Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

27,404 Article Results

Image Mosaicing for Wide Angle Panorama

10.11591/ijece.v5i5.pp1216-1226
Gopalasetti Divya , Chinta Chandra Sekhar
Images are integral part in our daily lives. With a normal camera it is not possible to get a wide angle panorama with high resolution. Image Mosaicing is one of the novel techniques, for combining two or more images of the same scene taken in different views into one image. In the dark areas, the obtained image is a panoramic image with high resolution without mask. But in the case of lighting areas, the resultant image is generating mask. In order to gets wide angle panorama, in the existing system, extracting feature points, finding the best stitching line, Cluster Analysis (CA) and Dynamic Programming (DP) methods are used. Also used Weighted Average (WA) method for smooth stitching results and also eliminate intensity seam effectively. In the proposed system, to get feature extraction and feature matching SIFT (Scaled Invariant Feature Transform) algorithm used. In this process, outliers can be generated. RANSAC (Random Sample Consensus) is used for detecting the outliers from the resultant image. Masking is significantly reduced by using Algebraic Reconstruction Techniques (ART).
Volume: 5
Issue: 5
Page: 1216-1226
Publish at: 2015-10-01

Design of the Monitoring System for Subway Platform Screen Doors Based on CAN Bus

10.11591/ijeecs.v16.i1.pp52-57
Caiqi Hu
In this paper, the application layer communication protocol of CAN bus and the monitoring system for subway platform screen doors are proposed.The system framework is built, hardware of every function module for this system is selected, and the monitoring platform of epigynous machine is designed. On the basis of the above work the communication function of the monitoring system is realized, and specific flow chart s given. This system has been tested at a subway line in Shanghai. And the results prove that the system is in full compliance with industry standards and can  completely meet the application requirements. The architecture plan of the system is practically proven to be valid and feasible.
Volume: 16
Issue: 1
Page: 52-57
Publish at: 2015-10-01

An Empirical Critique of On-Demand Routing Protocols against Rushing Attack in MANET

10.11591/ijece.v5i5.pp1102-1110
S. Ashok Kumar , E. Suresh Babu , C. Nagaraju , A. Peda Gopi
Over the last decade, researchers had  proposed numerous  mobile ad hoc routing protocols for which are operate in an on-demand way, as standard on-demand routing protocols such as AODV, DSR and TORA, etc., have been shown to often have faster reaction time and  lower overhead than proactive protocols. However, the openness of the routing environment and the absence of centralized system and infrastructure make them exposed to security attacks in large extent.  In particular, one such kind of attacks is rushing attack, which is mostly hard to detect due to their inherited properties, that alters the network statistics radically. In this paper, we modeled a rushing attack which is a powerful attack that exploits the weaknesses of the secure routing protocols. Moreover, to know the weakness and strength of these protocols, it is necessary to test their performance in hostile environments. Subsequently, the performance is measured with the various metrics, some ot them are average throughput, packet delivery ratio, average end-to-end delay and etc., to compare and evaluate their performance.
Volume: 5
Issue: 5
Page: 1102-1110
Publish at: 2015-10-01

Contribution to the Security of the Information System

10.11591/ijeecs.v16.i1.pp154-166
A. Ben Charke , M. Chabi , M. Fakir
Security of information systems has become a critical problem of companies. In this paper, the principles of security and the description of some attacks that threatening the information system are given. After Techniques of cryptography, digital signature to ensure the confidentiality, integrity and authentication of data, are described. Some security protocol such as Secure Shell (SSH), Secure Socket Layer (SSL), Internet Protocol SECure (IPSEC), in order to ensure the security of connection resources, are described. Intrusion detection is implemented using free IDS "SNORT" software.
Volume: 16
Issue: 1
Page: 154-166
Publish at: 2015-10-01

Segmentation of Fingerprint Image Based on Gradient Magnitude and Coherence

10.11591/ijece.v5i5.pp1202-1215
Saparudin Saparudin , Ghazali Sulong
Fingerprint image segmentation is an important pre-processing step in automatic fingerprint recognition system. A well-designed fingerprint segmentation technique can improve the accuracy in collecting clear fingerprint area and mark noise areas. The traditional grey variance segmentation method is widely and easily used, but it can hardly segment fingerprints with low contrast of high noise. To overcome the low image contrast, combining two-block feature; mean of gradient magnitude and coherence, where the fingerprint image is segmented into background, foreground or noisy regions,  has been done. Except for the noisy regions in the foreground, there are still such noises existed in the background whose coherences are low, and are mistakenly assigned as foreground. A novel segmentation method based on combination local mean of grey-scale and local variance of gradient magnitude is presented in this paper. The proposed extraction begins with normalization of the fingerprint. Then, it is followed by foreground region separation from the background. Finally, the gradient coherence approach is used to detect the noise regions existed in the foreground. Experimental results on NIST-Database14 fingerprint images indicate that the proposed method gives the impressive results.
Volume: 5
Issue: 5
Page: 1202-1215
Publish at: 2015-10-01

Design of Dual Band Sleeve Dipole Antenna for Mobile Jammer Applications

10.11591/ijeecs.v16.i1.pp106-110
Tariq Rahim , Jiaodong Xu
A multi band sleeve dipole antenna for jammer application is proposed. The antenna can cover band in which mobile and other wireless devices operate. The design antenna shows very good omni-directional characteristics and scattering parameter S11 value less than -10db. The dipole is made of two concentric hallow cylinder with different radius and different lengths. The antenna is fed at the center with coaxial cable pass through the bottom cylinder and thus avoids the use of complicated balun network. The impedance bandwidth and the radiation pattern are measured and analyzed both at 900 MHz and 1.8 GHz. The antenna can also be used GSM/DCS/WCDMA/CDMA2000/ TD-SCDMA /WLAN applications at both indoor and outdoor platform.
Volume: 16
Issue: 1
Page: 106-110
Publish at: 2015-10-01

New Methods for Reducing the Problems of Photovoltaic Systems

10.11591/ijeecs.v16.i1.pp13-18
Sobhan Dorahaki
Increasing of demand in the energy sphere and also unprecedented proliferation of environmental pollutants in the air has pushed human toward the using of renewable energy sources such as photovoltaic systems. Unfortunately, despite all the efforts made, in the field of photovoltaic systems, still the usability of this clean and renewable source is skeptical in the world. This paper examines some basic problems of photovoltaic systems and discusses a few new approaches to reduce some problems of photovoltaic systems. The proposed approaches have capabilities and difficulties which are investigated in this study.
Volume: 16
Issue: 1
Page: 13-18
Publish at: 2015-10-01

Modeling and Analysis of Inductive Coil ELF Sensor

10.11591/ijeecs.v16.i1.pp38-45
Rajendra Aparnathi , Vedvyas Dwivedi
Mathematical statistical analysis of inductive loop coil-sensor is carried out for its magnetic field effects operating on extremely low frequency (
Volume: 16
Issue: 1
Page: 38-45
Publish at: 2015-10-01

OFDM PAPR Reduction Using Recurring SLM with Cyclic and Linear Block Codes Schemes

10.11591/ijeecs.v16.i1.pp1-6
Pratima Manhas , M.K Soni
Orthogonal Frequency division multiplexing is a type of multicarrier modulation technique which is used in various wireless & telecommunication standards. In OFDM, higher data rate is split into several narrowband data stream that is transmitted simultaneously over a number of subcarriers.  One major disadvantage of using OFDM is high Peak to Average power ratio. This paper presents the simulation result which compares the PAPR using SLM with Cyclic & Linear block codes. The simulation study verifies that the PAPR reduction by proposed method is better than the existing technique (SLM).
Volume: 16
Issue: 1
Page: 1-6
Publish at: 2015-10-01

Fire Detection Using Multi Criteria Image Processing Technique in Video Sequences

10.11591/ijeecs.v16.i1.pp136-144
Behrouz Memarzadeh , Mohammad Ali Mohammadi
Vision-based flame detection has drawn significant attention in the past decade with camera surveillance systems becoming ubiquitous. This paper proposes a multi criterion method to detect fire or flames by processing the video data generated by a high speed camera. Since flame images are special class of images, some of the unique features of a flame may be used to identify flame. There are some differences between flame images and other general images. By using these features we are able to detect fire correctly with least false alarm. In this paper we present an algorithm which can detect fire and reduce number of false alarms by counting number of identified pixels. In the algorithm, we preprocess the images to have better results. So first we adjust the gray level of a flame image according to its statistical distribution to have better processing. After that we try to extract fire features in images. First by using color characteristics, the ratio of red to green, we can identify probable fire-like or fire like pixels. Second, to highlight the regions with high gray level contrast at their edges, we use the extended prewitt filter. We use AND operation on two above processing images to remove unrelated pixels, at last by using flicker frequency, the oscillating change in the number of identified pixels over time is transformed into the frequency domain to complete detection algorithm. Simulation proves the algorithm ability to detect fire in different situations in video sequences.
Volume: 16
Issue: 1
Page: 136-144
Publish at: 2015-10-01

Quality Enhancement of AC Chopper Using Genetic Algorithm

10.11591/ijeecs.v16.i1.pp30-37
S. Mahendran , Gnanambal I , Maheswari A
This paper mainly deals with the design of AC chopper using Genetic Algorithm based harmonic elimination technique. Genetic Algorithm is used to calculate optimum switching angles to eliminate lower order harmonics in the output voltage. Total Harmonic Distortion of output voltage is calculated from the obtained switching angles and also adopted in the proposed fitness function. Comparative analysis is made for the switching angles obtained by the Newton Raphson method and the proposed Genetic Algorithm. The analysis reveals that the proposed technique is on par with conventional method. Additionally, the Genetic Algorithm approach offers less computational burden, guaranteed global optima in most cases and faster convergence. The proposed method is simulated in Matlab/Simulink model and the results shows that the proposed method works with high effectiveness, accuracy and rapidity.
Volume: 16
Issue: 1
Page: 30-37
Publish at: 2015-10-01

Optimal Placement of Sensors in Mission-specific Mobile Sensor Networks

10.11591/ijeecs.v16.i1.pp191-198
Hicham Ouchitachen , Abdellatif Hair , Najlae Idrissi
Placement of nodes has been the major challenge in wireless sensor networks. The data reported from a sensor is only useful when the position of that sensor is found. In this context, several techniques have been proposed to conserve power consumption and to prolong the lifetime of the wireless sensor networks. In this paper, we propose a new algorithm that accurately finds the best locations of sensors while minimizing the average energy consumed in the network. More precisely, we consider a critical network in each sensor satisfying its own missions and depending on its locations. In addition to fulfill their mission, the sensor tries to maintain a good neighboring nodes quality. we determine the location of node by using two criteria: the cost and the quality of communication. The aim of this work is to develop a new algorithm so as to solve the complicated optimization problem posed in this case while minimize the total energy consumption. Our simulation results demonstrate that our algorithm is very advantageous in terms of convergence to the appropriate locations.
Volume: 16
Issue: 1
Page: 191-198
Publish at: 2015-10-01

Competitive intelligence: Leaven of a New Managerial Device for Decision Support

10.11591/ijeecs.v16.i1.pp167-175
Salima El Fadili , Firdaous Gmira
In a highly competitive environment saturated in information traversing the earth in nanosecond, the major challenge for companies is to have the right information at the right time, to exploit it and transform it into useful organizational knowledge for strategy formulation and decision-making. Nowadays, several management practices have been developed and designed to cope with the complexity that exists in the business environment and to maintain a sustained competitive advantage. Competitive intelligence is one of these innovative strategic management practices that play an increasingly important role in decision-making. This article attempts to present an overview of its fundamental concepts, functions and process and to explain how information is utilized in supporting decision-making process. The findings of this research suggest that decision makers should focus on developing competitive intelligence process in their organizations. This paper falls under a research task that was not confronted yet with the test of the terrain survey.
Volume: 16
Issue: 1
Page: 167-175
Publish at: 2015-10-01

Power Generation and Voltage Regulation of 132KV Karbala Grid using DFIG Wind Turbine Generator

10.11591/ijeecs.v16.i1.pp19-29
Qasim Kamil Mohsin , Xiangning Lin , Owolabi Sunday , Asad Waqar
Due to increasing demand on electrical energy in Iraq and to have clean energy that is environmental friendly, wind energy would be one of the most important and promising sources of renewable energy to achieve this goal. This paper discussed the reasons to use the Doubly-Feed Induction Generator (DFIG) amongst the available types of wind turbine generators, and in section (4) illustrate Motivations to select place to the wind farm construction. using decupling method (the vector control strategy) to change reactive power of DFIG 2MW connected to middle of the 132KV transmission line (Karbala north – Alahkader) without effect about the active power generated from DFIG itself with fixed wind speed value assumed to provide the voltage regulation, and control of the transmission line In addition to power generating. By using PSCAD/EMTDC, different simulation results are presented based on various scenarios.
Volume: 16
Issue: 1
Page: 19-29
Publish at: 2015-10-01

A Review on Development and Operational Strategy of Fault Current Limiters

10.11591/ijeecs.v16.i1.pp145-153
S.P. Janani Priyadharshna , T. Venkatesan
Distributed Generation (DG) plays a major role in existing power system. When such distributed generation system is interconnected with micro-grid improves voltage profile, power quality but at the same time results in fault conditions. Among various faults occurring in the power system, short circuit faults are the most predominant case. This results in the increase in flow of the fault current in the line. Also the equipments installed in such a line get damaged internally due to flow of excess fault current. Therefore in order to improve the transient conditions and limit the fault current to a manageable level, a device called Fault Current Limiters (FCLs) are being used in recent trend. This paper reviews about various fault current limiters, their development, characteristics and operating performance in the system. It gives a detailed knowledge about various operations performed by fault current limiters that is compared with other conventional techniques.
Volume: 16
Issue: 1
Page: 145-153
Publish at: 2015-10-01
Show 1531 of 1827

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration