Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

28,188 Article Results

Hardware Implementation of 3-level Inverter using Microcontroller for Single Phase Induction Motor

10.11591/ijres.v5.i2.pp96-102
Veena B.M. , Parimala S.K.
The conventional two level inverter has many limitations for high voltage & high power applications. The term multilevel began with the three-level inverter. Subsequently, several multilevel inverter topologies have been developed. However, the elementary concept of a multilevel inverter to achieve higher power is to use a series of power semiconductor switches with several lower voltage dc sources to perform the power conversion by synthesizing a staircase voltage waveform. Output voltage of 3 level inverter consists of 3 levels, which results smoother output. And hence the THD will be reduced. In this paper Simulink of 3 level inverter and the hardware implementation of micro controller based control of multilevel inverter for single phase Induction motor are presented.
Volume: 5
Issue: 2
Page: 96-102
Publish at: 2016-07-01

Analysis of Different Ways of Crosstalk Measurement in GSM Network

10.11591/ijres.v5.i2.pp103-107
Musefiu Aderinola , Bokolo Abovie , Festus Okosi , Igoniderigha Daniel , G.F. Odubo
Crosstalk is one of the problems that affect the performance operation of global system mobile (GSM) network. Among the effect of crosstalk are call mute, call drop, wire propagation delay, dynamic power dissipation etc. Crosstalk is an undesirable signal arising due to the coupling capacitances between adjacent interconnecting wires and measured in decibel. In this paper some literature were reviewed and different ways of measuring crosstalk such as Near end croosstalk (NEXT), far end crosstalk (FEXT), Power sum crosstalk (PSNEXT) and alien crosstalk (AXT) were analyzed.  
Volume: 5
Issue: 2
Page: 103-107
Publish at: 2016-07-01

Investigations of Electrostatic and Ionized Fields Analysis for Dual-Electrode System

10.11591/ijeecs.v3.i1.pp80-90
Mohamed A. Abouelatta , Abdelhadi R. Salama , A. M. Omar , S. A. Ward
The paper presents the computation and measurement of electric field, in both electrostatic as well as ionized case, for dual electrode system intended for electrostatic applications. The dual electrode system consists of an ionizing and non-ionizing electrode have the same voltage and facing a grounded collecting plate. The charge simulation method (CSM) coupled with genetic algorithms (GAs) and method of characteristic (MOC) is applied to compute the electrostatic field and the ionized field respectively. The influence of dual system parameters such as ionized wire diameter and inter electrode distances on the profile of the electrostatic field on the collecting plate and on the surface of the ionizing wire has been studied. The measurements of the ionized electric field, current-voltage characteristics and ion current density profiles are implemented using the technique of the linear biased probe. An experimental setup is constructed to model the present electrode arrangement. The measurements are carried out for ionized wire of diameter 0.25 and 0.5mm. The computed results are found to be in good agreement with experiments.
Volume: 3
Issue: 1
Page: 80-90
Publish at: 2016-07-01

Smart Safety Belt Design to Avoid Accidents in Hazardous Industrial Environment

10.11591/ijres.v5.i2.pp108-114
Muhammad Yaseen , Saad Qasim Khan , Muhammad Khurram , Rana N. Mubarak
Warehouse is one of the most dangerous places to work because of many potential dangers. The accidents caused by heavy vehicles result in seriousinjuries and even death. This paper proposes a solution to this problem. When a worker happens to be in any of such hazardous situations inside or outside workplace, he will press the emergency button (or pull a magnetic cord) placed in the smart safety belt which will not only stop the vehicles within 15 meters circle but also inform the workers within 250 meters circle through an indicator. In this technical paper, the outcome of first design phase has been reported. In the first design phase, we have successfully implemented a reliable and accurate ranging mechanism with ±0.3m maximum error. This ranging mechanism is based on wellknown RF Time-of-Flight (TOF) method. The maximum achievable transmit range of this solution is 300m.
Volume: 5
Issue: 2
Page: 108-114
Publish at: 2016-07-01

Implementation of Low Power Pipelined 64-bit RISC Processor with Unbiased FPU on CPLD

10.11591/ijres.v5.i2.pp115-120
J. Vijay Kumar , B. Naga Raju , M. Vasu Babu , T. Ramanjappa
This article represents the implementation of low power pipelined 64-bit RISC processor on Altera MAXV CPLD device.  The design is verified for arithmetic operations of both fixed and floating point numbers, branch and logical function of RISC processor. For all the jump instruction, the processor architecture will automatically flush the data in the pipeline, so as to avoid any misbehavior. This processor contains FPU unit, which supports double precision IEEE-754 format operations very accurately. The simulation results have been verified by using ModelSim software. The ALU operations and double precision floating point arithmetic operation results are displayed on 7-Segments. The necessary code is written in Verilog HDL.
Volume: 5
Issue: 2
Page: 115-120
Publish at: 2016-07-01

VLSI Design and Comparison of DA and LMS Based Reconfigurable FIR Filter

10.11591/ijres.v5.i2.pp121-126
P. Hemanthkumar , Y. Sai Kiran , V. Nava Teja
Here, we exhibit the design optimization of one- and two-dimensional fully-pipelined computing structures for area-delay-power-efficient implementation of finite impulse response (FIR) filter by systolic decomposition of distributed arithmetic (DA)-based inner-product computation. This plan is found to offer a flexible choice of the address length of the look-up-tables (LUT) for DA-based computation to determine suitable area-time trade-off. It is seen that by using smaller address-lengths for DA-based computing units, it is possible to decrease the memory-size but on the other side that leads to increase of adder complexity and the latency. For efficient DA-based realization of FIR filters of different orders, the flexible linear systolic design is implemented on a Xilinx Virtex-E XCV2000E FPGA using a hybrid combination of Handel-C and parameterizable VHDL cores. Various key performance metrics such as number of slices, maximum usable frequency, dynamic power consumption, energy density and energy throughput are estimated for different filter orders and address-lengths. Obtained results on analysis shows that performance metrics of the proposed implementation is broadly in line with theoretical expectations. We have seen that the choice of address-length M=4 gives the best of area-delay power-efficient realizations of the FIR filter for different filter orders. Moreover, the proposed FPGA implementation is found to involve significantly less area-delay complexity compared with the existing DA-based implementations of FIR filter.
Volume: 5
Issue: 2
Page: 121-126
Publish at: 2016-07-01

Variable Speed Control Using Fuzzy-PID Controller for Two-phase Hybrid Stepping Motor in Robotic Grinding

10.11591/ijeecs.v3.i1.pp102-118
Adnan Jabbar Attiya , Salam Waley Shneen , Basma Abdullah Abbas , Yang Wenyu
In a robotic grinding process, a light-weight grinder is held by an intelligible robot arm. Material removal is carried out by the rotating grinding tool while the end effector of robot guarantees that the tool follows a programmed path in order to work on complex curved surfaces. Grinding tool is driven by Two-Phase Hybrid Stepping motor derive. This work aims to develop a controller based on fuzzy logic to improve the speed control performance of Two-Phase Hybrid Stepping motor derive in order to achieve a controller that provides grinding with higher quality. The analysis and design of PID-Fuzzy controller to improve the response of the motor speed were studied. This paper simulates six motor speed input conditions. The simullink package of the MATLAB. Comparison between the conventional PID controller and Fuzzy-PID output was done on the basis of the simulation result obtained by MATLAB. The simulation results demonstrate that the designed Fuzzy-PID controller realize a good dynamic behavior of the Two-Phase Hybrid Stepping motor, a perfect speed tracking with less rise and settling time, minimum overshoot, minimum steady state error and give better performance compared to conventional PID controller.
Volume: 3
Issue: 1
Page: 102-118
Publish at: 2016-07-01

Study on Characteristics of SAR Data in Ravine Reservoir Area

10.11591/ijeecs.v3.i1.pp215-225
Mowen Xie , Jiaxuan Huang , Jiehui Huang
Landslide monitoring is one of the most important methods in landslide prevention. Landslide early identifying that based on D-InSAR technique is one of the effective means in landslide monitoring in ravine reservoir area. On the basis of D-InSAR technique analysis in ravine reservoir, how to eliminate the error and find the real moving area caused by rock and soil is the key problem. Considering the fact, an experiment region in reservoir of Wudongde hydropower station, Jinsha River has been studied. Based on D-InSAR analysis method and the characteristics of radar data, an analysis method of the SAR data trusted zone, the detectable landsliding displacement and error estimation has been established, extracting the effective range in the result of SAR data analysis.
Volume: 3
Issue: 1
Page: 215-225
Publish at: 2016-07-01

A New Structure for Sen Transformer Using Three Winding Linear Transformer

10.11591/ijpeds.v7.i2.pp440-449
Chia Lailypour , Murteza Farsadi
In this paper a new structure for "Sen" transformer is introduced, by using three winding transformers with neutral point in order to use negative value of compensating voltage. Combination of taps will be adjusted by a novel algorithm, to control the required active and reactive powers, separately. This paper tries to focus on three parts. First of all there is an introduction on the concept of ST structure what comes next is a try to work on power flow control by using PI controllers and an algorithm to find the best and efficient combination of taps, finally proposed idea and algorithm will be implement on a practical system. Implementation of the system consist of two separated and related parts. The first one is about transmission line and Sen Transformer and the interaction between them. The second part is programing codes that adjust taps for required active and reactive powers.
Volume: 7
Issue: 2
Page: 440-449
Publish at: 2016-06-06

An Algorithm for Continuous Optimization Problems using Hybrid Particle Updating Method

10.11591/ijeecs.v3.i1.pp164-173
Peter Bamidele Shola , L B Asaju
Optimization problem is one such problem commonly encountered in many area of endeavor, obviously due to the need to economize the use of the available resources in many problems. This paper presents a population-based meta-heuristic algorithm   for solving optimization problems in a continous space. The algorithm, combines a form of cross-over technique with a position updating formula based on the instantaneous global best position to update each particle position .The algorithm was tested and compared with the standard particle swarm optimization (PSO)  on many benchmark functions. The result suggests a better performance of the algorithm over the later in terms of reaching (attaining) the global optimum value (at least for those benchmark functions considered) and the rate of convergence in terms of the number of iterations required reaching the optimum values.
Volume: 3
Issue: 1
Page: 164-173
Publish at: 2016-06-04

Path Loss Models Optimization for Mobile Communication in Different Areas

10.11591/ijeecs.v3.i1.pp126-135
Messaoud Gareh , Lotfi Djouane , Houcine Oudira , Nazih Hamdiken
In mobile radio systems, path loss models are necessary for proper planning, interference estimations, frequencies assignments and cell parameters which are basic for network planning process. Empirical models are the most adjustable models that can be suited to different types of environments. In this paper, data collected in Batna, Algeria is used to calculate the path loss for GSM (908-957 MHz). The measured path loss is compared with theoretical path loss estimated by the most widely empirical models «Cost123»,  «Hata», «SUI» and «Egli». The best model to estimate the measured path loss is optimized using genetic algorithm to predict path loss for suburban and rural area. The RMSE and the other test criteria between the actual and predicted data are calculated for various path loss models. It turned out that the adjusted COST 231 model outperforms the other studied models. The investigated results can help telecommunication engineers improve their planning and design of microcellular system.
Volume: 3
Issue: 1
Page: 126-135
Publish at: 2016-06-04

Technology Map: A Text Mining and Network Analysis Approach

10.11591/ijeecs.v3.i1.pp200-208
Arif Rakhman Hakim , Taufik Djatna , Ade Febransyah
Information of technology development is indispensable for research planning. This information is needed by researcher to determine research topics which he will contribute. For journal editor, this information is needed to evaluate research paper draft. Unfortunately, technology development is unable to be measured directly. To measure the development, several methods have been developed using patent and journal as its data. In this work we focused on development of technology map and its measurement in a method to provide information of technology development from Indonesian research journals using text mining and network analysis. The map helps stakeholders to plan their researches. Using journal data from agro-industrial technology, the method is able to identify relation between researches, thus we can develop the time line of the research area. The method can also cluster the researches into nineteen research areas and measure its popularity, importance, affinity to particular group, research type whether breakthrough or incremental, research group retention time, and its saturation.
Volume: 3
Issue: 1
Page: 200-208
Publish at: 2016-06-04

Cyber informatics and Contrasting Extreme Programming with Boolean Logic

10.11591/ijeecs.v3.i1.pp157-163
Erick Fernando , Derist Touriano
Cyber information is the solution for e-commerce, in this study we investigated the LAN is needed and seek confirmation of the decision to use the method Red-Black Tree in forming binary search tree. Given the status of the wireless modalities and development of RAID, this study used a Bayesian tool in controlling identifier-locator split (palmate). In addition, to verify that Boolean logic and the model checking can collude to address this problem. In this paper, we verify that rasterization can be made strong, cooperative, and adaptive. Furthermore, we concentrated this study can be made so that IPv6 embedded, scalable, and highly-available. Our design for investigating encrypted algorithms is dubiously promising. Finally, we introduced an analysis of journaling file systems (Palmate), which we used to validate that local-area networks and replication are often incompatible.
Volume: 3
Issue: 1
Page: 157-163
Publish at: 2016-06-04

Helmet Charger Based Solar Power: A Review of Business Prospect

10.11591/ijeecs.v3.i1.pp17-25
Syifaul Fuada
Solar power based helmet charger is a product developed by the author and his team that was funded twice by the Ministry of Research and Technology of Higher Education in 2013 and 2014 for ‘Karsa Cipta’ (creative plan) program and ‘Kewirausahaan’ (enterpreneurship) program, respectively. This product has participated in several scientific agendas such as conferences or contests from 2013 to 2015, and is processing the proposal for patent with several claims distinguishing it from other similar innovations. This paper is contained with invention profile and achievement of qualification fulfillment of a superior innovation as well as several considerations of technopreneurship based opportunities or business prospects as a follow up research and development.
Volume: 3
Issue: 1
Page: 17-25
Publish at: 2016-06-04

Investigating the Ethernet and Boolean Logic

10.11591/ijeecs.v3.i1.pp194-199
Hetty Rohayani , Erick Fernando , Derist Touriano
Write-ahead logging to work. After years of research that are typical in Moore's Law, validate multi-processor investigation, which embodies the principles of intuitive machine learning. Our focus in this paper is not on whether a symmetric encryption can be made metamorphic, probabilistic, adaptive, efficient wearable, and interposable, but rather the introduction of new wireless communication (SCHAH). The properties SCHAH highly dependent on the assumptions inherent in our framework; in this section, we consider the methodology which consists of n access point. Implementation of our applications are replicated, symbiosis, and with large scale yangmemiliki full control over homegrown database, as may be necessary in order to control and access points are not compatible. A collection of shell scripts contains about 85 x86 assembly instructions. Where the engine and is fully compliant courseware follows the sensor network evaluation, although SCHAH not able to give a lot of kernel at a time. 
Volume: 3
Issue: 1
Page: 194-199
Publish at: 2016-06-04
Show 1528 of 1880

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration