Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,393 Article Results

Wideband Branch Line Coupler with Open Circuit Coupled Lines

10.11591/ijece.v7i2.pp888-893
Muataz Watheq Sabri , N A Murad , M K A Rahim
This paper focuses on the design of a Wideband Branch Line Coupler by using open circuits coupled lines technique. The design is implemented by adding four open circuits coupled lines to the structure of the Conventional Branch Line Coupler. The proposed design of Wideband Branch Line Coupler is simulated using CST microwave software. The simulation results show that the coupler is operated at 3.8 GHz with coupling factor of -3dB and 90̊ phase difference between the two output ports. The prototype is fabricated and measured to validate the simulated results. A similar Wide Bandwidth is observed on simulation and measurement. The structure achieved a fractional bandwidth of 42.63%, and return loss of 21 dB compared to the Conventional Branch Line Coupler (BLC).
Volume: 7
Issue: 2
Page: 888-893
Publish at: 2017-04-01

Video Inter-frame Forgery Detection Approach for Surveillance and Mobile Recorded Videos

10.11591/.v7i2.pp831-841
Staffy Kingra , Naveen Aggarwal , Raahat Devender Singh
We are living in an age where use of multimedia technologies like digital recorders and mobile phones is increasing rapidly. On the other hand, digital content manipulating softwares are also increasing making it easy for an individual to doctor the recorded content with trivial consumption of time and wealth. Digital multimedia forensics is gaining utmost importance to restrict unethical use of such easily available tampering techniques. These days, it is common for people to record videos using their smart phones. We have also witnessed a sudden growth in the use of surveillance cameras, which we see inhabiting almost every public location. Videos recorded using these devices usually contains crucial evidence of some event occurence and thereby most susceptible to inter-frame forgery which can be easily performed by insertion/removal/replication of frame(s). The proposed forensic technique enabled detection of inter-frame forgery in H.264 and MPEG-2 encoded videos especially mobile recorded and surveillance videos. This novel method introduced objectivity for automatic detection and localization of tampering by utilizing prediction residual gradient and optical flow gradient. Experimental results showed that this technique can detect tampering with 90% true positive rate, regardless of the video codec and recording device utilized and number of frames tampered.
Volume: 7
Issue: 2
Page: 831-841
Publish at: 2017-04-01

An Accurate Performance Analysis of Hybrid Efficient and Reliable MAC Protocol in VANET under Non-saturated Conditions

10.11591/ijece.v7i2.pp999-1011
Akram A. Almohammedi , Nor K. Noordin , A. Sali , Fazirulhisyam Hashim , Abdulmalek Al-Hemyari
Vehicular Ad Hoc Networks (VANETs) is a technology supporting two types of applications, safety and service applications with higher and lower priorities respectively. Thereby, Medium Access Control (MAC) protocol is designed to provide reliable and efficient data broadcasting based on prioritization. Different from the IEEE 1609.4 (legacy), HER-MAC protocol is a new multi-channel MAC proposed for VANETs, offering remarkable performance with regards to safety applications transmission. This paper focuses on the analysis of packet delivery ratio of the HER-MAC protocol under non-saturated conditions. 1-D and 2-D Markov chains have been developed for safety and non-safety applications respectively, to evaluate mathematically the performance of HER-MAC protocol. The presented work has taken into account the freezing of the backoff timer for both applications and the backoff stages along with short retry limit for non-safety applications in order to meet the IEEE 802.11p specifications. It highlights that taking these elements into consideration are important in modeling the system, to provide an accurate estimation of the channel access, and guarantees that no packet is served indefinitely. More precise results of the system packet delivery ratio have been yield. The probability of successful transmission and collisions were derived and used to compute the packet delivery ratio. The simulation results validate the analytical results of our models and indicate that the performance of our models outperformed the existing models in terms of the packet delivery ratio under different number of vehicles and contention window.
Volume: 7
Issue: 2
Page: 999-1011
Publish at: 2017-04-01

Diagnosis of Faulty Sensors in Antenna Array using Hybrid Differential Evolution based Compressed Sensing Technique

10.11591/.v7i2.pp961-966
Shafqat Ullah Khan , M. K. A. Rahim , I. M. Qureshi , N. A. Murad
In this work, differential evolution based compressive sensing technique for detection of faulty sensors in linear arrays has been presented. This algorithm starts from taking the linear measurements of the power pattern generated by the array under test. The difference between the collected compressive measurements and measured healthy array field pattern is minimized using a hybrid differential evolution (DE). In the proposed method, the slow convergence of DE based compressed sensing technique is accelerated with the help of parallel coordinate decent algorithm (PCD). The combination of DE with PCD makes the  minimization faster and precise. Simulation results validate the performance to detect faulty sensors from a small number of measurements.
Volume: 7
Issue: 2
Page: 961-966
Publish at: 2017-04-01

A New Methodology of Hierarchical Image Fusion in Framework for Hyperspectral Image Segmentation

10.11591/ijeecs.v6.i1.pp58-65
B. Raviteja , M. Surendra Prasad Babu , K. Venkata Rao , Jonnadula Harikiran
Hyperspectral imaging system contains stack of images collected from the sensor with different wavelengths representing the same scene on the earth. This paper presents a framework for hyperspectral image segmentation using a clustering algorithm. The framework consists of four stages in segmenting a hyperspectral data set. In the first stage, filtering is done to remove noise in image bands. Second stage consists of dimensionality reduction algorithms, in which the bands that convey less information or redundant data will be removed. In the third stage, the informative bands which are selected in the second stage are merged into a single image using hierarchical fusion technique. In the hierarchical image fusion, the images are grouped such that each group has equal number of images. This methodology leads to group of images having much varied information, thus decreasing the quality of fused image. This paper presents a new methodology of hierarchical image fusion in which similarity metrics are used to create image groups for merging the selected image bands. This single image is segmented using Fuzzy c-means clustering algorithm. The experimental results show that this framework will segment the data set more accurately by combining all the features in the image bands. 
Volume: 6
Issue: 1
Page: 58-65
Publish at: 2017-04-01

Quality of Service based Task Scheduling Algorithms in Cloud Computing

10.11591/.v7i2.pp1088-1095
Sirisha Potluri , Katta Subba Rao
In cloud computing resources are considered as services hence utilization of the resources in an efficient way is done by using task scheduling and load balancing. Quality of service is an important factor to measure the trustiness of the cloud. Using quality of service in task scheduling will address the problems of security in cloud computing. This paper studied quality of service based task scheduling algorithms and the parameters used for scheduling. By comparing the results the efficiency of the algorithm is measured and limitations are given. We can improve the efficiency of the quality of service based task scheduling algorithms by considering these factors arriving time of the task, time taken by the task to execute on the resource and the cost in use for  the communication.
Volume: 7
Issue: 2
Page: 1088-1095
Publish at: 2017-04-01

Fault Identification of In-Service Power Transformer using Depolarization Current Analysis

10.11591/ijece.v7i2.pp559-567
M.A. Talib , N.A. Muhamad , Z.A. Malek , B.T. Phung
Preventive diagnostic testing of in-service power transformers require system outage and expert’s knowledge and experiences in interpreting the measurement results. The chemical oil analysis may cause significant variance to measurement results due to the different practices in oil sampling, storage, handling and transportation. Thus, a cost effective measuring technique by means of a simpler method that is able provide an accurate measurement results is highly required. The extended application of Polarization and Depolarization Current (PDC) measurement for characterization of different faults conditions on in-service power transformer has been presented in this paper. The oil sample from in-service power transformers with normal and 3 different faults type conditions were sampled and tested for Dissolved Gases Analysis (DGA) and PDC measurement. The DGA results was used to confirm type of faults inside the transformer while the PDC pattern of oil with normal, partial discharge, overheating and arcing were correlated to the oil sample conditions. The analysis result shows that depolarization current provides significant information to defferenciate fault types in power transformer. Thus this finding provides a new alternative in identifying incipient faults and such knowledge can be used to avoid catastrophic failures of power transformers.
Volume: 7
Issue: 2
Page: 559-567
Publish at: 2017-04-01

Hybrid Low Complex near Optimal Detector for Spatial Modulation

10.11591/.v7i2.pp818-822
P. Rajani Kumari , K. Chenna Kesava Reddy , K.S. Ramesh
In our previous work maximum throughput in multi stream MIMO is analyzed by overcoming the inter antenna interference. To mitigate the Inter antenna interference spatial modulation can be used. Spatial Modulation(SM) aided MIMO systems are the emerging MIMO systems which are low complex and energy efficient. These systems additionally use spatial dimensions for transmitting information. In this paper a low complex detector based on matched filter is proposed for spatial modulation to achieve near maximum likelihood performance while avoiding exhaustive ML search since MF based detector exhibits a considerable reduced complexity since activated transmitting antenna and modulated amplitude phase modulation constellation are estimated separately. Simulation results show the performance of the proposed method with optimal ML detector, MRC and conventional matched filter methods.
Volume: 7
Issue: 2
Page: 818-822
Publish at: 2017-04-01

Wideband Branch Line Coupler with Open Circuit Coupled Lines

10.11591/.v7i2.pp888-893
Muataz Watheq Sabri , N A Murad , M K A Rahim
This paper focuses on the design of a Wideband Branch Line Coupler by using open circuits coupled lines technique. The design is implemented by adding four open circuits coupled lines to the structure of the Conventional Branch Line Coupler. The proposed design of Wideband Branch Line Coupler is simulated using CST microwave software. The simulation results show that the coupler is operated at 3.8 GHz with coupling factor of -3dB and 90̊ phase difference between the two output ports. The prototype is fabricated and measured to validate the simulated results. A similar Wide Bandwidth is observed on simulation and measurement. The structure achieved a fractional bandwidth of 42.63%, and return loss of 21 dB compared to the Conventional Branch Line Coupler (BLC).
Volume: 7
Issue: 2
Page: 888-893
Publish at: 2017-04-01

Focusing Properties of a Modified Retarding Structure for Linear Electron Accelerators

10.11591/.v7i2.pp741-747
Vladimir Kuz'mich Shilov , Aleksandr Nikolaevich Filatov , Aleksandr Evgen'evich Novozhilov
When using accelerators in industry and medicine, important are the dimensions of the device used, especially the radial ones. In the linear electron accelerators based on a biperiodic retarding structure, which operates in the standing wave mode, there is a possibility to provide focusing of the accelerated particles with the help of high-frequency fields without the use of external focusing elements. In the accelerating cell, due to the presence of the far protruding drift sleeves, the electric field lines become strongly curved, which leads to the appearance in the regions adjacent to these sleeves of a substantial in magnitude radial component of the electric field. The particles entering the accelerating gap experience the action of a force directed toward the axis of the system, and at the exit, of a force directed away from the axis. Under certain conditions, alternation of the focusing and defocusing fields can lead to a general focusing effect. In the paper we study the focusing properties of a modified biperiodic structure with standing wave. The main attention is paid to the possibility of using the focusing properties of the electromagnetic accelerating field for guiding the electron beam through the aperture of the accelerating system, which will lead to a significant reduction in the accelerator sizes. The proposed method can be applied in the calculation and design of linear electron accelerators.
Volume: 7
Issue: 2
Page: 741-747
Publish at: 2017-04-01

Enhanced Time of Use Electricity Pricing for Industrial Customers in Malaysia

10.11591/ijeecs.v6.i1.pp155-159
Nur Azrina Mohd Azman , Md Pauzi Abdullah , Mohammad Yusri hasan , Dalila Mat Said , Faridah Hussin
New Time of Use (ToU) tariff scheme known as Enhanced ToU (EToU) has been introduced on 1st January 2016 for industrial customers in Malaysia. EToU scheme is the advanced version of current ToU where the daily time frame is divided into six period blocks, as compared to only two in the existing ToU. Mid-peak tariff is introduced on top of peak-hour and off-peak tariff. The new scheme is designed to reduce Malaysia’s peak hour electricity demand. On customer side, they could be benefited from the low off-peak tariff by simply shifting their consumption. However, it depends on their consumption profile and their flexibility in shifting their consumption. Since EToU scheme is voluntary, each customer needs to perform cost-benefit analysis before deciding to switch into the scheme. This paper analyzes this problem by considering EToU tariff scheme for industry and customer’s electricity consumption profile. Case studies using different practical data from different industries are presented and discussed in this paper.
Volume: 6
Issue: 1
Page: 155-159
Publish at: 2017-04-01

Modeling and Simulation of VSI Fed Induction Motor Drive in Matlab/Simulink

10.11591/.v7i2.pp584-595
D. Uma , K. Vijayarekha
The theory of reference frames and switching functions are effective in analyzing the performance of the induction motor fed from VSI (Voltage Source Inverter). In this work, mathematical model of Adjustable Speed Drive (ASD) is developed by taking synchronous reference frame equations for induction motor, switching function concept for VSI and non-switching concept for diode bridge rectifier.  The developed model is implemented using MATLAB/Simulink as it is an important tool for the validation of the proposed model. The performance of induction motor is analysed for different frequencies. The developed model is tested for the steady state behavior of machine drive. The proposed mathematical model is validated by the simulation results.
Volume: 7
Issue: 2
Page: 584-595
Publish at: 2017-04-01

DARE Algorithm: A New Security Protocol by Integration of Different Cryptographic Techniques

10.11591/.v7i2.pp1032-1041
John Mark Espalmado , Edwin Arboleda
Exchange of information between computer networks requires a secure communications channel to prevent and monitor unauthorized access, modification and denial of the computer network. To address this growing problem, security experts sought ways to advance the integrity of data transmission. Security Attacks compromises the security and hence hybrid cryptographic algorithms have been proposed to achieve safe service in the proper manner, such as user authentication and data confidentiality. Data security and authenticity are achieved using these algorithms. Moreover, to improve the strength and cover each algorithm’s weaknesses, a new security algorithm can be designed using the combination of different cryptographic techniques. This design uses Digital Signature Algorithm (DSA) for authentic key generation, Data Encryption Standard (DES) for key scheduling, and Advanced Encryption Standard (AES) and Rivest–Schamir–Adleman Algorithm (RSA) in encrypting data. This new security algorithm has been proposed for improved security and integrity by integration of these cryptographic techniques.
Volume: 7
Issue: 2
Page: 1032-1041
Publish at: 2017-04-01

Fabrication and Analysis of Amorphous Silicon TFT

10.11591/.v7i2.pp754-758
Srikanth G , Yadhuraj S R , Subramanyam T K , Satheesh Babu Gandla , Uma B V
The display technology and large area electronics got momentum with the introduction of TFT devices. TFTs can be made using different semiconducting materials or organic conducting materials as the active layer. Each one of them differ in their performance depending on the material used for the active layer. In this paper, fabrication of amorphous silicon TFT using PECVD is carried out. Simulation of the a-Si: H TFT is also carried out with the dimensions similar to that of the masks used for the fabrication. The Id-Vd plot for both the simulation and fabrication is obtained and studied.
Volume: 7
Issue: 2
Page: 754-758
Publish at: 2017-04-01

Game-Theoretic Channel Allocation in Cognitive Radio Networks

10.11591/.v7i2.pp986-991
Sangsoon Lim
Cognitive radio networks provide dynamic spectrum access techniques to support the increase in spectrum demand. In particular, the spectrum sharing among primary and secondary users can improve spectrum utilization in unused spectrum by primary users. In this paper, we propose a novel game theoretic channel allocation framework to maximize channel utilization in cognitive radio networks. We degisn the utility function based on the co-channel interference among primary and secondary users. In addition, we embed the property of the adjacent channel intererence to consider real wireless environment. The results show that the utility function converges quickly to Nash equilibrium and achieves channel gain by up to 25 dB compared to initial assignment.
Volume: 7
Issue: 2
Page: 986-991
Publish at: 2017-04-01
Show 1532 of 1960

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration