Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,922 Article Results

A Dynamic Selection Algorithm on Optimal Auto-Response for Network Survivability

10.11591/ijeecs.v12.i8.pp6354-6360
Jinhui Zhao , Yujia Sun , Liangxun Shuo
In the selection process of survival strategies, it is a challenging work to automatically choose the optimal measure for the survival event. A dynamic selection algorithm is proposed, based on feedback control. According to the feature of survival strategy, the strategy model is presented, which includes fuor specific attribute. The dynamic update process of attribute vector is described in detail. Combining the weight of preference and attributes of strategy, the TOPSIS evaluation is employed to select optimal measure. Experiments and analysis show that optimal measure selected by proposed algorithm is appropriate and wishful, which enriches the research content in this field.
Volume: 12
Issue: 8
Page: 6354-6360
Publish at: 2014-08-01

Gear Fault Diagnosis and Classification Based on Fisher Discriminant Analysis

10.11591/ijeecs.v12.i8.pp6198-6204
Haiping Li , Jianmin Zhao , Xinghui Zhang , Hongzhi Teng , Ruifeng Yang
Gears are the most essential parts in rotating machinery. So gear fault modes diagnosis and levels classification are very important in engineering practice. This paper present a novel method in gear fault recognition and identification using Fisher discriminant analysis (FDA) due to FDA can reduct dimension when analyse signal. The real data collected from a gearbox test rig is used to validate the method this paper proposed. And the effectiveness of the methodology was demonstrated by the results obtained from the analysis. Three kinds of fault modes and levels were identified. And energy was selected as feature parameter. The fault modes (normal, breaktooth and crack) were diagnosed at first, then the fault levels of breaktooth and crack are classified. The accurate rate of the method is approximate 89%.
Volume: 12
Issue: 8
Page: 6198-6204
Publish at: 2014-08-01

Image Segmentation of Adhering Bars Based on Improved Concavity Points Searching Method

10.11591/ijeecs.v12.i8.pp6173-6180
Liu Guohua , Liu Bingle , Yuan Qiujie , Huang Zhenhui
It is difficult to track, count and separate the bars moving at a high speed on production line for their overlap under occlusion. Therefore, it is necessary to establish a reliable, practical splitting mechanism for the adhered bars. This paper proposed a new solution to the problem of bars adhesion: the plane array camera was utilized to acquire the images of moving bars so as to recognize the centroid coordinates of the bars ends and compute their area with a Blob algorithm, two geometric parameters were utilized to detect adhered bars, and the presence of adhered bars was analyzed according to the convex hull. For the adhered bars, the segmentation points were searched using scanning method by a series of the rules to determine the optimal segmentation line. The proposed method can segment the adhered bars effectively with matched concavity points. The experimental results show that the method can well segment and count bars moving at a high speed on production line, with the counting accuracy near to 100% and the recognizing time in millisecond.
Volume: 12
Issue: 8
Page: 6173-6180
Publish at: 2014-08-01

Research of Reliability, Availability and Maintainability on the All-electronic Computer Interlocking System

10.11591/ijeecs.v12.i8.pp5877-5885
He Tao , Ren Jianxin
High levels of reliability and high security are the basic characteristics and requirements of railway signal systems. So, reliability, availability and maintainability (RAM) are necessarily analyzed before the computer interlocking system will be adopted. The All-electronic Computer Interlocking System, which is a new kind of interlocking system, still needs to analyze its RAM before being put to use. In this paper, the reliability methods and Markov model are adopted to analyze the RAM indexes of the All-electronic Computer Interlocking System when its execution layer equipped with the single configuration or the dual-redundant configuration, the paper also compares the indexes with that of the traditional computer-based interlocking system. Finally, the paper will briefly include suggestions on how the All-electronic Computer Interlocking System’s RAM indexes may be increased and also, how the system may be used practically.
Volume: 12
Issue: 8
Page: 5877-5885
Publish at: 2014-08-01

Downscaling Modeling Using Support Vector Regression for Rainfall Prediction

10.11591/ijeecs.v12.i8.pp6423-6430
Sanusi Sanusi , Agus Buono , Imas S Sitanggang , Akhmad Faqih
Statistical downscaling is an effort to link global scale to local scale variable. It uses GCM model which usually used as a prime instrument in learning system of various climate. The purpose of this study is as a SD model by using SVR in order to predict the rainfall in dry season; a case study at Indramayu. Through the model of SD, SVR is created with linear kernel and RBF kernel. The results showed that the GCM models can be used to predict rainfall in the dry season. The best SVR model is obtained at Cikedung rain station in a linear kernel function with correlation 0.744 and RMSE 23.937, while the minimum prediction result is gained at Cidempet rain station with correlation 0.401 and RMSE 36.964. This accuracy is still not high, the selection of parameter values for each kernel function need to be done with other optimization techniques.
Volume: 12
Issue: 8
Page: 6423-6430
Publish at: 2014-08-01

Advances on Low Power Designs for SRAM Cell

10.11591/ijeecs.v12.i8.pp6063-6082
Labonnah Farzana Rahman , Mohammad F. B. Amir , Mamun Bin Ibne Reaz , Mohd. Marufuzzaman , Hafizah Husain
As the development of complex metal oxide semiconductor (CMOS) technology, fast low-power static random access memory (SRAM) has become an important component of many very large scale integration (VLSI) chips. Lot of applications preferred to use the 6T SRAM because of its robustness and very high speed. However, the leakage current has increasing with the increase SRAM size. It consumes more power while in standby condition. The power dissipation has become an importance consideration due to the increase integration, operating speeds and the explosive growth of battery operated appliances. The objective of this paper is to review and discuss several methods to overcome the power dissipation problem of SRAM. Low power SRAM can be produced with improvement in term of power dissipation during the standby condition, write operation and read operation. Discharging and charging of bit lines consumes more power during write ‘0’ and ‘1’compared to read operation. One of the methods to produce low power SRAM design is with make modification circuit at a standard 6T SRAM cell. This modification circuit will help to decrease power dissipation and leakage current. Several method was discussed in this paper for understand the method to produce low power design of SRAM cell. Recommendations for future research are also set out. This review gives some idea for future research to improve the design of low power SRAM cell.
Volume: 12
Issue: 8
Page: 6063-6082
Publish at: 2014-08-01

Dynamic Modeling Process of Neuro Fuzzy System to Control the Inverted Pendulum System

10.11591/ijeecs.v12.i8.pp6153-6163
Tharwat O. S. Hanafy , Mohamed K Metwally
The analysis and control of complex plants often requires the principles of qualitative process models since quantitative, namely analytical process models are not available. Qualitative modeling is one promising approach to the solution of difficult tasks automation if qualitative process models are not available. This contribution presents a new concept of qualitative dynamic process modeling using so called Dynamic Adaptive Neuro fuzzy Systems. This yields the framework of a new systems theory the essentials of which are given in further section of the paper. First, an identification method is presented, using a combination of linguistic knowledge.
Volume: 12
Issue: 8
Page: 6153-6163
Publish at: 2014-08-01

Application Research based on Artificial Fish-swarm Neural Network in Sintering Process

10.11591/ijeecs.v12.i8.pp6127-6133
Song Qiang , Wang Ai-Min , Li Hua
Sinter tumbler strength is an important parameter in the sintering process, and has an important influence on the performance of finished sinter. Artificial fish swarm algorithm have good ability to acquire the global performance, the neural network has strong nonlinear ability and local optimization performance,; AFSA+BP algorithm combined with artificial fish swarm algorithm and BP algorithm, realizes the complementary artificial fish swarm algorithm global search capability and BP algorithm's local optimization combination of performance, an artificial fish swarm neural results show that the network combination algorithm, it is shown that comparing with the traditional BP neural network forecasting method,the presented forecasting method has better adaptive ability and can give better forecasting results.The artificial fish—swarm algorithm network is trained and checked with the actual production data.this algorithm has strong generalization capability, predictive accuracy improved significantly, and speed up the convergence rate, provides an effective method for strength prediction. Which be used for off-line learning and prediction, a good basis for the online application.
Volume: 12
Issue: 8
Page: 6127-6133
Publish at: 2014-08-01

Small-world and Scale-free Features in Harry Potter

10.11591/ijeecs.v12.i8.pp6411-6416
Zhang Jun , Zhao Hai , Xu Jiu-qiang , Wang Jin-fa
Harry Potter is a series of seven fantasy novels which has got a huge success. To explore the reasons of so successful of the novel behind, we analyzed the characters network in Harry Potter from the perspective of complex networks. Studies show that the characters network in Harry Potter has got the small-world effect and scale-free feature. It is a typical complex network. The success of novel Harry Potter is precisely due to the complex properties of it, and this may give some guidance for novel writers when preparing their works.
Volume: 12
Issue: 8
Page: 6411-6416
Publish at: 2014-08-01

PLC SCADA Based Fault Identification and Protection for Three Phase Induction Motor

10.11591/ijeecs.v12.i8.pp5766-5773
Venkatesan Loganathan , S. Kanagavalli , P.R. Aarthi , K.S. Yamuna
Today overvoltage, over current, overload, over temperature, and under voltage are the most commonly occurred problems in protection circuits of induction motor. We usually design Protection circuits with components such as timers, contactors and current relays. In order to reduce the mechanical components usage we prefer to use Personal Computer (PC) and Programmable Logic Controller (PLC). In this method Induction motors current, voltage, Speed, temperature values and fault occurred history are monitored in PC with an Alarm Message during fault occurrence. PLC-based protection methods are costs less, provides higher accuracy with safe mode of operation when compared with the other protection systems.
Volume: 12
Issue: 8
Page: 5766-5773
Publish at: 2014-08-01

Image Protection by Intersecting Signatures

10.11591/ijeecs.v12.i8.pp6386-6392
Chun-Hung Chen , Yuan-Liang Tang , Wen-Shyong Hsieh , Min-Shiang Hwang
In this paper, we propose an exact image authentication scheme that can, in the best case, detect image tampering with the accuracy of one pixel. This method is based on constructing blocks in the image in such a manner that they intersect with one another in different directions. Such a technique is very useful to identify whether an individual image pixel has been tampered with.
Volume: 12
Issue: 8
Page: 6386-6392
Publish at: 2014-08-01

Embedded System Application for Blind People Navigation Tool

10.11591/ijeecs.v12.i8.pp6083-6087
Wakhyu Dwiono , Siska Novita Posma , Arif Gunawan
The stick for blindman navigational aid can only provide information about the presence of objects that being touched. This navigational aid stick can not provide more information such as object distance and the name of the place. To overcome this problem, we realized a navigational tool that can provide information about the distance of objects around the user and the name of the places where being passed. The existing objects are detected using three sets of ultra sonic sensors. These sensors emit ultrasonic signals, when the signal collide the obstacle, then will be reflected back and being received by these sensors too. The time lag between the transmitting and receiving signals then will be converted into the distance. RFID reader is used to read the presence or absence of tags around the RFID reader. Identity tag emits a signal that will be used to mark the place name. The results of measuring distance and sequence voice database recorder gives a good yield. Voice database recorder circuit works as well as the detection of RFID tags.
Volume: 12
Issue: 8
Page: 6083-6087
Publish at: 2014-08-01

A Complete Lattice Lossless Compression Storage Model

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/3756
Zhi Huilai
In this paper, a complete lattice lossless compression storage model is proposed to improve the storage efficiency. In order to build the proposed model, first all the upper and lower irreducible elements of the complete lattice are identified respectively, then an isomorphic mapping form the complete lattice to a concept lattice is founded, and finally a matrix is used to store the formal context of the concept lattice. Compared with using adjacent matrix, example and analysis show that the proposed method can improve the storage efficiency of complete lattice. DOI: http://dx.doi.org/10.11591/telkomnika.v12i8.5854 
Volume: 12
Issue: 8
Page: 6332-6337
Publish at: 2014-08-01

Performance Evaluation of Filters of Discrete Wavelet Transforms for Biometrics

10.11591/ijict.v3i2.pp97-102
Priya Bhirud , Nandana Prabhu
Biometrics associated with automated methods of identifying a person or verifying the identity of a person based on physiological or behavioral characteristics. Commonly used biometric features are facial features, fingerprints, voice, facial thermo grams, iris, posture/gait, palm print, hand geometry etc. Compared with other biometric characteristics iris is the most stable and hence the most reliable biometric characteristic over the period of a lifetime. This proposed work provides comparative study of various filters of Wavelet Transforms in terms of size and PSNR of images.
Volume: 3
Issue: 2
Page: 97-102
Publish at: 2014-08-01

Chaos Based Image Encryption using Expand-Shrink Concept

10.11591/ijict.v3i2.pp103-112
Naveenkumar S K , Panduranga H T , Kiran P
Image information security plays a vital role in computing and communication technologies. This paper describes a new concept of expand and shrink to enhance the strength of chaos based image encryption technique. This method consists of both permutations as well as substitution process for image scrambling and encryption. In permutation plain image is shuffled using chaos technique. Input image undergo two times chaos permutation in-between expand and shrink process leads to substitution. Permutation decreases the correlation between the pixel and substitution increases the entropy of encrypted image. Proposed encryption technique works for both gray-scale and color image. From the experiment highly scrambled image is obtained at the end of encryption process. Decryption process employs exactly reverse process of encryption which results in the reconstructed images.
Volume: 3
Issue: 2
Page: 103-112
Publish at: 2014-08-01
Show 1786 of 1995

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration