% and 33% respectively over the classical PID controller.
Volume: 1
Issue: 2
Page: 310-318
Publish at: 2016-02-01

Electricity Peak Load Demand using De-noising Wavelet Transform integrated with Neural Network Methods

10.11591/ijece.v6i1.pp12-20
Pituk Bunnoon
One of most important elements in electric power system planning is load forecasts. So, in this paper proposes the load demand forecasts using de-noising wavelet transform (DNWT) integrated with neural network (NN) methods. This research, the case study uses peak load demand of Thailand (Electricity Generating Authority of Thailand: EGAT). The data of demand will be analyzed with many influencing variables for selecting and classifying factors. In the research, the de-noising wavelet transform uses for decomposing the peak load signal into 2 components these are detail and trend components. The forecasting method using the neural network algorithm is used. The work results are shown a good performance of the model proposed. The result may be taken to the one of decision in the power systems operation.
Volume: 6
Issue: 1
Page: 12-20
Publish at: 2016-02-01

Modified Variational Mode Decomposition for Power Line Interference Removal in ECG Signals

10.11591/ijece.v6i1.pp151-159
Neethu Mohan , Sachin Kumar S , Prabaharan Poornachandran , Soman K.P
Power line interferences (PLI) occurring at 50/60 Hz can corrupt the biomedical recordings like ECG signals and which leads to an improper diagnosis of disease conditions. Proper interference cancellation techniques are therefore required for the removal of these power line disturbances from biomedical recordings. The non-linear time varying characteristics of biomedical signals make the interference removal a difficult task without compromising the actual signal characteristics. In this paper, a modified variational mode decomposition based approach is proposed for PLI removal from the ECG signals. In this approach, the central frequency of an intrinsic mode function is fixed corresponding to the normalized power line disturbance frequency. The experimental results show that the PLI interference is exactly captured both in magnitude and phase and are removed. The proposed approach is experimented with ECG signal records from MIT-BIH Arrhythmia database and compared with traditional notch filtering.
Volume: 6
Issue: 1
Page: 151-159
Publish at: 2016-02-01

Analysis of Legacy System in Software Application Development: A Comparative Survey

10.11591/ijece.v6i1.pp292-297
M. Srinivas , G. Ramakrishna , K. Rajasekhara Rao , E. Suresh Babu
Software evolution is one of the challenging issues in today’s business environment. It is necessary for the organizations, which make use of Information, and Communication Technologies will have to align their business processes to compete with global business. The existing large software systems (“legacy” systems) have never been built to cope with the current business requirement for their poor coding, design structures, logic and documentation. Moreover, Legacy applications have various problems such as lack of up to-date documentation, skilled man power, resources of the Legacy applications, and high maintenance costs. Even though the Legacy system is obsolete, it contains detailed business rules and in continuous use, because it satisfies the users' needs and forms the backbone of the information flow of organization. One of the possible solutions is to refactor or modernize those systems into a new platform. It is necessary to analyse the existing legacy system for better understanding the business logic and its functionalities. This paper analyses various techniques proposed for understanding Legacy systems in existence.
Volume: 6
Issue: 1
Page: 292-297
Publish at: 2016-02-01

Using Square Wave Input for Wireless Power Transfer

10.11591/ijece.v6i1.pp431-438
Kazuya Yamaguchi , Takuya Hirata , Ichijo Hodaka
A wireless power transfer (WPT) circuit is composed of a transmitting circuit with an AC power supply and a receiving circuit with a load, and the circuits are wirelessly connected each other. Then a designer chooses the wave form of the AC power supply. Many papers about WPT adopt a sinusoidal wave as the input. The frequency of the sinusoidal wave is generally determined to the resonant frequency of the circuit for high power transfer. Since the number of circuit elements in the power supply to generate a square wave is much less than that of a sinusoidal wave, WPT with a square wave input should be treated. In fact, some papers about WPT adopt a square wave as the input, and adjust the frequency of the square wave to the resonant frequency of the circuit. In this paper, we examine how the frequency of a square wave input affects power and efficiency of WPT circuits, and propose a procedure how to determine the frequency of the input to improve power and efficiency. Finally we discuss which wave should be adopted as an input and how the frequency of the input should be determined, regardless of whether resonant phenomena occur or not.
Volume: 6
Issue: 1
Page: 431-438
Publish at: 2016-02-01
Show 1511 of 1830

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration