Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

28,451 Article Results

Three Dimensional Space Vector Modulation Theory: Practices without Proofs

10.11591/ijece.v6i1.pp21-25
Bhaskar Bhattacharya , Ajoy Kumar Chakraborty
In three dimensional (3D) space vector modulation (SVM) theory with α-β-γ frame there are some issues which are well known and are widely practiced being quite obvious but without any proof so far. In this paper necessary scientific foundations to those issues have been provided. The foremost of these issues has been with the frame of reference to be considered in 3D SVM applications for unbalanced three phase systems. Although for balanced three phase systems there has been no controversy with α-β frame as the frame of reference but in 3D it has not yet been established which one, α-β-γ frame or the a-b-c frame, is mathematically correct. Another significant issue addressed in this work has been to ascertain the exact reason when a three phase system has to be represented in 2D or 3D space to apply SVM. It has been presented for the first time in this work that the key factor that determines whether 3D or 2D SVM has to be applied depends on the presence of time independent symmetrical components in a three phase ac system. Also it has been proved that the third axis, the Y–axis, represents the time independent quantity and that it must be directed perpendicular to the α-β plane passing through the origin.
Volume: 6
Issue: 1
Page: 21-25
Publish at: 2016-02-01

Defect Detection in Ceramic Images Using Sigma Edge Information and Contour Tracking Method

10.11591/ijece.v6i1.pp160-166
Kwang-Baek Kim , Young Woon Woo
In this paper, we suggest a method of detecting defects by applying Hough transform and least squares on ceramic images obtained from non-destructive testing. In the ceramic images obtained from non-destructive testing, the background area, where the defect does not exist, commonly shows gradual change of luminosity in vertical direction. In order to extract the background area which is going to be used in the detection of defects, Hough transform is performed to rotate the ceramic image in a way that the direction of overall luminosity change lies in the vertical direction as much as possible. Least squares is then applied on the rotated image to approximate the contrast value of the background area. The extracted background area is used for extracting defects from the ceramic images. In this paper we applied this method on ceramic images acquired from non-destructive testing. It was confirmed that extracted background area could be effectively applied for searching the section where the defect exists and detecting the defect.
Volume: 6
Issue: 1
Page: 160-166
Publish at: 2016-02-01

High throughput FPGA Implementation of Data Encryption Standard with time variable sub-keys

10.11591/ijece.v6i1.pp298-306
Soufiane Oukili , Seddik Bri
The Data Encryption Standard (DES) was the first modern and the most popular symmetric key algorithm used for encryption and decryption of digital data. Even though it is nowadays not considered secure against a determined attacker, it is still used in legacy applications. This paper presents a secure and high-throughput Field Programming Gate Arrays (FPGA) implementation of the Data Encryption Standard algorithm. This is achieved by combining 16 pipelining concept with time variable sub-keys and compared with previous illustrated encryption algorithms. The sub-keys vary over time by changing the key schedule permutation choice 1. Therefore, every time the plaintexts are encrypted by different sub-keys. The proposed algorithm is implemented on Xilinx Spartan-3e (XC3s500e) FPGA. Our DES design achieved a data encryption rate of 10305.95 Mbit/s and 2625 number of occupied CLB slices. These results showed that the proposed implementation is one of the fastest hardware implementations with much greater security.
Volume: 6
Issue: 1
Page: 298-306
Publish at: 2016-02-01

Projected Range Dependent Tunneling Current of Asymmetric Double Gate MOSFET

10.11591/ijece.v6i1.pp113-119
Hak Kee Jung
This study is to analyze the changes of tunneling current according to projected range, a variable of Gaussian function of channel doping function of Asymmetric Double Gate; ADG MOSFET. In MOSFET with channel length below 10 nm, tunneling current occupies a large percentage among off-currents. The increase of tunneling current has a large effect on the characteristics of subthreshold such as threshold voltage movement and the decline of subthreshold swing value, so the accurate analysis of this is being required. To analyze this, potential distribution of series form was obtained using Gaussian distribution function, and using this hermeneutic potential distribution, thermionic emission current and tunneling current making up off-current were obtained. At this point, the effect that the changes of projected range, a variable of Gaussian distribution function, have on the ratio of tunneling current among off-currents was analyzed. As a result, the smaller projected range was, the lower the ratio of tunneling current was. When projected range increased, tunneling current increased largely. Also, it was observed that the value of projected range which the ratio of tunneling current increased changed according to maximum channel doping value, channel length, and channel width.
Volume: 6
Issue: 1
Page: 113-119
Publish at: 2016-02-01

A Polynomial Digital Pre-Distortion Technique Based on Iterative Architecture

10.11591/ijece.v6i1.pp106-112
Kwang-Pyo Lee , Soon-Il Hong , Eui-Rim Jeong
A digital predistortion (DPD) technique based on an iterative adaptation structure is proposed for linearizing power amplifiers (PAs). To obtain proper DPD parameters, a feedback path that converts the PA’s output to a baseband signal is required, and memory is also needed to store the baseband feedback signals. DPD parameters are usually found by an adaptive algorithm by using the transmitted signals and the corresponding feedback signals. However, for the adaptive algorithm to converge to a reliable solution, long feedback samples are required, which increases hardware complexity and cost. Considering that the convergence time of the adaptive algorithm highly depends on the initial condition, we propose a DPD technique that requires relatively shorter feedback samples. Specifically, the proposed DPD iteratively utilizes the short feedback samples in memory while keeping and using the DPD parameters found at the former iteration as the initial condition at the next iteration. Computer simulation shows that the proposed technique performs better than the conventional technique, as the former requires much shorter feedback memory than the latter.
Volume: 6
Issue: 1
Page: 106-112
Publish at: 2016-02-01

Network Activity Monitoring Against Malware in Android Operating System

10.11591/ijece.v6i1.pp249-256
Luis Miguel Acosta-Guzman , Gualberto Aguilar-Torres , Gina Gallegos-Garcia
Google’s Android is the most used Operating System in mobile devices but as its popularity has increased hackers have taken advantage of the momentum to plague Google Play (Android’s Application Store) with multipurpose Malware that is capable of stealing private information and give the hacker remote control of smartphone’s features in the worst cases. This work presents an innovative methodology that helps in the process of malware detection for Android Operating System, which addresses aforementioned problem from a different perspective that even popular Anti-Malware software has left aside. It is based on the analysis of a common characteristic to all different kinds of malware: the need of network communications, so the victim device can interact with the attacker. It is important to highlight that in order to improve the security level in Android, our methodology should be considered in the process of malware detection. As main characteristic, it does not need to install additional kernel modules or to root the Android device. And finally as additional characteristic, it is as simple as can be considered for non-experienced users.
Volume: 6
Issue: 1
Page: 249-256
Publish at: 2016-02-01

Implementing Dynamically Evolvable Communication with Embedded Systems through WEB Services

10.11591/ijece.v6i1.pp381-398
Sasi Bhanu Jammalamadaka , Vinaya Babu A , Trimurthy A
Embedded systems that monitor and control safety and mission critical system are communicated with by a HOST located at a remote location through Internet. Such kind of embedded systems are developed to be dynamically evolvable with respect to syntax, semantics, online testing and communication subsystems. All these systems are to be dynamically evolvable and the components needed for evolution are also to be added into the embedded system. Architectural  models describe  various components using which dynamically evolvable sub-systems are realised through implementation by using specific and related technologies. Implementation system describe the platform, code units and the interlacing of various processes/tasks to the elementary level of details. WEB services place an excellent platform for implementing dynamically evolvable  systems due to the use of open standards. This paper presents an implementation system that is related to dynamically evolvable communication and other sub-systems using web services technologies.
Volume: 6
Issue: 1
Page: 381-398
Publish at: 2016-02-01

Application of Component Criticality Importance Measures in Design Scheme of Power Plants

10.11591/ijece.v6i1.pp63-70
Smajo Bisanovic , Mersiha Samardzic , Damir Aganovic
This paper presents application of component criticality importance measures in phase of preparation and design of power plants. These measures provide a numerical rank to determine which components are more important for power plant reliability improvement or more critical for power plant failure. Identifying critical components for power plant reliability provides an important input for decision-making and guidance throughout the development project. The study on several schematic design options of conventional thermal power plant show that the importance measures can be used as an effective tool to assess component criticality in the project phase of new production capacities.
Volume: 6
Issue: 1
Page: 63-70
Publish at: 2016-02-01

A Prototype of Online Dynamic Scaling Scheduler for Real-Time Task based on Virtual Machine

10.11591/ijece.v6i1.pp205-211
Junho Seo , Kyong Hoon Kim
In this paper, we provide an architecture of power-aware scheduler for real-time virtual machine system using dynamic frequency scaling mechanism This architecture provides that how to manage real-time resource and how to control processor frequency. In addition, we propose two scheduling schemes that utilize slack time to adjust processor frequency without violating tasks deadline. Based on the provided architecture, we implement a virtualization framework with online power-aware scheduler using RT-Xen real-time hypervisor and Litmus-RT real-time OS. Our implementation manages entire of real-time resource and processor frequency depending on system policy. For trasferring real-time requirements, we implement an interface using hypercall mechanism. To evaluate provided system, we analyze performance evaluation in various aspects.
Volume: 6
Issue: 1
Page: 205-211
Publish at: 2016-02-01

Proposed Potential Security Infrastructure in VANETS using Tamper Registered Hardware

10.11591/ijece.v6i1.pp344-348
Shaik Mahaboob Jani , Syed Umar
All over the world many road accidents are occurred due to lack of knowledge of vehicle`s distance and speed. But this issue will be solved by using VANETS through which we can well know about the speed of the vehicle and how much distance it is from other vehicles in all sides. So the VANETS will play a very crucial role in the safety and mostly avoidance of accidents like reacting immediately in dangerous situations. In order to prevent the abuse of VANETS a potential security infrastructure is needed to maintain confidential requirements like message integrity & availability. To achieve this we have proposed a concept called A seperate Potential security infrastructure facilitated with symmetric & Asymmetric cryptography with TRH. Our proposed theory will give very high efficient in terms of Computational Needs for the VANETS users.
Volume: 6
Issue: 1
Page: 344-348
Publish at: 2016-02-01

The Performance of CSR Mutual Funds and Investment Decision-Making

10.11591/ijeecs.v1.i2.pp229-237
Jen-Der Day , Thuy Mai Trinh Nguyen , Chia Nan Wang , George Yungchih Wang
Nowaday, Corporate Socially Responsible (CSR) mutual funds are becoming a popular investment option for investors. However, no any research confirms whether CSR Mutual fund activity is better than market index or not. Besides, we should have one method can help con sequently investors in making the decision to select appropriate investment funds. In this study, we measure the financial performance of a sample of 15 CSR mutual funds in the world, with the monthly return over the period 2008-2013, then we propose the dession table. We first use the measures to evaluate the performance of mutual funds such as Alpha (α), Sharpe Ratio (SR), and Information Ratio (IR). And then, we use the obtained decision table to evaluate the predictability by each measure. The results indicate that only 3 of the 15 CSR mutual funds achieve good performance results based on the statistical significance of the two measures Sharpe Ratio and Information Ratio. In addition, the IR is suggested to evaluate and make investment decisions in the future and it also is the best one among the three measures. The decision table suggest investors a measure forecast accuracy way.
Volume: 1
Issue: 2
Page: 229-237
Publish at: 2016-02-01

Designing Game-Based Service Desk towards User Engagement Improvement

10.11591/ijeecs.v1.i2.pp381-389
Kridanto Surendro , Sarifah Putri Raflesia
Along the implementation of Information Technology (IT), there are incident, request, problem, and event. According to this, organizations need to implement a function which can be a single point to provide communication between IT service provider and IT users. Information Technology Infrastructure Library (ITIL) mentions service desk as a function to operate solution of  this matter. But, recently organizations find new challenge which is related to service desk staffs’ motivation. The repeated activities which are run by service desk may cause saturation. This situation will affect workplace enviroment and productivity. In this research, we propose a design to help organization build game-like activities as solution to boost service desk’s motivation which can give good impact to service desk’s quality. Our proposed design uses game approach and ITIL practices to ensure that game-based service desk is well designed.
Volume: 1
Issue: 2
Page: 381-389
Publish at: 2016-02-01

Inset Feed Toppled H-Shaped Microstrip Patch Antenna for PCS/WiMAX Application

10.11591/ijeecs.v1.i2.pp365-370
Mohammad Aneesh , Mohd. Gulman Siddiqui , Jamshed Aslam Ansari , Ashish Singh , Km. Kamakshi
In this paper, an inset feed toppled H-shaped microstrip patch antenna with grounded plane is investigated for triple band operation. The simulation of proposed antenna geometry has been performed using IE3D simulation software based on method of moment. The prototype of the proposed antenna has been fabricated and tested to validate the simulation work. The measured results indicate that the reflection coefficient is better than -10dB for 1.8 GHz (PCS), 3.5 GHz (WiMAX), and 5.5 GHz (WiMAX) frequencies.
Volume: 1
Issue: 2
Page: 365-370
Publish at: 2016-02-01

Travel Angle Control of Quanser Bench-top Helicopter based on Quantitative Feedback Theory Technique

10.11591/ijeecs.v1.i2.pp310-318
A. H. Mohd Hairon , H. Mansor , T. S. Gunawan , S. Khan
A three degree of freedom (3-DOF) bench-top helicopter is a simplified aerial vehicle which is used to study the behaviors of the helicopter as well as testing multiple flight control approaches for their efficiency. Designing helicopter’s dynamic control is a challenging task due to the presence of high uncertainties and non-linear behavior. The main objective of this research is to achieve robust control over the helicopter model regardless parameter variation and disturbances using robust control technique, Quantitative Feedback Theory (QFT). QFT utilizes frequency domain methodology which ensures plant’s stability by considering the feedback of the system and thus removing the effect of disturbances and reducing sensitivity of parameter’s variation. The proposed technique is tested against LQR-tuned PID controller in both simulation and real hardware environment to verify its performance. The results obtained shown us that QFT algorithm managed to reduce settling time and steady state error of about 80% and 33% respectively over the classical PID controller.
Volume: 1
Issue: 2
Page: 310-318
Publish at: 2016-02-01

Electricity Peak Load Demand using De-noising Wavelet Transform integrated with Neural Network Methods

10.11591/ijece.v6i1.pp12-20
Pituk Bunnoon
One of most important elements in electric power system planning is load forecasts. So, in this paper proposes the load demand forecasts using de-noising wavelet transform (DNWT) integrated with neural network (NN) methods. This research, the case study uses peak load demand of Thailand (Electricity Generating Authority of Thailand: EGAT). The data of demand will be analyzed with many influencing variables for selecting and classifying factors. In the research, the de-noising wavelet transform uses for decomposing the peak load signal into 2 components these are detail and trend components. The forecasting method using the neural network algorithm is used. The work results are shown a good performance of the model proposed. The result may be taken to the one of decision in the power systems operation.
Volume: 6
Issue: 1
Page: 12-20
Publish at: 2016-02-01
Show 1578 of 1897

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration