Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,734 Article Results

A Novel Method based on Gaussianity and Sparsity for Signal Separation Algorithms

10.11591/ijece.v7i4.pp1906-1914
Abouzid Houda , Chakkor Otman
Blind source separation is a very known problem which refers to finding the original sources without the aid of information about the nature of the sources and the mixing process, to solve this kind of problem having only the mixtures, it is almost impossible , that why using some assumptions is needed in somehow according to the differents situations existing in the real world, for exemple, in laboratory condition, most of tested algorithms works very fine and having good performence because the  nature and the number of the input signals are almost known apriori and then the mixing process is well determined for the separation operation.  But in fact, the real-life scenario is much more different and of course the problem is becoming much more complicated due to the the fact of having the most of the parameters of the linear equation are unknown. In this paper, we present a novel method based on Gaussianity and Sparsity for signal separation algorithms where independent component analysis will be used. The Sparsity as a preprocessing step, then, as a final step, the Gaussianity based source separation block has been used to estimate the original sources. To validate our proposed method, the FPICA algorithm based on BSS technique has been used.
Volume: 7
Issue: 4
Page: 1906-1914
Publish at: 2017-08-01

Energy-Efficient Hybrid K-Means Algorithm for Clustered Wireless Sensor Networks

10.11591/ijece.v7i4.pp2054-2060
Aziz Mahboub , Mounir Arioua , El Mokhtar En-Naimi
Energy efficiency is the most critical challenge in wireless sensor network. The transmission energy is the most consuming task in sensor nodes, specifically in large distances. Clustered routing techniques are efficient approaches used to lower the transmission energy and maximize the network’s lifetime. In this paper, a hybrid clustered routing approach is proposed for energy optimization in WSN. This approach is based on K-Means clustering algorithm and LEACH protocol. The simulation results using MATLAB tool have shown that the proposed hybrid approach outperforms LEACH protocol and optimizes the nodes energy and the network lifetime.
Volume: 7
Issue: 4
Page: 2054-2060
Publish at: 2017-08-01

Real-Time Video Scaling Based on Convolution Neural Network Architecture

10.11591/ijeecs.v7.i2.pp381-394
S Safinaz , AV Ravi kumar
In recent years, video super resolution techniques becomes mandatory requirements to get high resolution videos. Many super resolution techniques researched but still video super resolution or scaling is a vital challenge. In this paper, we have presented a real-time video scaling based on convolution neural network architecture to eliminate the blurriness in the images and video frames and to provide better reconstruction quality while scaling of large datasets from lower resolution frames to high resolution frames. We compare our outcomes with multiple exiting algorithms. Our extensive results of proposed technique RemCNN (Reconstruction error minimization Convolution Neural Network) shows that our model outperforms the existing technologies such as bicubic, bilinear, MCResNet and provide better reconstructed motioning images and video frames. The experimental results shows that our average PSNR result is 47.80474 considering upscale-2, 41.70209 for upscale-3 and 36.24503 for upscale-4 for Myanmar dataset which is very high in contrast to other existing techniques. This results proves our proposed model real-time video scaling based on convolution neural network architecture’s high efficiency and better performance.
Volume: 7
Issue: 2
Page: 381-394
Publish at: 2017-08-01

Energy Efficient WSN by Optimizing the Packet Failure in Network

10.11591/ijeecs.v7.i2.pp415-425
Madhu Patil , Chirag Sharma
Wireless sensor network (WSN) has attained enormous growth in recent times due to availability of tiny and low cost sensor devices. The sensor network is been adopted by various organization for various application services such environment monitoring, surveillance etc.. The WSN are powered by batteries and are deployed in non-rechargeable remote location. Preserving batteries of these devices is most desired. Many methodologies have been proposed in recent time to improve the lifespan of sensor network among them clustering technique is the most sorted out technique. The drawback of existing technique the cluster head energy degrades very fast due to long transmission which requires amplification as a result energy is lost to the node that is surrounding the cluster head. They did not consider the packet failure likelihood among inter and intra as a results there exist scheduling bottleneck and degrades the energy of sensor devices. To overcome this work present a packet failure estimation model and hop selection optimization model for inter cluster transmission. Experiments are conducted for lifetime efficiency for varied sensor devices for proposed and existing. The result shows that the proposed model performs better than existing in term of network lifetime and energy efficiency.
Volume: 7
Issue: 2
Page: 415-425
Publish at: 2017-08-01

Performance Analysis of 3-Level 5-Phase Multilevel Inverter Topologies

10.11591/ijece.v7i4.pp1696-1705
B. Jyothi , M. Venu Gopala Rao
Now a day’s many industrial applications requires high power. Some other appliances may require intermediate power either more or less depending upon their operation. With these consequences, MULTI LEVEL INVERTERS are introduced in 1975.for above intermediate voltage applications. The name MULTI LEVEL began with the three-level converter.By enormous advancement in power semiconductor switches, in electric drives increasing the phase number greater than the conventional three phase especially in locomotives, naval, aerospace, and electrical vehicles industry has many advantages than three phase. In this view, here five phase VSI has developed. This paper aims at comparing the performance of conventional two level inverter Diode clamped and Capacitor clamped topologies of 5-phase multilevel inverter (3-level) using sinusoidal pulse width modulation. SPWM is highly economical, has more efficiency, controllability. These circuits are analyzed by using simulation software package such as MATLAB.
Volume: 7
Issue: 4
Page: 1696-1705
Publish at: 2017-08-01

Security Enhancement in Networked Embedded System

10.11591/ijece.v7i4.pp1867-1873
Pradip Ram Selokar , P T Karule
In the developed system ARM9 is a master and Two ARM7s are slaves. The peripherals are being controlled by two ARM7 boards. The Peripherals are connected to the ARM7 through Complex Programmable Logic Device (CPLD). The CPLD is in turn connected to the ARM7 using Serial Peripheral Interface (SPI). The ARM7 boards collect the information from the peripherals and send it to the ARM9 board. The communication between ARM7 and ARM9 is via UART (Universal Asynchronous Receiver Transmitter) over CAN (Controller Area Network). The ARM9 board has got the software intelligence. The ARM9 behaves as a master and two ARM7 boards behave as slaves. Being master ARM9 passes tokens to ARM7 which in turn returns (Acknowledges) the token. The ARM9 is further connected to Proxy via Ethernet. The proxy is further connected to the service platform (server) via Ethernet. So subsequently any decisions at any stage can be changed at server level. Further these commands can be passed on to ARM9 which in turn controls the peripherals through ARM7. (a) The system which we have developed consists of ARM9 as a master, Two ARM7 as Slaves. The communication between ARM9-ARM7 is via UART over a CAN, (b) Each ARM7 further communicates serially (RS232) with the two 8051 Microcontroller nodes, (c)Thus a networked Embedded System is developed wherein the serial data is brought over Ethernet. The ARM7 board, which is directly linked with the peripherals, can be modified of its functionality as and when required. The functionality of ARM7 can be modified by upgrading its firmware. To upgrade the firmware same communication link has been used. ARM7 receives the new firmware via same ARM9-ARM7 communication link. The Flash Write operation is performed using the source code to write the new firmware. Bootloader application for the ARM7 has been developed. The signature has been incorporated to assure authenticity of the new Firmware. Intel Hex File Format is used to parse the hex file.
Volume: 7
Issue: 4
Page: 1867-1873
Publish at: 2017-08-01

RC Hovercraft: An I-Bylogical Enzyme (I-BE) Biosensor Carrier

10.11591/ijece.v7i4.pp2002-2007
Rinta Kridalukmana , Budi Cahyo S.P. , Deddy Kurniawan W , Fahmi Arifan
In this research, a hovercraft was developed as a transportation tool to carry an I-Bylogical Enzyme (I-BE) biosensor. The main function of the biosensor is to measure the level of dangerous chemical materials from factory’s liquid waste. Hence, fiber and acrylic materials, that widely known for its resistance to chemical reaction, are needed to build the hovercraft. By using Atmega 8535 microcontroller and Arduino Uno board, a remote control was choosen to navigate hovercraft’s movement with support of 6 channels Transmitter Receiver. As a result, after series of tests that were carried out, indicate that the hovercraft’s prototype was found to meet design and requirements expectation.
Volume: 7
Issue: 4
Page: 2002-2007
Publish at: 2017-08-01

Classification with Single Constraint Progressive Mining of Sequential Patterns

10.11591/ijece.v7i4.pp2142-2151
Regina Yulia Yasmin , Putri Saptawati , Benhard Sitohang
Classification based on sequential pattern data has become an important topic to explore. One of research has been carried was the Classify-By-Sequence, CBS. CBS classified data based on sequential patterns obtained from AprioriLike sequential pattern mining. Sequential patterns obtained were called CSP, Classifiable Sequential Patterns. CSP was used as classifier rules or features for the classification task. CBS used AprioriLike algorithm to search for sequential patterns. However, AprioriLike algorithm took a long time to search for them. Moreover, not all sequential patterns were important for the user. In order to get the right and meaningful features for classification, user uses a constraint in sequential pattern mining. Constraint is also expected to reduce the number of sequential patterns that are short and less meaningful to the user. Therefore, we developed CBS_CLASS* with Single Constraint Progressive Mining of Sequential Patterns or Single Constraint PISA or PISA*. CBS_Class* with PISA* was proven to classify data in faster time since it only processed lesser number of sequential patterns but still conform to user’s need. The experiment result showed that compared to CBS_CLASS, CBS_Class* reduced the classification execution time by 89.8%. Moreover, the accuracy of the classification process can still be maintained. 
Volume: 7
Issue: 4
Page: 2142-2151
Publish at: 2017-08-01

A Big Data Security using Data Masking Methods

10.11591/ijeecs.v7.i2.pp449-456
Archana R A , Ravindra S Hegadi , Manjunath T N
Due to Internet of things and social media platforms, raw data is getting generated from systems around us in three sixty degree with respect to time, volume and type. Social networking is increasing rapidly to exploit business advertisements as business demands. In this regard there are many challenges for data management service providers, security is one among them. Data management service providers need to ensure security for their privileged customers in providing accurate and valid data. Since underlying transactional data have varying data characteristics such huge volume, variety and complexity, there is an essence of deploying such data sets on to the big data platforms which can handle structured, semi-structured and un-structured data sets. In this regard we propose a data masking technique for big data security. Data masking ensures proxy of original dataset with a different dataset which is not real but looks realistic. The given data set is masked using modulus operator and the concept of keys. Our experiment advocates enhanced modulus based data masking is better with respect to execution time and space utilization for larger data sets when compared to modulus based data masking. This work will help big data developers, quality analysts in the business domains and provides confidence for end-users in providing data security.
Volume: 7
Issue: 2
Page: 449-456
Publish at: 2017-08-01

A Markov Decision Model for Area Coverage in Autonomous Demining Robot

10.11591/ijict.v6i2.pp105-116
Abdelhadi Larach , Cherki Daoui , Mohamed Baslam
A review of literature shows that there is a variety of works studying coverage path planning in several autonomous robotic applications. In this work, we propose a new approach using Markov Decision Process to plan an optimum path to reach the general goal of exploring an unknown environment containing buried mines. This approach, called Goals to Goals Area Coverage on-line Algorithm, is based on a decomposition of the state space into smaller regions whose states are considered as goals with the same reward value, the reward value is decremented from one region to another according to the desired search mode. The numerical simulations show that our approach is promising for minimizing the necessary cost-energy to cover the entire area.
Volume: 6
Issue: 2
Page: 105-116
Publish at: 2017-08-01

Generator Dynamic Response Analysis and Improvement Following Distribution Network Disturbance

10.11591/ijeecs.v7.i2.pp356-363
Mirza Saric
Use of renewable energy sources for the purposes of electricity generation is increasing throughout the world. Connection of new generators, however, introduces significant challenges to power network operators and managers. The power system transient stability is affected by the grid connection of new generation units. The objective of this paper is to investigate asynchronous generator dynamic response issues and capabilities under three phase symmetrical fault conditions and to propose a methodological approach to designing a generator transient stability solutions. Analysis and methodology are introduced through a realistic generator connection example. Simulations show that power system stability can be significantly affected by the connection of new generators and that this phenomena needs to be carefully considered during the connection planning process. This paper is a part of an ongoing research on the distributed generation impact on power network and its aim is to provide two main contributions to the existing body of knowledge. Firstly, it is expected that this paper will contribute toward a better understanding of the influence that generators have on the power system transient stability. Secondly, this paper is expected to contribute towards the practical understanding of fundamental power system transient stability improvement solutions.
Volume: 7
Issue: 2
Page: 356-363
Publish at: 2017-08-01

Tiarrah Computing: The Next Generation of Computing

10.11591/ijict.v6i2.pp129-138
Yanish Pradhananga , Pothuraju Rajarajeswari
The evolution of Internet of Things (IoT) brought about several challenges for the existing Hardware, Network and Application development. Some of these are handling real-time streaming and batch bigdata, real- time event handling, dynamic cluster resource allocation for computation, Wired and Wireless Network of Things etc. In order to combat these technicalities, many new technologies and strategies are being developed. Tiarrah Computing comes up with integration the concept of Cloud Computing, Fog Computing and Edge Computing. The main objectives of Tiarrah Computing are to decouple application deployment and achieve High Performance, Flexible Application Development, High Availability, Ease of Development, Ease of Maintenances etc. Tiarrah Computing focus on using the existing opensource technologies to overcome the challenges that evolve along with IoT. This paper gives you overview of the technologies and design your application as well as elaborate how to overcome most of existing challenge.
Volume: 6
Issue: 2
Page: 129-138
Publish at: 2017-08-01

A Novel Approach to Study the Effects of Anesthesia on Respiratory Signals by using the EEG Signals

10.11591/ijict.v6i2.pp117-122
Mohd Suhaib Kidwai , S. Hasan Saeed
General anesthesia plays a crucial role in many surgical procedures. It is a drug-induced, reversible state characterized by unconsciousness, anti-nociception or analgesia, immobility and amnesia. On rare occasions, however, the patient can remain unconscious longer than intended, or may regain awareness during surgery. There are no precise measures for maintaining the correct dose of anesthetic, and there is currently no fully reliable instrument to monitor depth of anesthesia. Although a number of devices for monitoring brain function or sympathetic output are commercially available, the anesthetist also relies on clinical assessment and experience to judge anesthetic depth. The undesirable consequences of overdose or unintended awareness might in principle be ameliorated by improved control if we could understand better the changes in function that occur during general anesthesia. Coupling functions prescribe the physical rule specifying how the inter-oscillator interactions occur. They determine the possibility of qualitative transitions between the oscillations, e.g. routes into and out of phase synchronization. Their decomposition can describe the functional contribution from each separate subsystem within a single coupling relationship. In this way, coupling functions offer a unique means of describing mechanisms in a unified and mathematically precise way. It is a fast growing field of research, with much recent progress on the theory and especially towards being able to extract and reconstruct the coupling functions between interacting oscillations from data, leading to useful applications in cardio respiratory interactions.In this paper, a novel approach has been proposed for detecting the changes in synchronism of brain signals, taken from EEG machine. During the effect of anesthesia, there are certain changes in the EEG signals. Those signals show changes in their synchronism. This phenomenon of synchronism can be utilized to study the effect of anesthesia on respiratory parameters like respiration rate etc, and hence the quantity of anesthesia can be regulated, and if any problem occurs in breathing during the effect of anesthesia on patient, that can also be monitored
Volume: 6
Issue: 2
Page: 117-122
Publish at: 2017-08-01

Design and Simulation of Automatic Temperature Control and Alert System Based PIC16F887

10.11591/ijict.v6i2.pp95-104
Jabbar Shaati Jahlool
In this research, the design and simulation of an automatic system for temperature control using embedded system in order to automatically control of multi appliances depend on the temperature value. The appliances will be controlled are ventilation, cooling, heating and alert. this is an order to avoid or reduce to human intervention and increase system reliability. An important feature of this automation process is to reduce or eliminate the possibility of relying on the human factor operator for industries, warehouses and laboratories, and to improve working and performance environments. The system in this paper used the microcontroller PIC16F887 as the central control unit, LM35 temperature sensor as a temperature source,16x2 liquid crystal display (LCD) as indicator to display the different system working status an addition to some of drivers, relay and light emitting diodes (LED) as indicators to display the corresponding working appliance driver. The implementation and simulation of the system work has been achieved by using proteus professional software v8.0 and mikroc pro for pic v .6.6.1 software to write the equivalent program and generate .hex file for system working. The result shows in figures 5, 6, 7, and 8 that explain the system working cases
Volume: 6
Issue: 2
Page: 95-104
Publish at: 2017-08-01

Improving Performance of Mobile Ad Hoc Network Using Clustering Schemes

10.11591/ijict.v6i2.pp69-75
Mohamed Er-Rouidi , Houda Moudni , Hassan Faouzi , Hicham Mouncif , Abdelkrim Merbouha
Mobile ad hoc network become nowadays more and more used in different domains, due to its flexibility and low cost of deployment. However, this kind of network still suffering from several problems as the lack of resources. Many solutions are proposed to face these problems, among these solutions there is the clustering approach. This approach tries to partition the network into a virtual group. It is considered as a primordial solution that aims to enhance the performance of the total network, and makes it possible to guarantee basic levels of system performance. In this paper, we study some schemes of clustering such as Dominating-Set-based clustering, Energy-efficient clustering, Low-maintenance clustering, Load-balancing clustering, and Combined-metrics based clustering.
Volume: 6
Issue: 2
Page: 69-75
Publish at: 2017-08-01
Show 1528 of 1983

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration