Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,082 Article Results

Serious Games Adaptation According to the Learner’s Performances

10.11591/ijece.v7i1.pp451-459
Amine Belahbib , Lotfi Elaachak , Mohamed Bouhorma , Othman Bakkali Yedri , Slimani Abdelali , Elouaai Fatiha
Basically, serious games provides enjoyment and knowledge, several researches in this field have focused into joining these two proprieties and make the best balance between them, in order, to provide the best game and enjoyable game experience and ensure the learning of the needed knowledge. Players differ and their knowledge background can be a lot different from one to the other. This study focused on how the SG adapts and provide the needed knowledge and enjoyment. The game should analyze players behavior from different angles, thus it can add difficulty, information, immersion or enjoyment modules to fit the player skills/knowledge.
Volume: 7
Issue: 1
Page: 451-459
Publish at: 2017-02-01

PC-APC Schemes in Multipath Diversity System to Get Higher Throughput

10.11591/ijece.v7i1.pp337-343
Sanjit Ningthoujam , Manash Pratim Dutta , Subhasish Banerjee , Chandan T. Bhunia , Swarnendu K. Chakraborty
This paper is studied about a new protocol of Packet combining (PC) and Aggressive Packet Combining Scheme (APC) in multipath diversity system to get higher throughput. In the proposed protocol of PC and APC schemes, two and three copies of a packet are sent in two and three paths. If either of the copies is received without any erroneous then select the correct one and discard all other copies.  Again if all copies are found as erroneous then combine the erroneous copies and perform XOR operation in case of PC and bit by bit majority logic in case of APC in order to get the original copy. The paper is implemented using Mat lab and found that new proposed protocols are getting higher throughput and probability of receiving successful packet at the receiver side. Thus, performance of error prone wireless network can be improved by applying either PC or APC in multipath diversity system.
Volume: 7
Issue: 1
Page: 337-343
Publish at: 2017-02-01

Context Sensitive Search String Composition Algorithm using User Intention to Handle Ambiguous Keywords

10.11591/ijece.v7i1.pp432-450
Uma Gajendragadkar , Sarang Joshi
Finding the required URL among the first few result pages of a search engine is still a challenging task. This may require number of reformulations of the search string thus adversely affecting user's search time. Query ambiguity and polysemy are major reasons for not obtaining relevant results in the top few result pages. Efficient query composition and data organization are necessary for getting effective results. Context of the information need and the user intent may improve the autocomplete feature of existing search engines. This research proposes a Funnel Mesh-5 algorithm (FM5) to construct a search string taking into account context of information need and user intention with three main steps 1) Predict user intention with user profiles and the past searches via weighted mesh structure 2) Resolve ambiguity and polysemy of search strings with context and user intention 3) Generate a personalized disambiguated search string by query expansion encompassing user intention and predicted query. Experimental results for the proposed approach and a comparison with direct use of search engine are presented. A comparison of FM5 algorithm with K Nearest Neighbor algorithm for user intention identification is also presented. The proposed system provides better precision for search results for ambiguous search strings with improved identification of the user intention. Results are presented for English language dataset as well as Marathi (an Indian language) dataset of ambiguous search strings. 
Volume: 7
Issue: 1
Page: 432-450
Publish at: 2017-02-01

A Study of Shading Effect on Photovoltaic Modules with Proposed P&O Checking Algorithm

10.11591/ijece.v7i1.pp29-40
Rozana Alik , Awang Jusoh , Tole Sutikno
Sun irradiation levels and associated temperature changes are the main factors that influence the conversion of solar energy into electricity. Most energy is produced during a hot sunny day as the sun irradiation is at the maximum level and uniform throughout the solar photovoltaic (PV). However, most solar PV were frequently get shadowed, completely or partially, by the neighbouring buildings, trees and passing clouds. Consequently, the solar PV has lower voltage and current output; hence, multiple maximum power points (MPP) are existed on the PV curve, which could cause confusion to the conventional Maximum Power Point Tracker (MPPT) to track the true MPP for the PV system. Thus, it is important to examine the impacts of partial shading on the solar PV in order to extract the maximum possible power. This paper presents a MATLAB-based modelling for simulation and experimental setup to study the I-V and P-V characteristics of a solar module under a non-uniform irradiation due to partial shading condition (PSC).  Furthermore, this study is also proposed an effective method (a variable step size of P&O with checking algorithm) that is low cost and higher tracking efficiency. Thus, this study is essential in improving and evaluating any new MPPT algorithm under the PSC.
Volume: 7
Issue: 1
Page: 29-40
Publish at: 2017-02-01

Fuel Cell Impedance Model Parameters Optimization using a Genetic Algorithm

10.11591/ijece.v7i1.pp184-193
Mohamed Sélmene Ben Yahia , Hatem Allagui , Arafet Bouaicha , Abdelkader Mami
The objective of this paper is the PEM fuel cell impedance model parameters identification. This work is a part of a larger work which is the diagnosis of the fuel cell which deals with the optimization and the parameters identification of the impedance complex model of the Nexa Ballard 1200 W PEM fuel cell. The method used for the identification is a sample genetic algorithm and the proposed impedance model is based on electric parameters, which will be found from a sweeping of well determined frequency bands. In fact, the frequency spectrum is divided into bands according to the behavior of the fuel cell. So, this work is considered a first in the field of impedance spectroscopy So, this work is considered a first in the field of impedance spectroscopy. Indeed, the identification using genetic algorithm requires experimental measures of the fuel cell impedance to optimize and identify the impedance model parameters values. This method is characterized by a good precision compared to the numeric methods. The obtained results prove the effectiveness of this approach.
Volume: 7
Issue: 1
Page: 184-193
Publish at: 2017-02-01

A Vertical Handover Algorithm in Integrated Macrocell Femtocell Networks

10.11591/ijece.v7i1.pp299-308
Suman Deswal , Anita Singhrova
The explosion in wireless telecommunication technologies has lead to a huge increase in the number of mobile users. The greater dependency on the mobile devices has raised the user’s expectations to always remain best connected. In the process, the user is always desiring good signal strength even at certain black spots and indoors. Moreover, the exponential growth of the number of mobile devices has overloaded macrocells. Femtocells have emerged out as a good promising solution for complete coverage indoors and for offloading macrocell. Therefore, a new handover strategy between femtocells and macrocell is proposed in this paper. The proposed handover algorithm is mainly based on calculating equivalent received signal strength along with dynamic margin for performing handover. The simulation results of proposed algorithm are compared with the traditional algorithm. The proposed strategy shows improvement in two major performance parameters namely reduction in unnecessary handovers and Packet Loss Ratio. The quantitative analysis further shows 55.27% and 23.03% reduction in packet loss ratio and 61.85% and 36.78% reduction in unnecessary handovers at a speed of 120kmph and 30kmph respectively. Moreover, the proposed algorithm proves to be an efficient solution for both slow and fast moving vehicles.
Volume: 7
Issue: 1
Page: 299-308
Publish at: 2017-02-01

Offine/online Optimum Routing of a UAV using Auxiliary Points

10.11591/ijece.v7i1.pp392-401
Abbas Fadavi , Ali Beheshti , Pedram Kermani
This paper presents a method to determine the route of a three-dimensional UAV. Three criteria; the height, the length of flight path and the unauthorized areas are used as the constraints and combined in a fuzzy function as the evaluation function. The article aimed to discover a minimum cost route from source to destination considering the constrains. In this paper a new searching method is proposed, with use of auxiliary points. The auxiliary point method iteratively divides a straight line to two shorter lines with less cost of evaluation function. Implementation results show that the proposed method dramatically decreases the calculations; meanwhile the ight route is sub-optimum.
Volume: 7
Issue: 1
Page: 392-401
Publish at: 2017-02-01

Review on Localization based Routing Protocols for Underwater Wireless Sensor Network

10.11591/ijece.v7i1.pp536-541
Mukhtiar Ahmed , Mazleena Salleh , M.Ibrahim Channa , Mohd Foad Rohani
Underwater Wireless Sensor Network (UWSN) can enable many scientific, military, safety, commercial and environmental applications. Majority of the network models has been introduced for the deployment of sensor nodes through routing schemes and methodologies along with different algorithms but still the design of routing protocol for underwater environment is a challenging issue due to distinctive characteristics of underwater medium. The majority of the issues are also needed to fulfill the appropriate approach for the underwater medium like limited bandwidth, high bit error rates, propagation delay, and 3D deployment. This paper focuses the comparative analysis of the localization based routing protocols for UWSN. This comparative analysis plays a significant attention to construct a reliable routing protocol, which provides the effectual discovery of the route between the source node and the sink node. In addition this comparative analysis also focuses the data packets forwarding mechanism, the deployment of sensor nodes and location based routing for UWSN in different conditions.
Volume: 7
Issue: 1
Page: 536-541
Publish at: 2017-02-01

Optimal Placement and Sizing of Active Power Line Conditioners for Minimizing Power Quality Problems

10.11591/ijeecs.v5.i2.pp267-276
Swathisriranjani M , Mohananthini K , Ranjitha M , Baskar S , Kavitha D
In this paper, a problem of allocation and sizing of multiple active power-line conditioners (aplcs) in power systems is handled with novel formulation. The utilized objective function comprises two main factors such as reduction of total harmonic distortion and the total cost of active power-line conditioners (aplcs). The formulated problem is solved by optimization technique SHUFFLE FROG LEAP ALGORITHM(SHFLA) using MATLAB. To evaluate the competence of the proposed formulation, the IEEE 18-bus  distorted distribution test system is employed and investigated with various number of aplcs placement. These cases are based on the discrete and limited size for aplcs, requiring the optimization method to solve the constrained and discrete nonlinear problems. The comparison of results in this paper showed that the proposed SHFLA is the most effective result among others in determining optimum location and size of APLC in distribution systems.
Volume: 5
Issue: 2
Page: 267-276
Publish at: 2017-02-01

A New Proposal for OFCC-based Instrumentation Amplifier

10.11591/ijece.v7i1.pp134-143
Deva Nand , Neeta Pandey
This contribution puts forward a new voltage mode instrumentation amplifier (VMIA) based on operational floating current conveyor (OFCC). It presents high impedance at input terminals and provides output at low impedance making the proposal ideal for voltage mode operation. The proposed VMIA architecture has two stages - the first stage comprises of two OFCCs to sense input voltages and coverts the voltage difference to current while the second stage has single OFCC that converts the current to voltage. In addition it employs two resistors to provide gain and imposes no condition on the values of resistors.  The behavior of the proposed structure is also analyzed for OFCC non idealities namely finite transimpedance and tracking error. The proposal is verified through SPICE simulations using CMOS based schematic of OFCC. Experimental results, by bread boarding it using commercially available IC AD844, are also included.
Volume: 7
Issue: 1
Page: 134-143
Publish at: 2017-02-01

Comparison of Three Segmentation Methods for Breast Ultrasound Images based on Level Set and Morphological Operations

10.11591/ijece.v7i1.pp383-391
Dewi Putrie Lestari , Sarifuddin Madenda , Ernastuti Ernastuti , Eri Prasetyo Wibowo
Breast cancer is one of the major causes of death among women all over the world. The most frequently used diagnosis tool to detect breast cancer is ultrasound. However, to segment the breast ultrasound images is a difficult thing. Some studies show that the active contour models have been proved to be the most successful methods for medical image segmentation. The level set method is a class of curve evolution methods based on the geometric active contour model. Morphological operation describes a range of image processing technique that deal with the shape of features in an image. Morphological operations are applied to remove imperfections that introduced during segmentation. In this paper, we have evaluated three level set methods that combined with morphological operations to segment the breast lesions. The level set methods that used in our research are the Chan Vese (C-V) model, the Selective Binary and Gaussian Filtering Regularized Level Set (SBGFRLS) model and the Distance Regularized Level Set Evolution (DRLSE) model. Furthermore, to evaluate the method, we compared the segmented breast lesion that obtained by each method with the lesion that obtained manually by radiologists. The evaluation is done by four metrics: Dice Similarity Coefficient (DSC), True-Positive Ratio (TPR), True-Negative Ratio (TNR), and Accuracy (ACC). Our experimental results with 30 breast ultrasound images showed that the C-V model that combined with morphological operations have better performance than the other two methods according to mean value of DSC metrics.
Volume: 7
Issue: 1
Page: 383-391
Publish at: 2017-02-01

Design and Analysis System of KNN and ID3 Algorithm for Music Classification based on Mood Feature Extraction

10.11591/ijece.v7i1.pp486-495
Made Sudarma , I Gede Harsemadi
Each of music which has been created, has its own mood which is emitted, therefore, there has been many researches in Music Information Retrieval (MIR) field that has been done for recognition of mood to music.  This research produced software to classify music to the mood by using K-Nearest Neighbor and ID3 algorithm.  In this research accuracy performance comparison and measurement of average classification time is carried out which is obtained based on the value produced from music feature extraction process.  For music feature extraction process it uses 9 types of spectral analysis, consists of 400 practicing data and 400 testing data.  The system produced outcome as classification label of mood type those are contentment, exuberance, depression and anxious.  Classification by using algorithm of KNN is good enough that is 86.55% at k value = 3 and average processing time is 0.01021.  Whereas by using ID3 it results accuracy of 59.33% and average of processing time is 0.05091 second.
Volume: 7
Issue: 1
Page: 486-495
Publish at: 2017-02-01

Analysis of Fingerprint Image Enhancement using Gabor Filtering with Different Orientation Field Values

10.11591/ijeecs.v5.i2.pp427-432
Pakutharivu P , Srinath M. V
Fingerprint image enhancement is the key process in IAFIS systems.  In order to reduce false identification ratio and to supply good fingerprint images to IAFIS systems for exact identification, fingerprint images are generally enhanced.  A filtering process tries to filter out the noise from the input image, and emphasize on low, high and directional spatial frequency components of an image.  This paper presents an experimental summary of enhancing fingerprint images using Gabor filters.  Frequency, width and window domain filter ranges are fixed. The orientation angle alone is modified by 0 radians, ,   and  radians. The experimental results show that Gabor filter enhances the fingerprint image in a better way than other filtering methods and extracts features. 
Volume: 5
Issue: 2
Page: 427-432
Publish at: 2017-02-01

A Model Unavailability Perspective of Existing Nigerian Township Electricity Distribution

10.11591/ijece.v7i1.pp77-85
Melodi Adegoke Oladipo , Temikotan Kehinde Olusesan
The study aimed to investigate and obtain model values of system unavailability and cost of energy not supplied in existing Nigerian township electricity distributions using a robust representative system. Outage data was obtained from system records for analysis using frequency distribution statistics to identify the causes of outages, and the contribution of each cause of outage to the overall system outage. The cost of energy not supplied (CENS) due to faults, was evaluated at a rate of NGN6 per kWHr. An analysis of the results shows that in a distribution feeder (and system) unavailability is mainly due to load shedding arising and faults; feeder unavailability involving load shedding is 0.25, and 0.1 without load shedding. Compared with standard UA value for well managed systems of less than or 0.01, the obtained unavailability values for a feeder show that downtime management was poor, and the corresponding cost – prohibitive. In view of the regular load shedding on the feeders and poor downtime management, this study recommends a need to obtain model loadflow perspective of township electricity distribution to ascertain load carrying capacity, and the application of distribution automation system or other effective strategies to mitigate downtime.
Volume: 7
Issue: 1
Page: 77-85
Publish at: 2017-02-01

Human Data Acquisition through Biometrics using LabVIEW

10.11591/ijece.v7i1.pp225-229
K Nishanth Rao , N. Vasudheva Reddy
Human Data Acquisition is an innovative work done based on fingerprints of a particular person. Using the fingerprints we can get each and every detail of any individual. Through this, the data acquired can be used in many applications such as Airport Security System, Voting System, and Employee login System, in finding the thieves etc. We in our project have implemented in Voting System. In this we use the components such as MyDAQ which is data acquisition device. The coding here is in done in a Graphical Programming language named LabVIEW where the execution of any program is done in a sequential way or step by step according to the data received.
Volume: 7
Issue: 1
Page: 225-229
Publish at: 2017-02-01
Show 1534 of 1939

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration