Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

28,451 Article Results

Cloud Computing CPU Allocation and Scheduling Algorithms using CloudSim Simulator

10.11591/ijece.v6i4.pp1866-1879
Hicham GIBET TANI , Chaker EL AMRANI
In this paper, we describe the Cloud Computing basic compute resources scheduling and allocation algorithms, in addition to the working mechanism. This paper also presents a number of experiments conducted based on CloudSim simulation toolkit in order to assess and evaluate the performance of these scheduling algorithms on Cloud Computing like infrastructure. Furthermore, we introduced and explained the CloudSim simulator design, architecture and proposed two new scheduling algorithms to enhance the existent ones and highlight the weaknesses and/or effectiveness of these algorithms.
Volume: 6
Issue: 4
Page: 1866-1879
Publish at: 2016-08-01

Unusual Event Detection using Mean Feature Point Matching Algorithm

10.11591/ijece.v6i4.pp1595-1601
Chitra Hegde , Shakti Singh Chundawat , Divya S N
Analysis and detection of unusual events in public and private surveillance system is a complex task. Detecting unusual events in surveillance video requires the appropriate definition of similarity between events. The key goal of the proposed system is to detect behaviours or actions that can be considered as anomalies. Since suspicious events differ from domain to domain, it remains a challenge to detect those events in major domains such as airport, super malls, educational institutions etc. The proposed Mean Feature Point Matching (MFPM) algorithm is used for detecting unusual events. The Speeded-Up Robust Features (SURF) method is used for feature extraction. The MFPM algorithm compares the feature points of the input image with the mean feature points of trained dataset. The experimental result shows that the proposed system is efficient and accurate for wide variety of surveillance videos.
Volume: 6
Issue: 4
Page: 1595-1601
Publish at: 2016-08-01

Microstrip Line Fed Leaky Wave Antenna with Shorting Vias for Wideband Systems

10.11591/ijece.v6i4.pp1725-1731
T V Rama Krishna , B T P Madhav , G Monica , V Janakiram , S Md Abid Basha
In this work a complex structured shorted vias microstrip leaky wave antenna is designed and analysed. A Leaky wave antenna is a travelling wave structure with complex propagation constant. When shorting vias are loaded in a periodic structure the fundamental resonant mode shows some stop band characteristics and some of the modes will strongly attenuated. Three different types of iterations are examined in this work with and without defected ground structures. The defected ground structure based leaky wave antennas are showing better performance characteristics with respect to efficiency and phase. A micro strip line feeding with impedance of 50 ohms at both ports are providing excellent impedance matching to the conducting path on the microstrip surface. The shorting vias are suppressing certain higher order frequency bands and providing excellent wide band characteristics with low loss.
Volume: 6
Issue: 4
Page: 1725-1731
Publish at: 2016-08-01

Comparison of Voltage-Vector Control based on Duty Cycle Analysis in Three-Phase Four-Leg System Active Filter

10.11591/ijece.v6i4.pp1395-1405
Indriarto Yuniantoro , Rudy Setiabudy , Ridwan Gunawan
Comparison of voltage vector control in various forms of tetrahedron that result from switching combination on three-phase four-leg system active filter is presented especially asymmetric tetrahedron shape which is a projection pqr-coordinate into αβ0-coordinate. Parameter tetrahedrons such as modulation boundary-line, reference vector, switching duration time and duty cycle are described. Duty cycle analysis conducted on the Shen’s model, the Zhang’s model, the Perales’s model and asymmetric’s model are presented. The characteristics results showed that switching combination of each IGBT conductor especially its reviews on the neutral wire. Asymmetric tetrahedron can be proposed as control technique in three-phase four-leg system active filter.
Volume: 6
Issue: 4
Page: 1395-1405
Publish at: 2016-08-01

Analysis of the range of acceleration for an accelerometer with extended beams

10.11591/ijece.v6i4.pp1541-1550
Ramon Cabello , Margarita Tecpoyotl , Jose Gerardo Vera , Alfonso Torres , Pedro Vargas , Svetlana Koshevaya
The elastic behaviour of a system can be determined by an analysis of stresses. The stress generated in the element loaded of an accelerometer is of interest here. In these devices, the suspension beams are the elements subjected to greater stresses, as they support the mass. The stress that they can support is limited by the elastic limit of the material. Based on this analysis, the operating conditions to prevent permanent deformations are determined. The analysis is focused on the acceleration applied to the accelerometer because this parameter increases considerably the stresses in the device. A relationship between normal stress and gravity applied is obtained. This equation is used in order to avoid exceeding the elastic limit, during the accelerometer operation. This fact determines the acceleration range supported by the device. In the literature, studies about the physics and modelling of accelerometers are performed. However, about the specific acceleration of operation which they are subjected, information about its determination is not provided. In this paper, the analysis is realized considering a Conventional Capacitive Accelerometer (CCA) and a Capacitive Accelerometer with Extended Beams (CAEB), particularly, on the normal stress. When a range of acceleration values are applied, normal stress occur which must not exceed the elastic limit of the material, as it was mentioned before. The Matlab code used to calculate this relationship is given in Appendix A.
Volume: 6
Issue: 4
Page: 1541-1550
Publish at: 2016-08-01

Analysis of Brute Force Attacks with Ylmf-pc Signature

10.11591/ijece.v6i4.pp1681-1684
Anton Valeryevich Arzhakov , Dmitry Sergeevich Silnov
Brute force techniques used in many fields of authentication process. Ftp servers, web servers and mail servers very often got threatened by attackers. Old technique for mail service brute force still working and it can be easily detected by special signature.
Volume: 6
Issue: 4
Page: 1681-1684
Publish at: 2016-08-01

Segmentation of Retail Mobile Market Using HMS Algorithm

10.11591/ijece.v6i4.pp1818-1827
Koyi Anusha , Yashaswini C , Manishankar S
In the modern world of marketing, analyzing the trends in market is a key point towards to scope of improvement of any company. Considering the analysis of a retail market where market trends change very frequently based on customer needs and interest is highly challenging. Market segmentation is one of the approaches included in analysis of market trends which gives a diverse view of the market.  The research here concentrates, especially on a case study based on fast moving consumable goods market and identifying market change patterns by applying a novel data mining approach. Data mining includes a wide variety of techniques and algorithm which can be effectively used in the process of market analysis. The research work carried out coins a new algorithm which combines various association rules and techniques, the HMS (Hybrid market segmentation) algorithm with some specialized criteria is used to support the market segmentation. The primary data needed for the analysis and operation are collected through a questionnaire based survey conducted on people from various demographic regions as well as various age groups. Used a quota based sampling approach for the research, The data mining approach here helps to study the large dataset collected and also to extract the useful information required to model the system. The system here is a learning system which improves the market segmentation functionality as data set improves, The paper implements a hybrid data mining approach which effectively segments the retail mobile market in to various customer and product groups and also provides a prediction and suggestion system for company as well as customer. 
Volume: 6
Issue: 4
Page: 1818-1827
Publish at: 2016-08-01

Enterprise Architecture Characteristics in Context Enterprise Governance Base On COBIT 5 Framework

10.11591/ijeecs.v3.i1.pp240-248
Heru Nugroho , Tutut Herawan
The existence of the enterprise architecture is an attempt of managing and planning over the evolution of information systems in the sphere of an enterprise with model-based. In developing the enterprise architecture, there are several tools definition of components in the system. This tool is known as enterprises architecture (EA) framework. In this paper, we present a method to build a model of enterprise architecture in accordance with the needs of the Organization by Understanding the characteristics of the EA framework such as Zachman, TOGAF, and FEAF. They are selected as the EA framework will be used to determine the characteristics of an EA because the framework is most widely used in corporate or Government. In COBIT 5 framework, there is a process associated with enterprise architecture it is APO03 Manage Enterprise Architecture. At this stage of the research, we describe the link between the characteristics of the EA with one process in COBIT 5 framework. The results contribute to give a recommendation how to design EA for organization based on the characteristic of EA in Context Enterprise Governance using COBIT 5 Framework.
Volume: 3
Issue: 1
Page: 240-248
Publish at: 2016-07-01

Performance Evaluation of Doubly-Fed Induction Generator Using Combined Vector Control and Direct Power Control Method

10.11591/ijeecs.v3.i1.pp49-58
Khalil Valipour , Reza Najafi
This paper presents the performance evaluation of Doubly-Fed Induction Generator Using Combined Vector Control and Direct Power Control Method. Combined vector and direct power control (CVDPC) is used for the rotor side converter (RSC) of double-fed induction generators (DFIGs). The control system is according a direct current control by selecting suitable voltage vectors from a switching table. Actually, the proposed CVDPC encompass the benefits of vector control (VC) and direct power control (DPC) in a compact control system. Its benefits compare with VC contains rapid dynamic response, Stability against the machine parameters Changes, less computation, and naive implementation. On the other hand, it has benefits compared with DPC, contains less harmonic distortion and lower power ripple. This technique is to improve the dynamic performance of the DFIG driven by the wind-energy conversion system.
Volume: 3
Issue: 1
Page: 49-58
Publish at: 2016-07-01

GUI Based Control System Analysis using PID Controller for Education

10.11591/ijeecs.v3.i1.pp91-101
Ashwaq Abdulameer , Marizan Sulaiman , M.S.M. Aras , Dawood Saleem
PID control strategy should be understood as a huge part in the education oriented on process control. Application of suitable GUI windows software can contribute in the increase of education quality and providing a better understanding of PID control through as it provides a user friendly environment which is suitable and comfortable for teaching, learning and training application. This paper present the PID control system analysis by explaining the PID controller three-term parameters, PID control types and structure, and PID tuning approach using Ziegler-Nichols and manual tuning method (in both s-domain and z-domain) with the help of simulation and Graphical User Interface GUI windows based on MATLAB. This software package is targeted for engineering students and practicing engineers.
Volume: 3
Issue: 1
Page: 91-101
Publish at: 2016-07-01

Modeling of Magnetizing Inrush and Internal Faults for Three-phase Transformers

10.11591/ijeecs.v3.i1.pp26-37
Mohammad Bakhshipour , Farhad Namdari , Mohammad Sedaghat
Among the most noticeable root causes of improper performance in power transformers, internal short circuit faults can be noted and if not quickly be identified and addressed in the accepted time interval, irrecoverable damages such as interruption or even collapse of the network connected to the power transformer would happen. In this contribution, three-phase transformer behaviors under magnetizing inrush, internal short circuit condition and their current values determination have been surveyed using electromagnetic coupling model approach and structural finite element method. Utilizing the definition of transformer in the form of multi-coil and their electromagnetic and electric couple, a three dimensional geometric model of transformer is developed which includes nonlinear characteristics of the transformer, different states of normal and under internal short circuit occurrence and the moment of magnetizing inrush creation are investigated. The comparison between obtained results of presented model simulation with the consequences of practical studies on a typical three phase transformer reveals that the proposed model has a reliable accuracy in detection and modelling the transformer behavior in normal conditions, magnetizing inrush and different types of internal faults. The proposed approach represents an accurate model of a three-phase transformer for protection aims.
Volume: 3
Issue: 1
Page: 26-37
Publish at: 2016-07-01

Real Time Power Quality Phenomenon for Various Distribution Feeders

10.11591/ijeecs.v3.i1.pp10-16
C. Bharatiraja , Harish Chowdary V
Power Quality (PQ) brings more challenges to the large- scale and medium scale industries because in the recent years most of them use high efficiency and low energy devices which cause vulnerable PQ disturbances at Point of Common Coupling (PCC). In this paper, the measurement at different times during load condition and analysis of all types of disturbances occurred has been done. When large rated equipments run, the disturbance (harmonics, RMS variations, and switching transients) levels are very high and poor power factor (PF) has also appeared. Due to this poor PF, reactive power consumption in load increases and accordingly total power increases. An electronic device such as LED lights, fluorescent lamps, computers, copy machines, and laser printers also disturb the supply voltage. We are very well known that every PQ problem directly or indirectly must affect economically. Many researchers have investigated PQ audit for over three decades. However these studies and analysis have been done only at simulation level. Hence, the PQ analyzer based study is required to find out the PQ issues at distribution feeders. It will be a valuable guide for researchers, who are interested in the domain of PQ and wish to explore the opportunities offered by these techniques for further improvement in the field of PQ. This paper gives a brief Real Time PQ measurement using PQ analyzer HIOKI PW3198 at Distribution Feeders and it gives an idea to the researcher to optimize problems-related to PQ with respect to the high rated and low rated electric machinery of different feeders at PCC level. This study further extends to analyze the grid disturbances and looks forward to the optimization methods for each individual PQ disturbance.
Volume: 3
Issue: 1
Page: 10-16
Publish at: 2016-07-01

Design, Simulation and Fabrication of Band Pass Filter 308 MHz Narrow Bandwidth Using Technology Surface Mount Technology (SMT) on FMCW Radar Frequency Generators

10.11591/ijeecs.v3.i1.pp136-142
I Dewa Putu Hermida , Deni Permana Kurniadi , Iqbal Syamsu
Has been research a band pass filter with a steep slope the working frequency 308MHz with 4 MHz bandwidth used in navigation radar system. To overcome this, the design is done by using two filters are combined. Merger This filter consists of a single filter consisting of a low pass filter with a cutoff frequency that works at a frequency of 310 MHz, and a high pass filter with a cutoff frequency that works at a frequency of 306 MHz Type filter is used to generate the elliptic filter steepness better by ignoring the ripple in the pass band for narrow bandwidth. For a low pass filter, stop band width (Fs) approximately 20% of the cutoff frequency occurs at a frequency of 372 MHz, with stop band depth (As) of about -55 dB As for the high pass filter, stop band width (Fs) approximately 20% of the cutoff frequency that occurred at a frequency of 244.8 MHz, with stop band depth (As) of about -55 dB. The output filter is used as a clock on direct insert digital synthesizer (DDS). Using the components of surface mount technology (SMT), then the resulting circuit with its small dimensions, compact and has a high Q. Elsie used in the simulation stage software version 2.72, the manufacturing process using protel 99SE, and the stage of measurement using a vector network analyzer (VNA) Advantest R3770 type.
Volume: 3
Issue: 1
Page: 136-142
Publish at: 2016-07-01

An Energy Efficient Clustering Algrithm Based on DEEC Protocol and K-mean Method

10.11591/ijeecs.v3.i1.pp143-150
Elahmadi Cheikh , Chakkor Saad , Baghori Mostafa , Hajraoui Abderrahmane
In WSN the sensor nodes are usually powered by batteries and thus have very limited lifetime if no power management is performed. Because of this major limitation, energy-efficient techniques are main research challenge in this context to solve it. Dividing the network in clusters is an effective technique to achieve this goal. This algorithm is based on creating virtual sub-groups of sensor nodes in order to minimize routing calculations and to reduce the size of cluster head data aggregation. Nowadays, a lot of heterogeneous clustering protocols for WSN are created. Nevertheless, these protocols need to find the optimal clusters formation in the network that conserve CHs and theirs member nodes energy consumption. A new approach is proposed combining between an efficient clustering algorithm K-means and our proposed DEEC.  This approach has been employed to enhance DEEC protocol performances. Numerical simulation proves that the improved protocol entitled KM-DEEC achieves a satisfactory results compared to others DEEC protocol versions.
Volume: 3
Issue: 1
Page: 143-150
Publish at: 2016-07-01

Survey Smoothly Fiber-Wireless (FiWi) Accessing Wireless Networks: Convergence and Challenges

10.11591/ijeecs.v3.i1.pp151-156
Naseer Hwaidi Alkhazaali , Raed Abduljabbar Aljiznawi , Dheyaa Jasim Kadhim
 Traditionally, wireless networks and optical fiber Networks are independent of each other. Wireless networks are designed to meet specific service requirements, while dealing with weak physical transmission, and maximize system resources to ensure cost effectiveness and satisfaction for the end user. In optical fiber networks, on the other hand, search efforts instead concentrated on simple low-cost, future-proofness against inheritance and high services and applications through optical transparency. The ultimate goal of providing access to information when needed, was considered significantly. Whatever form it is required, not only increases the requirement sees technology convergence of wireless and optical networks but also played an important role in future communication networks. Some technical development of wireless access networks-optical and seamless coexistence of both techniques, this paper is a review of the State of the latest developments and advances in optical and wireless communications, major technical challenges to provide flawless communication in fiber- wireless (FiWi) access networks, places of interest important research issues to provide intelligence information, access and transport and the convergence of these networks in the future.
Volume: 3
Issue: 1
Page: 151-156
Publish at: 2016-07-01
Show 1544 of 1897

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration