Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,905 Article Results

Adaptive Adjustment of PSO Coefficients Taking the Notion from the Bee Behavior in Collecting Nectar

10.11591/ijece.v6i5.pp2470-2477
Abbas Fadavi , Karim Faez , Zeinab Famili
In particle swarm optimization, a set of particles move towards the global optimum point according to their experience and experience of other particles. Parameters such as particle rate, particle best experience, the best experience of all the particles and particle current position are used to determine the next position of each particle. Certain relationships received the input parameters and determined the next position of each particle. In this article, the relationships are accurately assessed and the amount of the effect of input parameters is horizontally set. To set coefficients adaptively, the notion is taken from bee behavior in collecting nectar. This method was implemented on software and examined in the standard search environments. The obtained results indicate the efficiency of this method in increasing the rate of convergence of particles towards the global optimum.
Volume: 6
Issue: 5
Page: 2470-2477
Publish at: 2016-10-01

Five-Phase Permanent Magnetic Synchronous Motor Fed by Fault Tolerant Five Phase Voltage Source Inverter

10.11591/ijece.v6i5.pp1994-2004
Hichem Kesraoui , Hamdi Echeikh , Atif Iqbal , Med Faouzi Mimouni
Multiphase machines have gained attention in numerous fields of pplications such as Aircraft, ship propulsion, petrochemical and automobiles, where high reliability is required. The additional number of phases guarantees that the system continues to operate in faulty conditions compared to the traditional three-phase machine due to the high degree of freedom. Among faults able to affect multiphase system, break between a machine phase and the voltage source inverter (VSI) degrade the performance of the control. In this paper, a five-phase permanent magnet synchronous machine (PMSM) is fed through a fault tolerant voltage source inverter with new structure to ensure drive continuity when open circuit occurs. The five phase PMSM is controlled with fuzzy logic regulator to minimize disturbance impact that can arise fault condition. Paper is accomplished with real time simulations using MATLAB-Simulink in order to validate the new topology and show the effectiveness of the proposed solution.
Volume: 6
Issue: 5
Page: 1994-2004
Publish at: 2016-10-01

An Unsupervised Classification Technique for Detection of Flipped Orientations in Document Images

10.11591/ijece.v6i5.pp2140-2149
Vijayashree CS , Shobha Rani , Vasudev T
Detection of text orientation in document images is of preliminary concern prior to processing of documents by Optical Character Reader. The text direction in document images should exist generally in a specific orientation, i.e.,   text direction for any automated document reading system. The flipped text orientation leads to an unambiguous result in such fully automated systems. In this paper, we focus on development of text orientation direction detection module which can be incorporated as the perquisite process in automatic reading system. Orientation direction detection of text is performed through employing directional gradient features of document image and adapts an unsupervised learning approach for detection of flipped text orientation at which the document has been originally fed into scanning device. The unsupervised learning is built on the directional gradient features of text of document based on four possible different orientations. The algorithm is experimented on document samples of printed plain English text as well as filled in pre-printed forms of Telugu script. The outcome attained by algorithm proves to be consistent and adequate with an average accuracy around 94%.
Volume: 6
Issue: 5
Page: 2140-2149
Publish at: 2016-10-01

ENPP: Extended Non-preemptive PP-aware Scheduling for Real-time Cloud Services

10.11591/ijece.v6i5.pp2291-2299
Fereshteh Hoseini , Mostafa Ghobaei Arani , Alireza Taghizadeh
By increasing the use of cloud services and the number of requests to processing tasks with minimum time and costs, the resource allocation and scheduling, especially in real-time applications become more challenging. The problem of resource scheduling, is one of the most important scheduling problems in the area of NP-hard problems. In this paper, we propose an efficient algorithm is proposed to schedule real-time cloud services by considering the resource constraints. The simulation results show that the proposed algorithm shorten the processing time of tasks and decrease the number of canceled tasks.
Volume: 6
Issue: 5
Page: 2291-2299
Publish at: 2016-10-01

Review of IDS Develepment Methods in Machine Learning

10.11591/ijece.v6i5.pp2432-2436
Abdulla Aburomman , Mamun Bin Ibne Reaz
Due to the rapid advancement of knowledge and technologies, the problem of decision making is getting more sophisticated to address, therefore the inventing of new methods to solve it is very important. One of the promising directions in machine learning and data mining is classifier combination. The popularity of this approach is confirmed by the still growing number of publications. This review paper focuses mainly on classifier combination known also as combined classifier, multiple classifier systems, or classifier ensemble. Eventually, recommendations and suggestions have also included.
Volume: 6
Issue: 5
Page: 2432-2436
Publish at: 2016-10-01

Switching Algorithm for Leakage Current Reduction in a PV- No Transformer Inverter System

10.11591/ijeecs.v4.i1.pp52-56
M. N. H. Khan , M. R. Hasan , M. K. Alam
Electricity generation purposes renewable energy brings a important role especially Photovoltaic (PV) panels that can be covered our basic energy (electricity) needs. This photovoltaic panels cover a domestic level (solar power for home), commercially (solar power for commercial applications) or at the community level.  Here used this photovoltaic panel as an input of PV-transformer-less inverter topology which has been compared with existed H6 transformer-less inverter topology. It’s possible to reduce the leakage current with inclined the output voltage that has been shown here by using proposed topology.  This topology is made by using two extra switches with filter. Moreover, overall system actually verified with Pulse Width Modulation (PWM) switching technique.
Volume: 4
Issue: 1
Page: 52-56
Publish at: 2016-10-01

Hybridation of Labeling Schemes for Efficient Dynamic Updates

10.11591/ijeecs.v4.i1.pp184-194
Su Cheng Haw , Samini Subramaniam , Wei Siang Lim , Fang Fang Chua
With XML as the leading standard for data representation over the Web, it is crucial to store and query XML data. However, relational databases are the dominant database technology in most organizations. Thus, replacing relational database with a pure XML database is not a wise choice. One most prominent solution is to map XML into relational database. This paper introduces a robust labeling scheme which is a hybrid labeling scheme combining the beauty features of extended range and ORDPATH schemes to supports dynamic updates. In addition, we also proposed a mapping scheme based on the hybrid labeling scheme. Our proposed approach is evaluated in terms of (i) loading time, (ii) storage size, (iii) query retrieval time, and (iv) dynamic updates time, as compared to ORDPATH and ME schemes. The experimental evaluation results shows that our proposed approach is scalable to support huge datasets and dynamic updates.
Volume: 4
Issue: 1
Page: 184-194
Publish at: 2016-10-01

SIP Authentication Protocols Based On Elliptic Curve Cryptography: Survey and comparison

10.11591/ijeecs.v4.i1.pp231-239
Mourade Azrour , Mohammed Ouanan , Yousef Farhaoui
Session Initiation Protocol (SIP) is the most popular signaling protocol using in order to establish, modify and terminate the session multimedia between different participants. It was selected by the Third Generation Project Partnership (3GPP) as a multimedia application protocol in 3G mobile networks. SIP is the protocol currently used for signaling ToIP calls.  The security of SIP is becoming more and more important. Authentication is the most important security service required by SIP. To ensure a secured communication, many SIP authentication protocols have been proposed. This work provides an overview of the proposed schemes based on elliptic curve cryptography. Those proposed schemes are analyzed in security consideration and the computational cost.
Volume: 4
Issue: 1
Page: 231-239
Publish at: 2016-10-01

Efficiency of JSON approach for Data Extraction and Query Retrieval

10.11591/ijeecs.v4.i1.pp203-214
Mohd Kamir Yusof , Mustafa Man
Students’ Information System (SIS) in Universiti Sultan Zainal Abidin (UniSZA) handles thousands of records on the information of students, subject registration, etc. Efficiency of storage and query retrieval of these records is the matter of database management especially involving with huge data. However, the execution time for storing and retrieving these data are still considerably inefficient due to several factors. In this contribution, two database approaches namely Extensible Markup Language (XML) and JavaScript Object Notation (JSON) were investigated to evaluate their suitability for handling thousands records in SIS. The results showed JSON is the best choice for storage and query speed. These are essential to cope with the characteristics of students’ data. Whilst, XML and JSON technologies are relatively new to date in comparison to the relational database. Indeed, JSON technology demonstrates greater potential to become a key database technology for handling huge data due to an increase of data annually.
Volume: 4
Issue: 1
Page: 203-214
Publish at: 2016-10-01

A Study on MapReduce: Challenges and Trends

10.11591/ijeecs.v4.i1.pp176-183
Sachin Arun Thanekar , K. Subrahmanyam , A. B. Bagwan
Nowadays we all are surrounded by Big data. The term ‘Big Data’ itself indicates huge volume, high velocity, variety and veracity i.e. uncertainty of data which gave rise to new difficulties and challenges. Big data generated may be structured data, Semi Structured data or unstructured data. For existing database and systems lot of difficulties are there to process, analyze, store and manage such a Big Data. The Big Data challenges are Protection, Curation, Capture, Analysis, Searching, Visualization, Storage, Transfer and sharing. Map Reduce is a framework using which we can write applications to process huge amount of data, in parallel, on large clusters of commodity hardware in a reliable manner. Lot of efforts have been put by different researchers to make it simple, easy, effective and efficient. In our survey paper we emphasized on the working of Map Reduce, challenges, opportunities and recent trends so that researchers can think on further improvement. 
Volume: 4
Issue: 1
Page: 176-183
Publish at: 2016-10-01

Private Cloud Storage Using OpenStack with Simple Network Architecture

10.11591/ijeecs.v4.i1.pp155-164
Albert Sagala , Ruth Marlina Hutabarat
The development of cloud computing was highly developed and increasingly in demand by many parties. Cloud computing was very helpful to user to perform data storage without preparing own physical device. Cloud storage is a part of cloud computing where it can facilitate user to upload and download files, view file status. The main barrier to implement the private cloud was the difficulty in configuration of many components involved. These conditions minimize the implementation of the private cloud in many parties. In this research, we demonstrate cloud storage architecture simply by using only three nodes with OpenStack. The first node is the controller, the second node is object storage and the third is object storage. Elaborating the component that should be activated to implement the private cloud. The result of this research will help parties who want to build private cloud storage with simple network architecture using OpenStack Object Storage.
Volume: 4
Issue: 1
Page: 155-164
Publish at: 2016-10-01

FPGA Implementation of a Nakagami-m fading channel Simulator using Random Number Generator

10.11591/ijeecs.v4.i1.pp133-140
Santhosh Kumar B , K. Ayyappa Swamy
By realizing the concept of implementation of the radio propagation channels on simulators is the eminent intention of this work. Even though prototyping software simulators are effortless to design we prefer hardware simulators as they endeavors distinguishable quickness, compared to earlier. Prior to this work fading channels like Gaussian, Rayleigh and Rician fading channel simulators were executed on hard ware.(i.e. FPGA) The significant target  of this attempt is to implement Nakagami-m  fading channel on hardware as they preserved for  unsubstantial consideration. While differentiating with other fading channels  Nakagami-m fading channel acquires wide spread applications, as its capability of providing  appropriate fit for practical fading data, as this is flexible through its size parameter ‘m’, over which representation of signal fading conditions that vary  from serious to modest, to normal  fading or no fading is accomplished . The proposed hardware simulator can hatches complex Nakagami variates after it was implemented on XilinxSpartan-xc3s500e-4fg320 FPGA. This is operated at 50MHz.
Volume: 4
Issue: 1
Page: 133-140
Publish at: 2016-10-01

Internal On-line Partial Discharge Analysis of 68.75 MVA Generator Stator Winding Insulation

10.11591/ijece.v6i5.pp2088-2095
Waluyo Waluyo , Siti Saodah , Eltha Hidayatullah
Partial discharge is a phenomenon of electron ionization occurs due to concentrated electric field in a different edge plane. This phenomenon will be investigated by an electric field measurement in a measuring point. The internal partial discharge will give the insulation damage effect on a generator stator winding due to void existence. This manuscript presents the measurement results of the on-line internal partial discharge on the stator winding insulation of 68.75 MVA generator. It used the resistant temperature detector method and CM2000TM. The results were classified into three conditions based on the voids in the generator stator insulation, the internal delamination and the surface discharge.
Volume: 6
Issue: 5
Page: 2088-2095
Publish at: 2016-10-01

Image Segmentation Based on Doubly Truncated Generalized Laplace Mixture Model and K Means Clustering

10.11591/ijece.v6i5.pp2188-2196
T Jyothirmayi , K Srinivasa Rao , P Srinivasa Rao , Ch Satyanarayana
The present paper aims at performance evaluation of Doubly Truncated Generalized Laplace Mixture Model and K-Means clustering (DTGLMM-K) for image analysis concerned to various practical applications like security, surveillance, medical diagnostics and other areas. Among the many algorithms designed and developed for image segmentation the dominance of Gaussian Mixture Model (GMM) has been predominant which has the major drawback of suiting to a particular kind of data. Therefore the present work aims at development of DTGLMM-K algorithm which can be suitable for wide variety of applications and data. Performance evaluation of the developed algorithm has been donethrough various measures like Probabilistic Rand index (PRI), Global Consistency Error (GCE) and Variation of Information (VOI). During the current work case studies forvarious different images having pixel intensities has been carried out and the obtained results indicate the superiority of the developed algorithm for improved image segmentation.
Volume: 6
Issue: 5
Page: 2188-2196
Publish at: 2016-10-01

A Secured Cloud Data Storage with Access Privileges

10.11591/ijece.v6i5.pp2338-2344
Naresh Vurukonda , B. Thirumala Rao , B. Tirapathi Reddy
In proposed framework client source information reinforcements off-site to outsider distributed storage benefits to decrease information administration costs. In any case, client must get protection ensure for the outsourced information, which is currently safeguarded by outsiders. To accomplish such security objectives, FADE is based upon an arrangement of cryptographic key operations that are self-kept up by a majority of key supervisors that are free of outsider mists. In unmistakable, FADE goes about as an overlay framework that works flawlessly on today's distributed storage administrations. Actualize a proof-of-idea model of FADE on Amazon S3, one of today's distributed storage administrations. My work oversee, esteem included security highlights acclimatize were today's distributed storage administration. our research work proceeds in ensuring the file access control and assured deletion in multi cloud environment and reducing the meta data management, there by the cloud storage become more attractive and many users will adopt the cloud space in order to diminish the data storage cost.
Volume: 6
Issue: 5
Page: 2338-2344
Publish at: 2016-10-01
Show 1619 of 1994

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration