Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

28,451 Article Results

Modified Variational Mode Decomposition for Power Line Interference Removal in ECG Signals

10.11591/ijece.v6i1.pp151-159
Neethu Mohan , Sachin Kumar S , Prabaharan Poornachandran , Soman K.P
Power line interferences (PLI) occurring at 50/60 Hz can corrupt the biomedical recordings like ECG signals and which leads to an improper diagnosis of disease conditions. Proper interference cancellation techniques are therefore required for the removal of these power line disturbances from biomedical recordings. The non-linear time varying characteristics of biomedical signals make the interference removal a difficult task without compromising the actual signal characteristics. In this paper, a modified variational mode decomposition based approach is proposed for PLI removal from the ECG signals. In this approach, the central frequency of an intrinsic mode function is fixed corresponding to the normalized power line disturbance frequency. The experimental results show that the PLI interference is exactly captured both in magnitude and phase and are removed. The proposed approach is experimented with ECG signal records from MIT-BIH Arrhythmia database and compared with traditional notch filtering.
Volume: 6
Issue: 1
Page: 151-159
Publish at: 2016-02-01

Analysis of Legacy System in Software Application Development: A Comparative Survey

10.11591/ijece.v6i1.pp292-297
M. Srinivas , G. Ramakrishna , K. Rajasekhara Rao , E. Suresh Babu
Software evolution is one of the challenging issues in today’s business environment. It is necessary for the organizations, which make use of Information, and Communication Technologies will have to align their business processes to compete with global business. The existing large software systems (“legacy” systems) have never been built to cope with the current business requirement for their poor coding, design structures, logic and documentation. Moreover, Legacy applications have various problems such as lack of up to-date documentation, skilled man power, resources of the Legacy applications, and high maintenance costs. Even though the Legacy system is obsolete, it contains detailed business rules and in continuous use, because it satisfies the users' needs and forms the backbone of the information flow of organization. One of the possible solutions is to refactor or modernize those systems into a new platform. It is necessary to analyse the existing legacy system for better understanding the business logic and its functionalities. This paper analyses various techniques proposed for understanding Legacy systems in existence.
Volume: 6
Issue: 1
Page: 292-297
Publish at: 2016-02-01

Using Square Wave Input for Wireless Power Transfer

10.11591/ijece.v6i1.pp431-438
Kazuya Yamaguchi , Takuya Hirata , Ichijo Hodaka
A wireless power transfer (WPT) circuit is composed of a transmitting circuit with an AC power supply and a receiving circuit with a load, and the circuits are wirelessly connected each other. Then a designer chooses the wave form of the AC power supply. Many papers about WPT adopt a sinusoidal wave as the input. The frequency of the sinusoidal wave is generally determined to the resonant frequency of the circuit for high power transfer. Since the number of circuit elements in the power supply to generate a square wave is much less than that of a sinusoidal wave, WPT with a square wave input should be treated. In fact, some papers about WPT adopt a square wave as the input, and adjust the frequency of the square wave to the resonant frequency of the circuit. In this paper, we examine how the frequency of a square wave input affects power and efficiency of WPT circuits, and propose a procedure how to determine the frequency of the input to improve power and efficiency. Finally we discuss which wave should be adopted as an input and how the frequency of the input should be determined, regardless of whether resonant phenomena occur or not.
Volume: 6
Issue: 1
Page: 431-438
Publish at: 2016-02-01

Robust Digital Predistortion in Saturation Region of Power Amplifiers

10.11591/ijece.v6i1.pp99-105
Soon-il Hong , Kwang-Pyo Lee , Eui-Rim Jeong
This paper proposes a digital predistortion (DPD) technique to improve linearization performance when the power amplifier (PA) is driven near the saturation region. The PA is a non-linear device in general, and the nonlinear distortion becomes severer as the output power increases. However, the PA’s power efficiency increases as the PA output power increases. The nonlinearity results in spectral regrowth, which leads to adjacent channel interference, and degrades the transmit signal quality. According to our simulation, the linearization performance of DPD is degraded abruptly when the PA operates in its saturation region. To relieve this problem, we propose an improved DPD technique. The proposed technique performs on/off control of the adaptive algorithm based on the magnitude of the transmitted signal. Specifically, the adaptation normally works for small and medium signals while it stops for large signals. Therefore, harmful coefficient updates by saturated signals can be avoided. A computer simulation shows that the proposed method can improve the linearization performance compared with the conventional DPD method in highly driven PAs.
Volume: 6
Issue: 1
Page: 99-105
Publish at: 2016-02-01

Key Software Metrics and its Impact on each other for Software Development Projects

10.11591/ijece.v6i1.pp242-248
Mridul Bhardwaj , Ajay Rana
Every software development project is unique and different from repeatable manufacturing process. Each software project share different challenges related to technology, people and timelines. If every project is unique, how project manager can estimate project in a consistent way by applying his past experience. One of the major challenges faced by the project manager is to identify the key software metrics to control and monitor the project execution. Each software development project may be unique but share some common metric that can be used to control and monitor the project execution. These metrics are software size, effort, project duration and productivity. These metrics tells project manager about what to deliver (size), how it was delivered in past (productivity) and how long will it take to deliver with current team capability (time and effort). In this paper, we explain the relationship among these key metrics and how they statistically impact each other. These relationships have been derived based on the data published in book “Practical Software Estimation” by International Software Benchmarking Group. This paper also explains how these metrics can be used in predicting the total number of defects. Study suggests that out of the four key software metrics software size significantly impact the other three metrics (project effort, duration and productivity). Productivity does not significantly depend on the software size but it represents the nonlinear relationship with software size and maximum team size, hence, it is recommended not to have a very big team size as it might impact the overall productivity. Total project duration only depends on the software size and it does not depend on the maximum team size. It implies that we cannot reduce project duration by increasing the team size. This fact is contrary to the perception that we can reduce the project duration by increasing the project team size. We can conclude that software size is the important metrics and a significant effort must be put during project initiation phases to estimate the project size. As software size will help in estimating the project duration and project efforts so error in estimating the software size will have significant impact on the accuracy of project duration and effort. All these key metrics must be re-calibrated during the project development life cycle.  
Volume: 6
Issue: 1
Page: 242-248
Publish at: 2016-02-01

A Monitoring System for Integrated Management of IoT-based Home Network

10.11591/ijece.v6i1.pp375-380
Changsu Ryu , Chang-Wu Hur
Recently, the society is rapidly becoming highly integrated with the convergence of smart devices, SNS, big data, cloud, and IoT. This phenomenon is being spread more swiftly based on the wired and wireless communication infrastructure provided to most homes, as terminal devices for communication have more various functions and are being supplied to homes through a multi-vendor system and as several terminal devices are installed in each home to provide services. Particularly, various IoT terminal devices and services are being introduced to facilitate functions such as home crime prevention, gas valve control, control of electric apparatus and temperature-humidity sensors, and door control based on facial recognition, and integrated IoT-based management monitoring is required for TVs, washing machines, refrigerators, etc. Hence, in this study, a monitoring system for integrated home network management and data collection management, which solves problems of existing home network systems by connecting API Adaptor connection technology, message technology for integrated management of universal communications terminal devices and IoT devices, and data modelling technology to individual network platforms, was proposed.
Volume: 6
Issue: 1
Page: 375-380
Publish at: 2016-02-01

Replacement of Analog Automatic Voltage Regulator using Digital Technology

10.11591/ijece.v6i1.pp53-62
Ersalina Werda Mukti , Sulistyo Wijanarko , Anwar Muqorobin
Before the 90’s, many power plants in Indonesia were equipped with analog controllers and now those power plants are still in operation to produce electricity. One of those controller parts is Automatic Voltage Regulator (AVR). If a failure occurs in the AVR, the economic solution is by replacing the damaged electronic component with new component. However this method will not solve the problem if the components are not available in local market or become obsolete. Purchasing the new AVR that compatible with other controller parts cannot be done again because the analog controllers are no longer produced by the vendor. Furthermore, replacement of all the controllers with the current technology become expensive.  According to this, an alternative solution is proposed in this paper by designing an AVR that compatible with other controller parts and considering the availability of the electronic components in local market. ATmega8 microcontroller is used to implement a digital AVR and employing op amp based as its signal conditioning. The result shows that the digital AVR can reduce hardware size and power consumption. The digital AVR also meets the computation rate of the computation signal.
Volume: 6
Issue: 1
Page: 53-62
Publish at: 2016-02-01

A Method for Attitude Control Based on a Mathematical Model for an Inverted Pendulum-Type Mobile Robot

10.11591/ijece.v6i1.pp198-204
Jin-Ho Yoon , Myung-Jin Chung
A method for attitude control based on a mathematical model for an inverted pendulum-type mobile robot was proposed. The inverted pendulum-type mobile robot was designed and the mathematical modeling was conducted. The parameters of the mobile robot were estimated and the state-space model of mobile robot was obtained by the substitution of the estimated parameters into the mathematical model. The transfer function of the mobile robot is applied to generate the root-locus diagram used for the estimation of the gains of the PID controller. The attitude control method including a PID controller, non-linear elements, and integral saturation prevention was designed and simulated. The experiment was conducted by applying the method to the mobile robot. In the attitude control experiment, the performance of attitude recovery from ±12° tilted initial state with a settling time of 0.98s and a percent overshoot of 40.1% was obtained. Furthermore, the attitude maintaining robustness against disturbance was verified.
Volume: 6
Issue: 1
Page: 198-204
Publish at: 2016-02-01

A Comparison of the Query Execution Algorithms in Secure Database System

10.11591/ijece.v6i1.pp337-343
Young-Dal Jang , Ji-Hong Kim
In accordance with the database management, DAS(Database as Service) model is one solution for outsourcing. However, we need some data protection mechanisms in order to maintain the database security The most effective algorithm to secure databases from the security threat of third party attackers is to encrypt the sensitive data within the database. However, once we encrypt the sensitive data, we have difficulties in queries execution on the encrypted database. In this paper, we focus on the search process on the encrypted database. We proposed the selective tuple encryption method using Bloom Filter which could tell us the existence of the data. Finally, we compare the search performance between the proposed method and the other encryption methods we know.
Volume: 6
Issue: 1
Page: 337-343
Publish at: 2016-02-01

A New Validation Approach of a New Three-Phase High Voltage Power Supply for Microwaves Generators with one Magnetron by Phase

10.11591/ijece.v6i1.pp1-11
M. Bassoui , M. Ferfra , M. Chraygane
In order to validating the new three-phase High voltage power supply for microwave generators with one magnetron by phase, this paper presents a new validation approach to evaluate the proposed model with several evaluations. This approach is based on the calculation and measurement of the performance and the power factor of this new three-phase power supply, also the study of the operation of this new system in case of failure. The design of this power supply is composed of new three-phase transformer with magnetic shunt, supplying by phase a voltage doubler cell composed of a capacitor and a diode. Each cell in turn, supplies a single magnetron. In this paper we have presented the new three-phase transformer by its equivalent model; it’s a π  quadruple  model composed  of  storable  inductances  able  to translating the nonlinear saturation phenomena for stabilization of  the  magnetron  current. The voltage and current curves obtained by simulation with MATLAB SIMULINK are in good conformity with those obtained by experimental of conventional power supply using a single phase transformer for one magnetron. The same curves will allow us to plot the instantaneous power absorbed by each magnetron. This leads to determine the average power emitted by each magnetron, and establish the balance of the power microwave generator by computing its performance which is compared to that obtained from experimental. After that we will compute the power factor of this power supply and we will study its operation in case of failure of one or two magnetrons.
Volume: 6
Issue: 1
Page: 1-11
Publish at: 2016-02-01

Incremental Tag Suggestion for Landmark Image Collections

10.11591/ijece.v6i1.pp139-150
Sutasinee Chimlek , Punpiti Piamsa-nga
In recent social media applications, descriptive information is collected through user tagging, such as face recognition, and automatic environment sensing, such as GPS. There are many applications that recognize landmarks using information gathered from GPS data. However, GPS is dependent on the location of the camera, not the landmark. In this research, we propose an automatic landmark tagging scheme using secondary regions to distinguish between similar landmarks. We propose two algorithms: 1) landmark tagging by secondary objects and 2) automatic new landmark recognition. Images of 30 famous landmarks from various public databases were used in our experiment. Results show increments of tagged areas and the improvement of landmark tagging accuracy.
Volume: 6
Issue: 1
Page: 139-150
Publish at: 2016-02-01

New Algorithm for Fast Processing RFID System in Container Terminal

10.11591/ijece.v6i1.pp283-291
Evizal Abdul Kadir , Siti Mariyam Shamsuddin , Detri Karya , Sri Listia Rosa
The growth of world economic and increasing of trading in most of countries has impact to the number of containers export and import between countries. Some of container terminal is very busy to handle high volume of container movement. Conventional operational procedures have difficulties to handle containers movement then make slow and some issues in terminal operation for container clearance. This paper discus on proposing new algorithm to the current container terminal management system used RFID technology for fast processing and clearance. Container Terminal Management System (CTMS) is a system for port management and interface to the RFID system that used to identify container e-seal, truck and driver identity. Lack of communication and interfacing protocol made slow response during request or reply of message to the gate operator. Proposed algorithm with new procedure of request to CTMS made faster response and avoid inaccuracy of detecting container e-seal. Results of implementation new algorithm have improved to the productivity and efficiency of container terminal. Testing and implementation of this proposed system conducted in a private container terminal in Malaysia.
Volume: 6
Issue: 1
Page: 283-291
Publish at: 2016-02-01

Issues in Routing Mechanism for Packets Forwarding: A Survey

10.11591/ijece.v6i1.pp421-430
Rohit Nilkanth Devikar , Dipak V. Patil , V. Chandraprakash
Nowadays internet has become more popular to each and every one. It is very sensitive to nodes or links failure due to many known or unknown issues in the network connectivity. Routing is the important concept in wired and wireless network for packet transmission. During the packet transmission many times some of the problems occur, due to this packets are being lost or nodes not able to transmit the packets to the specific destination. This paper discusses various issues and approaches related to the routing mechanism. In this paper, we present a review and comparison of different routing algorithms and protocols proposed recently in order to address various issues. The main purpose of this study is to address issues for packet forwarding like network control management, load balancing, congestion control, convergence time and instability. We also focus on the impact of these issues on packet forwarding.
Volume: 6
Issue: 1
Page: 421-430
Publish at: 2016-02-01

QoS Design Consideration for Enterprise and Provider’s Network at Ingress and Egress Router for VoIP protocols

10.11591/ijece.v6i1.pp235-241
Manjur Kolhar , Mosleh M Abualhaj , Faiza Rizwan
Compliance with the Service Level Agreement (SLA) metric is a major challenge in a Multiprotocol Label Switching Virtual Private Network (MPLS VPN) because mandatory models must be maintained on both sides of the MPLS VPN in order to achieve end-to-end service levels. The end-to-end service of an MPLS VPN can be degraded owing to various issues such as distributed denial of service (DDoS), and Random Early Detection (RED) that prevents congestion and differentiates between legitimate and illegitimate user traffic. In this study, we propose a centralized solution that uses a SLA Violation Detector (SLAVD) and intrusion detection to prevent SLA violation.
Volume: 6
Issue: 1
Page: 235-241
Publish at: 2016-02-01

Modelling of E-Governance Framework for Mining Knowledge from Massive Grievance Redressal Data

10.11591/ijece.v6i1.pp367-374
Sangeetha G , L. Manjunatha Rao
With the massive proliferation of online applications for the citizens with abundant resources, there is a tremendous hike in usage of e-governance platforms. Right from entrepreneur, players, politicians, students, or anyone who are highly depending on web-based grievance redressal networking sites, which generates loads of massive grievance data that are not only challenging but also highly impossible to understand. The prime reason behind this is grievance data is massive in size and they are highly unstructured. Because of this fact, the proposed system attempts to understand the possibility of performing knowledge discovery process from grievance Data using conventional data mining algorithms. Designed in Java considering massive number of online e-governance framework from civilian’s grievance discussion forums, the proposed system evaluates the effectiveness of performing datamining for Big data.
Volume: 6
Issue: 1
Page: 367-374
Publish at: 2016-02-01
Show 1579 of 1897

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration