Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

27,404 Article Results

Compared with PI, Fuzzy-PI and PSO-PI Controllers of Robotic Grinding Force Servo System

10.11591/ijeecs.v16.i1.pp65-74
Adnan Jabbar Attiya , Yang Wenyu , Salam Waley Shneen
By grinding process, when an industrial robot is used to finish a curved surface, both feed movement and contact force must controlled at the similar time in order that the grinding tool would machine the work-piece at  the  right  position  in  right  posture with  required  force. A passive wrist system is advanced, in this paper, to conform the shape of the machining propeller by altering its posture along with the surface. The proportional-integral (PI) controller, due to its simplicity, robustness, and affordable price, is extremely often used in practical applications, but it is effective for linear systems, as well as, the challenging task is to find its optimal gains. If the processes involved higher order and time delay systems, many intelligent controllers were appeared. In this paper, to cope with nonlinearities, improve the controller parameters and at the same time modeling uncertainties of grinding marine propeller surface, a PI torque controller is proposed such that its optimal gains are derived via a modern systems based on fuzzy logic theory and particle swarm optimization algorithm which are used to solve various engineering problems. Grinding force is controlled under Fuzzy-PI controller which is being assembled and compared with a PSO-PI controller to obtain which controller that provides grinding with higher quality. The compared controllers have been optimized together with the parameters of the Two-Phase Hybrid Stepping Motor. The suggested fuzzy rule function and PSO algorithm improve the response of the controlled system and searches a high-quality solution impressively. Simulation and comparison results are presented and that the proposed control systems are coping well with nonlinearities and uncertainties while find PI control parameter set effectively, the PSO-PI controller has a better control performance with improved step response for robotic grinding force servo system. These control methods was simulated using MATLAB/SIMULINK.
Volume: 16
Issue: 1
Page: 65-74
Publish at: 2015-10-01

Comparative Study of Wavelet Image Compression: JPEG2000 Standart

10.11591/ijeecs.v16.i1.pp83-90
Ansam Ennaciri , Mohammed Erritali , Mustapha Mabrouki , Jamaa Bengourram
The objective of this paper is to study the main characteristics of wavelets that affect the image compression by using the discrete wavelet transform and lead to an image data compression while preserving the essential quality of the original image. This implies a good compromise between the image compression ratio and the PSNR (Peak Signal Noise Ration).
Volume: 16
Issue: 1
Page: 83-90
Publish at: 2015-10-01

A 45 nm 6 Bit Low Power Current Steering Digital to Analog Converter Using GDI Logic

10.11591/ijeecs.v16.i1.pp46-51
Bharat H. Nagpara
In this paper, The Design and Implementation low power Current Steering Digital to Analog Converter in 45 nm technology using GDI Logic using TANNER TOOL, V15 is presented. This architecture gives the most optimized results in terms of speed, resolution and power. The designed 6-bit DAC operates with two supply voltages, 1 V and 3.3 V. The simulation result shows the transient analysis waveforms of current Steering DAC. The average power dissipation is 364.06 μW. The tool used for simulation is Tanner S-Edit and T-Spice. Comparisons show that using GDI logic, it consists low power as compare to the CMOS logic.
Volume: 16
Issue: 1
Page: 46-51
Publish at: 2015-10-01

Loss Minimization of Power Distribution Network using Different Types of Distributed Generation Unit

10.11591/ijece.v5i5.pp918-928
Su Hlaing Win , Pyone Lai Swe
A Radial Distribution network is important in power system area because of its simple design and reduced cost. Reduction of system losses and improvement of voltage profile is one of the key aspects in power system operation. Distributed generators are beneficial in reducing losses effectively in distribution systems as compared to other methods of loss reduction. Sizing and location of DG sources places an important role in reducing losses in distribution network. Four types of DG are considered in this paper with one DG installed for minimize the total real and reactive power losses. The objective of this methodology is to calculate size and to identify the corresponding optimum location for DG placement for minimizing the total real and reactive power losses and to improve voltage profile   in primary distribution system. It can obtain maximum loss reduction for each of four types of optimally placed DGs. Optimal sizing of Distributed Generation can be calculated using exact loss formula and an efficient approach is used to determine the optimum location for Distributed Generation Placement.  To demonstrate the performance of the proposed approach 36-bus radial distribution system in Belin Substation in Myanmar was tested and validated with different sizes and the result was discussed.
Volume: 5
Issue: 5
Page: 918-928
Publish at: 2015-10-01

Remote Control of Mobile Robot using the Virtual Reality

10.11591/ijece.v5i5.pp1062-1074
Ibari Benaoumeur , Ahmed-Foitih Zoubir , Hanifi Elhachimi Amar Reda
In this paper we present the simulation and manipulation of  teleoperation system for remote control of mobile robot using the Virtual Reality (VR). The objective of this work is to allow the operator to control and supervise a unicycle type mobile robot. In this research we followed three ways: The use of articulated robotic mobile on the Web, the design of remote environment for the experimentation using the network for the mobile robot and the  architecture of control is proposed to facilitate the piloting of the robot. This work proposes a hardware and software architecture based on communication and information technologies to control the virtual robot to improve the control towards the remote robot. A path planning method is integrated to the remote control system. Results show the real possibilities offered by this manipulation, in order to follow a trajectory of the robot and to create applications with a distance access to facilities through networks like the Internet and wireless.
Volume: 5
Issue: 5
Page: 1062-1074
Publish at: 2015-10-01

XML and Semantics

10.11591/ijece.v5i5.pp1174-1179
Mohammad Moradi , MohammadReza Keyvanpour
Since the early days of introducing eXtensible Markup Language (XML), owing to its expressive capabilities and flexibilities, it became the defacto standard for representing, storing, and interchanging data on the Web. Such features have made XML one of the building blocks of the Semantic Web. From another viewpoint, since XML documents could be considered from content, structural, and semantic aspects, leveraging their semantics is very useful and applicable in different domains. However, XML does not by itself introduce any built-in mechanisms for governing semantics. For this reason, many studies have been conducted on the representation of semantics within/from XML documents. This paper studies and discusses different aspects of the mentioned topic in the form of an overview with an emphasis on the state of semantics in XML and its presentation methods.
Volume: 5
Issue: 5
Page: 1174-1179
Publish at: 2015-10-01

Wavelet and FFT Based Image Denoising Using Non-linear Filters

10.11591/ijece.v5i5.pp1018-1026
S Gopinathan , Radhakrishnan Kokila , P Thangavel
We propose a stationary and discrete wavelet based image denoising scheme and an FFTbased image denoising scheme to remove Gaussian noise. In the first approach, high subbands are added with each other and then soft thresholding is performed. The sum of low subbands is filtered with either piecewise linear (PWL) or Lagrange or spline interpolated PWL filter. In the second approach, FFT is employed on the noisy image and then low frequency and high frequency coefficients are separated with a specified cutoff frequency.Then the inverse of low frequency components is filtered with one of the PWL filters and the inverse of high frequency components is filtered with soft thresholding. The experimental results are compared with Liu and Liu's tensor-based diffusion model (TDM) approach.
Volume: 5
Issue: 5
Page: 1018-1026
Publish at: 2015-10-01

Investigation of Rectifier Circuit Configurations for Microwave Power Transmission System Operating at S Band

10.11591/ijece.v5i5.pp967-974
Chuc Huu Doan , Duong Gia Bach
The purpose of this work is to propose rectifier circuit topologies for microwave power transmission system operating at ISM band. This paper particularly presents in detail the proposed rectifier circuit configurations including series diode half wave rectifier and voltage doubler rectifier. The maximum conversion efficiency of rectifier using series diode half wave rectifier is 40.17 % with 220 W load resistance whereas it is 70.06 % with 330 W load resistance for voltage doubler rectifier. Compared to the series rectifier circuit, it is significant to note that the voltage doubler rectifier circuit has higher efficiency. The circuits presented are tuned for a center frequency of 2.45 GHz. The rectifiers were fabricated using microstrip technology. The design, fabrication and measurement results were obtained using a well-known professional design software for microwave engineering, Advanced Design System 2009 (ADS 2009). All design and measurement results will be reported.
Volume: 5
Issue: 5
Page: 967-974
Publish at: 2015-10-01

Designing an Adversarial Model Against Reactive and Proactive Routing Protocols in MANETS: A Comparative Performance Study

10.11591/ijece.v5i5.pp1111-1118
A. Peda Gopi , E. Suresh Babu , C. Naga Raju , S. Ashok Kumar
Mobile ad-hoc networks are self-organized infrastructure less networks that consists of mobile nodes, which are capable of maintaining and forming the network by themselves. Recently, researchers are designed several routing protocols on these networks. However, these routing protocols are more vulnerable to attacks from the intruders, which can easily paralyze the operation of the network due to its inherited characteristics of MANETS. One such type of attack is wormhole attack. Because of its severity, the wormhole attack has attracted a great deal of attention in the research community. This paper compares reactive and proactive routing protocols in adversarial environment. Specifically, wormhole attack is applied to these routing protocols to evaluate its performance through simulation. Comprehensively the results shows the comparative performance of these protocols against wormhole attack is hard to detect and easy to implement.
Volume: 5
Issue: 5
Page: 1111-1118
Publish at: 2015-10-01

A Novel Transient Current Limiter Based on Three-Phase Thyristor Bridge for Y-yg Transformers

10.11591/ijpeds.v6.i4.pp747-758
Alok Kumar Shrivastav , Pradip Kumar Sadhu , Ankur Ganguly , Nitai Pal
The transformer in flux current may be a transient current that happens in electrical devices has been charged. This current depends on completely different parameters probably the voltage magnitude, the switching on angle the permanent flux, the core physical phemeon characteristics, the primary circuit resistance, etc. To beat the issues arising owing to transients, these are required to be suppressed.In this paper, an easy and economical techniquie is conferred to limit the transient current of the Y-yg transformers. One amongst the most benefit of this technique is it doesn’t would like any negative feedback circuit or activity unit. The tactic relies on a three-phase thyristors bridge single LC reactor with the individual phases of electrical device. Since the amount of thyristors is reduced, the voltage ripple, electrical losses and therefore the malfunction likelihood due to device failure is reduced significantly. The projected technique has been simulated by MATLAB simulation. It’s shown that the projected style is a lot of economical for the transient current limitation of Y-yg transformers.
Volume: 6
Issue: 4
Page: 747-758
Publish at: 2015-09-21

Novel Approach for Control Data Theft Attack in Cloud Computing

10.11591/ijece.v5i6.pp1545-1552
K. Narasimha Sastry , B. Thirumala Rao , T Gunasekhar
Information security is a major problem faced by cloud computing around the world. Because of their adverse effects on organizational information systems, viruses, hackers, and attackers insiders can jeopardize organizations capabilities to pursue their undertaken effectively. Although technology based solutions help to mitigate some of the many problems of information security, even the preeminent technology can’t work successfully unless effective human computer communication occurs.IT experts, users and administrators all play crucial role to determine the behavior that occurs as people interact with information technology will support the maintenance of effective security or threaten it. In the present paper we try to apply behavioral science concepts and techniques to understanding problems of information security in organizations.
Volume: 5
Issue: 6
Page: 1545-1552
Publish at: 2015-09-11

Security in Wireless sensor network: Approaches and Issues

10.11591/ijeecs.v15.i3.pp584-590
Raja Waseem Anwar , Majid Bakhtiari , Anazida Zainal , Kashif Naseer Qureshi
Wireless sensor network is a tremendous emerging technology provides communication services for environmental monitoring and target tracking for mass public and military. With increasing of this smart network popularity sensor network faced various challenges and threats. The inclusion of wireless sensor nodes also incurs different types of security threats in network. Mostly networks are using shared key approaches to make less communication overhead, but still network compromise with replay impersonation and compromise attacks. The existing proposed schemes are not fully addressed other network resources such as energy and speed, etc.  The intent of this paper is to provide a comprehensive security requirement, detail about security attacks in network and discuss the existing security schemes.
Volume: 15
Issue: 3
Page: 584-590
Publish at: 2015-09-04

Comparison between an Interleaved Boost Converter and CUK Converter Fed BLDC Motor

10.11591/ijpeds.v6.i3.pp594-602
V. Ramesh , Y. Kusuma Latha
There is a great concern of torque ripple and power quality of three phase voltage source converter fed Permanent Magnet Brushless DC Motor (PMBLDCM). In this paper, two control strategies for BLDC motor drive has been investigated. One of the control strategies is based on PFC - CUK converter fed PMBLDCM drive and another one is PFC- interleaved boost converter fed BLDC motor drive. Comparison has been made between the two control stragies in terms of Torque ripple, Total harmonic distortion (THD) and power factor for different operating speeds. The proposed work as been implemented under MATLAB/simulink environment. Simulation results are presented to validate proposed work. From the results, it is observed that PFC interleaved Boost converter fed BLDC motor drive is more effective compared to CUK converter fed BLDC motor drive.
Volume: 6
Issue: 3
Page: 594-602
Publish at: 2015-09-01

Modeling and Simulation of Superconducting Magnetic Energy Storage Systems

10.11591/ijpeds.v6.i3.pp524-537
Ashwin Kumar Sahoo , Nalinikanta Mohanty , Anupriya M
This paper aims to model the Superconducting Magnetic Energy Storage System (SMES) using various Power Conditioning Systems (PCS) such as, Thyristor based PCS (Six-pulse converter and Twelve-pulse converter) and Voltage Source Converter (VSC) based PCS. Modeling and Simulation of Thyristor based PCS and VSC based PCS has been carried out. Comparison has also been carried out based on various criteria such as Total Harmonic Distortion (THD), active and reactive power control ability, control structure and power handling capacity. MATLAB/Simulink is used to simulate the various Power Conditioning Systems of SMES.
Volume: 6
Issue: 3
Page: 524-537
Publish at: 2015-09-01

Influence Of Sensorless Control On The Noise Of Switched Reluctance Motor Drive

10.11591/ijpeds.v6.i3.pp433-438
Alexander Petrushin , Maxim Tchavychalov
The influence of the switched reluctance motor drive sensorless control on the level of its noise is considered. Theoretically justified the increase of noise level while sensorless SRM control. The results of switched reluctance motor noise measurement with sensorless control and control using the physical position sensor are given.
Volume: 6
Issue: 3
Page: 433-438
Publish at: 2015-09-01
Show 1532 of 1827

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration