Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,167 Article Results

Investigating Thermal Effect on a Cross Linked Polyethylene Power Cable

10.11591/ijeecs.v5.i1.pp33-40
Emna Khouildi , Rabah Attia , Rafik Cherni
One of the agents responsible of the degradation of power cables in electrical distribution network is the temperature. In this paper, numerical modelling of temperature effect on the cross linked polyethylene (XLPE) insulation of a medium voltage cable containing internal defects, which are air void cavity and water tree cavities, is developed by using the finite element method and simulated by COMSOL Multiphysics Software. The experimental investigation is conducted through studying parial discharge inception voltages in XLPE insulation before and after 23 heating cycles of a 7 meters sample of a medium voltage cable at 100°C and 120°C temperatures. Partial discharge inception voltages detection were performed using the IEC60270 test method. The simulation results and experimental measurements assessed the thermal effect on the degradation of XLPE insulation.
Volume: 5
Issue: 1
Page: 33-40
Publish at: 2017-01-01

Physicians’ and Users’ Perceptions towards Wearable Health Devices

10.11591/ijeecs.v5.i1.pp234-242
Narassima M Seshadri , Anbuudayasankar S P , Shriram Kris Vasudevan , Abhinavaram J
Healthcare plays a vital role in economic development of a country, and has a major impact on the entire wellness of humankind. One of the biggest issues of all times, Blood Pressure is prevailing in patients of all countries.  In developing countries like India, it is prevalent among people of diverse age groups, which somehow permeates into their wellness, reflecting and slowing down the growth of the country as well as that of an individual. As Blood Pressure is identified as one of the major contributors to Cardio Vascular Diseases, there is an urge to educate people about the consequences. The research focuses on various factors and their levels of impact on acceptance of Mobile Health Management Services. Appropriate tests have been carried out for validating this hypothesis. All the details are presented in the results’ section with clear discussion and description.
Volume: 5
Issue: 1
Page: 234-242
Publish at: 2017-01-01

Ontology Matching using BabelNet Dictionary and Word Sense Disambiguation Algorithms

10.11591/ijeecs.v5.i1.pp196-205
Mohamed Biniz , Rachid el Ayachi , Mohamed Fakir
Ontology matching is a discipline that means two things: first, the process of discovering correspondences between two different ontologies, and second is the result of this process, that is to say the expression of correspondences. This discipline is a crucial task to solve problems merging and evolving of heterogeneous ontologies in applications of the Semantic Web. This domain imposes several challenges, among them, the selection of appropriate similarity measures to discover the correspondences. In this article, we are interested to study algorithms that calculate the semantic similarity by using Adapted Lesk algorithm, Wu & Palmer Algorithm, Resnik Algorithm, Leacock and Chodorow Algorithm, and similarity flooding between two ontologies and BabelNet as reference ontology, we implement them, and compared experimentally. Overall, the most effective methods are Wu & Palmer and Adapted Lesk, which is widely used for Word Sense Disambiguation (WSD) in the field of Automatic Natural Language Processing (NLP).
Volume: 5
Issue: 1
Page: 196-205
Publish at: 2017-01-01

Data Integrity and Security [DIS] Based Protocol for Cognitive Radio Ad Hoc Networks

10.11591/ijeecs.v5.i1.pp187-195
Azeem Mohammed Abdul , Syed Umar
In the CRN (cognitive Radio Networks) the main issues to be addressed are spectrum scarcity and inadequate usage of spectrum. The CRN can analyse the unused spectrum, so that CRN users can easily occupy the unused spectrum without blocking the existing Primary Users. In a CRN, routing is a complex issue because of channel diversity. The existing system mainly focuses on the performance analysis of Ad hoc On-Demand Distance Vector (AODV) and the Weight Cumulative Expected transmission time (WCETT). The performance of these protocols are measured and compared in various ways such as the throughput of single radio station multi-channels, equal number of radio stations and channels, multi-radio stations multi-channels. The limitation with these protocols is, whenever a route fails, there is issue to get connected with the other nodes, the other being data integrity, which maintains the no loss of data [LOD]. In our proposed DIS – CRAHN system we overcome these limitations by adding data security and integrity. Security is provided using the RSA algorithm while Integrity is ensured using the SHA algorithm. With the data security we can maintain the shortest path from source to destination and if any route failure occurs then immediate route establishment can be done and data encryption and decryption also be implemented using the random key generation. Results show an improved performance in delay with reasonable throughput, making the protocol an ideal choice for CRNs.
Volume: 5
Issue: 1
Page: 187-195
Publish at: 2017-01-01

Efficient Phase Recovery System

10.11591/ijeecs.v5.i1.pp123-129
Mohamed Saber
An efficient, stable and reliable system to detect the unknown phase of the input sinusoidal signal is presented. The proposed design is a feedback loop consists of subtractor, peak detector and direct digital synthesizer (DDS). DDS generates a sinusoidal signal with the same frequency of input signal and with initial zero phase. An error signal is the output of subtracor after subtracting DDS signal from input signal. The peak of amplitude of error signal has a mathematical relation to the phase difference between the two input signals. Peak detector is used to extract the phase difference from error signal and passes the result to DDS to control the generated phase. The loop continues until the generated phase of DDS is the same as the input unknown phase. The proposed phase estimator has been implemented using a field programmable gate array (FPGA), consumed less power about 330 mW, and worked at 200 MHz clock.
Volume: 5
Issue: 1
Page: 123-129
Publish at: 2017-01-01

Attacks of Denial-of-Service on Networks Layer of OSI Model and Maintaining of Security

10.11591/ijeecs.v5.i1.pp181-186
Azeem Mohammed Abdul , Syed Umar
The emergence of wireless sensor networks as one of the technology trends in the coming years, and some special tests of safety. The event will be thousands of tiny sensors that cheap devices, memory, radio and make, in most cases, no access to the production and energy. Some great challenges of sensor networks are different; we focus on security in the form of wireless sensor networks. To some network wireless sensor network in order to optimize use of the sensor, so that the network can be as long as possible. But the management of the important mission of the sensor network, denial of service (DoS) attacks against the destruction of the efficient use of network resources and the vital functions of the network. DoS attacks can be one of the greatest threats to security threats be considered. In fact, there are many different layers of the OSI-DOS.
Volume: 5
Issue: 1
Page: 181-186
Publish at: 2017-01-01

Electrical Conductivity of Polyaniline Fiber Synthesized by Interfacial Polymerization and Electrospinning

10.11591/ijeecs.v5.i1.pp85-89
Ngurah Ayu Ketut Umiati , Kamsul Abraha , Kuwat Triyana
Polyaniline fiber is a promising biosensor material due to the capability of this material as an effective mediator for electron transfer. The polyaniline in fibre has wider surface to increase the electron transfer. In this work, polyaniline structure synthesized by interfacial polymerization was compared to polyaniline structure obtained from electrospinning to get a better fibre structure. Interfacial polymerization was carried out to form a polymerization between the water phase and the organic phase. The water phase was prepared from dopants, initiator and aquadestilata and the organic phase was was made from toluene as an organic solvent and aniline monomer. Electrospinning was conducted by using a dc high voltage 15 kV and 0.5 mm syringe needle to produce fibers from a melt polymer solution taken from interfacial polymerization. The scanning electro microscope results confimed the formation of polyaniline in structure of fiber. Resistance measurement by using LCR meter showed that polyaniline fiber resulted from electrospinning is more conductive than polyaniline fiber formed by interfacial polymerization method.  
Volume: 5
Issue: 1
Page: 85-89
Publish at: 2017-01-01

Speech Processing for Text Independent Amharic Language Dialect Recognition

10.11591/ijeecs.v5.i1.pp115-122
Abrham Debasu Mengistu , Dagnachew Melesew Alemayehu
Dialect is a difference of verbal communication spoken by people from a particular society or geographic area so the paper focuses on Amharic language dialect recognition. In this paper,  the authors have used backpropagation artificial neural network, VQ(vector quantization), (Gaussian Mixture Models) and a combination of GMM and backpropagation artificial neural network for classifying dialects of Amharic language speakers. In this research, a total of 100 speakers for each group of dialects are considered each having about 10 seconds duration is collected. The feature vectors of Mel frequency cepstral coefficients (MFCC) had been used to recognize the dialects of speakers. In this research paper the recognition model that uses a tanh activation function have a better result instead of using the Logistic Sigmoid activation function in backpropagation artificial neural network. After conducting the above experiments 95.7% accuracy achieved when GMM and backpropagation artificial neural network with tanh activation function are combined.
Volume: 5
Issue: 1
Page: 115-122
Publish at: 2017-01-01

Review of Dynamic Voltage Restorer Application for Compensation of Voltage Harmonics in Power Systems

10.11591/ijeecs.v5.i1.pp58-71
Mahmoud Zadehbagheri , Rahim Ildarabadi , Majid Baghaei Nejad , Tole Sutikno
Power distribution networks are considered the main link between power industry and consumers and they are exposed to public judgment and evaluation more than any other section. Thus, it is essential to study power quality in distribution section. On the other hand, power distribution networks have always been exposed to traditional factors such as  voltage sag, voltage swell, harmonics and capacitor switching which destruct sinusoidal waveforms and decrease power quality as well as network reliability. One of the methods by which power quality problems might be addressed is to apply power electronic devices in the form of custom power devices. One of such devices is Dynamic Voltage Restorer (DVR) which is connected in series to distribution networks. At the same time, through injection of voltage to the network it is able to control voltage amplitude and phase. It is  adopted lend to compensate for voltage sags through injecting series and synchronous three phase voltage. This paper reviews on the application of DVR for Voltage Compensation in recent years and gives sets of information for each control of the DVR in distribution networks.
Volume: 5
Issue: 1
Page: 58-71
Publish at: 2017-01-01

An Embedded Iris Image Acquisition Research

10.11591/ijeecs.v5.i1.pp90-98
Dangui Chen , Guojun Qin
In view of the limitation of traditional identification, it is easy to lose and copy keys, cards or ID cards, and it is easy to forget the password. Here, an embedded application system was designed based on the iris identification technology, the functions of gathering, inputing, and registering the iris information and identification can be realized. The system architecture was designed by using the embedded microprocessor of advanced RISC machines (ARM), which is used as the core. The iris sensor was used to gather the iris information, and the development of software was accomplished with the embedded OS Windows CE. The system can be used on the company entrance guard system, customs security of airport and criminal identification.
Volume: 5
Issue: 1
Page: 90-98
Publish at: 2017-01-01

Virtual Laboratory of Unbalanced Transient Condition in Synchronous Generator

10.11591/ijeecs.v5.i1.pp1-10
Sugiarto Kadiman , Arif Basuki , Diah Suwarti
The electrical engineering department at the Sekolah Tinggi Teknologi Nasional (STTNAS), Yogyakarta has recently reconnoitered virtual laboratories for its undergraduate synchronous generator course to complement existing full-scale laboratory equipment. This study explores virtual laboratory development to be treated as an accessorial tool for enhancing instruction. The focus of this synchronous generator course is the dynamic transient behavior of the system after small disturbances as affected by the unbalanced load. The work is mainly carried out through nonlinear simulations under Matlab-Simulink. Results of the first version of the synchronous generator virtual laboratory and details of its development are provided.
Volume: 5
Issue: 1
Page: 1-10
Publish at: 2017-01-01

Spatial Modeling in Landslide Susceptibility

10.11591/ijeecs.v5.i1.pp139-146
Dwi Shanty Apriliani Gunadi , I Nengah Surati Jaya , Boedi Tjahjono
Landslide Susceptibility Mapping is one of the mitigation effort to detect vulnerable areas for minimizing the risk of landslide disasters. This paper describes spatial model development for assessing landslide susceptibility by considering human and biophysical factors. The main objective of this research is to develop a spatial modeling of landslide susceptibility, particularly in several regencies of West Java Province. The data analysis include data pre-processing, regression analysis, correlation analysis, score development, and weight determination using Principal Component Analysis (PCA).  The study found that  the most important factors that contributed to landslide susceptibility within the research area is the Landuse/Landcover, then  followed by Slope, Distance to River, Soil Type, Annual Rainfall, Population Density, Geology Age, Climate Type, and Geomorphology. The first three highest factors occupied almost 53% of the total weight. The model successfully estimated the spatial distribution and degree of landslide susceptibility into 3 classes having overall accuracy of about 68%.
Volume: 5
Issue: 1
Page: 139-146
Publish at: 2017-01-01

Android-Based 3D Visualization of Indonesia Medicinal Plants

10.11591/ijeecs.v5.i1.pp229-233
Lita Karlitasari , Ismanto Ismanto , Agung Prajuhana Putra
3D visualization of medicinal plants is the result of the transformation that resembles the original image and are dynamic, so it can be viewed in detail from all sides. Image capture is performed with a level of clarity must be at least 70% so it would be easy when designing a 3D visualization. The medicinal plants collected came from Bogor Botanical Gardens of 11 plants, Ciapus - Bogor of 16 plants, and Cibodas Botanical Gardens of 37 plants. The image capture was done by using the comparison scale of human height, stem, flowers, fruits, and leaves both look forward and backward. Application development was done through the objects collection, object segmentation, object texture creation and 3D object creation. The application of 3D visualization medicinal plants can be enlarged and reduced, and rotated well to the right, left, up, and down. The medicinal plants that appears in the application was in Indonesian and Latin names, taxon and the descriptions. Therefore the general public, students, and researchers can utilize the plant objects much better.
Volume: 5
Issue: 1
Page: 229-233
Publish at: 2017-01-01

Early Test Effort Prediction using UML Diagrams

10.11591/ijeecs.v5.i1.pp220-228
Pulak Sahoo , J R Mohanty
Software Testing is essential for delivering quality software products. Accurate test effort estimation is an important part of project planning. Prediction of test effort at early phases of Software Developmen Life Cycle enables managers to plan ahead for the testing phase. This increases the chances of the project meeting its timeline while achieving required quality. Unified Modeling Language is a widely-used standard for representing Object Oriented Systems. Use Case and Class Diagrams are two of the most important models of the system created during early phases of software development. This work proposed that the initial test effort is predicted early using Use Case Diagram during the requirement stage and is refined during design stage when Class Diagrams are available. The predicted test efforts in both stages are functions of parameters derived from Use Case and Class Diagrams. Estimations can be revised when rest of the UML diagrams are created.
Volume: 5
Issue: 1
Page: 220-228
Publish at: 2017-01-01

Attacks and Secure Geographic Routing In Wireless Sensor Networks

10.11591/ijeecs.v5.i1.pp147-158
Sabri Yassine , Najib El Kamoun
Due to open network nature of wireless sensor networks make them highly vulnerable to a variety of security attacks and easy target for adversaries, which may capture these nodes, analyze and easily insert fake route information. Wireless sensor network is an emerging, cost effective and unsupervised solution for collecting this information from the physical world and sending this information back to centralized authority for further processing. GRPW (Geographic Routing in connected wireless sensor networks based on Multiple Sinks) is one of the basic routing protocols used for Supporting Mobile Sinks in Wireless Sensor Networks. GRPW, a geographical routing protocol for wireless sensor networks, is based on an architecture partitioned by logical levels, on the other hand based on a multipoint relaying flooding technique to reduce the number of topology broadcast. GRPW-MuS uses periodic HELLO packets to neighbor detection. The wormhole attack can form a serious threat in wireless sensor networks, especially against many wireless sensor networks routing protocols and location-based wireless security systems. Here, a trust model to handle this attack in GRPW is provided called GRPW-MuS-s. Using OMNET++ simulation and the MiXiM framework, results show that GRPW-MuS-s protocol only has very small false positives for wormhole detection during the neighbor discovery process (less than GRPW). The average energy usage at each node for GRPW-MuS-s protocol during the neighbor discovery and route discovery is very low than GRPW-MuS, which is much lower than the available energy at each node. The cost analysis shows that GRPW-MuS-s protocol only needs small memory usage at each node, which is suitable for the sensor network.
Volume: 5
Issue: 1
Page: 147-158
Publish at: 2017-01-01
Show 1546 of 1945

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration