Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

28,428 Article Results

An Improved Chaos Electromagnetism Mechanism Algorithm for Path Optimization Problem

10.11591/ijeecs.v3.i2.pp475-480
Shoulin Yin , Jie Liu , Lin Teng
As we all know, traditional electromagnetism mechanism (EM) algorithm has the disadvantage with low solution precision, lack of mining ability and easily falling into precocity. This paper proposes a new chaos electromagnetism mechanism algorithm combining chaotic mapping with limited storage Quasi-Newton Method (EM-CMLSQN). Its main idea is that it adopts limit quasi-Newton operator to replace the local optimization operator in EM algorithm for local searching in the late of algorithm. In the process of algorithm, the chaos mapping is introduced into optimization processes, and it generates new individuals to jump out of local to maintain the population diversity according to characteristics of chaos mapping random traversal. Finally, the experiments show that the new algorithm can effectively jump out of local optimal solution through comparing three continuous space test functions. The new algorithm has obvious advantages in terms of convergence speed compared to traditional EM algorithm, in addition, it is more accuracy than particle swarm optimization (PSO) algorithm. We compare the new chaos electromagnetism mechanism algorithm with ant colony optimization (ACO) algorithm, PSO algorithm, the results represent that new scheme can obtain the optimal path in the path optimization process, which shows that the new method has better applicability in the discrete domain problem.
Volume: 3
Issue: 2
Page: 475-480
Publish at: 2016-08-01

Tuning Methods of PID Controller for DC Motor Speed Control

10.11591/ijeecs.v3.i2.pp343-349
Ashwaq Abdulameer , Marizan Sulaiman , MSM Aras , Dawood Saleem
The traditional PID controllers are used for a long time to control the DC motor for many industrial processes, that because of the simplicity, flexibility, and satisfactory performance of this type of controller. This paper discusses the basic PID tuning method (Ziegler-Nichols) and its modification (Chien-Hrones-Reswick). Also, analysis the speed control DC motor response using the PID controller parameters that result from the tuning methods mentioned earlier. Moreover, explain the advantage and disadvantage of each formula of these methods.  GUL/MATLAB windows used to implementing both methods to create more comfortable and friendly environment for better understanding of the PID controller tuning methods formula for engineering students and practicing engineers.
Volume: 3
Issue: 2
Page: 343-349
Publish at: 2016-08-01

Designing a Multi-purpose GSM Based Interactive Embedded Data-Acquisition System Providing Solutions for Fire Accidents

10.11591/ijece.v6i4.pp1506-1513
P Michael Preetam Raj , Rakesh Tirupathi , P Gopi Krishna , Jasti Sateesh , Vijay Krishna Balachander
The Data-Acquisition systems with remote accessibility are greatly demanded in industry and consumer applications. In this paper, a data-acquisition system which can save lives and property, based on GSM communication, accommodating a wide range of electronic devices is presented. The system has the special ability to automatically quench fire by spraying water during fire accidents, simultaneously informing the local fire station and the responsible persons as well, saving loss of life and property. Also the varying status can be instantaneously recorded and uploaded in internet, for failure analysis. By using a GPS receiver it is possible to acquire and display the images of the locations where there are fire accidents by decoding the text SMS data, which helps in continuously tracking the fire accident location using google maps, helping the fire engine to reach instantly. Also the cost-effectiveness of the overall system is proved. The embedded board acts as the main controller of this system which has a SIM card placed in it and thus communicates using GSM, making it accessible from anywhere in the world, providing a faster two-way data transfer between the Embedded system and the client, in real-time.
Volume: 6
Issue: 4
Page: 1506-1513
Publish at: 2016-08-01

An Investigation Study on Optimizing Enterprise Resource Planning (ERP) Implementation in Emerging Public University: Al Baha University Case Study

10.11591/ijece.v6i4.pp1920-1928
Moh’D Suliman Shakkah , Khaled Alaqeel , Ali Alfageeh , Rahmat Budiarto
This project investigates the correlation between the organizational readiness in Albaha University (ABU) and the respective Critical Success Factors (CSFs) with regards to the Enterprise Resource Planning (ERP) implementation. The investigation also considers some suggestions to improve the ABU’s ERP systems and roadmap towards the self –development strategy and reduce vendor-dependency. A survey regarding ERP to the end-user, expert and developer in ABU was conducted. The analysis of the results in this work confirmed with the results of an existing work. The four significance success factors: Project Management, Business Process Re-engineering (BPR), System Integration, and Training and Education are recommended to be adopted to assure the smooth adoption of ERP at Albaha University
Volume: 6
Issue: 4
Page: 1920-1928
Publish at: 2016-08-01

Accurate Iris Localization Using Edge Map Generation and Adaptive Circular Hough Transform for Less Constrained Iris Images

10.11591/ijece.v6i4.pp1637-1646
Vineet Kumar , Abhijit Asati , Anu Gupta
This paper proposes an accurate iris localization algorithm for the iris images acquired under near infrared (NIR) illuminations and having noise due to eyelids, eyelashes, lighting reflections, non-uniform illumination, eyeglasses and eyebrow hair etc. The two main contributions in the paper are an edge map generation technique for pupil boundary detection and an adaptive circular Hough transform (CHT) algorithm for limbic boundary detection, which not only make the iris localization more accurate but faster also. The edge map for pupil boundary detection is generated on intersection (logical AND) of two binary edge maps obtained using thresholding, morphological operations and Sobel edge detection, which results in minimal false edges caused by the noise. The adaptive CHT algorithm for limbic boundary detection searches for a set of two arcs in an image instead of a full circle that counters iris-occlusions by the eyelids and eyelashes. The proposed CHT and adaptive CHT implementations for pupil and limbic boundary detection respectively use a two-dimensional accumulator array that reduces memory requirements. The proposed algorithm gives the accuracies of 99.7% and 99.38% for the challenging CASIA-Iris-Thousand (version 4.0) and CASIA-Iris-Lamp (version 3.0) databases respectively. The average time cost per image is 905 msec. The proposed algorithm is compared with the previous work and shows better results.
Volume: 6
Issue: 4
Page: 1637-1646
Publish at: 2016-08-01

A Generic Review on Effective Intrusion Detection in Ad hoc Networks

10.11591/ijece.v6i4.pp1779-1784
G. Gopichand , RA.K. Saravanaguru
Ad hoc network is specifically designed for the establishment of a network anywhere and anytime, which does not have any fixed infrastructure in order to support the mobility of the users in the network. The network is established without using any access points or base stations for communication implemented in multi hop schemes. Hence we call an Ad hoc network as a collection of nodes which are mobile in nature with a dynamic network infrastructure and forms a temporary network. Because of dynamic topological changes, these networks are vulnerable at the physical link, and they can easily be manipulated. An intruder can easily attack the Ad hoc network by loading the network resources which are available, such as wireless links and energy (battery) levels of other users, and then starts disturbing all the users. This paper provides a comparative survey on the various existing intrusion detection systems for Ad hoc networks based on the various approaches applied in the intrusion detection systems for providing security to the Ad hoc network.
Volume: 6
Issue: 4
Page: 1779-1784
Publish at: 2016-08-01

Active LC Clamp dv/dt Filter for Voltage Reflection due to Long Cable in Induction Motor Drives

10.11591/ijece.v6i4.pp1456-1469
Mini R , Manjiri Joshi , B. Hariram Satheesh , Dinesh M.N.
This paper presents an active LC clamped dv/dt filter to mitigate the over voltages appearing across the motor terminals. The over voltages at motor terminal is due to voltage reflection effect of long motor cable connected between high frequency PWM inverter having high dv/dt switching waveforms and ac motor drives. The voltage reflection due to fast switching transients can be reduced by increasing the rise time and fall time of inverter output voltage pulses. The most commonly available mitigating technique is a passive dv/dt filter between inverter and cable.  Since, size, cost and losses of passive LC dv/dt filter is more, an active dv/dt filtering technique is used to reduce over voltage at motor terminals. Active LC clamp filtering technique used here consists of a small LC filter designed for a single motor cable length which can be used for any lengths of cable up to 1000m only by changing the active control of the PWM pulses to achieve the desired voltage slope during voltage transition period. The basic principle of active dv/dt filer used here is to charge and discharge the capacitor in the filter with modified PWM pulses to increase the rise time and fall time of output voltage pulses without any extra devices to handle the transient response of the LC filter. Detailed investigation is carried out by simulation using MATLAB-Simulink software with active control of common LC clamp dv/dt filter suitable for various cable lengths ranging from 100 m to 1000 m. Comparative analysis is done with active dv/dt filter designed with a common LC clamp filter and active LC clamp dv/dt filter designed for various cable lengths and also with diode clamped passive dv/dt filter. The results proves the effectiveness of the active common LC dv/dt filter to mitigate the over voltages at motor terminal for cable lengths up to 1000m.
Volume: 6
Issue: 4
Page: 1456-1469
Publish at: 2016-08-01

Cloud Computing CPU Allocation and Scheduling Algorithms using CloudSim Simulator

10.11591/ijece.v6i4.pp1866-1879
Hicham GIBET TANI , Chaker EL AMRANI
In this paper, we describe the Cloud Computing basic compute resources scheduling and allocation algorithms, in addition to the working mechanism. This paper also presents a number of experiments conducted based on CloudSim simulation toolkit in order to assess and evaluate the performance of these scheduling algorithms on Cloud Computing like infrastructure. Furthermore, we introduced and explained the CloudSim simulator design, architecture and proposed two new scheduling algorithms to enhance the existent ones and highlight the weaknesses and/or effectiveness of these algorithms.
Volume: 6
Issue: 4
Page: 1866-1879
Publish at: 2016-08-01

Unusual Event Detection using Mean Feature Point Matching Algorithm

10.11591/ijece.v6i4.pp1595-1601
Chitra Hegde , Shakti Singh Chundawat , Divya S N
Analysis and detection of unusual events in public and private surveillance system is a complex task. Detecting unusual events in surveillance video requires the appropriate definition of similarity between events. The key goal of the proposed system is to detect behaviours or actions that can be considered as anomalies. Since suspicious events differ from domain to domain, it remains a challenge to detect those events in major domains such as airport, super malls, educational institutions etc. The proposed Mean Feature Point Matching (MFPM) algorithm is used for detecting unusual events. The Speeded-Up Robust Features (SURF) method is used for feature extraction. The MFPM algorithm compares the feature points of the input image with the mean feature points of trained dataset. The experimental result shows that the proposed system is efficient and accurate for wide variety of surveillance videos.
Volume: 6
Issue: 4
Page: 1595-1601
Publish at: 2016-08-01

Microstrip Line Fed Leaky Wave Antenna with Shorting Vias for Wideband Systems

10.11591/ijece.v6i4.pp1725-1731
T V Rama Krishna , B T P Madhav , G Monica , V Janakiram , S Md Abid Basha
In this work a complex structured shorted vias microstrip leaky wave antenna is designed and analysed. A Leaky wave antenna is a travelling wave structure with complex propagation constant. When shorting vias are loaded in a periodic structure the fundamental resonant mode shows some stop band characteristics and some of the modes will strongly attenuated. Three different types of iterations are examined in this work with and without defected ground structures. The defected ground structure based leaky wave antennas are showing better performance characteristics with respect to efficiency and phase. A micro strip line feeding with impedance of 50 ohms at both ports are providing excellent impedance matching to the conducting path on the microstrip surface. The shorting vias are suppressing certain higher order frequency bands and providing excellent wide band characteristics with low loss.
Volume: 6
Issue: 4
Page: 1725-1731
Publish at: 2016-08-01

Comparison of Voltage-Vector Control based on Duty Cycle Analysis in Three-Phase Four-Leg System Active Filter

10.11591/ijece.v6i4.pp1395-1405
Indriarto Yuniantoro , Rudy Setiabudy , Ridwan Gunawan
Comparison of voltage vector control in various forms of tetrahedron that result from switching combination on three-phase four-leg system active filter is presented especially asymmetric tetrahedron shape which is a projection pqr-coordinate into αβ0-coordinate. Parameter tetrahedrons such as modulation boundary-line, reference vector, switching duration time and duty cycle are described. Duty cycle analysis conducted on the Shen’s model, the Zhang’s model, the Perales’s model and asymmetric’s model are presented. The characteristics results showed that switching combination of each IGBT conductor especially its reviews on the neutral wire. Asymmetric tetrahedron can be proposed as control technique in three-phase four-leg system active filter.
Volume: 6
Issue: 4
Page: 1395-1405
Publish at: 2016-08-01

Analysis of the range of acceleration for an accelerometer with extended beams

10.11591/ijece.v6i4.pp1541-1550
Ramon Cabello , Margarita Tecpoyotl , Jose Gerardo Vera , Alfonso Torres , Pedro Vargas , Svetlana Koshevaya
The elastic behaviour of a system can be determined by an analysis of stresses. The stress generated in the element loaded of an accelerometer is of interest here. In these devices, the suspension beams are the elements subjected to greater stresses, as they support the mass. The stress that they can support is limited by the elastic limit of the material. Based on this analysis, the operating conditions to prevent permanent deformations are determined. The analysis is focused on the acceleration applied to the accelerometer because this parameter increases considerably the stresses in the device. A relationship between normal stress and gravity applied is obtained. This equation is used in order to avoid exceeding the elastic limit, during the accelerometer operation. This fact determines the acceleration range supported by the device. In the literature, studies about the physics and modelling of accelerometers are performed. However, about the specific acceleration of operation which they are subjected, information about its determination is not provided. In this paper, the analysis is realized considering a Conventional Capacitive Accelerometer (CCA) and a Capacitive Accelerometer with Extended Beams (CAEB), particularly, on the normal stress. When a range of acceleration values are applied, normal stress occur which must not exceed the elastic limit of the material, as it was mentioned before. The Matlab code used to calculate this relationship is given in Appendix A.
Volume: 6
Issue: 4
Page: 1541-1550
Publish at: 2016-08-01

Analysis of Brute Force Attacks with Ylmf-pc Signature

10.11591/ijece.v6i4.pp1681-1684
Anton Valeryevich Arzhakov , Dmitry Sergeevich Silnov
Brute force techniques used in many fields of authentication process. Ftp servers, web servers and mail servers very often got threatened by attackers. Old technique for mail service brute force still working and it can be easily detected by special signature.
Volume: 6
Issue: 4
Page: 1681-1684
Publish at: 2016-08-01

Segmentation of Retail Mobile Market Using HMS Algorithm

10.11591/ijece.v6i4.pp1818-1827
Koyi Anusha , Yashaswini C , Manishankar S
In the modern world of marketing, analyzing the trends in market is a key point towards to scope of improvement of any company. Considering the analysis of a retail market where market trends change very frequently based on customer needs and interest is highly challenging. Market segmentation is one of the approaches included in analysis of market trends which gives a diverse view of the market.  The research here concentrates, especially on a case study based on fast moving consumable goods market and identifying market change patterns by applying a novel data mining approach. Data mining includes a wide variety of techniques and algorithm which can be effectively used in the process of market analysis. The research work carried out coins a new algorithm which combines various association rules and techniques, the HMS (Hybrid market segmentation) algorithm with some specialized criteria is used to support the market segmentation. The primary data needed for the analysis and operation are collected through a questionnaire based survey conducted on people from various demographic regions as well as various age groups. Used a quota based sampling approach for the research, The data mining approach here helps to study the large dataset collected and also to extract the useful information required to model the system. The system here is a learning system which improves the market segmentation functionality as data set improves, The paper implements a hybrid data mining approach which effectively segments the retail mobile market in to various customer and product groups and also provides a prediction and suggestion system for company as well as customer. 
Volume: 6
Issue: 4
Page: 1818-1827
Publish at: 2016-08-01

Enterprise Architecture Characteristics in Context Enterprise Governance Base On COBIT 5 Framework

10.11591/ijeecs.v3.i1.pp240-248
Heru Nugroho , Tutut Herawan
The existence of the enterprise architecture is an attempt of managing and planning over the evolution of information systems in the sphere of an enterprise with model-based. In developing the enterprise architecture, there are several tools definition of components in the system. This tool is known as enterprises architecture (EA) framework. In this paper, we present a method to build a model of enterprise architecture in accordance with the needs of the Organization by Understanding the characteristics of the EA framework such as Zachman, TOGAF, and FEAF. They are selected as the EA framework will be used to determine the characteristics of an EA because the framework is most widely used in corporate or Government. In COBIT 5 framework, there is a process associated with enterprise architecture it is APO03 Manage Enterprise Architecture. At this stage of the research, we describe the link between the characteristics of the EA with one process in COBIT 5 framework. The results contribute to give a recommendation how to design EA for organization based on the characteristic of EA in Context Enterprise Governance using COBIT 5 Framework.
Volume: 3
Issue: 1
Page: 240-248
Publish at: 2016-07-01
Show 1542 of 1896

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration