Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,082 Article Results

Quality of Service based Task Scheduling Algorithms in Cloud Computing

10.11591/ijece.v7i2.pp1088-1095
Sirisha Potluri , Katta Subba Rao
In cloud computing resources are considered as services hence utilization of the resources in an efficient way is done by using task scheduling and load balancing. Quality of service is an important factor to measure the trustiness of the cloud. Using quality of service in task scheduling will address the problems of security in cloud computing. This paper studied quality of service based task scheduling algorithms and the parameters used for scheduling. By comparing the results the efficiency of the algorithm is measured and limitations are given. We can improve the efficiency of the quality of service based task scheduling algorithms by considering these factors arriving time of the task, time taken by the task to execute on the resource and the cost in use for  the communication.
Volume: 7
Issue: 2
Page: 1088-1095
Publish at: 2017-04-01

Image Processing for Rapidly Eye Detection based on Robust Haar Sliding Window

10.11591/.v7i2.pp823-830
Fitri Utaminingrum , Renaldi Primaswara Praetya , Yuita Arum Sari
Object Detection using Haar Cascade Clasifier widely applied in several devices and applications as a medium of interaction between human and computer such as a tool control that utilizes the detection of eye movements. Obviously speed and precision in the detection process such as eyes, has an effect if implemented on a device. If the eye could not detect accurately, controlling device systems could reach bad detection as well. The proposed method can be used as an approach to detect the eye region of eye based on haar classifier method by means of modifying the direction of sliding window. In which, it was initially placed in the middle position of image on facial area by assuming the location of eyes area in the central region of the image. While the window region of conventional haar cascade scan the whole of image start from the left top corner. From the experiment by using our proposed method, it can speed up the the computation time and improve accuracy significantly reach to 92,4%.
Volume: 7
Issue: 2
Page: 823-830
Publish at: 2017-04-01

DARE Algorithm: A New Security Protocol by Integration of Different Cryptographic Techniques

10.11591/.v7i2.pp1032-1041
John Mark Espalmado , Edwin Arboleda
Exchange of information between computer networks requires a secure communications channel to prevent and monitor unauthorized access, modification and denial of the computer network. To address this growing problem, security experts sought ways to advance the integrity of data transmission. Security Attacks compromises the security and hence hybrid cryptographic algorithms have been proposed to achieve safe service in the proper manner, such as user authentication and data confidentiality. Data security and authenticity are achieved using these algorithms. Moreover, to improve the strength and cover each algorithm’s weaknesses, a new security algorithm can be designed using the combination of different cryptographic techniques. This design uses Digital Signature Algorithm (DSA) for authentic key generation, Data Encryption Standard (DES) for key scheduling, and Advanced Encryption Standard (AES) and Rivest–Schamir–Adleman Algorithm (RSA) in encrypting data. This new security algorithm has been proposed for improved security and integrity by integration of these cryptographic techniques.
Volume: 7
Issue: 2
Page: 1032-1041
Publish at: 2017-04-01

Evaluation of the Energy Performance of the Amougdoul Wind Farm, Morocco

10.11591/.v7i2.pp692-705
Asma Ezzaidi , Mustapha Elyaqouti , Lahoussine Bouhouch , Ahmed Ihlal
This paper is concerned with the assessment of the the performance of the Amougdoul wind farm. We have determined the Weibull parameters; namely the scale parameter, c (m/s) and shape parameter, k. After that, we have estimated energy output by a wind turbine using two techniques: the useful power calculation method and the method based on the modeling of the power curve, which is respectively 134.5 kW and 194.19 KW corresponding to 27% and 39% of the available wind energy, which confirm that the conversion efficiency does not exceed 40%.
Volume: 7
Issue: 2
Page: 692-705
Publish at: 2017-04-01

A Modified Diagonal Mesh Shuffle Exchange Interconnection Network

10.11591/.v7i2.pp1042-1050
Akash Punhani , Pardeep Kumar , Nitin Nitin
Interconnection network is an important part of the digital system. The interconnection mainly describes the topology of the network along with the routing algorithm and flow control mechanism. The topology of the network plays an important role on the performance of the system. Mesh interconnection network was the simplest topology, but has the limited bisection bandwidth on the other hand torus and diagonal mesh was having long links. The Modified diagonal mesh network tried to replace the torodial links but was having more average path length so in proposed topology we have tried to improve the average distance using shuffle exchange network over the boundary node. In this paper, we propose the architecture of Modified Diagonal Mesh Shuffle Exchange Interconnection Network. This Modified Diagonal Mesh Shuffle Exchange Interconnection network have been compared with four popular topologies that are simple 2D Mesh, 2D Torus, Diagonal Mesh and Modified Diagonal Mesh Interconnection Network on the four traffic patterns such as Bit Complement traffic, Neighbor traffic, Tornado traffic and Uniform traffic are used for comparisonand performance analysis. We have performed the analysis with a 5% and 10% of hotspot on the Uniform Traffic. The simulation results shows that the proposed topology is performed better on bit complement traffic and can also handle the other traffic up to certain level.
Volume: 7
Issue: 2
Page: 1042-1050
Publish at: 2017-04-01

Optimal Allocation of Capacitor Bank in Radial Distribution System using Analytical Approach

10.11591/.v7i2.pp748-753
Sarfaraz Nawaz , M.P. Sharma , Abhishek Gupta
In this paper, a novel analytical technique is proposed for optimal allocation of shunt capacitor bank in radial distribution system. An objective function is formulated to determine the optimal size, number and location of capacitor bank for real & reactive power loss reduction, voltage profile enhancement and annual cost saving. A new constant, Power Voltage Sensitivity Constant (PVSC), has been proposed here. The value of PVSC constant decides the candidate bus location and size. The achievability of the proposed method has been demonstrated on IEEE-69 bus and real distribution system of Jamawaramgarh, Jaipur city. The obtained results are compared with latest optimization techniques to show the effectiveness and robustness of the proposed technique.
Volume: 7
Issue: 2
Page: 748-753
Publish at: 2017-04-01

An Improved Integrated Hash and Attributed based Encryption Model on High Dimensional Data in Cloud Environment

10.11591/.v7i2.pp950-960
Satheesh K S V A Kavuri , Gangadhara Rao Kancherla , Basaveswararao Bobba
Cloud computing is a distributed architecture where user can store their private, public or any application software components on it. Many cloud based privacy protection solutions have been implemented, however most of them only focus on limited data resources and storage format. Data confidentiality and inefficient data access methods are the major issues which block the cloud users to store their high dimensional data. With more and more cloud based applications are being available and stored on various cloud servers, a novel multi-user based privacy protection mechanism need to design and develop to improve the privacy protection on high dimensional data. In this paper, a novel integrity algorithm with attribute based encryption model was implemented to ensure confidentiality for high dimensional data security on cloud storage. The main objective of this model is to store, transmit and retrieve the high dimensional cloud data with low computational time and high security. Experimental results show that the proposed model has high data scalability, less computational time and low memory usage compared to traditional cloud based privacy protection models.
Volume: 7
Issue: 2
Page: 950-960
Publish at: 2017-04-01

Implementation of Algorithm for Vehicle Anti-Collision Alert System in FPGA

10.11591/.v7i2.pp775-783
Aiman Zakwan Jidin , Lim Siau Li , Ahmad Fauzan Kadmin
Vehicle safety has becoming one of the important issues nowadays, due to the fact the number of road accidents, which cause injuries, deaths and also damages, keeps on increasing. One of the main factors which contribute to these accidents are human's lack of awareness and also carelessness. This paper presents the development and implementation of an algorithm to be utilized for vehicle anti-collision alert system, which may be useful to reduce the occurrence of accidents. This algorithm, which is to be deployed with the front sensors of the vehicle, is capable of alerting any occurrence of sudden slowing or static vehicles ahead, by sensing the rate of distance change. Furthermore, it also triggers an alert if the driver is breaching the safe distance from the vehicle ahead. This algorithm has been successfully implemented in Altera DE0 FPGA and its functionality was validated via hardware experimental tests.
Volume: 7
Issue: 2
Page: 775-783
Publish at: 2017-04-01

Compact Digital Television (DTV) Antenna for Indoor Usage

10.11591/.v7i2.pp784-790
Mohamad Aasyraaf Mohd Shaufi , Huda A. Majid , Zuhairiah Zainal Abidin , Samsul Haimi Dahlan , Mohamad Kamal A. Rahim , Osman Bin Ayop
A compact indoor digital antenna for digital terrestrial television is proposed. The design of the antenna begins with the material selection to construct the antenna by using CST software with a standard monopole antenna design. The antenna is then simulated and optimized. A bandwidth of 290 MHz (46.14%) between 500 MHz and 790 MHz is achieved with the antenna gain more than 3 dBi. Simulated results is used to demonstrate the performance of the antenna. The simulated return losses, together with the radiation patterns and gain are presented and discussed.
Volume: 7
Issue: 2
Page: 784-790
Publish at: 2017-04-01

Optimal Siting of Distributed Generators in a Distribution Network using Artificial Immune System

10.11591/.v7i2.pp641-649
Meera P.S. , S. Hemamalini
Distributed generation (DG) sources are being installed in distribution networks worldwide due to their numerous advantages over the conventional sources which include operational and economical benefits. Random placement of DG sources in a distribution network will result in adverse effects such as increased power loss, loss of voltage stability and reliability, increase in operational costs, power quality issues etc. This paper presents a methodology to obtain the optimal location for the placement of multiple DG sources in a distribution network from a technical perspective. Optimal location is obtained by evaluating a global multi-objective technical index (MOTI) using a weighted sum method. Clonal selection based artificial immune system (AIS) is used along with optimal power flow (OPF) technique to obtain the solution. The proposed method is executed on a standard IEEE-33 bus radial distribution system. The results justify the choice of AIS and the use of MOTI in optimal siting of DG sources which improves the distribution system efficiency to a great extent in terms of reduced real and reactive power losses, improved voltage profile and voltage stability. Solutions obtained using AIS are compared with Genetic algorithm (GA) and Particle Swarm optimization (PSO) solutions for the same objective function.
Volume: 7
Issue: 2
Page: 641-649
Publish at: 2017-04-01

SC-FDM-IDMA Scheme Employing BCH Coding

10.11591/.v7i2.pp992-998
Roopali Agarwal , Manoj K. Shukla
In OFDM-IDMA scheme, intersymbol interference (ISI) is resolved by the OFDM layer and multiple access interference (MAI) is suppressed by the IDMA layer at low cost . However OFDM-IDMA scheme suffers high peak-to-average power ratio (PAPR) problem. For removing high PAPR problem a hybrid multiple access scheme SC-FDM-IDMA has been proposed. In this paper, bit error rate (BER) performance comparison of SC-FDM-IDMA scheme, OFDM-IDMA scheme and IDMA scheme have been duly presented.  Moreover, the BER performance of various subcarrier mapping methods for SC-FDM-IDMA scheme as well as other results with variation of different parameters have also been demonstrated. Finally simulation result for BER performance improvement has been shown employing BCH code. All the simulation results demonstrate the suitability of SC-FDM-IDMA scheme for wireless communication under AWGN channel environment.
Volume: 7
Issue: 2
Page: 992-998
Publish at: 2017-04-01

Utility Function-based Pricing Strategies in Maximizing the Information Service Provider’s Revenue with Marginal and Monitoring Costs

10.11591/.v7i2.pp877-887
Robinson Sitepu , Fitri Maya Puspita , Anggi Nurul Pratiwi , Icha Puspita Novyasti
Previous research only focus on maximizing revenue for pricing strategies for information good with regardless the marginal and monitoring costs. This paper aims to focus on the addition of marginal and monitoring costs into the pricing strategies to maintain the maximal revenue while introduce the costs incurred in adopting the strategies. The well-known utility functions applied to also consider the consumer’s satisfaction towards the service offered. The results show that the addition costs incurred for setting up the strategies can also increase the profit for the providers rather than neglecting the costs. It is also showed that the Cobb-Douglas utility functions used can enhance the notion of provider to optimize the revenue compared to quasi linear and perfect substitutes.
Volume: 7
Issue: 2
Page: 877-887
Publish at: 2017-04-01

Z–Source Multilevel Inverter Based on Embedded Controller

10.11591/ijeecs.v6.i1.pp1-8
K. Vijayalakshmi , Chinnapettai Ramalingam Balamurugan
In this paper Embedded based Z-source multilevel inverter (ZSMLI) is proposed. This work implements a five level cascaded H-bridge Z-source inverter by using embedded control. Switching devices are triggered using embedded controller. In this controller coding is described by using switching table. The presence of Z-source network couples inverter main circuit to the power source that providing special features that can overcome the limitations of VSI (voltage source inverter) and CSI (current source inverter). The Z-source concept can applicable in all dc-ac, dc-dc, ac-dc and ac-ac power conversions. Simulation model of Z-source multilevel inverter based on embedded controller has been built in MATLAB/SIMULINK. The Performance parameters of Z-source MLI such as RMS (root mean square) output voltage, THD (total harmonic distortion) and DC component have been analysed for various inductance (L) and capacitance (C) value.
Volume: 6
Issue: 1
Page: 1-8
Publish at: 2017-04-01

Identification of Thalassemia Disorder using Active Contour

10.11591/ijeecs.v6.i1.pp160-165
Nurhanis Izzati Binti Che Marzuki Izzati Binti Che Marzuki , Nasrul Humaimi bin Mahmood Humaimi bin Mahmood , Mohd Azhar bin Abdul Razak
Thalassemia was known as the red blood cell (RBC) morphology disorder. This disease mostly affects the shape of the red blood cells. Thalassemia becomes the major public health problem when one of the people becomes the carrier of the disease. It can occur within a months after birth or even before birth and results in inappropriate growth and development of babies. Sometimes the affected babies will die shortly after birth. In order to screen thalassemia, there are a few tests need to be done. Firstly by performed Complete Blood Count (CBC) and secondly continued with hemoglobin electrophoresis test. This CBC test will identify the morphology of RBC. Hence, this paper will discuss the methods on identifying the morphology of thalassemia blood cells by using active contour technique. From the result of 16 normal and abnormal blood cell images, the active countour methods able to identifyThalassemia blood cells with accuracy of 90% from the abnormal cell images.
Volume: 6
Issue: 1
Page: 160-165
Publish at: 2017-04-01

Recent Trend in Electromagnetic Radiation and Compliance Assessments for 5G Communication

10.11591/.v7i2.pp912-918
Nor Adibah Ibrahim , Tharek Abd. Rahman , Olakunle Elijah
The deployment of the 5G networks will feature high proliferation of radio base station (RBS) in order to meet the increasing demand for bandwidth and also to provide wider coverage that will support more mobile users and the internet-of-things (IoT). The radio frequency (RF) waves from the large-scale deployment of the RBS and mobile devices will raise concerns on the level of electromagnetic (EM) radiation exposure to the public. Hence, in this paper, we provide an overview of the exposure limits, discuss some of the effects of the EM emission, reduction techniques and compliance assessment for the 5G communication systems. We discuss the open issues and give future directions.
Volume: 7
Issue: 2
Page: 912-918
Publish at: 2017-04-01
Show 1515 of 1939

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration