Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

28,719 Article Results

Design and Implementation of Single Phase AC-DC Buck-Boost Converter for Power Factor Correction and Harmonic Elimination

10.11591/ijpeds.v7.i3.pp1004-1011
Damodaran Jayahar , R. Ranihemamalini , K. Rathnakannan
This paper discusses the Power Factor Correction (PFC) for single phase ACDC Buck-Boost Converter (BBC) operated in Continuous Conduction Mode (CCM) using inductor average current mode control. The proposed control technique employs Proportional-Integral (PI) controller in the outer voltage loop and the Inductor Average Current Mode Control (IACMC) in the inner current loop for PFC BBC. The IACMC has advantages such as robustness when there are large variations in line voltage and output load. The PI controller is developed by using state space average model of BBC. The simulation of the proposed system with its control circuit is implemented in MatLab/Simulink. The simulation results show a nearly unity power factor can be attained and there is almost no change in power factor when the line frequency is at various ranges. Experimental results are provided to show its validity and feasibility. Keyword
Volume: 7
Issue: 3
Page: 1004-1011
Publish at: 2016-09-01

Self-Tuning Fuzzy Based PI Controller for DFIM Powered by Two Matrix Converters

10.11591/ijpeds.v7.i3.pp665-676
Abdelhakim Alalei , Abdeldjebar Hazzab , Ali Nesba
This paper presents a study of the Doubly Fed Induction Machine (DFIM) powered by two matrix converters; one connected to the stator windings and the other connected to the rotor windings. First, the mathematical model of DFIM and those of the matrix converters are developed. Then, the vector control technique is applied to the DFIM. Fuzzy logic is used in order to automatically adjust the parameters of the PI controller. The performance of this structure under different operating conditions is studied. Particular interest is given to the robustness of the fuzzy logic based control. The operation of the DFIM under overload conditions is also examined.  Simulation results obtained in MATLAB/Simulink environment are presented and discussed.
Volume: 7
Issue: 3
Page: 665-676
Publish at: 2016-09-01

Duty Cylcing Stratagems for Network Permanency in Wireless Sensor Network

10.11591/ijeecs.v3.i3.pp534-539
Muhammad Toufique , Hongbo Jiang , Alaa Rahhoom Hadi
Wireless Sensor Networks (WSNs) having Sensor Nodes (SNs) deployed in the field, is penetrating in all fields of life. Commonly used and appreciated by the research community and general user especially. The energy delinquent in WSNs are the main barricades averting whole manipulation expertise. However, their energy embarrassed nature requires the use of energy effective stratagems to maximize network lifetime. Emerging such a Medium Access Control (MAC) code of behavior is burning topic zone in this field. For evade deteriorating imperfect power,   redeemable functions proposed in MAC code of behavior. Features are to save energy and thus extend the lifespan of the network. We exploit especially the duty cycle and present this as an energy minimizing tool in MAC protocols.
Volume: 3
Issue: 3
Page: 534-539
Publish at: 2016-09-01

Real Time Implementation of Variable Step Size Based P&O MPPT for PV Systems Based on dSPACE

10.11591/ijpeds.v7.i3.pp915-925
K. Muthukumar , T.S. Anandhi
Nowadays Solar energy is an important energy source due to the energy crisis and environment pollution. Maximum power point tracking (MPPT) algorithm improves the utilization efficiency of a photovoltaic systems. In this paper an improved P&O MPPT algorithm is developed and simulated using MATLAB / SIMULINK to control the DC/DC buck converter. The obtained simulink model is also verified using dspace tool. Both the simulated and experimental results are validated by also comparing them with conventional MPPT methods. The performance measures show the increase in the efficiency of PV system by the proposed model.
Volume: 7
Issue: 3
Page: 915-925
Publish at: 2016-09-01

Design and Implementation of 8x8 Multiplier using 4-2 Compressor and 5-2 Compressor

10.11591/ijres.v5.i3.pp127-131
K. Hari Kishore , K. Akhil , G. Viswanath , N. Pavan Kumar
In this paper, a 8x8 multiplier is realized by using 4-2 and 5-2 compressors. Low-power high speed 4-2 compressors and 5-2 compressors are extensively utilized for numerical realizations. Both the compressors circuits that is the 4-2 compressor circuit and 5-2 compressor circuit internally consist of the logic gates i.e. the XOR and XNOR gates.  4-2 compressor circuit has been designed uses a brand new partial-product reduction format that consecutively reduces the utmost output new style of number needs less variety of MOSFET’s compared to Wallace Tree Multipliers. The 4-2 compressor used is created from high-speed and consists of logic gates XOR and XNOR gates and transmission gate primarily based electronic device. The regular delay and switching energy also called as power-delay product (PDP) is differentiated with the 5-2 compressor enforced with 4-2 Compressors and while not compressors, and is evidenced to own minimum delay and PDP. Simulations are performed by mistreatment Xilinx ten.1 ISE.
Volume: 5
Issue: 3
Page: 127-131
Publish at: 2016-08-21

FPGA Implementation of Automatic Irrigation and Pesticide Control System

10.11591/ijres.v5.i3.pp132-136
D. Hanitha , B. Anusha , M. Durga Prakash
In many parts of the world rainfalls are inadequate to meet agricultural needs of farmers. It thus becomes imperative to use an irrigation system that meets the moisture needs of plants in order to increase food crop production. The system described here monitors the moisture and pesticide control needs of crops. Irrigation control is monitored through suitable moisture sensors and automatically pumps water when the need arises through FPGA control logic thus requiring minimal human interventions. We can also use this system for liquid pesticide supply through the selection. Thus, we achieve the efficient supply of water and pesticide as needed by plants and conserve quantity, energy and time. In this paper, the proposed system is designed using Verilog and implemented on FPGA. The system operation is also explained in DSCH (Digital Schematic) software. The system is very simple to operate and ideally suits the irrigation and pesticide need for green houses as well as farms.
Volume: 5
Issue: 3
Page: 132-136
Publish at: 2016-08-21

Fast, Intelligent and Secure an Embedded Health-care Supervisory System

10.11591/ijres.v5.i2.pp75-82
Neha Shivaji Bidgar
The world of medical supervisory system should remotely monitor various parameters of patients with help of electronics. This work aims at monitoring parameters in fast, intelligent and secure way. The work emphasizes on designing an embedded system which handles critical parameters of patients in hospital/nursing units. The data samples are processed using an ARM based CPU’s and to achieve performance metrics TI RTOS is used and validated. The system generates interrupts based on the priority of each of critical parameters with a threshold in it and enables alarming/warning system. The data is then transferred to IoT layer using a CC3100 TI based SoC for further reference and processing.In this paper, 4 parameters has been monitored for designing system such as measuring Respiratory rate for human breath, MMG signal for muscle movement, Blood pressure rate as well as Temperature. RTOS helps with scheduling as well as with interrupts also helps Wi-Fi module to work with it. Wi-Fi module provides many security options as WEP, WAP, and WAP2.
Volume: 5
Issue: 2
Page: 75-82
Publish at: 2016-08-21

FPGA Based Data Hiding Methods using DNA Cryptography Techniques

10.11591/ijres.v5.i3.pp137-142
B. Murali Krishna , CH. Surendra , K. Mani Varma , K. Mani Kanta , S.K. Shabbeer , G.L. Madhumati
To convey the information safely DNA grouping mechanisms are used. There are many methods used by DNA sequences. The proposed method is of both encryption and information concealing utilizing a few properties of Deoxyribonucleic Acid (DNA) groupings. This technique is highlighted that DNA groupings have many more intriguing properties which are used for concealing the information. There are three strategies in this encryption strategy: the Insertion Technique, the Complimentary Pair Technique and the Substitution Strategy .For every single strategy, a specific reference DNA grouping P is chosen and then the taken sequence is changed over with the mystery message M and is consolidated, so that P0 is acquired. P0 is then sent to the collector and the beneficiary can recognize and separate the message M covered up in P. This technique is proposed to utilize INSERTION Strategy. Subsequently, the proposed plan comprises for the most part of two stages. In the principal stage, the mystery information is encoded utilizing a DNA Sequence. In the second stage the encoded information is steganographically covered up into some reference DNA grouping utilizing an insertion strategy. The effectiveness of this security algorithm is seen with many merits and limitations. A, C, G, and T are the 4 nucleotides which are taken for this project.
Volume: 5
Issue: 3
Page: 137-142
Publish at: 2016-08-21

Low Cost Microcontroller Based Automatic Billing System with Protective Shielding from RF Waves

10.11591/ijres.v5.i2.pp83-89
Suganthi Evangeline
Shopping Mall is a complex of shops representing various merchandisers that enables the customers to buy all their needed things. As it is easier for people to come and buy all their things in a common place, shopping malls are crowded. As people are coming in large numbers to buy the groceries and house hold products for the full month, the billing counters are flooded with people. In order to avoid such large queues at the billing counter, we are coming up with Smart Cart using newly evolved RFID Technology. In our proposed method, the bill is automatically generated in the trolley as the customer purchases the product.
Volume: 5
Issue: 2
Page: 83-89
Publish at: 2016-08-21

Web Based Home Security and Automation System

10.11591/ijres.v5.i2.pp90-95
Norfadzlia Mohd Yusof , Aiman Zakwan Jidin , Lim Mei Sze
Home security and automation is crucial issue concerned by people. A home security system is needed for convenience and safety. A home automation system is a key to having effective energy efficiency in the house. In this paper, we present the design and implementation of a web-based home security and automation system. This system make use of PIR motion sensor to detect intruder in the house. This sensor is further fed to microcontroller which would help the GSM module to send notification to house owner regarding the intrusion. On the other hand, the LDR light sensor is used to provide auto-light functionality which will turn on the light at night and dim it at day time. A web-based system function as a remote control system for user to monitor control the sensors and lights at home in order to save energy consumption. This system is accessible by user anytime and anywhere as long there is an Internet connection.
Volume: 5
Issue: 2
Page: 90-95
Publish at: 2016-08-21

Artificial Intelligence a Threat

10.11591/ijai.v5.i3.pp117-118
Abhedya Saini
Research in AI has built upon the tools and techniques of many different disciplines.Study in the artificial intelligence has given rise to rapidly growing technology known as expert system. Rapid development in this field made human more dependent on this technology. More advancement will lead to side effects of that technology because after a certain point, everything is harmful.
Volume: 5
Issue: 3
Page: 117-118
Publish at: 2016-08-20

Natural Immune System Response As Complexe Adaptive System Using Learning Fuzzy Cognitive Maps

10.11591/ijai.v5.i3.pp95-104
Ahmed Tlili , Salim Chikhi
In the Natural Immune Systems NIS, adaptive and emergent behaviors result from the behaviors of each cell and their interactions with other cells and environment. Modeling and Simulating NIS requires aggregating these cognitive interactions between the individual cells and the environment. In last years the Fuzzy Cognitive Maps (FCM) has been shown to be a convenient tool for modeling, controlling and simulating complex systems. In this paper,  a new type of learning fuzzy cognitive maps (LFCM) have been proposed as an extension of traditional FCM for modeling complex adaptive system is described. Our approach is summarized in two major ideas: The first one is to increase the reinforcement learning capabilities of the FCM by using an adaptation of Q-learning technique and the second one is to foster diversity of concept's states within the FCM by adopting an IF-THEN rule based system. Through modeling and simulating response of natural immune system, we show the effectiveness of the proposed approach in modeling CASs.
Volume: 5
Issue: 3
Page: 95-104
Publish at: 2016-08-20

Prediction of Daily Network Traffic based on Radial Basis Function Neural Network

10.11591/ijai.v3.i4.pp145-149
Haviluddin Haviluddin , Imam Tahyudin
This paper presents an approach for predicting daily network traffic using artificial neural networks (ANN), namely radial basis function neural network (RBFNN) method. The data is gained from 21 – 24 June 2013 (192 samples series data) in ICT Unit Universitas Mulawarman, East Kalimantan, Indonesia. The results of measurement are using statistical analysis, e.g. sum of square error (SSE), mean of square error (MSE), mean of percentage error (MPE), mean of absolute percentage error (MAPE), and mean of absolute deviation (MAD). The results show that values are the same, with different goals that have been set are 0.001, 0.002, and 0.003, and spread 200. The smallest MSE value indicates a good method for accuracy. Therefore, the RBFNN model illustrates the proposed best model to predict daily network traffic.
Volume: 3
Issue: 4
Page: 145-149
Publish at: 2016-08-20

Rule Based and Expectation Maximization algorithm for Arabic-English Hybrid Machine Translation

10.11591/ijai.v5.i2.pp72-79
Arwa Hatem Alqudsi , Nazlia Omar , Rabha W. Ibrahim
It is practically impossible for pure machine translation approach to process all of translation problems; however, Rule Based Machine Translation and Statistical Machine translation (RBMT and SMT) use different architectures for performing translation task. Lexical analyser and syntactic analyser are solved by Rule Based and some amount of ambiguity is left to be solved by Expectation–Maximization (EM) algorithm, which is an iterative statistic algorithm for finding maximum likelihood. In this paper we have proposed an integrated Hybrid Machine Translation (HMT) system. The goal is to combine the best properties of each approach. Initially, Arabic text is keyed into RBMT; then the output will be edited by EM algorithm to generate the final translation of English text. As we have seen in previous works, the performance and enhancement of EM algorithm, the key of EM algorithm performance is the ability to accurately transform a frequency from one language to another. Results showing that, as proved by BLEU system, the proposed method can substantially outperform standard Rule Based approach and EM algorithm in terms of frequency and accuracy. The results of this study have been showed that the score of HMT system is higher than SMT system in all cases. When combining two approaches, HMT outperformed SMT in Bleu score.
Volume: 5
Issue: 2
Page: 72-79
Publish at: 2016-08-20

Automatic Exudates Detection in Diabetic Retinopathy Images

10.11591/ijai.v5.i2.pp45-54
H. Faouzi , Mohamed Fakir
Diabetic Retinopathy (DR) refers to the presence of typical retinal micro vascular lesions in persons with diabetics. When the disease is at the early state, a prompt diagnosis may help in preventing irreversible damages to the diabetic eye. If the exudates are closer to macula, then the situation is critical. Early detection can potentially reduce the risk of blind.  This paper proposes tool for the early detection of Diabetic Retinopathy using edge detection, algorithm kmeans in segmentation phase, invariant moments (Hu and Affine) and descriptor GIST in extraction phase. In the recognition phase, neural network is adopted. All tests are applied on database DIARETDB1.
Volume: 5
Issue: 2
Page: 45-54
Publish at: 2016-08-20
Show 1554 of 1915

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration