Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

28,451 Article Results

Image Mosaic Method Based on Gaussian Second-order Difference Feature Operator

10.11591/ijeecs.v15.i2.pp336-345
Chen Yong , Hao Yu-bin Hao , Zhan Di
To compose the wide visual angle and high resolution image from the sequence of images which have overlapping region in the same scene quickly and correctly, an improved SIFT algorithm which is based on D2oG interest point detector was proposed. It extracted the image feature points and generated corresponding feature descriptors by improved SIFT algorithm. Then, using the random consistency (RANSAC) algorithm purified feature point matching pairs and calculating the transformation matrix H. Last, complete the seamless mosaic of images by using the image fusion algorithm of slipping into and out. It respectively process the images which had the four typical transformations with the traditional SIFT and the proposed method. The result indicated that the number of feature pairs is fewer than SIFT algorithm and the mosaic time is shorter, and then the matching efficiency is higher than the later. This proposed method reduces the complexity of operation and improves real-time of image mosaic simultaneously.
Volume: 15
Issue: 2
Page: 336-345
Publish at: 2015-08-01

Time Series Prediction Using Radial Basis Function Neural Network

10.11591/ijece.v5i4.pp765-771
Haviluddin Haviluddin , Imam Tahyudin
This paper presents an approach for predicting daily network traffic using artificial neural networks (ANN), namely radial basis function neural network (RBFNN) method. The data is gained from 21-24 June 2013 (192 samples series data) in ICT Unit of Mulawarman University, East Kalimantan, Indonesia. The results of measurement are using statistical analysis, e.g. sum of square error (SSE), mean of square error (MSE), mean of absolute percentage error (MAPE), and mean of absolute deviation (MAD). The results show that values are the same, with different goals that have been set are 0.001, 0.002, and 0.003, and spread 200. The smallest MSE value indicates a good method for accuracy. Therefore, the RBFNN model illustrates the proposed best model to predict daily network traffic.
Volume: 5
Issue: 4
Page: 765-771
Publish at: 2015-08-01

Lip Image Feature Extraction Utilizing Snake’s Control Points for Lip Reading Applications

10.11591/ijece.v5i4.pp720-728
Faridah Faridah , Balza Achmad , Binar Listyana S
Snake is an active contour model that catches and locks image edges, then localizes them accurately. The simplest Snake consists of a set of control points that are connected by straight lines to form a closed loop. This paper discusses the application of Snake to find the visual feature of lip shapes. In most previous papers, visual feature of lip shapes is represented by Snake’s contour. In this paper, the feature of lip shapes is represented by six control points on lip Snake’s contours. By simply utilizing six control points representing one lip Snake’s contour, it is expected to reduce the burden on pattern recognition stage. To demonstrate the performance of this method, some analysis has been conducted on the effect of lip conditions and illumination. The results shows that the overall lip feature extraction using the proposed method is better for lips that have more contrast to the surrounding skin, optimum room illumination that gives the best result is in the range of 330-340 lux.
Volume: 5
Issue: 4
Page: 720-728
Publish at: 2015-08-01

Security for Mobile Agents: Trust Estimate for Platforms

10.11591/ijeecs.v15.i2.pp381-389
Razouki Hassan , Hair Abdellatif
The mobile agent has been seen as a promising distributed computing technology. The mobility characteristic of mobile agent makes it to travel often in open network. In this scenario, it is obvious that the mobile agents are vulnerable to various security threats. Protecting free-roaming mobile agents from malicious host and from other mobile agents has drawn much attention in recent years. The protection of mobile agents is considered as one of the greatest challenges of security, because the platform of execution has access to all the components of the mobile agent. In this paper, we present a new architecture paradigm of mobile agents, which allows the separation of the implementation tasks of the agent and its security mechanisms. Our approach is based on using two strategies of adaptation to adapt the mobile agent security at runtime, depending on the sensitivity of the services required to perform the duties of the agent and the degree of confidence of the visited platforms.
Volume: 15
Issue: 2
Page: 381-389
Publish at: 2015-08-01

DSS using AHP in Selection of Lecturer

10.11591/ijict.v4i2.pp79-85
Adriyendi Adriyendi , Yeni Melia
This paper was conducted to apply Analytical Hierarcy Process (AHP), applied as Decision Support System (DSS) model in selection of lecturer at STAIN Batsangkar. Data collected by through observation and interview done in shares of administration academic data center at college. Here in  data analyzed to learn the pattern from method used and added with the reference from literature. Experiment done using Microsoft Excel and Expert Choice Software, known that method can yield the optimal decision in selection of lecturer. There by the method recommended to be applied to getting optimal result in decision making.
Volume: 4
Issue: 2
Page: 79-85
Publish at: 2015-08-01

One-Bit Hard Combination Decision Scheme for Cooperative Spectrum Sensing in Cognitive Radio

10.11591/ijict.v4i2.pp66-73
Md. Shamim Hossain , Md. Ibrahim Abdullah , Mohammad Alamgir Hossain
In this paper, the performance of 1-bit hard combination decision scheme for cooperative spectrum sensing in Cognitive Radio has been studied to maximize the probability of primary user detection. Energy detector model is used to observe the presence of primary user signal. Simulation result shows that the probability of missed detection is decreasing for both conventional and 1-bit hard combination OR rule with increasing the probability of false alarm correspondingly. It also has demonstrated that 1-bit hard combination decision scheme exhibits comparable performance with the conventional one-bit scheme and thus achieves a good tradeoff between performance and complexity.
Volume: 4
Issue: 2
Page: 66-73
Publish at: 2015-08-01

Optimization of Economic Load Dispatch with Unit Commitment on Multi Machine

10.11591/ijape.v4.i2.pp47-60
Ranjeet Kumar , Rekha Jha , Ramjee Prasad Gupta
Economic load dispatch (ELD) and Unit Commitment (UC) are significant research applications in power systems that optimize the total production cost of the predicted load demand. The UC problem determines a turn-on and turn-off schedule for a given combination of generating units, thus satisfying a set of dynamic operational constraints. ELD optimizes the operation cost for all scheduled generating units with respect to the load demands of customers. The first phase in this project is to economically schedule the distribution of generating units using Gauss seidal and the second phase is to determine optimal load distribution for the scheduled units using dynamic programming method is applied to select and choose the combination of generating units that commit and de-commit during each hour. These precommitted schedules are optimized by dynamic programming method thus producing a global optimum solution with feasible and effective solution quality, minimal cost and time and higher precision. The effectiveness of the proposed techniques is investigated on two test systems consisting of five generating units and the experiments are carried out using MATLAB R2010b software. Experimental results prove that the proposed method is capable of yielding higher quality solution including mathematical simplicity, fast convergence, diversity maintenance, robustness and scalability for the complex ELD-UC problem.
Volume: 4
Issue: 2
Page: 47-60
Publish at: 2015-08-01

New Method of Content Based Image Retrieval based on 2-D ESPRIT Method and the Gabor Filters

10.11591/ijeecs.v15.i2.pp313-320
Chawki Youness , El Asnaoui Khalid , Ouanan Mohammed , Aksasse Brahim
We propose, in this paper, a new method for Content Based Image Retrieval (CBIR) by exploiting the digital image content. Our method is based on the representation of the digital image content by a characteristics vector of the indexed image. Indeed, we have exploited the image texture to extract its characteristics and for constructing a new descriptor vector by combining the Bidimensional High Resolution Spectral Analysis 2-D ESPRIT (Estimation of Signal Parameters via Rotationnal Invariance Techniques) method and Gabor filter. To evaluate the performance, we have tested our approach on Brodatz image database. The results show that the representation of the digital image content appears significant in research of imaging information.
Volume: 15
Issue: 2
Page: 313-320
Publish at: 2015-08-01

Integration of Solar Power Plant in Distribution Network

10.11591/ijece.v5i4.pp656-668
Srete N. Nikolovski , Predrag Ž. Marić , Ljubomir V. Majdandžić
This paper presents the integration of the solar power plant SE Gumiimpex, rated power of  1 MW in Croatian distribution network. Basic data of solar power plant are presented as well as the analysis of its impact on the distribution network. Power quality measurements, seven days before and seven days after the connection of PV plant to the grid are performed and obtained power quality indices are compared to those stated in the power quality standard HRN EN 50160/2012 and Croatian grid code. There are also presented results of the simulation of protection relays selection and coordination
Volume: 5
Issue: 4
Page: 656-668
Publish at: 2015-08-01

Impact of Buried Conductor Length on Computation of Earth Grid Resistance

10.11591/ijape.v4.i2.pp61-69
S. D. Buba , W. F. Wan Ahmad , Mohammed Z. A. Ab Kadir , C. Gomes , J. Jasni , M. Osman
Effective design of substation earth grid implies achieving low earth grid resistance and fulfillment of the safety criteria at the lowest possible cost. This paper presents an evaluation of IEEE Standard 80-2000 Equations 50 to 52 to determine the impact of buried conductor length on computation of earth grid resistance. Calculated results indicated that a saturation point is reached beyond which further addition of more conductor length does not significantly reduce the earth grid resistance but incurs more economic implications. These were validated by earth grids designed using CDEGS where good agreement between the calculated and simulated results was found.
Volume: 4
Issue: 2
Page: 61-69
Publish at: 2015-08-01

A Scalable Large Format Display Based on Zero Client Processor

10.11591/ijece.v5i4.pp714-719
Sang Don Kim , Seung Eun Lee
This paper proposes zero client module that targets Large  Format Display (LFD) system for display wall. Increased resolution in modern LFD requires a high bandwidth channel and a high performance display controller to transfer the image data to the monitor. The key idea is to use a Gagabit-Etherent communication based Daisy-Chain to transfer an image data. This communication supports sufficient bandwidth for image data transfer. As a result, we implement the LFD system using tha zero  client module and LFDmonitors.
Volume: 5
Issue: 4
Page: 714-719
Publish at: 2015-08-01

Design of Slotted and Slotless AFPM Synchronous Generators and their Performance Comparison Analysis by using FEA Method

10.11591/ijece.v5i4.pp810-820
Saint Saint Soe , Yan Aung Oo
Axial-flux permanent magnet machines are popular and widely used for many applications due to their attractive features such as light weight, low noise, high torque, robust and higher efficiency due to lack of field excitation. The main essence of this paper is to perform slotted and slotless axial-flux permanent magnet synchronous generator design based on theoretical sizing equations and then finite element analysis is reinforcement in order to get a more reliable and accuracy machine design. A comparative study of machine design and performances over the same rating but different configurations i.e., slotted and slotless are also discussed. And then, finite-element method (FEM) software was made for the slotted stator and slotless stator (AFPMSG) in order to compare their magnetic flux density and efficiency. The AFPMSG topology considered in this paper is a three-phase double-rotor single-stator topology with 16 pole-pairs, 2kW rated power and 188 rpm rated speed.
Volume: 5
Issue: 4
Page: 810-820
Publish at: 2015-08-01

Research on Roll Variable Speed Grinding Based on Adaptive Fuzzy Control

10.11591/ijeecs.v15.i2.pp284-293
Bi Junxi , Gao Qing , Wang Shuwei
The traditional method of improving the machining precision is mainly on account of changes in the workpiece and the grinding wheel in grinding process, including, considered the weakest of the workpiece from the axial stiffness, using center frame to increase the stiffness of the workpiece, take error compensation, and analyze the mechanism of gear grinding and the suppression measures of variable speed grinding and grinding chatter. Based on the analysis of the relationship among gear grinding mechanism, variable speed grinding and grinding chatter suppression and grinding precision, the variable speed micro-feed grinding process strategy based on adaptive fuzzy control is put up, that is according to the roller material and structure to reasonably determine the characteristics of grinding wheel and the parameters of grinding process. And with full consideration of roll grinders, changes of roller system along the axial stiffness and the deformation control in the roll grinding process, a new strategy of variable speed grinding micro-feed adaptive control optimization based on adaptive fuzzy control is proposed, which for improving the accuracy of the grinding roll presents a new and effective solution.
Volume: 15
Issue: 2
Page: 284-293
Publish at: 2015-08-01

Security against Timing Analysis Attack

10.11591/ijece.v5i4.pp759-764
Deevi Radha Rani , S Venkateswarlu
Timing attack is the type of side-channel attack involves the time taken to complete critical operations. Securing crypto processor from timing attack is critical issue. This paper implements the Bernstein’s Timing Attack and timing attack based on hamming weight. The countermeasures of Bernstein’s Timing attack are implemented in our experimental test bed and their performance is compared.  This paper also proposes the key recovery method based on timing attack using hamming weight of the key.
Volume: 5
Issue: 4
Page: 759-764
Publish at: 2015-08-01

Investigation of Dependent Rikitake System to Initiation Point

10.11591/ijape.v4.i2.pp70-76
Yousof Gholipour , Amin Ramezani , Mahmood Mola
In this paper we investigate depending of the Rikitake system to initiation point, and monitor changing behavior of this system. We will have 4 initiation points in Cartesian system. We at 4 positions, will monitor behavior of this system, while holding constant other values, and after per position, will draw operation of system on axes of x, y, z and 3-D plot. We want to know, what is the effect of initiation point on Rikitake system? Numerical simulations to illustrate the effect of initiation point are presented, and at the end conclusions and comparing the states together are obtained.
Volume: 4
Issue: 2
Page: 70-76
Publish at: 2015-08-01
Show 1613 of 1897

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration