Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,167 Article Results

Key Software Metrics and its Impact on each other for Software Development Projects

10.11591/ijece.v6i1.pp242-248
Mridul Bhardwaj , Ajay Rana
Every software development project is unique and different from repeatable manufacturing process. Each software project share different challenges related to technology, people and timelines. If every project is unique, how project manager can estimate project in a consistent way by applying his past experience. One of the major challenges faced by the project manager is to identify the key software metrics to control and monitor the project execution. Each software development project may be unique but share some common metric that can be used to control and monitor the project execution. These metrics are software size, effort, project duration and productivity. These metrics tells project manager about what to deliver (size), how it was delivered in past (productivity) and how long will it take to deliver with current team capability (time and effort). In this paper, we explain the relationship among these key metrics and how they statistically impact each other. These relationships have been derived based on the data published in book “Practical Software Estimation” by International Software Benchmarking Group. This paper also explains how these metrics can be used in predicting the total number of defects. Study suggests that out of the four key software metrics software size significantly impact the other three metrics (project effort, duration and productivity). Productivity does not significantly depend on the software size but it represents the nonlinear relationship with software size and maximum team size, hence, it is recommended not to have a very big team size as it might impact the overall productivity. Total project duration only depends on the software size and it does not depend on the maximum team size. It implies that we cannot reduce project duration by increasing the team size. This fact is contrary to the perception that we can reduce the project duration by increasing the project team size. We can conclude that software size is the important metrics and a significant effort must be put during project initiation phases to estimate the project size. As software size will help in estimating the project duration and project efforts so error in estimating the software size will have significant impact on the accuracy of project duration and effort. All these key metrics must be re-calibrated during the project development life cycle.  
Volume: 6
Issue: 1
Page: 242-248
Publish at: 2016-02-01

A Monitoring System for Integrated Management of IoT-based Home Network

10.11591/ijece.v6i1.pp375-380
Changsu Ryu , Chang-Wu Hur
Recently, the society is rapidly becoming highly integrated with the convergence of smart devices, SNS, big data, cloud, and IoT. This phenomenon is being spread more swiftly based on the wired and wireless communication infrastructure provided to most homes, as terminal devices for communication have more various functions and are being supplied to homes through a multi-vendor system and as several terminal devices are installed in each home to provide services. Particularly, various IoT terminal devices and services are being introduced to facilitate functions such as home crime prevention, gas valve control, control of electric apparatus and temperature-humidity sensors, and door control based on facial recognition, and integrated IoT-based management monitoring is required for TVs, washing machines, refrigerators, etc. Hence, in this study, a monitoring system for integrated home network management and data collection management, which solves problems of existing home network systems by connecting API Adaptor connection technology, message technology for integrated management of universal communications terminal devices and IoT devices, and data modelling technology to individual network platforms, was proposed.
Volume: 6
Issue: 1
Page: 375-380
Publish at: 2016-02-01

Replacement of Analog Automatic Voltage Regulator using Digital Technology

10.11591/ijece.v6i1.pp53-62
Ersalina Werda Mukti , Sulistyo Wijanarko , Anwar Muqorobin
Before the 90’s, many power plants in Indonesia were equipped with analog controllers and now those power plants are still in operation to produce electricity. One of those controller parts is Automatic Voltage Regulator (AVR). If a failure occurs in the AVR, the economic solution is by replacing the damaged electronic component with new component. However this method will not solve the problem if the components are not available in local market or become obsolete. Purchasing the new AVR that compatible with other controller parts cannot be done again because the analog controllers are no longer produced by the vendor. Furthermore, replacement of all the controllers with the current technology become expensive.  According to this, an alternative solution is proposed in this paper by designing an AVR that compatible with other controller parts and considering the availability of the electronic components in local market. ATmega8 microcontroller is used to implement a digital AVR and employing op amp based as its signal conditioning. The result shows that the digital AVR can reduce hardware size and power consumption. The digital AVR also meets the computation rate of the computation signal.
Volume: 6
Issue: 1
Page: 53-62
Publish at: 2016-02-01

A Method for Attitude Control Based on a Mathematical Model for an Inverted Pendulum-Type Mobile Robot

10.11591/ijece.v6i1.pp198-204
Jin-Ho Yoon , Myung-Jin Chung
A method for attitude control based on a mathematical model for an inverted pendulum-type mobile robot was proposed. The inverted pendulum-type mobile robot was designed and the mathematical modeling was conducted. The parameters of the mobile robot were estimated and the state-space model of mobile robot was obtained by the substitution of the estimated parameters into the mathematical model. The transfer function of the mobile robot is applied to generate the root-locus diagram used for the estimation of the gains of the PID controller. The attitude control method including a PID controller, non-linear elements, and integral saturation prevention was designed and simulated. The experiment was conducted by applying the method to the mobile robot. In the attitude control experiment, the performance of attitude recovery from ±12° tilted initial state with a settling time of 0.98s and a percent overshoot of 40.1% was obtained. Furthermore, the attitude maintaining robustness against disturbance was verified.
Volume: 6
Issue: 1
Page: 198-204
Publish at: 2016-02-01

A Comparison of the Query Execution Algorithms in Secure Database System

10.11591/ijece.v6i1.pp337-343
Young-Dal Jang , Ji-Hong Kim
In accordance with the database management, DAS(Database as Service) model is one solution for outsourcing. However, we need some data protection mechanisms in order to maintain the database security The most effective algorithm to secure databases from the security threat of third party attackers is to encrypt the sensitive data within the database. However, once we encrypt the sensitive data, we have difficulties in queries execution on the encrypted database. In this paper, we focus on the search process on the encrypted database. We proposed the selective tuple encryption method using Bloom Filter which could tell us the existence of the data. Finally, we compare the search performance between the proposed method and the other encryption methods we know.
Volume: 6
Issue: 1
Page: 337-343
Publish at: 2016-02-01

A New Validation Approach of a New Three-Phase High Voltage Power Supply for Microwaves Generators with one Magnetron by Phase

10.11591/ijece.v6i1.pp1-11
M. Bassoui , M. Ferfra , M. Chraygane
In order to validating the new three-phase High voltage power supply for microwave generators with one magnetron by phase, this paper presents a new validation approach to evaluate the proposed model with several evaluations. This approach is based on the calculation and measurement of the performance and the power factor of this new three-phase power supply, also the study of the operation of this new system in case of failure. The design of this power supply is composed of new three-phase transformer with magnetic shunt, supplying by phase a voltage doubler cell composed of a capacitor and a diode. Each cell in turn, supplies a single magnetron. In this paper we have presented the new three-phase transformer by its equivalent model; it’s a π  quadruple  model composed  of  storable  inductances  able  to translating the nonlinear saturation phenomena for stabilization of  the  magnetron  current. The voltage and current curves obtained by simulation with MATLAB SIMULINK are in good conformity with those obtained by experimental of conventional power supply using a single phase transformer for one magnetron. The same curves will allow us to plot the instantaneous power absorbed by each magnetron. This leads to determine the average power emitted by each magnetron, and establish the balance of the power microwave generator by computing its performance which is compared to that obtained from experimental. After that we will compute the power factor of this power supply and we will study its operation in case of failure of one or two magnetrons.
Volume: 6
Issue: 1
Page: 1-11
Publish at: 2016-02-01

Incremental Tag Suggestion for Landmark Image Collections

10.11591/ijece.v6i1.pp139-150
Sutasinee Chimlek , Punpiti Piamsa-nga
In recent social media applications, descriptive information is collected through user tagging, such as face recognition, and automatic environment sensing, such as GPS. There are many applications that recognize landmarks using information gathered from GPS data. However, GPS is dependent on the location of the camera, not the landmark. In this research, we propose an automatic landmark tagging scheme using secondary regions to distinguish between similar landmarks. We propose two algorithms: 1) landmark tagging by secondary objects and 2) automatic new landmark recognition. Images of 30 famous landmarks from various public databases were used in our experiment. Results show increments of tagged areas and the improvement of landmark tagging accuracy.
Volume: 6
Issue: 1
Page: 139-150
Publish at: 2016-02-01

New Algorithm for Fast Processing RFID System in Container Terminal

10.11591/ijece.v6i1.pp283-291
Evizal Abdul Kadir , Siti Mariyam Shamsuddin , Detri Karya , Sri Listia Rosa
The growth of world economic and increasing of trading in most of countries has impact to the number of containers export and import between countries. Some of container terminal is very busy to handle high volume of container movement. Conventional operational procedures have difficulties to handle containers movement then make slow and some issues in terminal operation for container clearance. This paper discus on proposing new algorithm to the current container terminal management system used RFID technology for fast processing and clearance. Container Terminal Management System (CTMS) is a system for port management and interface to the RFID system that used to identify container e-seal, truck and driver identity. Lack of communication and interfacing protocol made slow response during request or reply of message to the gate operator. Proposed algorithm with new procedure of request to CTMS made faster response and avoid inaccuracy of detecting container e-seal. Results of implementation new algorithm have improved to the productivity and efficiency of container terminal. Testing and implementation of this proposed system conducted in a private container terminal in Malaysia.
Volume: 6
Issue: 1
Page: 283-291
Publish at: 2016-02-01

Issues in Routing Mechanism for Packets Forwarding: A Survey

10.11591/ijece.v6i1.pp421-430
Rohit Nilkanth Devikar , Dipak V. Patil , V. Chandraprakash
Nowadays internet has become more popular to each and every one. It is very sensitive to nodes or links failure due to many known or unknown issues in the network connectivity. Routing is the important concept in wired and wireless network for packet transmission. During the packet transmission many times some of the problems occur, due to this packets are being lost or nodes not able to transmit the packets to the specific destination. This paper discusses various issues and approaches related to the routing mechanism. In this paper, we present a review and comparison of different routing algorithms and protocols proposed recently in order to address various issues. The main purpose of this study is to address issues for packet forwarding like network control management, load balancing, congestion control, convergence time and instability. We also focus on the impact of these issues on packet forwarding.
Volume: 6
Issue: 1
Page: 421-430
Publish at: 2016-02-01

QoS Design Consideration for Enterprise and Provider’s Network at Ingress and Egress Router for VoIP protocols

10.11591/ijece.v6i1.pp235-241
Manjur Kolhar , Mosleh M Abualhaj , Faiza Rizwan
Compliance with the Service Level Agreement (SLA) metric is a major challenge in a Multiprotocol Label Switching Virtual Private Network (MPLS VPN) because mandatory models must be maintained on both sides of the MPLS VPN in order to achieve end-to-end service levels. The end-to-end service of an MPLS VPN can be degraded owing to various issues such as distributed denial of service (DDoS), and Random Early Detection (RED) that prevents congestion and differentiates between legitimate and illegitimate user traffic. In this study, we propose a centralized solution that uses a SLA Violation Detector (SLAVD) and intrusion detection to prevent SLA violation.
Volume: 6
Issue: 1
Page: 235-241
Publish at: 2016-02-01

Modelling of E-Governance Framework for Mining Knowledge from Massive Grievance Redressal Data

10.11591/ijece.v6i1.pp367-374
Sangeetha G , L. Manjunatha Rao
With the massive proliferation of online applications for the citizens with abundant resources, there is a tremendous hike in usage of e-governance platforms. Right from entrepreneur, players, politicians, students, or anyone who are highly depending on web-based grievance redressal networking sites, which generates loads of massive grievance data that are not only challenging but also highly impossible to understand. The prime reason behind this is grievance data is massive in size and they are highly unstructured. Because of this fact, the proposed system attempts to understand the possibility of performing knowledge discovery process from grievance Data using conventional data mining algorithms. Designed in Java considering massive number of online e-governance framework from civilian’s grievance discussion forums, the proposed system evaluates the effectiveness of performing datamining for Big data.
Volume: 6
Issue: 1
Page: 367-374
Publish at: 2016-02-01

Multi-input DC-AC Inverter for Hybrid Renewable Energy Power System

10.11591/ijece.v6i1.pp40-52
Mohd Azman Rosli , Nor Zaihar Yahaya , Zuhairi Baharudin
The objective of this paper is to design a multi-input dc-ac inverter integrated photovoltaic array, wind turbine and fuel cell in order to simplify the hybrid power system and reduce the cost.  The output power characteristics of the photovoltaic array, wind turbine and fuel cell are introduced. The operational principle and technical details of the proposed multi-input dc-ac inverter is then explained. The proposed inverter consists of a three input flyback dc-dc converter and a single phase full bridge dc-ac inverter. The control strategy for the proposed inverter to distribute the power reasonably to the sources and it achieved a priority of the new energy utilization is discussed. This multi-input dc-ac inverter is capable of being operated in five conditions and power delivered to the ac load can be either individually or simultaneously. First to third condition occurs when the power delivered from either renewable energy sources individually, fourth condition happens when power is demanded from two sources simultaneously, and finally when power are available from three sources simultaneously. The proposed inverter has been simulated by employing NI Multisim 12.0 circuit simulator.
Volume: 6
Issue: 1
Page: 40-52
Publish at: 2016-02-01

Design of Quadcopter Robot as a Disaster Environment Remote Monitor

10.11591/ijece.v6i1.pp188-197
Made Sudarma , I.B. Alit Swamardika , Adinata Mas Pratama
As technology development increase, human more use robot technology to help in many fields. One of robot technology advances is the flying robot Quadcopter. The quadcopter robot is an Unmanned Aerial Vehicle or UAV that consists of four propellers and four brushless motors that function as actuator. Quadcopter was designed by using KK Board V 2.0 Flight Controller which is a series of motor rotation controller and all at once has Accelerometer censor as acceleration censor and Gyroscop censor as a balance or stability censor. The robot controlling is by using remote control (RC), and GoPro HD Hero2 camera was installed to monitor the condition of the environment. Result of testing is that the quadcopter has maximum load for 4.4 kg and maximum range distance of RC is 100 meters without any barrier and 50 meters with barrier.  In the testing, robot can fly with maximum height for 30 meters from land surface. The robot is equipped with camera, so the quadcopter flying robot can be used to monitor any places that are hard to reach.
Volume: 6
Issue: 1
Page: 188-197
Publish at: 2016-02-01

Prediction Data Processing Scheme using an Artificial Neural Network and Data Clustering for Big Data

10.11591/ijece.v6i1.pp330-336
Se-Hoon Jung , Jong-Chan Kim , Chun-Bo Sim
Various types of derivative information have been increasing exponentially, based on mobile devices and social networking sites (SNSs), and the information technologies utilizing them have also been developing rapidly. Technologies to classify and analyze such information are as important as data generation. This study concentrates on data clustering through principal component analysis and K-means algorithms to analyze and classify user data efficiently. We propose a technique of changing the cluster choice before cluster processing in the existing K-means practice into a variable cluster choice through principal component analysis, and expanding the scope of data clustering. The technique also applies an artificial neural network learning model for user recommendation and prediction from the clustered data. The proposed processing model for predicted data generated results that improved the existing artificial neural network–based data clustering and learning model by approximately 9.25%.
Volume: 6
Issue: 1
Page: 330-336
Publish at: 2016-02-01

Information Base Security Threats and Challenges' in Information Forensic: A Survey

10.11591/ijeecs.v1.i2.pp406-410
Dilip Kumar Barai , G. Sridevi , Syed Umar , MSR Prasad
Generally to store the information or Information of any organization then they will be maintain Information base to manage that Information base we use some management techniques like Information base management systems so called DBMS. In this paper we introduced Relational DBMS which is a collection of applications that can store various information which can be easily retrieve, manipulate and storage of Information. So in this we are concentrating on forensic analysis and Information base of it which is very sensitive Information. In this paper we are analyzing and surveying of forensic Information based using various methodologies with different tools and algorithms for investigations, through which we got what are the challenges are facing in the forensic Information bases since the years.
Volume: 1
Issue: 2
Page: 406-410
Publish at: 2016-02-01
Show 1627 of 1945

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration