Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,393 Article Results

Quality of Service based Task Scheduling Algorithms in Cloud Computing

10.11591/.v7i2.pp1088-1095
Sirisha Potluri , Katta Subba Rao
In cloud computing resources are considered as services hence utilization of the resources in an efficient way is done by using task scheduling and load balancing. Quality of service is an important factor to measure the trustiness of the cloud. Using quality of service in task scheduling will address the problems of security in cloud computing. This paper studied quality of service based task scheduling algorithms and the parameters used for scheduling. By comparing the results the efficiency of the algorithm is measured and limitations are given. We can improve the efficiency of the quality of service based task scheduling algorithms by considering these factors arriving time of the task, time taken by the task to execute on the resource and the cost in use for  the communication.
Volume: 7
Issue: 2
Page: 1088-1095
Publish at: 2017-04-01

Video Monitoring Application using Wireless Sensor Node with Various External Antenna

10.11591/ijeecs.v6.i1.pp148-154
Amerrul Zabri , Mohamad Kamal A. Rahim , Farid Zubir , Norsaidah Muhamad Nadzir , Huda A. Majid
Surveillance and monitoring has become very important for security reasons these days. The use of wireless sensor node device offers a variety of platform depends on the attached sensor. When an image sensor is attached, the wireless sensor node is capable of monitoring an area wirelessly. Since wireless environment uses antenna to transmit and receive data, antenna is an important component that affects the video monitoring performance. This paper describes a surveillance system using Raspberry Pi with various external antenna. The Raspberry Pi with Pi Camera module and various types of antennas was used for testing and experimentation in line-of-sight (LOS) and non-line-of-sight (NLOS) condition. The results revealed that the Yagi Uda antenna gives the best output in terms of its signal strength and average Receive (Rx) rate.
Volume: 6
Issue: 1
Page: 148-154
Publish at: 2017-04-01

Implementation of Algorithm for Vehicle Anti-Collision Alert System in FPGA

10.11591/.v7i2.pp775-783
Aiman Zakwan Jidin , Lim Siau Li , Ahmad Fauzan Kadmin
Vehicle safety has becoming one of the important issues nowadays, due to the fact the number of road accidents, which cause injuries, deaths and also damages, keeps on increasing. One of the main factors which contribute to these accidents are human's lack of awareness and also carelessness. This paper presents the development and implementation of an algorithm to be utilized for vehicle anti-collision alert system, which may be useful to reduce the occurrence of accidents. This algorithm, which is to be deployed with the front sensors of the vehicle, is capable of alerting any occurrence of sudden slowing or static vehicles ahead, by sensing the rate of distance change. Furthermore, it also triggers an alert if the driver is breaching the safe distance from the vehicle ahead. This algorithm has been successfully implemented in Altera DE0 FPGA and its functionality was validated via hardware experimental tests.
Volume: 7
Issue: 2
Page: 775-783
Publish at: 2017-04-01

Performance of Non-Uniform Duty-Cycled ContikiMAC in Wireless Sensor Networks

10.11591/.v7i2.pp942-949
Nur Rabiul Liyana Mohamed , Ansar Jamil , Lukman Hanif Audah Audah , Jiwa Abdullah , Rozlan Alias
Wireless Sensor Network (WSN) is a promising technology in Internet of Things (IoTs) because it can be implemented in many applications. However, a main drawback of WSN is it has limited energy because each sensor node is powered using batteries. Therefore, duty-cycle mechanisms are introduced to reduce power consumption of the sensor nodes by ensuring the sensor nodes in the sleep mode almost of the time in order to prolong the network lifetime. One of the de-facto standard of duty-cycle mechanism in WSN is ContikiMAC, which is the default duty-cycle mechanism in Contiki OS. ContikiMAC ensures nodes can participate in network communication yet keep it in sleep mode for roughly 99\% of the time. However, it is found that the ContikiMAC does not perform well in dynamic network conditions. In a bursty network, ContikiMAC provides a poor performance in term of packet delivery ratio, which is caused by congestion. One possible solution is ContikiMAC should increase its duty-cycle rate in order to support the bursty traffic. This solution creates a non-uniform duty-cycle rates among the sensor nodes in the network. This work aims to investigate the effect of non-uniform duty-cycle rates on the performance on ContikiMAC. Cooja simulator is selected as the simulation tool. Three different simulation scenarios are considered depending on the Clear Channel Assessment Rate (CCR) configurations: a low uniform CCR value (Low-CCR), a high uniform CCR value (High-CCR) and non-uniform CCR values (Non-uniform-CCR). The simulation results show that the Low-CCR scenario provides the worst performance of PDR. On the other hand, the High-CCR scenario provides the best performance of PDR. The Non-uniform-CCR provides PDR in between of Low-CCR and High-CCR.
Volume: 7
Issue: 2
Page: 942-949
Publish at: 2017-04-01

Optical Humidity Sensor Based on Tapered Fiber with Multi-walled Carbon Nanotubes Slurry

10.11591/ijeecs.v6.i1.pp97-103
Habibah Mohamed , Ninik Irawati , Fauzan Ahmad , Mohd Haniff Ibrahim , Sumiaty Ambran , Mohd Azizi Abdul Rahman , Sulaiman Wadi Harun
We demonstrated performance comparison of optical humidity sensor for bare and Multi-walled carbon nanotubes (MWCNTs) slurry coated tapered optical fiber. The starting material for MWCNTs slurry is MWCNTs- acrylonitrile butadiene styrene (ABS) based fused deposition modeling (FDM) 3D printer filament. The ABS was dissolved using acetone to produce MWCNTs-acetone suspension. The MWCNTs-acetone suspension was drop-casted on the tapered fiber to produce MWCNTs slurry by evaporation process at room temperature, which resulted the MWCNTs slurry attach to the tapered fiber. The MWCNTs slurry acts as the cladding for humidity changes measurement. The experimental works showed improvement of sensitivity from 3.811 μW/% of bare tapered fiber to 5.17 μW/% for the coated tapered fiber with MWCNTs slurry when the humidity varied from 45% to 80%.
Volume: 6
Issue: 1
Page: 97-103
Publish at: 2017-04-01

Focusing Properties of a Modified Retarding Structure for Linear Electron Accelerators

10.11591/.v7i2.pp741-747
Vladimir Kuz'mich Shilov , Aleksandr Nikolaevich Filatov , Aleksandr Evgen'evich Novozhilov
When using accelerators in industry and medicine, important are the dimensions of the device used, especially the radial ones. In the linear electron accelerators based on a biperiodic retarding structure, which operates in the standing wave mode, there is a possibility to provide focusing of the accelerated particles with the help of high-frequency fields without the use of external focusing elements. In the accelerating cell, due to the presence of the far protruding drift sleeves, the electric field lines become strongly curved, which leads to the appearance in the regions adjacent to these sleeves of a substantial in magnitude radial component of the electric field. The particles entering the accelerating gap experience the action of a force directed toward the axis of the system, and at the exit, of a force directed away from the axis. Under certain conditions, alternation of the focusing and defocusing fields can lead to a general focusing effect. In the paper we study the focusing properties of a modified biperiodic structure with standing wave. The main attention is paid to the possibility of using the focusing properties of the electromagnetic accelerating field for guiding the electron beam through the aperture of the accelerating system, which will lead to a significant reduction in the accelerator sizes. The proposed method can be applied in the calculation and design of linear electron accelerators.
Volume: 7
Issue: 2
Page: 741-747
Publish at: 2017-04-01

Game-Theoretic Channel Allocation in Cognitive Radio Networks

10.11591/.v7i2.pp986-991
Sangsoon Lim
Cognitive radio networks provide dynamic spectrum access techniques to support the increase in spectrum demand. In particular, the spectrum sharing among primary and secondary users can improve spectrum utilization in unused spectrum by primary users. In this paper, we propose a novel game theoretic channel allocation framework to maximize channel utilization in cognitive radio networks. We degisn the utility function based on the co-channel interference among primary and secondary users. In addition, we embed the property of the adjacent channel intererence to consider real wireless environment. The results show that the utility function converges quickly to Nash equilibrium and achieves channel gain by up to 25 dB compared to initial assignment.
Volume: 7
Issue: 2
Page: 986-991
Publish at: 2017-04-01

DARE Algorithm: A New Security Protocol by Integration of Different Cryptographic Techniques

10.11591/.v7i2.pp1032-1041
John Mark Espalmado , Edwin Arboleda
Exchange of information between computer networks requires a secure communications channel to prevent and monitor unauthorized access, modification and denial of the computer network. To address this growing problem, security experts sought ways to advance the integrity of data transmission. Security Attacks compromises the security and hence hybrid cryptographic algorithms have been proposed to achieve safe service in the proper manner, such as user authentication and data confidentiality. Data security and authenticity are achieved using these algorithms. Moreover, to improve the strength and cover each algorithm’s weaknesses, a new security algorithm can be designed using the combination of different cryptographic techniques. This design uses Digital Signature Algorithm (DSA) for authentic key generation, Data Encryption Standard (DES) for key scheduling, and Advanced Encryption Standard (AES) and Rivest–Schamir–Adleman Algorithm (RSA) in encrypting data. This new security algorithm has been proposed for improved security and integrity by integration of these cryptographic techniques.
Volume: 7
Issue: 2
Page: 1032-1041
Publish at: 2017-04-01

Parallel Genetic Algorithms for University Scheduling Problem

10.11591/.v7i2.pp1096-1102
Artan Berisha , Eliot Bytyçi , Ardeshir Tershnjaku
University scheduling timetabling problem, falls into NP hard problems. Re-searchers have tried with many techniques to find the most suitable and fastest way for solving the problem. With the emergence of multi-core systems, the parallel implementation was considered for finding the solution. Our approaches attempt to combine several techniques in two algorithms: coarse grained algorithm and multi thread tournament algorithm. The results obtained from two algorithms are compared, using an algorithm evaluation function. Considering execution time, the coarse grained algorithm performed twice better than the multi thread algorithm.
Volume: 7
Issue: 2
Page: 1096-1102
Publish at: 2017-04-01

An Improved Integrated Hash and Attributed based Encryption Model on High Dimensional Data in Cloud Environment

10.11591/.v7i2.pp950-960
Satheesh K S V A Kavuri , Gangadhara Rao Kancherla , Basaveswararao Bobba
Cloud computing is a distributed architecture where user can store their private, public or any application software components on it. Many cloud based privacy protection solutions have been implemented, however most of them only focus on limited data resources and storage format. Data confidentiality and inefficient data access methods are the major issues which block the cloud users to store their high dimensional data. With more and more cloud based applications are being available and stored on various cloud servers, a novel multi-user based privacy protection mechanism need to design and develop to improve the privacy protection on high dimensional data. In this paper, a novel integrity algorithm with attribute based encryption model was implemented to ensure confidentiality for high dimensional data security on cloud storage. The main objective of this model is to store, transmit and retrieve the high dimensional cloud data with low computational time and high security. Experimental results show that the proposed model has high data scalability, less computational time and low memory usage compared to traditional cloud based privacy protection models.
Volume: 7
Issue: 2
Page: 950-960
Publish at: 2017-04-01

A Training Monitoring System for Cyclist Based on Wireless Sensor Networks

10.11591/ijeecs.v6.i1.pp80-87
N. M. Abdul Latiff , M. A. Ruslee , S. K. Syed Yusof , M. R. Abdul Rahim , H. Sayuti , K. Mohamad Yusof , M. A. Baharudin
This paper presents a training monitoring system for cyclist that is based on the technology of wireless sensor networks (WSNs). A stable and reliable wireless cyclist monitoring system is vital to establish a smart and efficient sports management program. A training monitoring system has been developed and tested in a real cyclist training environment in a velodrome. The system is designed is such a way that the packet loss rate is minimum. Using TelG mote as the basis, customized sensor nodes that function as a forwarder node and the relay nodes are developed to form the WSN. This WSN is linked to the cloud network on the Internet. The cloud network is then established and end users application for data accessing is designed. Several experiments have been conducted in a real scenario in a velodrome to measure the reliability of the system architecture. It is shown from the experiments that the proposed system is reliable even when the cyclist is moving at a high speed. The packet loss is less than 2% which does not give a huge impact to the data transmission.
Volume: 6
Issue: 1
Page: 80-87
Publish at: 2017-04-01

Modeling and Simulation of VSI Fed Induction Motor Drive in Matlab/Simulink

10.11591/.v7i2.pp584-595
D. Uma , K. Vijayarekha
The theory of reference frames and switching functions are effective in analyzing the performance of the induction motor fed from VSI (Voltage Source Inverter). In this work, mathematical model of Adjustable Speed Drive (ASD) is developed by taking synchronous reference frame equations for induction motor, switching function concept for VSI and non-switching concept for diode bridge rectifier.  The developed model is implemented using MATLAB/Simulink as it is an important tool for the validation of the proposed model. The performance of induction motor is analysed for different frequencies. The developed model is tested for the steady state behavior of machine drive. The proposed mathematical model is validated by the simulation results.
Volume: 7
Issue: 2
Page: 584-595
Publish at: 2017-04-01

Maintenance and Safety Requirements of Flameproof and Intrinsically Safe Equipment for Coal Mines

10.11591/ijeecs.v6.i1.pp9-15
B. Ahirwal , Arvind kumar singh , Rajendra kumar vishwakarm
In the generation of the new technology segment, new explosionproof (Ex) equipment are being installed to make systems suitable for use in hazardous areas of mines. Generally, 80-90% equipment having flameproof (Exd) and intrinsic safety (Exi) methodology of protection are used in the mines for safe operation. The maintenance and safety are two vital parameters to improve the system efficiency of installation in the mines. These parameters are also responsible for the productivity of the mines. The minimum breakdown and maximum safety are the prime concerns of the mines to increase the production. Many observations and basic knowledge are necessary of safety parameters of Ex protections while doing maintenance because micro joules energy is sufficient to ignite the hazardous areas of mines. Trained and skilled personals having good knowledge of Ex protections are required to maintain the limitations of ignition energy sources of Ex equipment to prevent explosion in the mines. A regular and organized scheme of inspection and maintenance may ensure continued, satisfactory and safe operation of Ex electrical equipment in mines. The important points for safety and maintenance of Exd and Exi equipment are pondered in this paper.
Volume: 6
Issue: 1
Page: 9-15
Publish at: 2017-04-01

Image Processing for Rapidly Eye Detection based on Robust Haar Sliding Window

10.11591/.v7i2.pp823-830
Fitri Utaminingrum , Renaldi Primaswara Praetya , Yuita Arum Sari
Object Detection using Haar Cascade Clasifier widely applied in several devices and applications as a medium of interaction between human and computer such as a tool control that utilizes the detection of eye movements. Obviously speed and precision in the detection process such as eyes, has an effect if implemented on a device. If the eye could not detect accurately, controlling device systems could reach bad detection as well. The proposed method can be used as an approach to detect the eye region of eye based on haar classifier method by means of modifying the direction of sliding window. In which, it was initially placed in the middle position of image on facial area by assuming the location of eyes area in the central region of the image. While the window region of conventional haar cascade scan the whole of image start from the left top corner. From the experiment by using our proposed method, it can speed up the the computation time and improve accuracy significantly reach to 92,4%.
Volume: 7
Issue: 2
Page: 823-830
Publish at: 2017-04-01

Vertical Information System: A Case Study of Civil Servant Teachers’ Data in Manado City

10.11591/ijeecs.v6.i1.pp42-49
Julyeta P.A. Runtuwene , Irene R.H.T Tangkawarow
Information systems have become important factors in a company, where information systems are useful in providing useful information for the company itself. The information system helps companies implement corporate activities at the beginning of the process until the decision making. In the concept Information system, we know the term of vertical information system, which is another strategy for increasing vertical information capacity. Vertical information system includes the periodic report, written information, and computer-based communications distributed to managers. In this article, discusses the approach in the development of vertical information system which will be preceded by comparison of operational systems, management information systems, and business intelligence systems. We will give explanations about the role in the BI system in an organization, the challenges faced in the implementation of vertical information systems, approaches in vertical information systems, approaches that we choose, and how it implement in  civil servant teachers data in Manado City. 
Volume: 6
Issue: 1
Page: 42-49
Publish at: 2017-04-01
Show 1536 of 1960

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration