Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

27,404 Article Results

Three-Dimensional Application-Specific Protocol Architecture for Wireless Sensor Networks

10.11591/ijeecs.v15.i2.pp352-360
Mostafa Baghouri , Abderrahmane Hajraoui , Saad Chakkor
Many researchers assume that the distribution of the nodes is done in a two-dimensional environment in the reason that the height of this network is negligible compared to its width and length. However, in the reality, three-dimensional (3D) deployment of the wireless sensor networks is used. Therefore, many applications require 3D architecture such as underwater, space communications, atmospheric, forest or building. Unfortunately, the energy consumption and throughput in the 3D environment decreases considerably compared to 2D in which we can’t neglect them in some applications. In his paper we applied the 3D architecture in LEACH protocol and we prove by computer simulation how this 2D approximation is not reasonable since the lifetime of 3D WSN decrease by about 21% over than 2D WSN.
Volume: 15
Issue: 2
Page: 352-360
Publish at: 2015-08-01

Handling Low and High Demand Mode on Safety Instrumented Function

10.11591/ijece.v5i4.pp742-749
Totok R. Biyanto , Franky Kusuma , Hendra Cordova , Yerry Sutatio , Ridho Bayuaji
In this paper, demand rate and hazardous event frequency considerations which effect to the error on the SIL calculation will be discused. The various value of hazardous event frequency and demand rate will be evaluated in this paper. The  result of this paper is when hazardous event frequency 10E-06/year and PFD’s safeguard 0.00002, with test interval 1 year, the SILs of low and high demand start showing different level at demand 5.1/year. At that point, we shouldn’t use simplified formula for low demand, because it will make different SIL with the exponential formula and simplified high demand formula. The requared SIL targets are SIL 2 and SIL 1, for exponential formula and simplified high demand formula, respectifely. Hence, it should be taken more attention and consideration for various value of hazardous event frequency with various demand rate.
Volume: 5
Issue: 4
Page: 742-749
Publish at: 2015-08-01

Automatic Vehicle Tracking System Based on Fixed Thresholding and Histogram Based Edge Processing

10.11591/ijece.v5i4.pp869-878
N. Shobha Rani , Neethu O. P. , Nila Ponnath
Automatic detection, extraction and recognition of vehicle number plate region in traffic control systems is one of the prominent application in Computer vision. The drastic increase in number of vehicles in the current generation greatly increases the complexity in tracking the vehicles through the human visual system, manual procedure of controlling traffic and enforcement of various laws and rules is not sufficient for smooth control of traffic. This urges the need for development of technology that can automate this process. This paper mainly focuses on the development of an automatic number plate extraction and recognition algorithm by incorporating constructs like edge detection, horizontal and vertical edge processing using fixed threshold technique. The extracted number plate region is again processed using template matching algorithm for the recognition of the characters embossed on the number plate with respect to every individual piece of number plate. The algorithm developed has achieved an accuracy of around 100% and works for both front and rear images of the car.
Volume: 5
Issue: 4
Page: 869-878
Publish at: 2015-08-01

Impedance Matching Method in Two-Stage Converters for Single Phase PV-Grid System

10.11591/ijece.v5i4.pp626-635
L. Heru Pratomo , F. Danang Wijaya , Eka Firmansyah
This paper presents the study on the impedance matching method in two-stage converters for single phase PV-grid system. The use of PV systems was to obtain the electrical power from the sunlight energy. The system consisted of a Buck-Boost DC-DC converter and a five-level inverter. A Buck-Boost DC-DC converter was used as a means of impedance matching to obtain the maximum power that, in this case, through a method by using the incremental conductance current control algorithm. Meanwhile a five-level inverter was used as an interface to the utilities.  By using this technique, the system came to be simple. The impedance of the power grid, a Buck-Boost DC-DC converter, and a five-level inverter were seen by PV mostly in the area of RMPP, enabling the maximum power produced by the PV to be delivered to the grid. To demonstrate the effectiveness of the design, the analysis and simulation results, furthermore, were provided
Volume: 5
Issue: 4
Page: 626-635
Publish at: 2015-08-01

Scientific Documents clustering based on Text Summarization

10.11591/ijece.v5i4.pp782-787
Pedram Vahdani Amoli , Omid Sojoodi Sh.
In this paper a novel method is proposed for scientific document clustering. The proposed method is a summarization-based hybrid algorithm which comprises a preprocessing phase. In the preprocessing phase unimportant words which are frequently used in the text are removed. This process reduces the amount of data for the clustering purpose. Furthermore frequent items cause overlapping between the clusters which leads to inefficiency of the cluster separation. After the preprocessing phase, Term Frequency/Inverse Document Frequency (TFIDF) is calculated for all words and stems over the document to score them in the document. Text summarization is performed then in the sentence level. Document clustering is finally done according to the scores of calculated TFIDF. The hybrid progress of the proposed scheme, from preprocessing phase to document clustering, gains a rapid and efficient clustering method which is evaluated by 400 English texts extracted from scientific databases of 11 different topics. The proposed method is compared with CSSA, SMTC and Max-Capture methods. The results demonstrate the proficiency of the proposed scheme in terms of computation time and efficiency using F-measure criterion.
Volume: 5
Issue: 4
Page: 782-787
Publish at: 2015-08-01

Contribution to the Artifical Neural Network Speed Estimator in a Degraded Mode for Sensor-Less Fuzzy Direct Control of Torque Application Using Dual Stars Induction Machine

10.11591/ijece.v5i4.pp729-741
Hechelef Mohammed , Abdelkader Meroufel
Recently one of the major topic of research is the involvement of the intelligence artificial in the control system. This paper deals with application of a new combination between two-control strategy known as fuzzy direct control of torque and then an adaptive Neuronal Speed estimator utilizing dual starts induction motor. The research discussed consist to replace the switching table used in the conventional direct control method and adaptive mechanism of the classic MRAS estimator with fuzzy controller and new neural network accordingly, both strategies can manage the degraded and normal modes. The neural networks used are the back-propagation, to reduce the training patterns and increase the execution speed of the training process. As results we achieved can be summarised as follows: 1) high degree of reliability of speed estimation even with using only one start voltages and currents and parameters; 2) Minimization of the torque and flux ripples; and                3) Minimization of the current total harmonic distortion.
Volume: 5
Issue: 4
Page: 729-741
Publish at: 2015-08-01

Side Effects in a HEMT Performance with InAlN/GaN

10.11591/ijeecs.v15.i2.pp249-258
Z. Kourdi , B. Bouazza , A. Guen-Bouazza , M. Khaouani
We present a simulation of a HEMT (high electron mobility transistor) structure. We extract the device characteristics through the analysis of DC, AC and high frequency regimes, as shown in this paper. This work demonstrates the optimal device with a gate length of 30 nm, and InAlN/GaN heterostructure for minimizing side effects. The simulated with Silvaco software of the HEMT devices with the materials InAlN show very good scalability in different application. We have demonstrated an excellent current density, as high as 644 mA/mm, a peak extrinsic transconductance of 710 mS/mm at VDS=2 V, and cutting frequency cutoffs of 385 GHZ, maximum frequency of 810 GHz, maximum efficiency of 23% for x-Band, maximum breakdown voltage of 365 V, and an ON/OFF current density ratio higher than 8 x 108. These values were determined through the simulation by hydrodynamics models, which makes that optimize the design is the future of this technology.
Volume: 15
Issue: 2
Page: 249-258
Publish at: 2015-08-01

Proposed SMART Traffic Control Signal in Brunei Darussalam

10.11591/ijeecs.v15.i2.pp277-283
Bibi Rawiyah Mulung , Andino Maseleno
This paper presents proposed SMART (Systematic Monitoring of Arterial Road Traffic Signals) traffic control signal in Brunei Darussalam. Traffic congestion due to stops and delays at traffic light signals has much been complained about in Brunei Darussalam as well as across the world during the recent years. There are primarily two types of traffic signal controls in Brunei Darussalam. The most common one is the fixed or pre-timed signal operation traffic light and the other one is the actuated signal operation traffic light. Although the actuated signal control is more efficient than the fixed or pre-fixed signal control in the sense that it provides fewer stops and delays to traffic on the major arteries, the best option for Brunei Darussalam would be to introduce smart traffic control signal. This type of traffic signal uses artificial intelligence to take the appropriate action by adjusting the times in real time to minimise the delay in the intersection while also coordinating with intersections in the neighbourhood. SMART Signal simultaneously collects event-based high-resolution traffic data from multiple intersections and generates real-time signal performance measures, including arterial travel time, number of stops, queue length, intersection delay, and level of service. In Brunei Darussalam, where we have numerous intersections where several arterial roads are linked to one another, The SMART signal traffic control method should be implemented.
Volume: 15
Issue: 2
Page: 277-283
Publish at: 2015-08-01

Prediction Status Nutrition using by Body Mass Index on Mobile Device

10.11591/ijict.v4i2.pp56-65
Adri Vendi Esaku
This paper is aim to predict nutrition status using by the Body Mass Index (BMI). BMI for men and women are obtained from the calorie needs. Calorie requirement is used to determine energy needs. The energy needs are determined by the needs of Protein, Carbohydrate, Fat, Vitamin and Mineral. The paper is made in the form of an application program using Mobile Programming. Mobile Programming by implementing Reverse Engineering. The tool used is a J2ME application on cell phone emulator having minimal CLDC, CDC 1.1, MIDP 2.0 and MIDlet. Main contribution, BMI as the simple, fast and easy to used method. BMI can be used to determine the nutrition status of individual. The benefit for individual reduce the cost of healthcare. The new result is the prediction of the nutrition status of individual using by BMI can be applied with new ways through the Mobile Application on Mobile Device, that is implemented to the cell phone. Mobile Application is a medium for the user can be accessed anytime and anywhere. It is known an application that can yield the rational decision in predicting the nutritious needs of families.
Volume: 4
Issue: 2
Page: 56-65
Publish at: 2015-08-01

Real Time Domestic Power Consumption Monitoring using Wireless Sensor Networks

10.11591/ijece.v5i4.pp685-694
Venkatsampath Raja Gogineni , Kalyan Matcha , Raghava Rao K
This paper subsumes the implementation of automation in tracking the electrical consumption data of household systems over the network (WEB). This could sub-sequentially cut down the manual work involved in the process of collecting no: of units consumed from each house, thereby avoiding the manual costs and errors by building an automatic network access. The installation of this system is quite an easy task, which do not need much hardware work. The key elements that make this system are Current sensor and Voltage sensor interfaced to an Arduino board (A General Purpose Micro Controller board) with an Ethernet shield and a WIFI Router for transmission of data wirelessly to the server for storing consumption values into the database. Hosting web pages with the database connectivity will make the administrator generate electricity bill automatically that facilitates user’s to view and pay his electricity bill online.
Volume: 5
Issue: 4
Page: 685-694
Publish at: 2015-08-01

Guidelines Aimed at Reducing the Risks of User Acceptance Delay in the Context of an IT Service Project Management Plan

10.11591/ijece.v5i4.pp832-839
Eun Joo Jeong , Ji Hwan Bae , Seung Ryul Jeong
Delays in the user acceptance of information technology (IT) service projects in Korea have occurred frequently due to various risk factors. User acceptance delays may hinder the achievement of the client’s project objectives and cause schedule delays or cost overruns. Furthermore, the client may impose a delay charge and claim for additional damages, causing serious disputes between buyer and supplier. The main causes of user acceptance delays are unclear user requirements, changes in user requirements, poor-quality development outputs, excessive functional and non-functional errors, lack of user involvement, unclear user roles and responsibilities, and unclear criteria of user acceptance test.We help foster the timely completion of user acceptance by proposing a method of identifying the risk factors in user acceptance delay and creating a project management plan to weed out the identified risks. We propose a guideline for an IT service management plan that weeds out or lowers the risk factors well in advance. To validate the guideline’s utility, we apply it to IT service projects. The results show that the guideline is effective in identifying and removing risk factors affecting delays in the user acceptance of IT service projects.
Volume: 5
Issue: 4
Page: 832-839
Publish at: 2015-08-01

MDS-WLAN: Maximal Data Security in WLAN for Resisting Potential Threats

10.11591/ijece.v5i4.pp859-868
Latha P.H. , Vasantha R
The utmost security standards over Wireless Local Area Network (WLAN) are still an unsolved answer in research community as well as among the commercial users. There are various prior attempts in proposing security of WLAN that lacks focus on access point and is found to be quite complex implementation of cryptography. The proposed paper presents a novel, simple, and yet robust technique called as MDS-WLAN i.e. maximal data security in WLAN. The system is evaluated over laboratory prototype and mitigation measures are drawn for resisting wormhole attack, Sybil attack, and rogue access point issue in WLAN. The outcome of the MDS is compared with conventional AES and SHA that shows optimal communication performance and highest data security.
Volume: 5
Issue: 4
Page: 859-868
Publish at: 2015-08-01

Affiliation Oriented Journals: Don’t Worry About Peer Review If You Have Good Affiliation

10.11591/ijece.v5i4.pp621-625
Mehdi Dadkhah , Adel M. Alharbi , Mohammad Hamad Al-khresheh , Tole Sutikno , Tomasz Maliszewski , Mohammad Davarpanah Jazi , Shahaboddin Shamshirband
There has been a growing concern about fraud peer review articles that have been published in some journals in favor of their authors' affiliation, which have been discussed extensively by some researchers. This research paper introduces a new another challenge in academic world concerning journals’ editors who look at authors' affiliations rather than papers' contents. In this short paper, we will introduce this alarming problem and do an experimental test by submitting computer generated papers to some journals and finally present the results of our experiment. The paper is an expression of our concern about providing for maximum high ethics in and quality of publication policy of modern scientific journals.
Volume: 5
Issue: 4
Page: 621-625
Publish at: 2015-08-01

A Path-Compression Approach for Improving Shortest-Path Algorithms

10.11591/ijece.v5i4.pp772-781
Nabil Arman , Faisal Khamayseh
Given a weighted directed graph G=(V;E;w), where w is non-negative weight function, G’ is a graph obtained from G by an application of path compression. Path compression reduces the graph G to a critical set of vertices and edges that affect the generation of shortest trees. The main contribution of this paper is finding shortest path between two selected vertices by applying a new algorithm that reduces number of nodes that needs to be traversed in the graph while preserving all graph properties.  The main method of the algorithm is restructuring the graph in a way that only critical/relevant nodes are considered while all other neutral vertices and weights are preserved as sub paths' properties.  Our algorithm can compress the graph paths into considerable improved percentage especially when the graph is sparse and hence improves performance significantly.
Volume: 5
Issue: 4
Page: 772-781
Publish at: 2015-08-01

Performance Enhancement of Multicore Architecture

10.11591/ijece.v5i4.pp669-684
Medhat Awadalla , Hanan Konsowa
Multicore processors integrate several cores on a single chip. The fixed architecture of multicore platforms often fails to accommodate the inherent diverse requirements of different applications. The permanent need to enhance the performance of multicore architecture motivates the development of a dynamic architecture. To address this issue, this paper presents new algorithms for thread selection in fetch stage. Moreover, this paper presents three new fetch stage policies, EACH_LOOP_FETCH, INC-FETCH, and WZ-FETCH, based on Ordinary Least Square (OLS) regression statistic method. These new fetch policies differ on thread selection time which is represented by instructions’ count and window size. Furthermore, the simulation multicore tool, , is adapted to cope with multicore processor dynamic design by adding a dynamic feature in the policy of thread selection in fetch stage. SPLASH2, parallel scientific workloads, has been used to validate the proposed adaptation for multi2sim. Intensive simulated experiments have been conducted and the obtained results show that remarkable performance enhancements have been achieved in terms of execution time and number of instructions per second produces less broadcast operations compared to the typical algorithm.
Volume: 5
Issue: 4
Page: 669-684
Publish at: 2015-08-01
Show 1542 of 1827

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration