Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

28,910 Article Results

Bangladesh Perspective: Vehicle Speed Proposition System using Localized Wireless Identification

10.11591/ijece.v6i5.pp2134-2139
Md. Mamunoor Islam , Mehdi Hasan Chowdhury
Even in the era of advanced engineering, road accident has been a regular phenomenon causing death of many people in Bangladesh due to over speeding action of reckless drivers. There are several key places (such as schools, colleges, hospitals, highways and constructional areas etc.) where the speed of the vehicle should be lessened to avoid accidents. The roads and highways authority may place the speed limiter signboards in these areas to avoid these accidents, but these are frequently overlooked by the drivers. So this paper demonstrates a wireless forewarning system which will aid to control the speed of the vehicles at speed restricted areas. The whole system is established on the basis of radio frequency (RF) communication. There are two parts of this system named as transmitting unit and receiving unit. Each RF transmitter positioned on the roadside will be transmitting the code signal continuously. Whenever the vehicle enters the range of transmission, the RF receiver which is attached in the vehicle, will receive the signal and will display the information in a LCD monitor by notifying the driver to reduce the speed while going through that area.
Volume: 6
Issue: 5
Page: 2134-2139
Publish at: 2016-10-01

Design of a Front-End for Satellite Receiver

10.11591/ijece.v6i5.pp2282-2290
Tran Van Hoi , Ngo Thi Lanh , Nguyen Xuan Truong , Nguyen Huu Duc , Bach Gia Duong
This paper focuses on the design and implementation of a front-end for a Vinasat satellite receiver with auto-searching mechanism and auto-tracking satellite. The front-end consists of a C-band low-noise block down-converter and a L-band receiver. The receiver is designed to meet the requirements about wide-band, high sensitivity, large dynamic range, low noise figure. To reduce noise figure and increase bandwidth, the C-band low-noise amplifier is designed using T-type of matching network with negative feedback and the L-band LNA is designed using cascoded techniques. The local oscillator uses a voltage controlled oscillator combine phase locked loop to reduce the phase noise and select channels. The front-end has successfully been designed and fabricated with parameters: Input frequency is C-band; sensitivity is greater than -130 dBm for C-band receiver and is greater than -110dBm for L-band receiver; output signals are AM/FM demodulation, I/Q demodulation, baseband signals.
Volume: 6
Issue: 5
Page: 2282-2290
Publish at: 2016-10-01

A Normative Process Model for ICT Business Continuity Plan for Disaster Event in Small, Medium and Large Enterprises

10.11591/ijece.v6i5.pp2425-2431
Fadeel Sambo , Felix Olu Bankole
Small, Medium and Large Enterprises (SMLs) are exposed to the risks of business interruption as they expand and become more dependent on Information Communication Technology (ICT) infrastructure. The current study seeks to determine why organization that have Business Continuity Plan (BCP) in place and implement regular testing of their plan still experience prolong downtime during a disaster event resulting in Service Level Agreement (SLA) not being met or major financial loss. By employing a descriptive analytics approach through a qualitative case study, the research propose a normative process model for comprehensive procedures of BCP for business leaders, ICT service managers, IS executives, data science researchers, risk managers, entrepreneur and policy makers on how to adopt strategies on effective disaster risk reduction and management in organizations. The current study offer both theoretical and practical implications for BCP in small, medium and large enterprises.
Volume: 6
Issue: 5
Page: 2425-2431
Publish at: 2016-10-01

Design of MPC for Superheated Steam Temperature Control in a Coal-fired Thermal Power Plant

10.11591/ijeecs.v4.i1.pp73-82
A. Yasmine Begum , G. V. Marutheeswar
A superheater is a vital part of the steam generation process in the boiler-turbine system. Reliable control of temperature in the superheated steam temperature system is essential to guarantee efficiency and high load-following capability in the operation of coal-fired Thermal power plant. The PI and PID controllers are extensively used in cascade control of secondary superheated steam temperature process.The design and implementation of a Model Predictive Control (MPC) strategy for the superheated steam temperature regulation in a thermal power plant is presented. A FOPTD model  is derived from  the dynamic model of the superheater. This model is required by the MPC algorithm to calculate the future control inputs. A new MPC controller is designed and its performance is tested through simulation studies. Compared with the superheater steam temperature control using a conventional PID controller, the steam temperature controlled by the MPC controller is found to be more stable. The stable steam temperature leads to energy saving and efficient plant operation, as verified by the simulation results. 
Volume: 4
Issue: 1
Page: 73-82
Publish at: 2016-10-01

Spatio-Temporal Typology of Land and Forest Fire in Sumatra

10.11591/ijeecs.v4.i1.pp83-90
Israr Albar , I. Nengah Surati Jaya , Bambang Hero Saharjo , Budi Kuncahyo
The characteristic of land and forest fires occurred in Indonesia are varied widely, following the variation of time within a year and geographic location. This paper describes how the spatio-temporal of forest and land fire typology was developed. The main objective of this study was to develop a spatio-temporal typology of forest and land fire by considering several key indicators that directly related to the density of active fire occurrence, such as percentage of forest area (x1), population density (x2), ratio of forest area to population (x3), ratio of plantation area to population (x4), ratio of agriculture area to population (x5), GRDP (x6), population growth (x7), deforestation growth (x8), plantation growth (x9) and dry agriculture growth (x10) as well as  MODIS-based fire hotspot. The typology analysis was performed using clustering techniques with Euclidean distance dissimilarity measure, where the grouping process was drawn with single linkage method. The temporal analysis showed that the highest occurrence of the fire hotspot was mainly found in the third quarter. It was found that the forest and land fire typology could be developed into three classes using variables x6 and x7 with overall accuracy of 78.15% or x1-x6-x7 with overall accuracy of 78.8%.  No accuracy improvement was obtained when the typology was developed using five variables x1-x3-x4-x6-x7.
Volume: 4
Issue: 1
Page: 83-90
Publish at: 2016-10-01

An Improved Criterion for Induced Stability of Fixed-Point Digital Filters with Saturation Arithmetic

10.11591/ijeecs.v4.i1.pp65-72
Priyanka Kokil , Xavier Arockiaraj S
This paper establishes a criterion for the induced  stability of fixed-point state-space digital filters with saturation nonlinearities and external interference. The criterion is established in a linear matrix inequality (LMI) setting, and therefore, computationally tractable. The criterion turns out to be an improvement over a previously reported criterion. A comparison of the presented criterion with existing criterion is made. Numerical examples are given to demonstrate the usefulness of the proposed approach.
Volume: 4
Issue: 1
Page: 65-72
Publish at: 2016-10-01

Performance Analysis of SMES Integrated with Offshore Wind Farms to Power Systems through MT-HVDC

10.11591/ijeecs.v4.i1.pp1-9
Mohammed A. Badr , Ahmed M. Atallah , Mona A. Bayoumi
With the increase in the development of offshore wind farm (OWF) around the world, this paper describes OWF consisting of permanent magnet synchronous generator (PMSG) wind turbines connected to Active network (AC grid) and Passive network (loads) through Multi Terminal High voltage direct current(MT-HVDC) transmission system. This paper discusses the effect of using a Superconducting Magnetic Energy Storage (SMES) unit in a hybrid power system that contains OWF. In this paper, we have aggregated 300 wind turbines of 1.5 MW PMSG using an aggregation technique (multi full aggregated model using equivalent wind speed (MFAM_EWS)). Furthermore, we have used a detector to detect any tripping of any wind turbine and substitute the shortage of power due to this loss of wind turbines immediately through SMES. The Active network in this paper should have a minimum of 150 MW power to be supplied by controlling the SMES unit (absorbing or providing power according to the system requirement). Simulation has been carried out by MATLAB/Simulink program to test the effectiveness of the SMES unit during tripping some of the wind turbines, fluctuation in wind speeds, load change and voltage dips. 
Volume: 4
Issue: 1
Page: 1-9
Publish at: 2016-10-01

A New P System Based Genetic Algorithm

10.11591/ijeecs.v4.i1.pp165-168
Caiping Hou , Xiyu Liu
For the “early convergence” or the “genetic drift” of the genetic algorithm, this paper proposes a new genetic algorithm based on P system. Based on the parallel mechanism of P system in membrane computing, we put forward the new P system based genetic algorithm (PBGA). So that we can improve the performance of GA.
Volume: 4
Issue: 1
Page: 165-168
Publish at: 2016-10-01

Android Malware Detection Using Backpropagation Neural Network

10.11591/ijeecs.v4.i1.pp240-244
Fais Al Huda , Wayan Firdaus Mahmudy , Herman Tolle
The rapid growing adoption of android operating system around the world affects the growth of malware that attacks this platform. One possible solution to overcome the threat of malware is building a comprehensive system to detect existing malware. This paper proposes multilayer perceptron artificial neural network trained with backpropagation algorithm to determine an application is malware or non-malware application which is often called benign application. The parameters that used in this study based on the list of permissions in the manifest file, the battery rating based on permission, and the size of the application file. Final weights obtained in the training phase will be used in mobile applications for malware detection. The experimental results show that the proposed method for detection of malware on android is effective. The effectiveness is demonstrated by the results of the accuracy of the system developed in this study is relatively high to recognize existing malware samples.
Volume: 4
Issue: 1
Page: 240-244
Publish at: 2016-10-01

Insulating Material Erosion in Atmospheric Non-Thermal Plasma Jet Device

10.11591/ijeecs.v4.i1.pp20-28
K. M. Ahmed , T. M. Allam , M. A. Abouelatta , S. A. Ward , A. A. Lashin , H. M. Soliman
This paper reports on the selection of insulating material types in a developed atmospheric-pressure non-thermal plasma jet (ANPJ-II) device which was operated previously in our laboratory based on the minimum erosion area of the insulator’s nozzle. Three identical insulator groups used in our experiment include; Teflon insulator material with different thicknesses of 1.5 mm and 2 mm respectively, and Ceramic insulating material with thickness of 2 mm. ANPJ-II device is operated with each of the three insulator groups. These insulators are operated and analyzed with different operation times for compressed Air or Nitrogen gas with a flow rate of 12 L/min and input voltage of 6 kV.  The erosion area of these insulator materials is measured as a function of the operation time. The Ceramic insulator was found to have the minimum erosion area. Also, the temperature of both the cathode and the insulating material (Teflon or Ceramic) are measured to study the effect of operation time and the gas type on the device components.
Volume: 4
Issue: 1
Page: 20-28
Publish at: 2016-10-01

The Peak of the PQRST and the Trajectory Path of Each Cycle of the ECG 12-Lead Wave

10.11591/ijeecs.v4.i1.pp169-175
Sabar Setiawidayat , Djanggan Sargowo , Setyawan P. Sakti , Sri Andarini
The objective of this present article is to describe the record of the ECG 12-lead examination in order to obtain the peaks of the P, Q, R, S and T from each cycle and also to present the Peak of the PQRST and the trajectory path of each cycle of the ECG 12- lead wave. The duration of the peak R to another is used as the period  of each cycle, while the Phytagoras theorem is employed to count the trajectory path of the wave in each step. The Peak PQRST is utilized to diagnose the  heart condition, and the trajectory path  is the distance taken up by the impulses in the heart muscles. The discrete data from the MIT-BIH and the results of the measurement itself are employed as the data to obtain the values of the peak PQRST and the trajectory path of the wave of each cycle.
Volume: 4
Issue: 1
Page: 169-175
Publish at: 2016-10-01

Two Dimensional Tunable Optical-CDMA System

10.11591/ijeecs.v4.i1.pp125-132
Rajesh Yadav Yadav , Gurjit Kaur Kaur
In this work an experimental demonstration is proposed to implement the synchronous optical code division multiple access system using two dimensional wavelength hopping and time spreading optical prime code is presented. An optical CDMA system is configured on latest version of optisystem by optiwave for the 20 users (Prime Number = 5) connected in a network operating at a bit rate 10 Gbps each. Tunability is achieved by using a MATLAB based delay selector which serves as the source of control signal for optical delay lines. The encoded optical signal of each user has been assigned a particular mode. The resulting optical signal is then transmitted over parabolic index multimode optical fiber. The received signal can successfully be retrieved at the decoder, when the encoder and decoder are configured for the same user. The performance of Optical CDMA system is evaluated in terms of the autocorrelation and cross correlation function, BER, Q factor, eye diagram and compared with 1D code for a given prime number. 
Volume: 4
Issue: 1
Page: 125-132
Publish at: 2016-10-01

TreeNet Analysis of Human Stress Behavior using Socio-Mobile Data

10.11591/ijeecs.v4.i1.pp148-154
B. Padmaja , V. V. Rama Prasad , K. V. N
Human behavior is essentially social and humans start their daily routines by interacting with others. There are many forms of social interactions and we have used mobile phone based social interaction features and social surveys for finding human stress behavior. For this, we gathered mobile phone call logs data set containing 111444 voice calls of 131 adult members of a living community for a period of more than 5 months. And we identified that top 5 social network measures like hierarchy, density, farness, reachability and eigenvector of individuals have profound influence on individuals stress levels in a social network. If an ego lies in the shortest path of all other alters then the ego receives more information and hence is more stressed. In this paper, we have used TreeNet machine learning algorithm for its speed and immune to outliers. We have tested our results with another Random Forest classifier as well and yet, we found TreeNet to be more efficient. This research can be of vital importance to economists, professionals, analysts, and policy makers.
Volume: 4
Issue: 1
Page: 148-154
Publish at: 2016-10-01

A Novel Generalized Topology for Multi-level Inverter with Switched Series-Parallel DC Sources

10.11591/ijeecs.v4.i1.pp41-51
S. Sridhar , P. Satish Kumar , M. Susham
This paper presents a novel topology of Single-phase multilevel inverter for low and high power applications. It consists of polarity (Level) generation circuit and H Bridge to generate both positive and negative polarities. The proposed topology can produce more output voltage levels by switching dc voltage sources in series and parallel. The proposed topology utilizes minimum number of power electronic devices which leads to the reduction of cost, size, and weight low and consumes low power which improves the efficiency. Switching pulses are generated using Phase disposition (PD) pulse width modulation technique. Finally the effectiveness of the proposed topology is verified using MATLAB/SIMULINK software tool. 7level asymmetrical multilevel inverter prototype hardware is prepared to support the proposed topology to verify the effectiveness and its validity.
Volume: 4
Issue: 1
Page: 41-51
Publish at: 2016-10-01

Quantitative Analysis and Comparison of Symmetric Cryptographic Security Algorithms

10.11591/ijeecs.v4.i1.pp116-124
Mahaba Saad , Khalid Youssef , Hala Abdel-Kader
Nowadays, the rapid evolution of communication systems offers, to a very large percentage of population, access to a huge amount of information and a variety of means to use in order to exchange personal data. Hence the search for the best solution to offer the necessary protection against the data intruders’ attacks along with providing these services in time is one of the most interesting subjects in the security related communities. Cryptography is usually referred to as “the study of secret”. Encryption is the process of converting normal text to unreadable form. There are a variety of encryption algorithms have been developed. This paper provides quantitative analysis and comparison of some symmetric key cryptographic ciphers (DES, 3DES, AES, Blowfish, RC5, and RC6).  The quantitative analysis approach is a step towards optimizing the security operations for an efficient next generation family of network processors with enhanced speed and power performance. A framework will be proposed as a reference model for quantitative analysis of security algorithm mathematical and logical operations. 
Volume: 4
Issue: 1
Page: 116-124
Publish at: 2016-10-01
Show 1554 of 1928

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration