ARPN Journal of Engineering and Applied Sciences              ISSN 1819-6608 (Online)
 

 
GoogleCustom Search
 
 
 
ARPN Journal of Engineering and Applied Sciences                            April 2018  |  Vol. 13  No. 8
   
Title: Use of non-industrial environmental sensors and Machine Learning techniques in telemetry for indoor air pollution
Author (s): Gomez Carlos, Fonseca Valeria and Valencia Guillermo
Abstract:

Classic telemetry systems are usually limited to taking a large variety and number of measurements focused on outdoor air, large concentrations of automobiles and factories, but indoor air pollution has not been addressed with the same intensity. Any of the telemetry techniques generates a large amount of data that implies a great challenge for its analysis; this work demonstrates the application of Machine Learning techniques in telemetry systems focused on the study of indoor air pollution. A telemetry system has been developed which collects data from the environment which are concentrated in a centralized storage unit and are analyzed by automatic learning techniques that can predict the historical behavior of the CO2 concentration based on the variables of the environment, past records of CO2 and independent variables such as time of day, which creates an important tool to detect anomalous behavior in air pollution by CO2. Results of the development of several data prediction models based on Kernel methods to estimate a regression are presented.

   

Full Text

 

Title: A counterbalancing technique for skew and power management of clock tree
Author (s): Maneesha Jayakumar, Umadevi Seerangasamy, V. Prakash and Abraham Sudharson Ponraj
Abstract:

Many Integrated Circuits (or ICs) consisting of sequential logic use a clock signal for synchronizing different components of the circuit. The clock tree distributes the clock signals from its source to all the components and hence, any uncertainty in the arrival times of the clock signals can intensely limit the performance of the whole circuit. Generating the clock tree network with minimum skew and power consumption plays a vital role in digital IC design. On this research work, the three methods i) low swing ii) buffer upsizing and iii) polarity assignment techniques has been used together to achieve minimum power and skew in a clock tree network. It has been observed that applying polarity assignment technique after the low swing and buffer upsizing techniques reduces the clock tree network delay to 25% and power consumption of the clock tree network lies between first two techniques and hence this method gives counterbalanced clock tree network with respect to skew and power consumption. The research work has been carried out using tsmc 180nm technology library, Cadence® Virtuoso®, Cadence® Layout editor and Cadence® Assura® tools.

   

Full Text

 

Title: A new approach for Aircraft Landing Scheduling problem based on the Deadline Monotonic algorithm
Author (s): Sallami Chougdali, Khalifa Mansouri, Mohamed Youssfi and Mohammed Qbadou
Abstract:

Historically, the Aircraft Landing Scheduling (ALS) problem remains one of the complex problems in the air traffic management domain. In the last years the number of air traffic increases on almost all airport platforms in the world, so the aircraft landing scheduling optimization become a critical problem. In the practice the ALS problem can be considered as an optimization problem under constraints and that requires real-time approach to solve it. Several methods of optimizing the landing cost of a sequence of aircraft have been proposed, such as methods using the approach of linear programming and other optimization methods based on meta-heuristics algorithms. These methods have shown great advantage over the method first-come-first served (FCFS) currently used for air traffic management. In this paper, we propose a method that optimizes the aircraft landing scheduling problem based on real time scheduling algorithm Deadline Monotonic (DM). This approach solves the ALS problem in two steps. First, it gives a mathematical model of aircraft landing scheduling problem, thereafter in the second step, our approach schedules.

   

Full Text

 

Title: Structural and power analysis of Ripple Carry Adder in QCA
Author (s): S. Senthilnathan and S. Kumaravel
Abstract:

Adders and Multipliers are used frequently in the design of several computing subsystems that includes arithmetic and logical units (ALUs). A quantum-dot cellular automata (QCA) which is promising and emerging Nano-technology is used to realize such subsystems with high-performance, ultra-dense and low-power. For reliable realizations of QCA based designs, structural and power analysis is essential. Most of the QCA based Ripple Carry Adder (RCA) reported in the literature doesn’t consider the structural and power consumption issues. In this paper, the existing design of QCA based Ripple carry adder is studied extensively based on structural and power analysis. The QCA based RCA is implemented and verified for its functional output using QCA Designer tool. The power dissipation is estimated using QCA Pro simulator which is an accurate power estimator tool.

   

Full Text

 

Title: A new technique of load shedding to stabilize voltage magnitude and Fast Voltage Stability Index by using hybrid optimization
Author (s): Raja Masood Larik, Mohd. Wazir Mustafa, Abdulrahaman Okino Otuoze, Obalowu Olatunji Mohammed and Aliyu Hamza Sule
Abstract:

The boundary limitation of power systems in terms of generation and network growth, Owing to lack of generation or transmission capacity, due to this a power system operates near to its stability boundaries. The growing complexity of heavily loaded power systems stuck through disturbances and outages makes the problem of voltage uncertainty even worse, a blackout is usually the result of increasing load beyond the transmission capacity of the power system. Therefore, under voltage load shedding (UVLS) is performed as a final remedy to avoid larger scale voltage collapse, restore reactive power balance and finally re-establish the operating conditions, so it is considered, as state of the art to achieve voltage stability. Weak buses are identified using the Fast Voltage Stability Index (FVSI). Moreover, it is capable for identification of critical areas in a large power system; determine the point of voltage collapse, maximum permissible load, and the most critical line in an interconnected system. It is highlighted that if load shed is conducted at the location with high FVSI index value, the system would become more voltage stable. This paper focuses on optimal load shed as well as enhancing the system voltage profile this results to stabilize fast voltage stability index values by using a hybrid optimization algorithm based on the well-known Genetic Algorithm (GA) and Particle Swarm Optimization (PSO). GA has traditionally been known for its accuracy while the PSO algorithm is popular for its fast convergence time. The GAPSO algorithm is utilized to minimize the total amount of load shed on the weak buses under the constraint of maintaining the minimum system voltage profile. The performance of the proposed technique was assessed by simulations in MATLAB/SIMULINK under the IEEE-30 bus meshed networks. Thus, the proposed technique is not only robust against system failures but is also efficient enough for real time applications in power systems.

   

Full Text

 

Title: Embedding the hidden information into java byte code based on operands’ interchanging
Author (s): Andrey Vladimirovich Krasov, Aleksander Sergeevich Arshinov and Igor Aleksandrovich Ushakov
Abstract:

Software piracy becomes more and more a serious issue by the day, software companies lose money because of that. In this article the technique called software watermarking has been considered. A digital watermark is embedded by means of slightly changes of the executable file. Such changes must not be found and not change the program’s logic. The system of embedding digital watermarks into executable java files by means of operands’ interchanging has been designed. The designed system does not change the file volume and the execution time. This system can be used to protect copyright on software or on a part of it.

   

Full Text

 

Title: Dijkstra algorithm based intelligent path planning with topological map and wireless communication
Author (s): Lyle Parungao, Fabian Hein and Wansu Lim
Abstract:

In this paper, an idea of intelligent path planning was introduced. Using information received from a server that is transmitted through a wireless communication, the data is processed to edit a provided topological map, with which a shortest path calculation will be executed. Information about the destination and blocked road parts is sent to a mobile robot using a wireless ad hoc network communication. The mobile robot will process this information in a topological 2D-array map and ignore the blocked parts of the road for the shortest path calculation based on Dijkstra’s algorithm. Aside from the intelligent path planning, an automated driving algorithm was also implemented using infra-red sensors installed on the mobile robot to navigate the robot to its destination.

   

Full Text

 

Title: Applications of artificial intelligence in geotechnical engineering
Author (s): Nabeel S. Juwaied
Abstract:

The use of artificial intelligence (AI) techniques to deal with complex geotechnical problems has recently escalated. Which may be the result of the lack of efficiency of traditional methods, or the promising potential of these techniques to represent such complexity. Artificial intelligence has been applied in most areas of geotechnical engineering. In this research, these applications were extensively reviewed and discussed. Where they showed great success in most of them.

   

Full Text

 

Title: The influence of substrate surface energy on the adhesion compatibility of epoxy adhesive using molecular simulation tool
Author (s): Nurul Farah Izati Ahmad Nizam, Nabihah Sallih, Dewi Puspitasari, Turnad Lenggo Ginta and Mazli Mustapha
Abstract:

The utilization of structural adhesive onto aluminium oxide (Al2O3), aluminium (Al) and polyvinyl chloride (PVC) can be remarkably observed in much industrial application such as aerospace, automotive, electronics and medical. Due to the abundant prominent properties exhibited by epoxy resin, the relevancy of opting for it as adhesive agent in the aforementioned industry is believed to be highly beneficial. However, the feasibility of implementing the idea is still not clear. It was the objective of this study to shed light on those aspects which are lacking in literature. In this study, Materials Studio 6.0 will be utilized to model and simulate the compatibility and adhesion strength of epoxy resin with three different substrates i.e. Al2O3, Al and PVC. Simulation consist of molecular dynamics (MD) and molecular mechanics (MM) reveal the significant influence that each substrate gives in promoting the adhesion compatibility within the epoxy-substrate system. The computed result has shown significant agreement upon the experimental data in which the epoxy resin is most compatible with Al2O3, followed by Al and lastly with PVC.

   

Full Text

 

Title: Bentonite-biochar composite for bleaching of Crude Coconut Oil
Author (s): Jessica Angelia Suhadi, Elizena Filipe Goncalves, Kuncoro Foe and Felycia Edi Soetaredjo
Abstract:

CNO (Crude Coconut Oil) is oil extracted from coconut flesh that is orange or brownish yellow. Usually, CNO refining process is done through bleaching process or blanching to remove color. In general, this oil blanching process using bleaching earth or bentonite as an adsorbent. In this study, bentonite was combined with biochar to improve its adsorption ability. The purpose of this research is to investigate the process of making bentonite-biochar composite from cassava peel and its application in CNO bleaching process. The variables studied in the manufacture of bentonite - biochar composite for CNO blanching process were the ratio of bentonite: biomass, and the influence of temperature on the composite manufacturing process. The maximum color removal was 99.2 %.

   

Full Text

 

Title: Economic analysis of anethanol-to-hydrocarbon processset-up through modelling and simulation using Aspen Plus
Author (s): Abdulwahab GIWA
Abstract:

This research work has been carried out to develop and simulate the reactive distillation and conventional models for production of hydrocarbon ether (diethyl ether) from ethanol for the purpose of economic analyses. The development of the models for the two process methods were achieved with the aid of Aspen Plus using RadFrac as the column for the reactive distillation process and an equilibrium reactor in addition to RadFrac for the conventional process method. The column used in both cases had 21 stages including a total condenser and a kettle reboiler, and the feed entered the column at the 11th stage of the column. For the two processes, Non-Random Two-Liquid activity coefficient model was used as the Property Method. From the results obtained, it was discovered that the performance of reactive distillation process was better than that of the conventional method of diethyl ether production from ethanol. This was because the mole fraction of liquid product given by the reactive distillation process was higher than the one obtained from the conventional method of production when the two of them were operated at approximately the same conditions. Furthermore, the observations made from the economic analyses of the two approaches of the production indicated that reactive distillation was a cheaper process to set up and operate because its total capital cost, operating cost, utilities cost, equipment cost and equipment installation cost were estimated to be less than those of the conventional method of the ethanol-to-diethyl ether process.

   

Full Text

 

Title: Development of home automation systems by using Android apps
Author (s): Mohd. Azlan Abu and Wan Muhamad Faris Wan Kamarulzaman

Abstract:

The purpose of this paper is to develop an android based home automation systems using raspberry pi. This project focuses on the smart home electrical appliances such as light and fans so that they can be controlled from far or mobile communication systems that is using 3G network. Status of the fan or light whether it is off or on is collected by the Raspberry Pi as the main processor. The access point will transmit data using internet. The data is accessed by using smart phone operating in Android application. This technology offers new and exciting opportunities to increase the connectivity of devices within the home for purpose of smart home controller, due to their portability and their wide range of capabilities. They can communicate with a smart home controller network through an internet gateway. This project creates a user friendly interface for the android devices that allow a user to communicate with the Raspberry Pi server and the server is communicating with the corresponding relay. Each relay is connected to electrical appliances.

   

Full Text

 

Title: A 3.4 GHz fast-locking PLL using transmission gate charge-pump in 0.18µm CMOS for HDMI applications
Author (s): Ramanjaneyulu Ningampalli, Satyanarayana Donti and Satya Prasad Kodati
Abstract:

A 3.4 GHz Phase Locked Loop (PLL) with a Differential Ring oscillator is simulated in a 0.18µm CMOS process with 1.8V power supply. The reference clock frequency is 212.5 MHz with a mod 16 frequency divider the PLL generates a 3.4 GHz frequency. The proposed PLL can be locked from 2.539 GHz to 5.0793 GHz with a lock range of 2.54 GHz with 48.4% of duty cycle. The peak-peak jitter is 8.786ps with an RMS jitter of 1.18 ps and pull-in time 170ns (fast lock-in time). The PLL consumes 18.8mW power from a 1.8V power supply. PLL Blocks are simulated with 1.8V, 0.18µm CMOS Technology using Cadence-Virtuoso tool.

   

Full Text

 

Title: Battery management system based on Synchronous Non-Inverting Buck-Boost DC-DC converter
Author (s): H. Suryoatmojo, M. N. Khakam, M. Ashari, R. Mardiyanto and E. Setijadi Dan M. Ridwan
Abstract:

Battery and load management on a stand-alone electric generator from renewable energy sources manages the process of battery charging and discharging. This study discusses design, simulation and implementation of Synchronous Non-Inverting Buck-Boost (SNIBB) using four-switch H-bridge to control current and voltage of multi-stage charging lead acid battery. When the voltage is under 2.4 V/cell, the charging current of battery is kept constant using constant-current (CC) mode, then the voltage is kept constant on constant-voltage (CV) mode until the charging current reaches 5% and it is switched to float-charge mode with set point voltage 2.25 V/cell. Controlling battery charging/discharging and load is using two switches with the parameters, such as power electric source, battery capacity, and load. The implementation of the design is using microcontroller ATMega 16 with PI controller. As on CV and CC mode, SNIBB circuit is able to keep voltage and current appropriate to the set point with the changes of input voltage. On CC mode, when the set point of current is increased, the charging time is faster. The result shows that the battery management designed is able to control charging and discharging the battery to the load.

   

Full Text

 

Title: Constructing an information matrix for multivariate DCC-MGARCH (1, 1) method
Author (s): Maleeva E. A., Kritski O. L. and Amini M. H. M.
Abstract:

The analytic form of Fisher Information Matrix (IM) for DCC-MGARCH (1, 1) was suggested. After that, it was applied for simplifying the general algorithm: the statistical hypothesis about constant correlation matrix usage was put forward and statistical verification was made. IM was employed for Russian share market: to do investigations the five equilibrium portfolios was compounded from four different shares in each case. Computations made showed that there are three types T1–T3 of trading days on the market and day type changing from T1 to T2 and vice versa is happening over the time moments T3. Moreover, the clustarisation effect of multivariate volatility that was investigated by scientists from all around the world in the univariate case was discovered and described.

   

Full Text

 

Title: Determination of speed range of hammer mill grinder
Author (s): Mikhail Semenovich Eliseev, Mikhail Gennadyevich Zagoruyko, Dmitriy Alekseevich Rybalkin, Aleksey Alekseevich Leontyev and Andrey Vladimirovich Peretyatko
Abstract:

In Russia 2017 was declared the Year of ecology. Enormous amounts of wastes resulted from scouring of agricultural crops (husks of sunflower, buckwheat, panicum etc.) impair environmental situation. Nevertheless, such wastes are widely applied in various industries. In order to use the wastes after processing of agricultural products it is necessary to grind them and to mix with various components in certain ratios. Hammer mill grinders are the most widely applied machines. However, their design and workflow are characterized by certain disadvantages leading to quality impairment of final products and significant energy consumption. Thus, we developed new designs of hammer mill grinder and hammer which allow to reduce grinding energy consumption and to increase yield. This article is devoted to theoretical study of optimum angular speed of rotor shaft with the hammers of the proposed grinder design.

   

Full Text

 

Title: Design of signature analyzer structures with required properties
Author (s): Evgeniy Feofanovich Berezkin
Abstract:

A problem of signature analyzer synthesis with required properties is solved for digital schemes compact testing. The main attention is devoted to the issues of eliminating losses of diagnostic information and to simplicity of structural organization. Solutions are based on detecting all error vectors or matrices resulting from failures of diagnostics objects related to the postulated class. Any other error vectors or matrices can be non-detectable and are excluded from consideration. A software implementation of the mathematical model is proposed. Error vectors or matrix detection process visualization aids are given.

   

Full Text

 

Title: Low power test pattern generation using Test-Per-Scan technique for BIST implementation
Author (s): K. Jamal, P. Srihari, K. Manjunatha Chari and B. Sabitha
Abstract:

This paper introduces the function of test cases with minimal power for Built-In-Self-Test (BIST) implementation. This method intends Test-Per-Scan (TPS) based test cases using Multiple Single Input Change (MSIC) architecture. Multiple SIC patterns are developed by using EX-OR operation of twisted ring counter and test design algorithms like Linear Feedback Shift Register (LFSR),Bit-Swapping LFSR (BSLFSR), and Cellular Automata (CA). These patterns are used to a diminish number of transitions in the test patterns that are generated. The preferred method uses Test-Per-Scan technique for generating Multiple SIC test patterns. TPS diminished the power consumption during test mode. The seed generator used in TPS is modified LFSR’s i.e., BS-LFSR, Cellular Automata (CA). BS-LFSR is composed of with an LFSR with a multiplexer. In CA, it also presents a variation on a BIST technique, which is from a one-dimensional cellular automaton; the pseudo random bit generator is generated. The proposed Hybrid Cellular Automata (HCA) using the rules 90 and 150 to generate the pseudo random designs. Moreover, the CA implementations illustrates properties of data compression like LFSRs and that they exhibit locally and with topological consistency significant attributes for a VLSI design. In this proposed method, LFSR is replaced with BS-LFSR, and HCA. Simulation and synthesis outcome with ISCAS c432 benchmark determine that Multiple SIC can reduce the power consumption.

   

Full Text

 

Title: Predicting strength of pillars in fractured rock mass during development of apatite-nephelinic ores
Author (s): Vladimir Leonidovich Trushko, Anatoliy Grigoryevich Protosenya and Pavel Eduardovich Verbilo
Abstract:

A method of predicting the strength characteristics of fractured rock massif with the help of numerical modeling by the finite elements method in the Simulia Abaqus software suite has been proposed with respect to the conditions of the deposit of apatite-nephelinic ores in the Rasvumchorr Plateau of JSC "Apatit" in the Kirovsk Area of the Murmansk region. Geometric and geo mechanical models of solids in the fractured rock mass have been built, where blockiness is taken into account in explicit form, and for modeling the conditions of contact interaction, nonlinear strength criterion of Barton is used. The sequences of creating a numerical geo mechanical model of rock mass have been considered, and schemes of virtual testing have been specified. Studying the behavior of the model of pillars under load was aimed at defining the scale effect of tensile strength limit on uniaxial compression (bearing capacity) of the pillars in the fractured rock mass. The article also studied the anisotropy of strength and deformation characteristics of the rear sight and the effect of the ratio of sides on its carrying capacity. The proposed approach has been qualitatively compared to the existing empirical correlations.

   

Full Text

 

Title: Improving QoS parameters in wireless sensor network
Author (s): Hyder Ali Hingoliwala and Gandharba Swain
Abstract:

Wireless sensor network is a collection of sensor nodes that are used for sensing the environment and transmitting the data to the base station. In WSN there are multiple Quality of Services which includes energy efficiency, throughput, delay, congestion control etc. that are used to increase the performance of network. The different routing protocols are used in network for finding the shortest path between source to destination. There are different routing protocols like AODV, DSDV, DSR .wireless sensor network is based on routing protocols and MAC protocols. In wireless sensor network source node send packet to the destination node. End-to-end delay, packet delivery ratio, packet loss ratio, throughput, energy consumption, congestion control etc. are the QoS parameters for wireless sensor network. Author Mohammad et al. Implement the IH-MAC protocol for achieving the energy and delay parameters in sensor networks. Authors implement IH-MAC using Link and Broadcast scheduling concept with parallel transmission. But in this paper we have designed and implemented RH-MAC protocol using CSMA and TDMA MAC Protocols. RH-MAC for achieving the Quality of Services (QoS) like PDR, PLR, Throughput, end-to-end delay, congestion control and reliability. For congestion control applying TDMA protocol to the nodes which are one hop away from the sink node. CSMA for the rest of the nodes. In second model we have to implement the Cluster based data dissemination.

   

Full Text

 

Title: Propagation path loss modeling and coverage measurements in urban microcell in millimeter wave frequency bands
Author (s): Mohammed B. Majed and Tharek Abd. Rahman
Abstract:

The global bandwidth deficiency facing wireless carriers has motivated the exploration of the underutilized millimeter wave (mm-wave) frequency spectrum for future broadband cellular communication networks, and mm Wave band is one of the promising candidates due to wide spectrum. This paper presents propagation path loss and outdoor coverage and link budget measurements for frequencies above 6 GHz (mm-wave bands) using directional horn antennas at the transmitter and omni directional antennas at the receiver. This work presents measurements showing the propagation time delay spread and path loss as a function of separation distance for different frequencies and antenna pointing angles for many types of real-world environments. The data presented here show that at 28 GHz, 38 GHz and 60 GHz, unobstructed Line of Site (LOS) channels obey free space propagation path loss while non-LOS (NLOS) channels have large multipath delay spreads and can utilize many different pointing angles to provide propagation links. At 60 GHz, there is more path loss and smaller delay spreads. Power delay profiles PDPs were measured at every individual pointing angle for each TX and RX location, and integrating each of the PDPs to obtain received power as a function of pointing angle. The result shows that the mean RMS delay spread varies between 7.2 ns and 74.4 ns for 60 GHz and 28 GHz respectively in NLOS scenario.

   

Full Text

 

Title: Towards a framework for context-aware information systems: a metamodel-driven definition and implementation
Author (s): Zineb Aarab, Rajaa Saidi and Moulay Driss Rahmani
Abstract:

Context-awareness has captivated a lot of attention, especially in the field of pervasive and mobile computing which gives the naissance of the concept of smart cities in the last decade. Doubtless an important demand for real-world location data inner the virtual world is expanding. Nevertheless, users’ context is more than its location. Most context-aware information systems do not take into account the diversity of users’ preferences and needs because of its complexity to manage. A key element in the design of context-aware systems is the representation and management of context and of its attributes, to be able to define a relationship between each context and the aspects of interest. In this sense, the objective of our paper is to present a generic context metamodel for the development of context-aware systems. The automation that context-aware systems give can solve many problems and contributes to the concretization of the concept of the smart city. In this paper, we present our context-aware traffic light control system architecture and its implementation as a use case for our contribution which is the generic context framework for context-aware systems.

   

Full Text

 

Title: Multimodal image fusion and bee colony optimization for brain tumor detection
Author (s): Jany Shabu S. L. and C. Jayakumar
Abstract:

Medical image fusion is a method that concatenates different features of multimodality images into a single image. The fused image is used to make accurate decisions for doing further treatment by the doctors. In medical imaging, neurologists require the ability to fuse brain tumor images. Computer Tomography (CT) scan provides detailed cross-sectional views of all types of tissues. Whereas Magnetic Resonance Imaging (MRI) scan, a non-invasive nuclear diagnostic procedure for imaging tissues. And Single Photon Emission Computational Tomography (SPECT) scan handovers, a nuclear medicine imaging technique using gamma rays to show blood flows in organs. Also, Positron Emission Tomography (PET) delivers a three-dimensional image of metabolic activities in tissues and functions of organs. We obtain scanned images of these technologies and fuse it together. Adaptive Histogram Equalization and Anisotropic Filtering is an applied in the pre-processing step to remove noise present in the images. Bee colony optimization method is used for fusion which gives best results compared to conventional algorithms. PSNR and entropy value is calculated to show the robustness and efficiency of the system developed.

   

Full Text

 

Title: A novel GPS multipath error estimation technique for urban civil surveying
Author (s): N. Swathi, V. B. S. Srilatha Indira Dutt and G. Sasibhushana Rao
Abstract:

The awareness of orientation of multipath is critical for site selection or for antenna accumulation, particularly in the applications like precise monitoring of earthquake movement and tsunami detection. This paper presents the analysis of the multipath error estimated on the L1 frequency (1575.42MHz) of all the GPS satellites that are visible from the Andhra University College of Engineering, Visakhapatnam. This analysis is useful in determining the location of the obstructions in the path between satellites and receiver. From this analysis the location of the satellite which is affected more by the multipath can also be determined. The analysis is done using the TEQC toolkit and the CF2SKY toolboxes [1, 2]. The analysis made in this paper is also useful in determining which location of the receiver antenna has more multipath and at which location it is less and thereby the antenna can be mounted at less multipath location.

   

Full Text

 

Title: An analysis of the beneficial of energy saving device
Author (s): Mohd. Firdaus bin Mohd. Ab Halim, Khalil Azha Mohd. Annuar, Mohamad Haniff Harun and Nik Azran Ab Hadi
Abstract:

This paper discusses about the energy saving device product which claim that it can reduce the electrical consumption in domestic building when connected to any point of power line bus or improve the energy conversion of electrical appliances. In 2014, electricity saver product had claimed losses amounting to USD 1 million in Malaysia alone. Power factor correction is proven to reduce electricity consumption in commercial and industrial building but do it applies to the domestic building as well? To prove or disprove this case, an energy saving device is constructed and tested in real situation. Multiple appliances are connected with and without the energy saving device. The result shows an insignificant amount of losses being reduced by the device and in some cases further increase the power consumption due to LED’s indicator that continuously switched ON once it is connected. The result of this study provides the awareness to the consumer to be more critical and stop supporting a non-beneficial product that is theoretically and practically faulty.

   

Full Text

 

Title: Body sensor using Internet of Things (IOT)
Author (s): S. Revathi, Pulichintha Harshitha, Prashanthi Narramneni and Raghavee N. S.
Abstract:

In recent proceedings in IT and communication have led to the birth of a new technology named Internet of Things (IOT) Healthcare is one of the most vital domains that are present today. Healthcare has seen a wide transformation over time. Body Sensor Network is definitely one of the most vital technologies used in studying a healthcare system which functions on IoT. It is basically a combination of very low-power and wireless nodes of a sensor that are essentially used to supervise the human body functions and the environment surrounding the patient. The nodes of Body Sensor Network are used to gather critical and proximate information which enables the system to function in unreceptive environments. Severe and appropriate security methods are used to prevent unnecessary interaction with the existing system. A controlled map of services with respect to health services should be enabled to make health care available to the human population. The main objective of this project is to talk about the problems linked to the usage of wearable and implantable sensors for distributed mobile computing.

   

Full Text

 

Title: Catastrophic fault analysis on Butterworth low pass filter
Author (s): Shailaja Mantha and Asha Rani M.
Abstract:

Testing of analog circuit is a challenging domain compared to digital circuits. This is mainly due to the difficulty to access the internal nodes. To prevail this difficulty an approach is presented for testing of Analog circuits. In this paper a hierarchical method for detection, location and identification of a single catastrophic fault is proposed. The circuit under test (CUT) is analyzed with different values of components which can be faulty. The response of the circuit is analyzed considering few parameters for analysis. A Fault dictionary consisting of these parameters is developed. This method uses top down Hierarchal testing of the system. Using this proposed method, single catastrophic faults in an analog circuit can be identified.

   

Full Text

 

Title: Study on tool wear and tool life during milling JFRP using uncoated carbide cutting tool
Author (s): M. A. N. Rashid, S. A. Khan, M. K. Nor Khairusshima and Norshahida Sarifuddin
Abstract:

Jute fiber-reinforcement polymer (JFRP) composite is a cheap material that is broadly used in automotive, marine, aircrafts, domestic upholstery applications because of its various high quality properties. During machining, a few of problems arise due to the Jute fiber in JFRP. Abrasive nature of this composite creates tool wear on the cutting tools during JFRP machining, thereby the life of the cutting tool become shorter and damage the surface quality. In this study, the solid uncoated carbide cutting tool (8.0 mm) performance and the life of tool were measured on the JFRP composite panel during the CNC milling process were examined. A spindle speed ranging from 671.57 rev/min to 6328.43 rev/min and a feed rate ranging from 108.58 mm/min to 391.42 mm/min were used in the experiment. Results found that the longest tool life 41.6 min were achieved at lowest feed rate 108.58 mm/min and the highest spindle speed 6328.43 rev/min effects on tool life 14.4 min. The shining area of the cutting tool shows the abrasive nature of jute fiber and chips formation mechanism.

   

Full Text

 

Title: Fiber gypsum concrete composites with using volcanic tuff sawing waste
Author (s): Khezhev T. A., Pukharenko Yu. V., Khezhev Kh. A. and Klyuev S. V.
Abstract:

The results of studies on the development of gypsum fibre concrete composites with using of volcanic tuff sawing wastes, which provides a reduction in specific consumption of gypsum binder by 30, 5-31, 7 % without reducing the strength of gypsum concrete are presented. The new formations in the gypsum lime tuff concrete composite are established. The effect of granulometric composition of tuff stone sawing waste on the strength characteristics of the gypsum concrete composite is revealed. The structure of gypsum lime vermiculite tuff composite is designed and their flame retardant properties are investigated by experimental and computational methods. The influences of the parameters of disperse reinforcement on the properties of fiber gypsum tuff concrete and fiber gypsum vermiculite tuff composites are defined. Developed fiber gypsum vermiculite tuff composites have higher strength and fire resistant properties. The proposed algorithm of calculation with finite-difference implicit scheme for solving the heat conduction problem and the sweep method allows selecting and specifying the coefficients and the functional dependencies included in the mathematical model, and only approximately known a priori and provides an acceptable coincidence with the experimental data.

   

Full Text

 

Title: Risk analysis of drinking water process in drinking water treatment using fuzzy FMEA approach
Author (s): Dino Rimantho and M. Hatta
Abstract:

Drinking water treatment in the local water company in Indonesia faces a variety of complex and vulnerable problems. In order to know the potential risks to clean water treatment and selecting action based on priority is required a risk identification and evaluation model. The purpose of this paper is to identification and analyze the risk of drinking water processing. Risk identification will be done using the Fishbone method approach and risk analyze using the FMEA fuzzy model, with input data from several experts. The results showed that the main risk factors in water treatment such as machine, human, method and raw water material. The result of the calculation using MATLAB shows the highest FRPN value is incorrect dosing dosage (883) and lack of pumping machine maintenance periodically (809). In addition, other factors are still categorized medium and low. Overall this model can be used to identify risk factors and variables on clean water treatment processes and choose priority actions. Thus, it will be obtained a recommendation of the right action to anticipate it.

   

Full Text

 

Title: UML based model for displaying Privacy Preserving Data Mining Systems
Author (s): Anurag, Deepak Arora and Upendra Kumar
Abstract:

Physical deployment of Privacy Preserving Data Mining System is a great challenge for organizations nowadays. What are different hardware and software files needed for deployment? How different software files across the system should interlinked together for functioning correctly. What execution environment should be provided for different platforms on the same hardware? What are various protocol needed for hardware communication. Its prior knowledge will assist the developers for successful implementation of the entire framework. This paper deals with UML pictorial model for enabling the developers in successful installation of Privacy Preserving Data Mining Systems during run time environment. This would enable for the engineers in developing the software projects within optimum time, within budget, reduce the chances of errors and in turn minimizes the development and maintenance effort.

   

Full Text

 

Title: Development of android application for controlling children’s usage of smartphone
Author (s): Raymond Joshua P. S., Satrio Yudo Prawiro and Wansu Lim
Abstract:

In a world of everlasting development of technology, personal digital assistant such as smartphones have become extremely important among people around the world. The result, people became addicted to these devices, which can give negative impact on their mental health and well-being. The researchers see the importance of this issue and aim to develop an Android application, namely KidConrol, an application that can make a rule when their kid try to use smartphone. This application allow the parent to setting the time when using the smartphone, the maximum time of using it, and the application allowed for the kid.

   

Full Text

 

Title: Scribble legalization cryptographic Aspect Based on data access control for steam count
Author (s): Yerragudipadu, Subba Rayudu, R. M. Noorullah and C. Praveen Kumar
Abstract:

Recently, healthcare applications adopt the advents of cloud technologies. Electronic Health Records (EHR) plays a vital role in healthcare environments. Thus, the proper usage and protection of EHR systems enabled the growth of cloud based healthcare applications which implies the patients-safety of their sensitive information. However, the data owner should be online in order to send the PRE keys to the CSP in a timely fashion, to prevent the revoked user from accessing the future data. The delay of issuing the PRE keys may cause potential security risks in this paper, we have proposed cryptographic Aspect Based access control system for EHR systems which uses time and location based user’s authentication process. A defined set of attributes embedded with time period T to access the data by its intended users. Experimental results have shown the efficacy of our proposed work in terms of decryption key compromised, role expiration and lessened key complexity have been studied.

   

Full Text

 

Title: Control of laser-field technological complexes for tool hardening
Author (s): Bashmakov D. A. and Zvezdin V. V.
Abstract:

Specific features formation of hardened layer of metals with unknown curvature under the joint action of laser radiation and an electrostatic field are described. It is shown, that the quality of the technological process of hardening depends on not only the energy characteristics of the hybrid technological complex, the temperature of the surface layer, but also on the accuracy of positioning the focus of laser radiation and its perpendicularity with respect to the surface of the part. The results of the studies show, that the deviation of the laser radiation focus from the surface of the part should not exceed 8-10 µm, and its vertical not more than 1 degree.

   

Full Text

 

Title: Enhance peak to average power ratio (PAPR) in OFDM systems using Partial Transmit Sequence
Author (s): Susritha, N. Bala Subramanyam, T. S. Arulananth and R. Karthik
Abstract:

Orthogonal Frequency Division Multiplexing (OFDM) system is preferred in many advanced high data rate wireless communication systems such as Wi-max, WI-FI, Digital Video Broadcasting (DVB), advanced LTE and Hiper-LAN as it is free from multipath fading. Even though this technique is power efficient as well as bandwidth efficient, there are a few drawbacks such as increase in peak power which results in High Peak to Average Power Ratio (PAPR) and Inter Carrier Interference (ICI). High PAPR leads to requirement of power amplifiers with large dynamic range A/D, D/A converters which increases complexity in the system. There are different techniques to reduce PAPR such as clipping & filtering, Partial Transmit Sequence (PTS) and Selective Level Mapping (SLM). In this paper we are implement a distortion less technique is known as Partial Transmits Sequence (PTS) algorithm is analyzed for the reduction of PAPR. In PTS, an input data sequence is partitioned into a number of disjoint sub blocks and each sub block is handled through phase factors. A Low Density Parity Check (LDPC) block code is used for encoding. In this paper, the PAPR values with and without PTS for different modulation techniques are compared.

   

Full Text

 

Title: An active learning media of interfacing microcontroller 8051 to 4x4 keypad using MCU 8051 IDE and ASM-51
Author (s): Dahlan R. P. Sitompul and Siti Dara Fadilla
Abstract:

On this occasion, the author discusses the development of an instructional media of active learning teaching to interface microcontroller 8051 to a virtual 4 X 4 Keypad by using a simulator called MCU 8051 IDE on Windows 7 (MCU 8051 IDE runs on various operating systems) to support the implementation of active learning for higher education. The developed Learning and teaching Media is in the form of simulating program to read the pressed button of the virtual 4 X 4 Keypad and display the ASCII code obtained to a virtual structure of 8 common anode LEDs and to the virtual 2 X 16 LCD display as well. The developed program was built by using ASM-51 embedded in the MCU 8051 (in assembly language); this simulator (MCU 8051 IDE) can be downloaded for free at sourceforge.net site [3]. The scenario of this simulating media is as follows, the simulating program runs continuously and pooling the virtual keypad. When a button is pressed by clicking one of the virtual buttons the program will decode the pressed button to the ASCII code and display it to the two virtual displays mentioned above and then repeat the program continuously. According to the writer's observation the developed simulation program has been stable and successful as a media of teaching and learning of Microcontroller 8051 in interfacing Microcontroller 8051 to the 4 X 4 Keypad and increase the participation and engagement of the students in the learning process, allowing the teacher to apply their teaching strategies more conveniently and successfully in overcoming the lack of funds to meet the needs for equipment in supporting active learning. The simulation program has also been successful in reducing errors in developing or manufacturing the real equipment (reducing costs).

   

Full Text

 

Title: A review on piezoelectric energy harvester and its power conditioning circuit
Author (s): Nur Amalina Ahmad Nawir, Amat Amir Basari, Mohd. Shakir Md. Saat, Ng Xue Yan and Seiji Hashimoto
Abstract:

The application of batteries as the main portable power sources is not applicable any longer as it has limited lifespan. This paper presents the recent concern on the power requirements of Wireless Sensor Nodes and the studies on the development of energy harvesting system using piezoelectric devices. Ambient Energy harvesting is one of the alternatives in replacing the use of batteries and wiring where small amounts of energy from environmental sources such as solar, air flow or vibration is harvested to form an electrical energy. Numerous studies have shown that power density of energy harvesting devices is in the range of hundreds of microwatts, while from the literature study it reveals that power requirements of most of electronic devices are in the range of milliwatts. Therefore, a key challenge for a successful deployment of energy harvesting technology remains, in many cases, the provision of adequate power. General discussion on two types of rectifier; full-wave bridge rectifier and voltage doubler also presented at the end of this paper.

   

Full Text

 

Title: Geological condition at landslides potential area based on Microtremor Survey
Author (s): Suhendra, Zul Bahrum C. and Nanang Sugianto
Abstract:

Vulnerability to landslide hazard significant effected by geological condition such as decrease of material strength. The weakness in the composition or structure of rock can be estimated by seismic vulnerability index and shear wave velocity. A hundred seismic stations have installed at along Central Bengkulu to Kepahyang cross lane (mountain region: Bukit Barisan) to record ambient noise as rock response. All of Microtremor data analysed by using HVSR and Dinver to get amplification factor, resonance frequency of ground motion and 1D models of shear wave velocity, respectively. Based on distribution of seismic vulnerability index, it has been divided into four zones, including brown zone, red zone, yellow zone, and green zone. Brown zone was a highest seismic vulnerability index (Kg= 25.82) in along of line, then red zone yellow zone and green zone, respectively. Based on shear wave velocity model, red and yellow zones were not significant different with brown zone. Rock structure of them was soft, especially on the surface with the thickness about 4 meters. Both of these zone still high risk to landslide like brown zone. Different results have been found on green zone. Green zone was stable and safe zone because it has the lowest seismic vulnerability index. In addition, based on shear wave velocity models, it has hard rock structure on the surface. All of them were compatible with visual observation results and landslide profile in the past. These combination showed that Microtremor Survey be able to describe geological condition of landslide potential area.

   

Full Text

 


 

     

  

   

  

  

  

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

       arpnjournals.com                                                       Publishing Policy                                                  Review Process                                           Code of Ethics