Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

28,451 Article Results

Survey on Mutation-based Test Data Generation

10.11591/ijece.v5i5.pp1164-1173
Hanh Le Thi My , Binh Nguyen Thanh , Tung Khuat Thanh
The critical activity of testing is the systematic selection of suitable test cases, which be able to reveal highly the faults. Therefore, mutation coverage is an effective criterion for generating test data. Since the test data generation process is very labor intensive, time-consuming and error-prone when done manually, the automation of this process is highly aspired. The researches about automatic test data generation contributed a set of tools, approaches, development and empirical results. In this paper, we will analyse and conduct a comprehensive survey on generating test data based on mutation. The paper also analyses the trends in this field.
Volume: 5
Issue: 5
Page: 1164-1173
Publish at: 2015-10-01

Networking Heterogeneous Microcontroller based Systems through Universal Serial Bus

10.11591/ijece.v5i5.pp992-1002
Sastry Kodanda Rama Jammalamadaka , Valluru Sai Kumar Reddy , Smt J Sasi Bhanu
Networking heterogeneous embedded systems is a challenge. Every distributed embedded systems requires that the network is designed specifically considering the heterogeneity that exits among different Microcontroller based systems that are used in developing a distributed embedded system. Communication architecture, which considers the addressing of the individual systems, arbitration, synchronisation, error detection and control etc., needs to be designed considering a specific application. The issue of configuring the slaves has to be addressed. It is also important that the messages, flow of the messages across the individual ES systems must be designed. Every distributed embedded system is different and needs to be dealt with separately. This paper presents an approach that addresses various issues related to networking distributed embedded systems through use of universal serial bus communication protocol (USB). The approach has been applied to design a distributed embedded that monitors and controls temperatures within a Nuclear reactor system.
Volume: 5
Issue: 5
Page: 992-1002
Publish at: 2015-10-01

Seasonal and Diurnal Variability of Rain Heights at An Equatorial Station

10.11591/ijece.v5i5.pp1134-1142
Abayomi Isiaka Yussuff , Nor Hisham Haji Khamis
Seasonal and diurnal rain heights variation at Universiti Teknologi Malaysia, Johor was studied. Slant path rain attenuation prediction and modeling is crucial to satellite equipment design; a major input is the rain height. One year meteorological ground-based, S-band, 3D RAPIC precipitation radar data at 500m resolution sourced from the Malaysian Meteorological Department was complemented with two-year TRMM PR data sourced from JAXA Earth Observation Research Center. After filtering, sorting, extraction and decoding of the data, vertical reflectivity profiles were constructed; from which rain height parameters were extracted. TRMM PR processed monthly (3A25) and daily (2A23) rainfall precipitation data were similarly used to obtain rain height parameters to investigate the seasonal and diurnal variations. Results from this work suggested that rain height parameters are influenced by both seasonal and diurnal variations. Higher seasonal variability was observed during south-west and pre-southwest monsoons. Rain heights were also observed to be higher in the night than in the day time.
Volume: 5
Issue: 5
Page: 1134-1142
Publish at: 2015-10-01

A Mathematical Model for Minimizing Add-On Operational Cost in Electrical Power Systems Using Design of Experiments Approach

10.11591/ijece.v5i5.pp948-956
Zakaria Al-Omari , A. Hamzeh , Sadeq A. Hamed , A. Sandouk , G. Aldahim
One of the key functions of the Distribution System Operators (DSOs) ofelectrical power systems (EPS) is to minimize the transmission anddistribution power losses and consequently the operational cost. Thisobjective can be reached by operating the system in an optimal mode which is performed by adjusting control parameters such as on-load tap changer (OLTC) settings of transformers, generator excitation levels, and VAR compensators switching. The deviation from operation optimality will result in additional losses and additional operational cost of the power system. Reduction of the operational cost increases the power system efficiency and provides a significant reduction in total energy consumption. This paper proposes a mathematical model for minimizing the additional (add-on) costs based on Design of Experiments (DOE). The relation between add-on operational costs and OLTC settings is established by means of regression statistical analysis. The developed model is applied to a 20-bustest network. The regression curve fitting procedure requires simulation experiments which have been carried out by the DigSilent PowerFactory 13.2 Program for performing network power flow. The results show the effectiveness of the model. The research work raises the importance the power system operation management of the EPS where the Distribution System Operator can avoid the add-on operational costs by continuous correction to get an operation mode close to optimality.
Volume: 5
Issue: 5
Page: 948-956
Publish at: 2015-10-01

Study of Data Security Algorithms using Verilog HDL

10.11591/ijece.v5i5.pp1092-1101
M. Sumathi , D. Nirmala , R. Immanuel Rajkumar
This paper describes an overview of data security algorithms and its performance evaluation. AES, RC5 and SHA algorithms have been taken under this study. Three different types of security algorithms used to analyze the performance study. The designs were implemented in Quartus-II software. The results obtained for encryption and decryption procedures show a significant improvement on the performance of the three algorithms. In this paper, 128-bit AES, 64-bit of RC5 and 512-bit of SHA256 encryption and Decryption has been made using Verilog Hardware Description Language and simulated using ModelSim.
Volume: 5
Issue: 5
Page: 1092-1101
Publish at: 2015-10-01

Optimal Design of Switched Reluctance Motor Using PSO Based FEM-EMC Modeling

10.11591/ijece.v5i5.pp887-895
Mouellef Sihem , Bentounsi Amar , Benalla Hocine
This paper aims to optimize the design of a prototype of a 6/4 Switched Reluctance Motor (SRM) using the Particle Swarm Optimization (PSO) algorithm. The geometrical parameters to optimize are the widths of the stator and rotor teeth due to their significant effects on the prototype design and the performances in terms of increased average torque and reduced torque ripple. The studied 3kW SRM is modeled using a numerical-analytical approach based on a coupled Finite Element Method with Equivalent Magnetic Circuit (FEM-EMC). The simulations are performed under MATLAB environment with user-friendly software. The optimal results found are discussed, compared against those obtained by the Genetic Algorithms (GA) and showed a significant improvement in average torque.
Volume: 5
Issue: 5
Page: 887-895
Publish at: 2015-10-01

New Method to Optimize Initial Point Values of Spatial Fuzzy c-means Algorithm

10.11591/ijece.v5i5.pp1035-1044
Iman Omidvar Tehrani , Subariah Ibrahim , Habib Haron
Fuzzy based segmentation algorithms are known to be performing well on medical images. Spatial fuzzy C-means (SFCM) is broadly used for medical image segmentation but it suffers from optimum selection of seed point initialization which is done either manually or randomly. In this paper, an enhanced SFCM algorithm is proposed by optimizing the SFCM initial point values. In this method in order to increasing the algorithm speed first the approximate initial values are determined by calculating the histogram of the original image. Then by utilizing the GWO algorithm the optimum initial values could be achieved. Finally By using the achieved initial values, the proposed method shows the significant improvement in segmentation results. Also the proposed method performs faster than previous algorithm i.e. SFCM and has better convergence. Moreover, it has noticeably improved the clustering effect.
Volume: 5
Issue: 5
Page: 1035-1044
Publish at: 2015-10-01

Comprehensive Algorithmic Review and Analysis of LDPC Codes

10.11591/ijeecs.v16.i1.pp111-130
Waheed Ullah , Abid Yahya
Due to the increasing popularity of LDPC codes and its demand for future applications, first time in this paper, LDPC coding techniques have been systematically summarized and analyzed. The paper gives the comprehensive review of LDPC encoder, decoder and its architecture for simulation and implementation. The paper is specially intended for giving an insight of the algorithmic overview of the LDPC encoder, decoder and its architecture for research and practical purposes. The original belief propagation algorithm (BPA) , logarithmic model of BPA , and the other simplified form of the logarithmic sum product algorithms (SPA) has been elaborated and analyzed for medium and short length codes under AWGN channel
Volume: 16
Issue: 1
Page: 111-130
Publish at: 2015-10-01

A New Approach for SAR Image Denoising

10.11591/ijece.v5i5.pp984-991
Murali Mohan Babu. Y , Subramanyam M. V. , Giri Prasad. M. N
In synthetic aperture radar (SAR)  imaging, the transmitted pulses from space born antenna interacts with ground objects and returned energy or back scattered energy will be collected  to get backscattered image. In this process, a speckle noise will be added because of the coherent imaging system and  makes the study of SAR images very difficult. For better SAR image processing, the speckle has to be removed in the initial stages of processing  and maintain all texture features efficiently. The BM3D method is generally considered as state of art method in denoising of SAR images. In this paper, it is proposed a technique to despeckle the speckle noise to the maximum extent while maintaining the edge characteristics.
Volume: 5
Issue: 5
Page: 984-991
Publish at: 2015-10-01

Wireless Mote Based Explosive Detection Land Rover using EC Sensor (WEDLRE)

10.11591/ijece.v5i5.pp1128-1133
Vaddi Manasa , K.Raghava Rao
As continues attacks in the world from terrorists countries warning us to be aware of those attacks like Explosive attacks, hijacks etc., which will cause huge damage to the life and property in all over the world. Among these explosive attacks is most effective to life and wealth of a country. To overcome such attacks and to save the life an intense research has done to know the characterization of the explosives, Detection Methods are also improvised. To save our next generation and escape from threats a new detection methodology has been implemented to detect the explosives at all places and the proposed system is called “Wireless Explosive detection Land Rover using ECS”. In this system chemical sensors, Quartz sensors etc., are used on the motes. By using the RF Camera a continuous surveillance can be done throughout the places like malls, rooms, houses, streets, etc., if any explosive is detected then without any delay the explosive location and timeout to explode and area that effect if explode details will be sent to the Police control room to diffuse the explode device with in time. A message will also be sent to the nearby hospitals to rescue the people.
Volume: 5
Issue: 5
Page: 1128-1133
Publish at: 2015-10-01

Design Calculation of Parabolic Trough Solar Thermal System and Three-phaseTurbo Alternator

10.11591/ijece.v5i5.pp939-947
Theingi Htun , Myo Thet Tun
Solar energy can be converted into thermal energy with the help of solarcollectors. Electricity can be produced directly from solar energy usingphotovoltaic devices or indirectly from steam generators using solar thermal collectors to heat a working fluid. This research is using the conversion of solar energy into electricity in a closed cycle driven by natural convection. It would mean that electricity is cheaper than from any other renewable technology and cheaper than from fossil fuels. This paper describes converting thermal energy collected by solar collector to electricity by using turbine. Anywhere in Myanmar will cheaply use electricity by using solar turbine generator. Remote areas will improve more and more when getting the efficient electricity. The design calculation and performance predication of 1 MVA turbo-alternator/generator are also mentioned. Design calculation of absorbed flux, useful heat gain and exit temperature is described. And then development of two-tank thermal storage system that uses molten salt as the heat transfer fluid is described.
Volume: 5
Issue: 5
Page: 939-947
Publish at: 2015-10-01

Path Loss Modeling of WLAN and WiMAX Systems

10.11591/ijece.v5i5.pp1083-1091
Imran Israr , Mahmood Ashraf Khan , Shahzad A. Malik , Shahid A. Khan , Mustafa Shakir
With the advancement in technology, there was need for efficient and high speed internet through which we could have access to multiple networks as per the user requirement. WLAN met this need to some extent but, due to its low range it was not recommended commercially. With the introduction of WiMAX there was an emerging need to select the best network amongst WiMAX or WLAN depending upon the user location. Pathloss with respect to these particular networks also needs to be compared. In this paper we compare the pathloss modelling for WiMAX and WLAN systems. Different Models have been compared with each other to know which model performs better by keeping same simulation environment. Path Loss models used for WLAN are Okumura, Hata, Cost-231 and Free Space Path Loss whereas models used for WiMAX are Free Space Path Loss, Okumura-Hata, Cost231-Hata and Stanford University Interim. In case of WiMAX three different scenarios Urban, Sub-Urban and Rural is considered where as in case of WLAN only outdoor environment is considered. With the Path Loss comparison, power received for these two technologies; WiMAX, and WLAN is also simulated. MATLAB is the tool used for simulations. Antenna Specifications for WiMAX and WLAN is kept same for all simulation environments.
Volume: 5
Issue: 5
Page: 1083-1091
Publish at: 2015-10-01

A Review of Solar PV-Grid Parity in Akure, South-West Nigeria

10.11591/ijece.v5i5.pp879-886
Adegoke Oladipo Melodi , Sola Richard Famakin
The abundance of solar energy in Akure, South-West Nigeria and its feasibility as an alternative energy source has been proven. However, cheap, Government subsidized but unreliable grid electricity and high cost of solar equipment are considered the major hindrances to deployment of solar energy for improved power supply and environmental sustainability. An earlier work pointed out realistic pricing of electricity, reduced cost of solar equipment and reduction in solar cell degradation factor as major factors capable of speeding up parity hence, motivating solar energy consumption. It showed that parity is attainable within 14 years. Documented significant improvements in these factors in recent times are the motivations for this review. This review cost-comparatively re-assesses both sources of energy under the prevailing National electricity policy and market realities using simple mathematical and graphical modeling techniques. This is with a view to determining a new timing for parity of solar energy with grid supply. Results showed that solar PV-grid energy cost parity is now attainable within 6 years in the study region. It was also observed that sustained improvement in grid energy unit cost and reduction in cost of solar equipment and accessories may accelerate solar-grid energy parity to less than three years.
Volume: 5
Issue: 5
Page: 879-886
Publish at: 2015-10-01

A New Approach Based on Quantum Clustering and Wavelet Transform for Breast Cancer Classification: Comparative Study

10.11591/ijece.v5i5.pp1027-1034
Nezha Hamdi , Khalid Auhmani , Moha.M’Rabet Hassani
Feature selection involves identifying a subset of the most useful features that produce the same results as the original set of features. In this paper, we present a new approach for improving classification accuracy. This approach is based on quantum clustering for feature subset selection and wavelet transform for features extraction. The feature selection is performed in three steps. First the mammographic image undergoes a wavelet transform then some features are extracted. In the second step the original feature space is partitioned in clusters in order to group similar features. This operation is performed using the Quantum Clustering algorithm. The third step deals with the selection of a representative feature for each cluster. This selection is based on similarity measures such as the correlation coefficient (CC) and the mutual information (MI). The feature which maximizes this information (CC or MI) is chosen by the algorithm. This approach is applied for breast cancer classification. The K-nearest neighbors (KNN) classifier is used to achieve the classification. We have presented classification accuracy versus feature type, wavelet transform and K neighbors in the KNN classifier. An accuracy of 100% was reached in some cases.
Volume: 5
Issue: 5
Page: 1027-1034
Publish at: 2015-10-01

A Predictive Model for Mining Opinions of an Educational Database Using Neural Networks

10.11591/ijece.v5i5.pp1158-1163
M R Narasinga Rao , Deepthi Gurram , Sai Mahathi Vadde , Sathish Tallam , N. Sai Chand , L. Kiran
Assessing the performance of an educational institute is a prime concern in an educational scenario. Educational Data Mining (EDM) considers several tasks originated from an educational context. One of the tasks identified is providing feedback for supporting instructors, administrators, teachers, course authors in decision making and thereby enable them to take appropriate remedial action. In this research, we have developed a prototype Neural Network Model which is trained to predict the performance of an educational institution. A Multilayer Perceptron Neural Network (MLP) model had been developed for this proposed research. The network is trained by back propagation algorithm. Data was obtained from a well-defined questionnaire consisting of 14 questions in the domains namely Academic Schedule, International Exposure, Jobs and Internship, Quality of the college, and Life at Campus. The results of these questions have been taken as inputs and performance of the institute has been considered as the output. To, validate the results generated by the network, statistical techniques have been used for the purpose. In this proposed research performance of an educational institution has been predicted. The results generated by the Neural Network and the statistical techniques have been compared in this research and it is observed that, both the methods have generated accurate results. The results have been considered based on the Normalized System Error (NSE) values of the network. A prototype Neural Network model has been developed to assess the performance of an educational institution.
Volume: 5
Issue: 5
Page: 1158-1163
Publish at: 2015-10-01
Show 1599 of 1897

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration