Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

27,404 Article Results

Computing Subspace Skylines without Dominance Tests Using Set Interaction Approaches

10.11591/ijece.v5i5.pp1188-1193
T. Vijaya Saradhi , K. Subrahmanyam , Ch.V. Phani Krishna
Now a day’s preference answering plays major role in all crucial applications. If user wants to find top k–objects from a set of high dimensional data based on any monotonic function requires huge computation. One of the promising methods to compute preference set is Skyline Technology. Sky line computation returns the set objects that are not overruled by any other objects in n a multi dimensional space. If data is high dimensional, different users requests sky line set based on different dimensions. It requires subspace skyline computation. If objects are d-dimensional we need to compute skyline sets in 2d different subspaces, called as SKYLINE CUBE computation, which incurs lot of computation cost. In this paper we address the problem of finding subspace skyline computation with minimum effort by using simple set interaction methods. By that we can decrease the number of subspace skylines need to be searched to find full sky cube. In this paper we developed one algorithm which uses Boolean algebra rules, skyline lattice to reduce dominance test for preparing sub space skylines.
Volume: 5
Issue: 5
Page: 1188-1193
Publish at: 2015-10-01

Unbalanced Variable Nonlinear Load Compensation Using Multiple Shunt Active Filters

10.11591/ijece.v5i5.pp896-904
Deepthi Janyavula , Satyendra Nath Saxena
The proposed scheme has considered a three-phase four-wire system, which experienced sag and swell in source voltage for a certain period while feeding an unbalanced and variable non-linear load. The load has unequal resistive and reactive elements in the three phases, forming the unbalanced component. A three-phase silicon controlled rectifier converter with adjustable firing angle connected to the load has formed the variable non-linear component. This has been considered, so as to simulate the unbalanced and variable non-linear  nature of loads in real-time power system. The trends in the total harmonic distortion variation were obtained for the proposed system under power factor correction and voltage regulation mode operation when the load-side converter firing angles of 30°, 60° and 90° were considered using MATLAB/SIMULINK software. Three pulse-width-modulation methods, namely, sinusoidal pulse-width-modulation, space vector modulation and hysteresis pulse-width-modulation have been used to generate pulses for the voltage source converter of the shunt active filter based on the reference currents generated using synchronous reference frame theory.  It has been demonstrated in the proposed paper that power factor correction, voltage regulation, better harmonic reduction and hence load compensation are obtained simultaneously by using two SAFs.
Volume: 5
Issue: 5
Page: 896-904
Publish at: 2015-10-01

Multiple Feature Fuzzy c-means Clustering Algorithm for Segmentation of Microarray Images

10.11591/ijece.v5i5.pp1045-1053
J. Harikiran , P.V. Lakshmi , R. Kiran Kumar
Microarray technology allows the simultaneous monitoring of thousands of genes. Based on the gene expression measurements, microarray technology have proven powerful in gene expression profiling for discovering new types of diseases and for predicting the type of a disease. Gridding, segmentation and intensity extraction are the three important steps in microarray image analysis. Clustering algorithms have been used for microarray image segmentation with an advantage that they are not restricted to a particular shape and size for the spots. Instead of using single feature clustering algorithm, this paper presents multiple feature clustering algorithm with three features for each pixel such as pixel intensity, distance from the center of the spot and median of surrounding pixels. In all the traditional clustering algorithms, number of clusters and initial centroids are randomly selected and often specified by the user.  In this paper, a new algorithm based on empirical mode decomposition algorithm for the histogram of the input image will generate the number of clusters and initial centroids required for clustering.   It overcomes the shortage of random initialization in traditional clustering and achieves high computational speed by reducing the number of iterations. The experimental results show that multiple feature Fuzzy C-means has segmented the microarray image more accurately than other algorithms.
Volume: 5
Issue: 5
Page: 1045-1053
Publish at: 2015-10-01

Survey on Mutation-based Test Data Generation

10.11591/ijece.v5i5.pp1164-1173
Hanh Le Thi My , Binh Nguyen Thanh , Tung Khuat Thanh
The critical activity of testing is the systematic selection of suitable test cases, which be able to reveal highly the faults. Therefore, mutation coverage is an effective criterion for generating test data. Since the test data generation process is very labor intensive, time-consuming and error-prone when done manually, the automation of this process is highly aspired. The researches about automatic test data generation contributed a set of tools, approaches, development and empirical results. In this paper, we will analyse and conduct a comprehensive survey on generating test data based on mutation. The paper also analyses the trends in this field.
Volume: 5
Issue: 5
Page: 1164-1173
Publish at: 2015-10-01

Networking Heterogeneous Microcontroller based Systems through Universal Serial Bus

10.11591/ijece.v5i5.pp992-1002
Sastry Kodanda Rama Jammalamadaka , Valluru Sai Kumar Reddy , Smt J Sasi Bhanu
Networking heterogeneous embedded systems is a challenge. Every distributed embedded systems requires that the network is designed specifically considering the heterogeneity that exits among different Microcontroller based systems that are used in developing a distributed embedded system. Communication architecture, which considers the addressing of the individual systems, arbitration, synchronisation, error detection and control etc., needs to be designed considering a specific application. The issue of configuring the slaves has to be addressed. It is also important that the messages, flow of the messages across the individual ES systems must be designed. Every distributed embedded system is different and needs to be dealt with separately. This paper presents an approach that addresses various issues related to networking distributed embedded systems through use of universal serial bus communication protocol (USB). The approach has been applied to design a distributed embedded that monitors and controls temperatures within a Nuclear reactor system.
Volume: 5
Issue: 5
Page: 992-1002
Publish at: 2015-10-01

Seasonal and Diurnal Variability of Rain Heights at An Equatorial Station

10.11591/ijece.v5i5.pp1134-1142
Abayomi Isiaka Yussuff , Nor Hisham Haji Khamis
Seasonal and diurnal rain heights variation at Universiti Teknologi Malaysia, Johor was studied. Slant path rain attenuation prediction and modeling is crucial to satellite equipment design; a major input is the rain height. One year meteorological ground-based, S-band, 3D RAPIC precipitation radar data at 500m resolution sourced from the Malaysian Meteorological Department was complemented with two-year TRMM PR data sourced from JAXA Earth Observation Research Center. After filtering, sorting, extraction and decoding of the data, vertical reflectivity profiles were constructed; from which rain height parameters were extracted. TRMM PR processed monthly (3A25) and daily (2A23) rainfall precipitation data were similarly used to obtain rain height parameters to investigate the seasonal and diurnal variations. Results from this work suggested that rain height parameters are influenced by both seasonal and diurnal variations. Higher seasonal variability was observed during south-west and pre-southwest monsoons. Rain heights were also observed to be higher in the night than in the day time.
Volume: 5
Issue: 5
Page: 1134-1142
Publish at: 2015-10-01

A Mathematical Model for Minimizing Add-On Operational Cost in Electrical Power Systems Using Design of Experiments Approach

10.11591/ijece.v5i5.pp948-956
Zakaria Al-Omari , A. Hamzeh , Sadeq A. Hamed , A. Sandouk , G. Aldahim
One of the key functions of the Distribution System Operators (DSOs) ofelectrical power systems (EPS) is to minimize the transmission anddistribution power losses and consequently the operational cost. Thisobjective can be reached by operating the system in an optimal mode which is performed by adjusting control parameters such as on-load tap changer (OLTC) settings of transformers, generator excitation levels, and VAR compensators switching. The deviation from operation optimality will result in additional losses and additional operational cost of the power system. Reduction of the operational cost increases the power system efficiency and provides a significant reduction in total energy consumption. This paper proposes a mathematical model for minimizing the additional (add-on) costs based on Design of Experiments (DOE). The relation between add-on operational costs and OLTC settings is established by means of regression statistical analysis. The developed model is applied to a 20-bustest network. The regression curve fitting procedure requires simulation experiments which have been carried out by the DigSilent PowerFactory 13.2 Program for performing network power flow. The results show the effectiveness of the model. The research work raises the importance the power system operation management of the EPS where the Distribution System Operator can avoid the add-on operational costs by continuous correction to get an operation mode close to optimality.
Volume: 5
Issue: 5
Page: 948-956
Publish at: 2015-10-01

Study of Data Security Algorithms using Verilog HDL

10.11591/ijece.v5i5.pp1092-1101
M. Sumathi , D. Nirmala , R. Immanuel Rajkumar
This paper describes an overview of data security algorithms and its performance evaluation. AES, RC5 and SHA algorithms have been taken under this study. Three different types of security algorithms used to analyze the performance study. The designs were implemented in Quartus-II software. The results obtained for encryption and decryption procedures show a significant improvement on the performance of the three algorithms. In this paper, 128-bit AES, 64-bit of RC5 and 512-bit of SHA256 encryption and Decryption has been made using Verilog Hardware Description Language and simulated using ModelSim.
Volume: 5
Issue: 5
Page: 1092-1101
Publish at: 2015-10-01

Optimal Design of Switched Reluctance Motor Using PSO Based FEM-EMC Modeling

10.11591/ijece.v5i5.pp887-895
Mouellef Sihem , Bentounsi Amar , Benalla Hocine
This paper aims to optimize the design of a prototype of a 6/4 Switched Reluctance Motor (SRM) using the Particle Swarm Optimization (PSO) algorithm. The geometrical parameters to optimize are the widths of the stator and rotor teeth due to their significant effects on the prototype design and the performances in terms of increased average torque and reduced torque ripple. The studied 3kW SRM is modeled using a numerical-analytical approach based on a coupled Finite Element Method with Equivalent Magnetic Circuit (FEM-EMC). The simulations are performed under MATLAB environment with user-friendly software. The optimal results found are discussed, compared against those obtained by the Genetic Algorithms (GA) and showed a significant improvement in average torque.
Volume: 5
Issue: 5
Page: 887-895
Publish at: 2015-10-01

New Method to Optimize Initial Point Values of Spatial Fuzzy c-means Algorithm

10.11591/ijece.v5i5.pp1035-1044
Iman Omidvar Tehrani , Subariah Ibrahim , Habib Haron
Fuzzy based segmentation algorithms are known to be performing well on medical images. Spatial fuzzy C-means (SFCM) is broadly used for medical image segmentation but it suffers from optimum selection of seed point initialization which is done either manually or randomly. In this paper, an enhanced SFCM algorithm is proposed by optimizing the SFCM initial point values. In this method in order to increasing the algorithm speed first the approximate initial values are determined by calculating the histogram of the original image. Then by utilizing the GWO algorithm the optimum initial values could be achieved. Finally By using the achieved initial values, the proposed method shows the significant improvement in segmentation results. Also the proposed method performs faster than previous algorithm i.e. SFCM and has better convergence. Moreover, it has noticeably improved the clustering effect.
Volume: 5
Issue: 5
Page: 1035-1044
Publish at: 2015-10-01

Comprehensive Algorithmic Review and Analysis of LDPC Codes

10.11591/ijeecs.v16.i1.pp111-130
Waheed Ullah , Abid Yahya
Due to the increasing popularity of LDPC codes and its demand for future applications, first time in this paper, LDPC coding techniques have been systematically summarized and analyzed. The paper gives the comprehensive review of LDPC encoder, decoder and its architecture for simulation and implementation. The paper is specially intended for giving an insight of the algorithmic overview of the LDPC encoder, decoder and its architecture for research and practical purposes. The original belief propagation algorithm (BPA) , logarithmic model of BPA , and the other simplified form of the logarithmic sum product algorithms (SPA) has been elaborated and analyzed for medium and short length codes under AWGN channel
Volume: 16
Issue: 1
Page: 111-130
Publish at: 2015-10-01

A New Approach for SAR Image Denoising

10.11591/ijece.v5i5.pp984-991
Murali Mohan Babu. Y , Subramanyam M. V. , Giri Prasad. M. N
In synthetic aperture radar (SAR)  imaging, the transmitted pulses from space born antenna interacts with ground objects and returned energy or back scattered energy will be collected  to get backscattered image. In this process, a speckle noise will be added because of the coherent imaging system and  makes the study of SAR images very difficult. For better SAR image processing, the speckle has to be removed in the initial stages of processing  and maintain all texture features efficiently. The BM3D method is generally considered as state of art method in denoising of SAR images. In this paper, it is proposed a technique to despeckle the speckle noise to the maximum extent while maintaining the edge characteristics.
Volume: 5
Issue: 5
Page: 984-991
Publish at: 2015-10-01

Wireless Mote Based Explosive Detection Land Rover using EC Sensor (WEDLRE)

10.11591/ijece.v5i5.pp1128-1133
Vaddi Manasa , K.Raghava Rao
As continues attacks in the world from terrorists countries warning us to be aware of those attacks like Explosive attacks, hijacks etc., which will cause huge damage to the life and property in all over the world. Among these explosive attacks is most effective to life and wealth of a country. To overcome such attacks and to save the life an intense research has done to know the characterization of the explosives, Detection Methods are also improvised. To save our next generation and escape from threats a new detection methodology has been implemented to detect the explosives at all places and the proposed system is called “Wireless Explosive detection Land Rover using ECS”. In this system chemical sensors, Quartz sensors etc., are used on the motes. By using the RF Camera a continuous surveillance can be done throughout the places like malls, rooms, houses, streets, etc., if any explosive is detected then without any delay the explosive location and timeout to explode and area that effect if explode details will be sent to the Police control room to diffuse the explode device with in time. A message will also be sent to the nearby hospitals to rescue the people.
Volume: 5
Issue: 5
Page: 1128-1133
Publish at: 2015-10-01

Design Calculation of Parabolic Trough Solar Thermal System and Three-phaseTurbo Alternator

10.11591/ijece.v5i5.pp939-947
Theingi Htun , Myo Thet Tun
Solar energy can be converted into thermal energy with the help of solarcollectors. Electricity can be produced directly from solar energy usingphotovoltaic devices or indirectly from steam generators using solar thermal collectors to heat a working fluid. This research is using the conversion of solar energy into electricity in a closed cycle driven by natural convection. It would mean that electricity is cheaper than from any other renewable technology and cheaper than from fossil fuels. This paper describes converting thermal energy collected by solar collector to electricity by using turbine. Anywhere in Myanmar will cheaply use electricity by using solar turbine generator. Remote areas will improve more and more when getting the efficient electricity. The design calculation and performance predication of 1 MVA turbo-alternator/generator are also mentioned. Design calculation of absorbed flux, useful heat gain and exit temperature is described. And then development of two-tank thermal storage system that uses molten salt as the heat transfer fluid is described.
Volume: 5
Issue: 5
Page: 939-947
Publish at: 2015-10-01

Path Loss Modeling of WLAN and WiMAX Systems

10.11591/ijece.v5i5.pp1083-1091
Imran Israr , Mahmood Ashraf Khan , Shahzad A. Malik , Shahid A. Khan , Mustafa Shakir
With the advancement in technology, there was need for efficient and high speed internet through which we could have access to multiple networks as per the user requirement. WLAN met this need to some extent but, due to its low range it was not recommended commercially. With the introduction of WiMAX there was an emerging need to select the best network amongst WiMAX or WLAN depending upon the user location. Pathloss with respect to these particular networks also needs to be compared. In this paper we compare the pathloss modelling for WiMAX and WLAN systems. Different Models have been compared with each other to know which model performs better by keeping same simulation environment. Path Loss models used for WLAN are Okumura, Hata, Cost-231 and Free Space Path Loss whereas models used for WiMAX are Free Space Path Loss, Okumura-Hata, Cost231-Hata and Stanford University Interim. In case of WiMAX three different scenarios Urban, Sub-Urban and Rural is considered where as in case of WLAN only outdoor environment is considered. With the Path Loss comparison, power received for these two technologies; WiMAX, and WLAN is also simulated. MATLAB is the tool used for simulations. Antenna Specifications for WiMAX and WLAN is kept same for all simulation environments.
Volume: 5
Issue: 5
Page: 1083-1091
Publish at: 2015-10-01
Show 1529 of 1827

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration