Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

28,451 Article Results

Film Thickness of Lithium Battery Fast De-Noising Based on Atomic Sequence Template Library

10.11591/ijeecs.v12.i8.pp6088-6093
Gong Chen , Xifang Zhu , Qingquan Xu , Ancheng Xu , Hui Yang
The natural frequency and scanning vibration frequency of C-dynamic scanning system of laser sensors are acquired for film thickness of lithium battery de-noising based on multi-resolution wavelet algorithm. For this reason, fast de-noising based on atomic sequence template library is present .First, under various mode of scanning, best atomic sequence template is built by sparse decomposition. Secondly, at the given mode, film thickness data is match to the best atomic sequence to de-nosing. Experimental results show that template-matching pursuit(MP) algorithm is effective and algorithm speed is higher than MP 57 times.
Volume: 12
Issue: 8
Page: 6088-6093
Publish at: 2014-08-01

Inteference Mitigation in Femtocellular Networks

10.11591/ijict.v3i2.pp113-121
Amevi Acakpovi , Dominique Kogue , Koudjo Mawuefam Koumadi , Ibrahim Tahirou
Femtocells can significantly boost up wireless cellular network capacity by reducing communication distances to user equipment and also by reusing resources already utilized in the macrocell network on which they overlay. However, the deployment of femtocells within a macrocell coverage area, causes severe interference between the femtocell and the macrocell, which may have an impact on the overall performance of the femtocells. Avoiding such interference is very important for the effective co-existence of femtocells and macrocell. This paper proposes an algorithm to mitigate cross-tier interference between a femtocell and a macrocell using adaptive power control. The proposed approach is modeled and simulated using MATLAB. The impact on the performance of the femtocell using the proposed algorithm is analysed. Results show that the proposed adaptive power control algorithm has tremendously reduced the negative effects on the system throughput, delay and outage probability for voice and data traffics.
Volume: 3
Issue: 2
Page: 113-121
Publish at: 2014-08-01

ANFIS Based Approach to Estimate Remnant Life of Power Transformer by Predicting Furan Contents

https://ijece.iaescore.com/index.php/IJECE/article/view/5507
Priyesh Kumar Pandey , Zakir Husain , R K Jarial
Condition monitoring and diagnostic playing important role in estimating remnant Life of power transformer. Concentration of furan content in transformer oil can be a promising factor for indirect measurement of the aging of transformer insulation. The oil gets contaminated mainly due to prolonged operation and ageing. The present research paper introduces Adaptive Neuro Fuzzy inference system (ANFIS) technique to correlate furanic compounds obtained by High Performance Liquid Chromatography (HPLC) test to remnant life of the power transformer. The results are obtained by conducting HPLC test at TIFAC-CORE lab, NIT Hamirpur on thirteen samples of Power transformer oil taken from Himachal State Electricity Board Ltd, Shimla (India).DOI:http://dx.doi.org/10.11591/ijece.v4i4.5567
Volume: 4
Issue: 4
Page: 463-470
Publish at: 2014-08-01

Rules Mining Based on Rough Set of Compatible Relation

10.11591/ijeecs.v12.i8.pp6346-6353
Weiyan Xu , Ming Zhang , Bo Sun , Mengyun Lin , Rui Cheng
Rough set model based on tolerance relation, has been widely used to deal with incomplete information systems. However, this model is not so perfect because not all of the elements in a tolerant class are mutually tolerant, but they are all tolerant with the generating element of this class. To mend this limitation, the compatible relation is redefined, and then the concept of maximal complete compatible class in incomplete information system is presented for the purpose that any two elements in the same compatible module are mutually compatible. Furthermore, two methods are put forward in the interest of selecting optimal compatible class for an object, which can be used in knowledge reduction. Besides, coverings on universe produced by tolerance and compatible relations are deeply investigated and compared. Finally, a medical decision table is analyzed, some compact rules are mined.
Volume: 12
Issue: 8
Page: 6346-6353
Publish at: 2014-08-01

New Controllable Field Current Induced Excitation Synchronous Generator

10.11591/ijeecs.v12.i8.pp5905-5909
Bei Wei , Xiuhe Wang
The electrical machine using induced excitation system is a kind of brushless self-excited machine with low cost and high reliability, the induced excited machine would provide high power density at high-speed. But the low efficiency of the excitation system limits the development of this kind machine. Based on traditional excitation system, an improved construction induced excitation system is proposed in this paper. Adaptive control method is used to control the current direction in the stator auxiliary winding to replace constant DC excitation, the input current can change its direction according to the position of the rotor, the result is that all of induced currents at work in excitation system. Position sensors are fixed on the rotor and the stator field winding currents can synchronize with the rotor position according to the signal of the sensors. Experiments with the proposed structure are performed and compared with those of the traditional induced excitation system one. The results show that the new structure can improve the excitation system efficiency and reduce the cost.
Volume: 12
Issue: 8
Page: 5905-5909
Publish at: 2014-08-01

A CMOS-based Analog Function Generator: HSPICE Modeling and Simulation

https://ijece.iaescore.com/index.php/IJECE/article/view/5523
Madina Hamiane
In many Engineering applications, analog circuits present many advantagesover their digital counterparts and have recently been particularly used in awide range of signal processor circuits. In this paper, an analog non-linearfunction synthesizer is presented based on a polynomial expansion model.The proposed function synthesizer model is based on a 10th orderpolynomial approximation of any of the required non-linear functions. Thepolynomial approximations of these functions can then be implemented usingbasic CMOS circuit blocks. The proposed circuit model can simultaneouslysynthesize and generate many different mathematical functions. The circuitmodel is designed and simulated with HSPICE and its performance isdemonstrated through the simulation of a number of non-linear functions.DOI:http://dx.doi.org/10.11591/ijece.v4i4.5981
Volume: 4
Issue: 4
Page: 532-538
Publish at: 2014-08-01

The Intelligent Control System of the Freezing Station in Coal Mine Freezing Shaft Sinking

10.11591/ijeecs.v12.i8.pp5743-5750
Xiaoliang Zheng , Yelin Hu , Zhaoquan Chen
In order to address the issue of low degree of automation and huge waste of electric energy of the equipment in drilling engineering freezing station which adopts the freezing method of coal mine, we need to design an intelligent control system to control both the brine pump and double stage ammonia screw compressor. According to the actual cooling need in freezing project, this new system is able to adjust the working condition of the equipment so as to optimize the supply as needed. Also, the temperature and flow of the brine are controlled by fuzzy decoupling controller, and variable frequency controller is adopted in the brine pump to change the motor drive speed and finally adjust the flow of the brine appropriately, besides, the reasonable start-stop unit is used in the compressor to control the temperature of the brine. It has turned out that this intelligent control system features a better control performance, and thus has increased the automation level and prolonged the using life of the whole system as well as saved a large amount of electric energy and decreased the electricity cost of construction enterprises. 
Volume: 12
Issue: 8
Page: 5743-5750
Publish at: 2014-08-01

Minimum Eigenvalue Detection for Spectrum Sensing in Cognitive Radio

https://ijece.iaescore.com/index.php/IJECE/article/view/5550
Syed Sajjad Ali , Chang Liu , Minglu Jin
Spectrum sensing is a key task for cognitive radio. Our motivation is to increase the probability of detection for spectrum sensing in cognitive radio. In this paper, we proposed a new semi blind method which is based on minimum Eigenvalue of a covariance matrix. The ratio of the minimum eigenvalue to noise power is used as the test statistic. The method does not need channel and signal information as prior knowledge. Eigenvalue based algorithm perform better than energy detection for correlated signal. Our proposed method is better than the maximum eigenvalue and energy detection for correlated signal. We perform Simulation which is based on digital TV signal. In all tests, our method performs better than maximum eigenvalue detection and energy detection.DOI:http://dx.doi.org/10.11591/ijece.v4i4.6226
Volume: 4
Issue: 4
Page: 623-630
Publish at: 2014-08-01

Continuous Real-time Monitoring of Patient’s Vital Signs Based on ZigBee Standard

10.11591/ijict.v3i2.pp73-79
Saso Koceski , Olivera Kotevska , Elena Vlahu-Gjorgievska , Vladimir Trajkovik
This paper gives an understanding of what possibilities Wireless Body Area Network (WBAN) have when using shortrange wireless communications protocols. There advantages are used to facilitate versatility in the movements of health care patients. The paper investigates the feasibility of using the ZigBee protocol, givean analysis of methods for collection of received data from multi sensor environment, and mechanisms for privacy and data protection by using encryption techniques. This characteristics are applied on previously developed collaborative healthcare system model (COHESY).COHESY is aimed at continuous real time remote patients’ health monitoring.
Volume: 3
Issue: 2
Page: 73-79
Publish at: 2014-08-01

Chaos Based Image Encryption using Expand-Shrink Concept

10.11591/ijict.v3i2.pp103-112
Naveenkumar S K , Panduranga H T , Kiran P
Image information security plays a vital role in computing and communication technologies. This paper describes a new concept of expand and shrink to enhance the strength of chaos based image encryption technique. This method consists of both permutations as well as substitution process for image scrambling and encryption. In permutation plain image is shuffled using chaos technique. Input image undergo two times chaos permutation in-between expand and shrink process leads to substitution. Permutation decreases the correlation between the pixel and substitution increases the entropy of encrypted image. Proposed encryption technique works for both gray-scale and color image. From the experiment highly scrambled image is obtained at the end of encryption process. Decryption process employs exactly reverse process of encryption which results in the reconstructed images.
Volume: 3
Issue: 2
Page: 103-112
Publish at: 2014-08-01

Video Summarization Based on a Fuzzy Based Incremental Clustering

https://ijece.iaescore.com/index.php/IJECE/article/view/5544
Monireh Pournazari , Fariborz Mahmoudi , Amir Masoud Eftekhari Moghadam
The significant development of multimedia and dijital video production in recent years has led to the mass production of personal and commerical video archives.Therefore, the need for efficient tools and methods of accessing video content and information rapidly is significantly increasing. Video summarization is the removal of visual redundancy and repetitive video frames,and obtaining a short summary of the whole video so that the summary obtained effectively reflects the whole video content. Examples of these summarizations in recent years include STIMO and VSUMM.According to users' comments, in the mentioned methods, the summarization has a high rate of error in a full report of summarization and a low accuracy in non-repetitive frames production, as well as a high computation time.In this paper.in order to solve these problems,we developed a system which modeled users' and supervisors' comments.We used a fuzzy based incremental clustering by which the selection and deselection of frames are done based on fuzzy rules. The extracted rules were determined based on users' comments on the video summarization.Finally, we performed our proposed method on the video clips used in the previous methodes.Produced summaries were evaluated by a qualitative method to minimize human interferences.The results obtained indicate the high accuracy of summarization and the less computation time.DOI:http://dx.doi.org/10.11591/ijece.v4i4.5836
Volume: 4
Issue: 4
Page: 593-602
Publish at: 2014-08-01

Design of the Coal Mining Transient Electromagnetic Receiver with A Large Dynamic Range

10.11591/ijeecs.v12.i8.pp5736-5742
Xiaoliang Zheng
Considering the influence of the transient process of transient electromagnetic receiving coil on the early signals detection of the secondary field, as well as the great change and the various decay rates in different periods of the secondary field signals, which will affect the secondary field signal collection, we aim at designing a new receiver with the variable stored program control receiving coil, prefixed amplifying circuit, programmable amplifying circuit and high-performance analog-to-digital conversion circuit according to the underground coal mining environment, in which we apply the different sampling interval software and self-adaptive filtering algorithm to eliminate the influence of transient process and filter out the 50Hz power line interference, thus to increase the data collection ability and improve the detection result. The whole device is suitable for underground coal mining environment with a small volume.
Volume: 12
Issue: 8
Page: 5736-5742
Publish at: 2014-08-01

Capacitive Interferences Modeling and Optimization between HV Power Lines and Aerial Pipelines

https://ijece.iaescore.com/index.php/IJECE/article/view/5512
Rabah Djekidel , Djillali Mahi
Metal pipelines are widely used for the transport of fluids and liquid and gaseous hydrocarbons. When these pipelines are installed near overhead power transmission lines, AC interference can occur between the high voltage power lines and pipelines. This interference can cause the appearance of induced voltages that present a risk of electric shock to the operator safety, direct effects on the pipeline, such as corrosion of the coating and steel. Evaluation of this coupling is necessary to ensure the safety of personnel and equipment connected to the pipeline. In this paper, an optimization method combining PSO with CSM is proposed to simulate the capacitive coupling between the HV power lines and aerial pipelines and analyze the different factors that affect the level of this coupling, the simulation results were compared with a previous study of specialty, the results are found in good agreement.DOI:http://dx.doi.org/10.11591/ijece.v4i4.6289
Volume: 4
Issue: 4
Page: 486-497
Publish at: 2014-08-01

An Adaptive Steganography Scheme Based on Visual Quality and Embedding Capacity Improvement

https://ijece.iaescore.com/index.php/IJECE/article/view/5539
Mojtaba Bahmanzadegan Jahromi , Karim Faez
In this paper, a steganography technique using LSB substitution and PVD method is presented as an adaptive scheme in the spatial domain. Our method partitions the grayscale image into several non-overlapping blocks with three consecutive pixels. The embedding algorithm can both replace the secret data with the LSBs of the middle pixel and embed it in the difference values between the middle pixel and its two neighboring pixels of the cover-block. The number of secret bits is determined adaptively based on the range divisions for embedding in the difference value. We define a new range division on gray level which takes into account a larger embedding capacity for bits. After the embedding, the proposed method detects the pixels which are sensitive to hyper distortion. Then, the embedding process will be repeated to produce insignificant visual distortion in those pixels. Our experimental results demonstrate that this iterative steganography scheme prevents significant visual distortion into stego-image. The generated PSNR values are higher than the corresponding values of the most commonly used methods, discussed in this study. Furthermore, the experimental results show that the hiding capacity increased enormously when the proposed range division is used. Finally, we illustrate that the method can pass RS and steganalysis detector attacks.DOI:http://dx.doi.org/10.11591/ijece.v4i4.6307
Volume: 4
Issue: 4
Page: 573-584
Publish at: 2014-08-01

Which Representation to Choose for Image Cluster

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/3737
Haolin Gao
To choose best representation for image cluster, we analyzed the distinguish ability of three typical image representations, color histogram, Gabor texture and geometric moment by fitting image distance curve, and show different retrieval results of image retrieval for different image representations. To depict the distinguish ability of different image representations, we present a cluster discriminant index called Simplified Overall Cluster Quality, which constitutes cluster compaction and cluster separation, and the experiment results show that the image representation with best distinguish ability also possesses maximum discriminant index value. This index can be used to determine optimal representation for clustering or the order of feature used to cluster.DOI: http://dx.doi.org/10.11591/telkomnika.v12i8.5458 
Volume: 12
Issue: 8
Page: 6181-6189
Publish at: 2014-08-01
Show 1684 of 1897

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration