|
ARPN Journal of Engineering and
Applied Sciences
April 2018 | Vol. 13 No. 8 |
|
|
Title: |
Use of non-industrial environmental
sensors and Machine Learning techniques in telemetry for indoor air
pollution |
Author (s): |
Gomez Carlos, Fonseca Valeria and Valencia
Guillermo |
Abstract: |
Classic telemetry systems are usually limited to taking a large variety
and number of measurements focused on outdoor air, large concentrations
of automobiles and factories, but indoor air pollution has not been
addressed with the same intensity. Any of the telemetry techniques
generates a large amount of data that implies a great challenge for its
analysis; this work demonstrates the application of Machine Learning
techniques in telemetry systems focused on the study of indoor air
pollution. A telemetry system has been developed which collects data
from the environment which are concentrated in a centralized storage
unit and are analyzed by automatic learning techniques that can predict
the historical behavior of the CO2 concentration based on the variables
of the environment, past records of CO2 and independent variables such
as time of day, which creates an important tool to detect anomalous
behavior in air pollution by CO2. Results of the development of several
data prediction models based on Kernel methods to estimate a regression
are presented. |
|
|
Full Text |
|
|
Title: |
A counterbalancing technique for skew and
power management of clock tree |
Author (s): |
Maneesha Jayakumar, Umadevi Seerangasamy,
V. Prakash and Abraham Sudharson Ponraj |
Abstract: |
Many
Integrated Circuits (or ICs) consisting of sequential logic use a clock
signal for synchronizing different components of the circuit. The clock
tree distributes the clock signals from its source to all the components
and hence, any uncertainty in the arrival times of the clock signals can
intensely limit the performance of the whole circuit. Generating the
clock tree network with minimum skew and power consumption plays a vital
role in digital IC design. On this research work, the three methods i)
low swing ii) buffer upsizing and iii) polarity assignment techniques
has been used together to achieve minimum power and skew in a clock tree
network. It has been observed that applying polarity assignment
technique after the low swing and buffer upsizing techniques reduces the
clock tree network delay to 25% and power consumption of the clock tree
network lies between first two techniques and hence this method gives
counterbalanced clock tree network with respect to skew and power
consumption. The research work has been carried out using tsmc 180nm
technology library, Cadence® Virtuoso®, Cadence® Layout editor and
Cadence® Assura® tools. |
|
|
Full Text |
|
|
Title: |
A new approach for Aircraft Landing
Scheduling problem based on the Deadline Monotonic algorithm |
Author (s): |
Sallami Chougdali, Khalifa Mansouri,
Mohamed Youssfi and Mohammed Qbadou |
Abstract: |
Historically, the Aircraft Landing Scheduling (ALS) problem remains one
of the complex problems in the air traffic management domain. In the
last years the number of air traffic increases on almost all airport
platforms in the world, so the aircraft landing scheduling optimization
become a critical problem. In the practice the ALS problem can be
considered as an optimization problem under constraints and that
requires real-time approach to solve it. Several methods of optimizing
the landing cost of a sequence of aircraft have been proposed, such as
methods using the approach of linear programming and other optimization
methods based on meta-heuristics algorithms. These methods have shown
great advantage over the method first-come-first served (FCFS) currently
used for air traffic management. In this paper, we propose a method that
optimizes the aircraft landing scheduling problem based on real time
scheduling algorithm Deadline Monotonic (DM). This approach solves the
ALS problem in two steps. First, it gives a mathematical model of
aircraft landing scheduling problem, thereafter in the second step, our
approach schedules. |
|
|
Full Text |
|
|
Title: |
Structural and power analysis of Ripple
Carry Adder in QCA |
Author (s): |
S. Senthilnathan and S. Kumaravel |
Abstract: |
Adders and Multipliers are used frequently in the design of several
computing subsystems that includes arithmetic and logical units (ALUs).
A quantum-dot cellular automata (QCA) which is promising and emerging
Nano-technology is used to realize such subsystems with
high-performance, ultra-dense and low-power. For reliable realizations
of QCA based designs, structural and power analysis is essential. Most
of the QCA based Ripple Carry Adder (RCA) reported in the literature
doesn’t consider the structural and power consumption issues. In this
paper, the existing design of QCA based Ripple carry adder is studied
extensively based on structural and power analysis. The QCA based RCA is
implemented and verified for its functional output using QCA Designer
tool. The power dissipation is estimated using QCA Pro simulator which
is an accurate power estimator tool. |
|
|
Full Text |
|
|
Title: |
A new technique of load shedding to
stabilize voltage magnitude and Fast Voltage Stability Index by using
hybrid optimization |
Author (s): |
Raja Masood Larik, Mohd. Wazir Mustafa,
Abdulrahaman Okino Otuoze, Obalowu Olatunji Mohammed and Aliyu Hamza
Sule |
Abstract: |
The
boundary limitation of power systems in terms of generation and network
growth, Owing to lack of generation or transmission capacity, due to
this a power system operates near to its stability boundaries. The
growing complexity of heavily loaded power systems stuck through
disturbances and outages makes the problem of voltage uncertainty even
worse, a blackout is usually the result of increasing load beyond the
transmission capacity of the power system. Therefore, under voltage load
shedding (UVLS) is performed as a final remedy to avoid larger scale
voltage collapse, restore reactive power balance and finally
re-establish the operating conditions, so it is considered, as state of
the art to achieve voltage stability. Weak buses are identified using
the Fast Voltage Stability Index (FVSI). Moreover, it is capable for
identification of critical areas in a large power system; determine the
point of voltage collapse, maximum permissible load, and the most
critical line in an interconnected system. It is highlighted that if
load shed is conducted at the location with high FVSI index value, the
system would become more voltage stable. This paper focuses on optimal
load shed as well as enhancing the system voltage profile this results
to stabilize fast voltage stability index values by using a hybrid
optimization algorithm based on the well-known Genetic Algorithm (GA)
and Particle Swarm Optimization (PSO). GA has traditionally been known
for its accuracy while the PSO algorithm is popular for its fast
convergence time. The GAPSO algorithm is utilized to minimize the total
amount of load shed on the weak buses under the constraint of
maintaining the minimum system voltage profile. The performance of the
proposed technique was assessed by simulations in MATLAB/SIMULINK under
the IEEE-30 bus meshed networks. Thus, the proposed technique is not
only robust against system failures but is also efficient enough for
real time applications in power systems. |
|
|
Full Text |
|
|
Title: |
Embedding the hidden information into java
byte code based on operands’ interchanging |
Author (s): |
Andrey Vladimirovich Krasov, Aleksander
Sergeevich Arshinov and Igor Aleksandrovich Ushakov |
Abstract: |
Software piracy becomes more and more a serious issue by the day,
software companies lose money because of that. In this article the
technique called software watermarking has been considered. A digital
watermark is embedded by means of slightly changes of the executable
file. Such changes must not be found and not change the program’s logic.
The system of embedding digital watermarks into executable java files by
means of operands’ interchanging has been designed. The designed system
does not change the file volume and the execution time. This system can
be used to protect copyright on software or on a part of it. |
|
|
Full Text |
|
|
Title: |
Dijkstra algorithm based intelligent path
planning with topological map and wireless communication |
Author (s): |
Lyle Parungao, Fabian Hein and Wansu Lim |
Abstract: |
In
this paper, an idea of intelligent path planning was introduced. Using
information received from a server that is transmitted through a
wireless communication, the data is processed to edit a provided
topological map, with which a shortest path calculation will be
executed. Information about the destination and blocked road parts is
sent to a mobile robot using a wireless ad hoc network communication.
The mobile robot will process this information in a topological 2D-array
map and ignore the blocked parts of the road for the shortest path
calculation based on Dijkstra’s algorithm. Aside from the intelligent
path planning, an automated driving algorithm was also implemented using
infra-red sensors installed on the mobile robot to navigate the robot to
its destination. |
|
|
Full Text |
|
|
Title: |
Applications of artificial intelligence in
geotechnical engineering |
Author (s): |
Nabeel S. Juwaied |
Abstract: |
The
use of artificial intelligence (AI) techniques to deal with complex
geotechnical problems has recently escalated. Which may be the result of
the lack of efficiency of traditional methods, or the promising
potential of these techniques to represent such complexity. Artificial
intelligence has been applied in most areas of geotechnical engineering.
In this research, these applications were extensively reviewed and
discussed. Where they showed great success in most of them. |
|
|
Full Text |
|
|
Title: |
The influence of substrate surface energy
on the adhesion compatibility of epoxy adhesive using molecular
simulation tool |
Author (s): |
Nurul Farah Izati Ahmad Nizam, Nabihah
Sallih, Dewi Puspitasari, Turnad Lenggo Ginta and Mazli Mustapha |
Abstract: |
The
utilization of structural adhesive onto aluminium oxide (Al2O3),
aluminium (Al) and polyvinyl chloride (PVC) can be remarkably observed
in much industrial application such as aerospace, automotive,
electronics and medical. Due to the abundant prominent properties
exhibited by epoxy resin, the relevancy of opting for it as adhesive
agent in the aforementioned industry is believed to be highly
beneficial. However, the feasibility of implementing the idea is still
not clear. It was the objective of this study to shed light on those
aspects which are lacking in literature. In this study, Materials Studio
6.0 will be utilized to model and simulate the compatibility and
adhesion strength of epoxy resin with three different substrates i.e.
Al2O3, Al and PVC. Simulation consist of molecular dynamics (MD) and
molecular mechanics (MM) reveal the significant influence that each
substrate gives in promoting the adhesion compatibility within the
epoxy-substrate system. The computed result has shown significant
agreement upon the experimental data in which the epoxy resin is most
compatible with Al2O3, followed by Al and lastly with PVC. |
|
|
Full Text |
|
|
Title: |
Bentonite-biochar composite for bleaching
of Crude Coconut Oil |
Author (s): |
Jessica Angelia Suhadi, Elizena Filipe
Goncalves, Kuncoro Foe and Felycia Edi Soetaredjo |
Abstract: |
CNO
(Crude Coconut Oil) is oil extracted from coconut flesh that is orange
or brownish yellow. Usually, CNO refining process is done through
bleaching process or blanching to remove color. In general, this oil
blanching process using bleaching earth or bentonite as an adsorbent. In
this study, bentonite was combined with biochar to improve its
adsorption ability. The purpose of this research is to investigate the
process of making bentonite-biochar composite from cassava peel and its
application in CNO bleaching process. The variables studied in the
manufacture of bentonite - biochar composite for CNO blanching process
were the ratio of bentonite: biomass, and the influence of temperature
on the composite manufacturing process. The maximum color removal was
99.2 %. |
|
|
Full Text |
|
|
Title: |
Economic analysis of anethanol-to-hydrocarbon
processset-up through modelling and simulation using Aspen Plus |
Author (s): |
Abdulwahab GIWA |
Abstract: |
This
research work has been carried out to develop and simulate the reactive
distillation and conventional models for production of hydrocarbon ether
(diethyl ether) from ethanol for the purpose of economic analyses. The
development of the models for the two process methods were achieved with
the aid of Aspen Plus using RadFrac as the column for the reactive
distillation process and an equilibrium reactor in addition to RadFrac
for the conventional process method. The column used in both cases had
21 stages including a total condenser and a kettle reboiler, and the
feed entered the column at the 11th stage of the column. For the two
processes, Non-Random Two-Liquid activity coefficient model was used as
the Property Method. From the results obtained, it was discovered that
the performance of reactive distillation process was better than that of
the conventional method of diethyl ether production from ethanol. This
was because the mole fraction of liquid product given by the reactive
distillation process was higher than the one obtained from the
conventional method of production when the two of them were operated at
approximately the same conditions. Furthermore, the observations made
from the economic analyses of the two approaches of the production
indicated that reactive distillation was a cheaper process to set up and
operate because its total capital cost, operating cost, utilities cost,
equipment cost and equipment installation cost were estimated to be less
than those of the conventional method of the ethanol-to-diethyl ether
process. |
|
|
Full Text |
|
|
Title: |
Development of home automation systems by
using Android apps |
Author (s): |
Mohd. Azlan Abu and Wan Muhamad Faris Wan
Kamarulzaman |
Abstract: |
The
purpose of this paper is to develop an android based home automation
systems using raspberry pi. This project focuses on the smart home
electrical appliances such as light and fans so that they can be
controlled from far or mobile communication systems that is using 3G
network. Status of the fan or light whether it is off or on is collected
by the Raspberry Pi as the main processor. The access point will
transmit data using internet. The data is accessed by using smart phone
operating in Android application. This technology offers new and
exciting opportunities to increase the connectivity of devices within
the home for purpose of smart home controller, due to their portability
and their wide range of capabilities. They can communicate with a smart
home controller network through an internet gateway. This project
creates a user friendly interface for the android devices that allow a
user to communicate with the Raspberry Pi server and the server is
communicating with the corresponding relay. Each relay is connected to
electrical appliances. |
|
|
Full Text |
|
|
Title: |
A 3.4 GHz fast-locking PLL using
transmission gate charge-pump in 0.18µm CMOS for HDMI applications |
Author (s): |
Ramanjaneyulu Ningampalli, Satyanarayana
Donti and Satya Prasad Kodati |
Abstract: |
A 3.4
GHz Phase Locked Loop (PLL) with a Differential Ring oscillator is
simulated in a 0.18µm CMOS process with 1.8V power supply. The reference
clock frequency is 212.5 MHz with a mod 16 frequency divider the PLL
generates a 3.4 GHz frequency. The proposed PLL can be locked from 2.539
GHz to 5.0793 GHz with a lock range of 2.54 GHz with 48.4% of duty
cycle. The peak-peak jitter is 8.786ps with an RMS jitter of 1.18 ps and
pull-in time 170ns (fast lock-in time). The PLL consumes 18.8mW power
from a 1.8V power supply. PLL Blocks are simulated with 1.8V, 0.18µm
CMOS Technology using Cadence-Virtuoso tool. |
|
|
Full Text |
|
|
Title: |
Battery management system based on
Synchronous Non-Inverting Buck-Boost DC-DC converter |
Author (s): |
H. Suryoatmojo, M. N. Khakam, M. Ashari,
R. Mardiyanto and E. Setijadi Dan M. Ridwan |
Abstract: |
Battery and load management on a stand-alone electric generator from
renewable energy sources manages the process of battery charging and
discharging. This study discusses design, simulation and implementation
of Synchronous Non-Inverting Buck-Boost (SNIBB) using four-switch
H-bridge to control current and voltage of multi-stage charging lead
acid battery. When the voltage is under 2.4 V/cell, the charging current
of battery is kept constant using constant-current (CC) mode, then the
voltage is kept constant on constant-voltage (CV) mode until the
charging current reaches 5% and it is switched to float-charge mode with
set point voltage 2.25 V/cell. Controlling battery charging/discharging
and load is using two switches with the parameters, such as power
electric source, battery capacity, and load. The implementation of the
design is using microcontroller ATMega 16 with PI controller. As on CV
and CC mode, SNIBB circuit is able to keep voltage and current
appropriate to the set point with the changes of input voltage. On CC
mode, when the set point of current is increased, the charging time is
faster. The result shows that the battery management designed is able to
control charging and discharging the battery to the load. |
|
|
Full Text |
|
|
Title: |
Constructing an information matrix for
multivariate DCC-MGARCH (1, 1) method |
Author (s): |
Maleeva E. A., Kritski O. L. and Amini M.
H. M. |
Abstract: |
The
analytic form of Fisher Information Matrix (IM) for DCC-MGARCH (1, 1)
was suggested. After that, it was applied for simplifying the general
algorithm: the statistical hypothesis about constant correlation matrix
usage was put forward and statistical verification was made. IM was
employed for Russian share market: to do investigations the five
equilibrium portfolios was compounded from four different shares in each
case. Computations made showed that there are three types T1–T3 of
trading days on the market and day type changing from T1 to T2 and vice
versa is happening over the time moments T3. Moreover, the
clustarisation effect of multivariate volatility that was investigated
by scientists from all around the world in the univariate case was
discovered and described. |
|
|
Full Text |
|
|
Title: |
Determination of speed range of hammer
mill grinder |
Author (s): |
Mikhail Semenovich Eliseev, Mikhail
Gennadyevich Zagoruyko, Dmitriy Alekseevich Rybalkin, Aleksey
Alekseevich Leontyev and Andrey Vladimirovich Peretyatko |
Abstract: |
In
Russia 2017 was declared the Year of ecology. Enormous amounts of wastes
resulted from scouring of agricultural crops (husks of sunflower,
buckwheat, panicum etc.) impair environmental situation. Nevertheless,
such wastes are widely applied in various industries. In order to use
the wastes after processing of agricultural products it is necessary to
grind them and to mix with various components in certain ratios. Hammer
mill grinders are the most widely applied machines. However, their
design and workflow are characterized by certain disadvantages leading
to quality impairment of final products and significant energy
consumption. Thus, we developed new designs of hammer mill grinder and
hammer which allow to reduce grinding energy consumption and to increase
yield. This article is devoted to theoretical study of optimum angular
speed of rotor shaft with the hammers of the proposed grinder design. |
|
|
Full Text |
|
|
Title: |
Design of signature analyzer structures
with required properties |
Author (s): |
Evgeniy Feofanovich Berezkin |
Abstract: |
A
problem of signature analyzer synthesis with required properties is
solved for digital schemes compact testing. The main attention is
devoted to the issues of eliminating losses of diagnostic information
and to simplicity of structural organization. Solutions are based on
detecting all error vectors or matrices resulting from failures of
diagnostics objects related to the postulated class. Any other error
vectors or matrices can be non-detectable and are excluded from
consideration. A software implementation of the mathematical model is
proposed. Error vectors or matrix detection process visualization aids
are given. |
|
|
Full Text |
|
|
Title: |
Low power test pattern generation using
Test-Per-Scan technique for BIST implementation |
Author (s): |
K. Jamal, P. Srihari, K. Manjunatha Chari
and B. Sabitha |
Abstract: |
This
paper introduces the function of test cases with minimal power for
Built-In-Self-Test (BIST) implementation. This method intends
Test-Per-Scan (TPS) based test cases using Multiple Single Input Change
(MSIC) architecture. Multiple SIC patterns are developed by using EX-OR
operation of twisted ring counter and test design algorithms like Linear
Feedback Shift Register (LFSR),Bit-Swapping LFSR (BSLFSR), and Cellular
Automata (CA). These patterns are used to a diminish number of
transitions in the test patterns that are generated. The preferred
method uses Test-Per-Scan technique for generating Multiple SIC test
patterns. TPS diminished the power consumption during test mode. The
seed generator used in TPS is modified LFSR’s i.e., BS-LFSR, Cellular
Automata (CA). BS-LFSR is composed of with an LFSR with a multiplexer.
In CA, it also presents a variation on a BIST technique, which is from a
one-dimensional cellular automaton; the pseudo random bit generator is
generated. The proposed Hybrid Cellular Automata (HCA) using the rules
90 and 150 to generate the pseudo random designs. Moreover, the CA
implementations illustrates properties of data compression like LFSRs
and that they exhibit locally and with topological consistency
significant attributes for a VLSI design. In this proposed method, LFSR
is replaced with BS-LFSR, and HCA. Simulation and synthesis outcome with
ISCAS c432 benchmark determine that Multiple SIC can reduce the power
consumption. |
|
|
Full Text |
|
|
Title: |
Predicting strength of pillars in
fractured rock mass during development of apatite-nephelinic ores |
Author (s): |
Vladimir Leonidovich Trushko, Anatoliy
Grigoryevich Protosenya and Pavel Eduardovich Verbilo |
Abstract: |
A
method of predicting the strength characteristics of fractured rock
massif with the help of numerical modeling by the finite elements method
in the Simulia Abaqus software suite has been proposed with respect to
the conditions of the deposit of apatite-nephelinic ores in the
Rasvumchorr Plateau of JSC "Apatit" in the Kirovsk Area of the Murmansk
region. Geometric and geo mechanical models of solids in the fractured
rock mass have been built, where blockiness is taken into account in
explicit form, and for modeling the conditions of contact interaction,
nonlinear strength criterion of Barton is used. The sequences of
creating a numerical geo mechanical model of rock mass have been
considered, and schemes of virtual testing have been specified. Studying
the behavior of the model of pillars under load was aimed at defining
the scale effect of tensile strength limit on uniaxial compression
(bearing capacity) of the pillars in the fractured rock mass. The
article also studied the anisotropy of strength and deformation
characteristics of the rear sight and the effect of the ratio of sides
on its carrying capacity. The proposed approach has been qualitatively
compared to the existing empirical correlations. |
|
|
Full Text |
|
|
Title: |
Improving QoS parameters in wireless
sensor network |
Author (s): |
Hyder Ali Hingoliwala and Gandharba Swain |
Abstract: |
Wireless sensor network is a collection of sensor nodes that are used
for sensing the environment and transmitting the data to the base
station. In WSN there are multiple Quality of Services which includes
energy efficiency, throughput, delay, congestion control etc. that are
used to increase the performance of network. The different routing
protocols are used in network for finding the shortest path between
source to destination. There are different routing protocols like AODV,
DSDV, DSR .wireless sensor network is based on routing protocols and MAC
protocols. In wireless sensor network source node send packet to the
destination node. End-to-end delay, packet delivery ratio, packet loss
ratio, throughput, energy consumption, congestion control etc. are the
QoS parameters for wireless sensor network. Author Mohammad et al.
Implement the IH-MAC protocol for achieving the energy and delay
parameters in sensor networks. Authors implement IH-MAC using Link and
Broadcast scheduling concept with parallel transmission. But in this
paper we have designed and implemented RH-MAC protocol using CSMA and
TDMA MAC Protocols. RH-MAC for achieving the Quality of Services (QoS)
like PDR, PLR, Throughput, end-to-end delay, congestion control and
reliability. For congestion control applying TDMA protocol to the nodes
which are one hop away from the sink node. CSMA for the rest of the
nodes. In second model we have to implement the Cluster based data
dissemination. |
|
|
Full Text |
|
|
Title: |
Propagation path loss modeling and
coverage measurements in urban microcell in millimeter wave frequency
bands |
Author (s): |
Mohammed B. Majed and Tharek Abd. Rahman |
Abstract: |
The
global bandwidth deficiency facing wireless carriers has motivated the
exploration of the underutilized millimeter wave (mm-wave) frequency
spectrum for future broadband cellular communication networks, and mm
Wave band is one of the promising candidates due to wide spectrum. This
paper presents propagation path loss and outdoor coverage and link
budget measurements for frequencies above 6 GHz (mm-wave bands) using
directional horn antennas at the transmitter and omni directional
antennas at the receiver. This work presents measurements showing the
propagation time delay spread and path loss as a function of separation
distance for different frequencies and antenna pointing angles for many
types of real-world environments. The data presented here show that at
28 GHz, 38 GHz and 60 GHz, unobstructed Line of Site (LOS) channels obey
free space propagation path loss while non-LOS (NLOS) channels have
large multipath delay spreads and can utilize many different pointing
angles to provide propagation links. At 60 GHz, there is more path loss
and smaller delay spreads. Power delay profiles PDPs were measured at
every individual pointing angle for each TX and RX location, and
integrating each of the PDPs to obtain received power as a function of
pointing angle. The result shows that the mean RMS delay spread varies
between 7.2 ns and 74.4 ns for 60 GHz and 28 GHz respectively in NLOS
scenario. |
|
|
Full Text |
|
|
Title: |
Towards a framework for context-aware
information systems: a metamodel-driven definition and implementation |
Author (s): |
Zineb Aarab, Rajaa Saidi and Moulay Driss
Rahmani |
Abstract: |
Context-awareness has captivated a lot of attention, especially in the
field of pervasive and mobile computing which gives the naissance of the
concept of smart cities in the last decade. Doubtless an important
demand for real-world location data inner the virtual world is
expanding. Nevertheless, users’ context is more than its location. Most
context-aware information systems do not take into account the diversity
of users’ preferences and needs because of its complexity to manage. A
key element in the design of context-aware systems is the representation
and management of context and of its attributes, to be able
to define a relationship between each context
and the aspects of interest. In this sense, the objective of our paper
is to present a generic context metamodel for the development of
context-aware systems. The automation that context-aware systems give
can solve many problems and contributes to the concretization of the
concept of the smart city. In this paper, we present our context-aware
traffic light control system architecture and its implementation as a
use case for our contribution which is the generic context framework for
context-aware systems. |
|
|
Full Text |
|
|
Title: |
Multimodal image fusion and bee colony
optimization for brain tumor detection |
Author (s): |
Jany Shabu S. L. and C. Jayakumar |
Abstract: |
Medical image fusion is a method that concatenates different features of
multimodality images into a single image. The fused image is used to
make accurate decisions for doing further treatment by the doctors. In
medical imaging, neurologists require the ability to fuse brain tumor
images. Computer Tomography (CT) scan provides detailed cross-sectional
views of all types of tissues. Whereas Magnetic Resonance Imaging (MRI)
scan, a non-invasive nuclear diagnostic procedure for imaging tissues.
And Single Photon Emission Computational Tomography (SPECT) scan
handovers, a nuclear medicine imaging technique using gamma rays to show
blood flows in organs. Also, Positron Emission Tomography (PET) delivers
a three-dimensional image of metabolic activities in tissues and
functions of organs. We obtain scanned images of these technologies and
fuse it together. Adaptive Histogram Equalization and Anisotropic
Filtering is an applied in the pre-processing step to remove noise
present in the images. Bee colony optimization method is used for fusion
which gives best results compared to conventional algorithms. PSNR and
entropy value is calculated to show the robustness and efficiency of the
system developed. |
|
|
Full Text |
|
|
Title: |
A novel GPS multipath error estimation
technique for urban civil surveying |
Author (s): |
N. Swathi, V. B. S. Srilatha Indira Dutt
and G. Sasibhushana Rao |
Abstract: |
The
awareness of orientation of multipath is critical for site selection or
for antenna accumulation, particularly in the applications like precise
monitoring of earthquake movement and tsunami detection. This paper
presents the analysis of the multipath error estimated on the L1
frequency (1575.42MHz) of all the GPS satellites that are visible from
the Andhra University College of Engineering, Visakhapatnam. This
analysis is useful in determining the location of the obstructions in
the path between satellites and receiver. From this analysis the
location of the satellite which is affected more by the multipath can
also be determined. The analysis is done using the TEQC toolkit and the
CF2SKY toolboxes [1, 2]. The analysis made in this paper is also useful
in determining which location of the receiver antenna has more multipath
and at which location it is less and thereby the antenna can be mounted
at less multipath location. |
|
|
Full Text |
|
|
Title: |
An analysis of the beneficial of energy
saving device |
Author (s): |
Mohd. Firdaus bin Mohd. Ab Halim, Khalil
Azha Mohd. Annuar, Mohamad Haniff Harun and Nik Azran Ab Hadi |
Abstract: |
This
paper discusses about the energy saving device product which claim that
it can reduce the electrical consumption in domestic building when
connected to any point of power line bus or improve the energy
conversion of electrical appliances. In 2014, electricity saver product
had claimed losses amounting to USD 1 million in Malaysia alone. Power
factor correction is proven to reduce electricity consumption in
commercial and industrial building but do it applies to the domestic
building as well? To prove or disprove this case, an energy saving
device is constructed and tested in real situation. Multiple appliances
are connected with and without the energy saving device. The result
shows an insignificant amount of losses being reduced by the device and
in some cases further increase the power consumption due to LED’s
indicator that continuously switched ON once it is connected. The result
of this study provides the awareness to the consumer to be more critical
and stop supporting a non-beneficial product that is theoretically and
practically faulty. |
|
|
Full Text |
|
|
Title: |
Body sensor using Internet of Things (IOT) |
Author (s): |
S. Revathi, Pulichintha Harshitha,
Prashanthi Narramneni and Raghavee N. S. |
Abstract: |
In
recent proceedings in IT and communication have led to the birth of a
new technology named Internet of Things (IOT) Healthcare is one of the
most vital domains that are present today. Healthcare has seen a wide
transformation over time. Body Sensor Network is definitely one of the
most vital technologies used in studying a healthcare system which
functions on IoT. It is basically a combination of very low-power and
wireless nodes of a sensor that are essentially used to supervise the
human body functions and the environment surrounding the patient. The
nodes of Body Sensor Network are used to gather critical and proximate
information which enables the system to function in unreceptive
environments. Severe and appropriate security methods are used to
prevent unnecessary interaction with the existing system. A controlled
map of services with respect to health services should be enabled to
make health care available to the human population. The main objective
of this project is to talk about the problems linked to the usage of
wearable and implantable sensors for distributed mobile computing. |
|
|
Full Text |
|
|
Title: |
Catastrophic fault analysis on Butterworth
low pass filter |
Author (s): |
Shailaja Mantha and Asha Rani M. |
Abstract: |
Testing of analog circuit is a challenging domain compared to digital
circuits. This is mainly due to the difficulty to access the internal
nodes. To prevail this difficulty an approach is presented for testing
of Analog circuits. In this paper a hierarchical method for detection,
location and identification of a single catastrophic fault is proposed.
The circuit under test (CUT) is analyzed with different values of
components which can be faulty. The response of the circuit is analyzed
considering few parameters for analysis. A Fault dictionary consisting
of these parameters is developed. This method uses top down Hierarchal
testing of the system. Using this proposed method, single catastrophic
faults in an analog circuit can be identified. |
|
|
Full Text |
|
|
Title: |
Study on tool wear and tool life during
milling JFRP using uncoated carbide cutting tool |
Author (s): |
M. A. N. Rashid, S. A. Khan, M. K. Nor
Khairusshima and Norshahida Sarifuddin |
Abstract: |
Jute
fiber-reinforcement polymer (JFRP) composite is a cheap material that is
broadly used in automotive, marine, aircrafts, domestic upholstery
applications because of its various high quality properties. During
machining, a few of problems arise due to the Jute fiber in JFRP.
Abrasive nature of this composite creates tool wear on the cutting tools
during JFRP machining, thereby the life of the cutting tool become
shorter and damage the surface quality. In this study, the solid
uncoated carbide cutting tool (8.0 mm) performance and the life of tool
were measured on the JFRP composite panel during the CNC milling process
were examined. A spindle speed ranging from 671.57 rev/min to 6328.43
rev/min and a feed rate ranging from 108.58 mm/min to 391.42 mm/min were
used in the experiment. Results found that the longest tool life 41.6
min were achieved at lowest feed rate 108.58 mm/min and the highest
spindle speed 6328.43 rev/min effects on tool life 14.4 min. The shining
area of the cutting tool shows the abrasive nature of jute fiber and
chips formation mechanism. |
|
|
Full Text |
|
|
Title: |
Fiber gypsum concrete composites with
using volcanic tuff sawing waste |
Author (s): |
Khezhev T. A., Pukharenko Yu. V., Khezhev
Kh. A. and Klyuev S. V. |
Abstract: |
The
results of studies on the development of gypsum fibre concrete
composites with using of volcanic tuff sawing wastes, which provides a
reduction in specific consumption of gypsum binder by 30, 5-31, 7 %
without reducing the strength of gypsum concrete are presented. The new
formations in the gypsum lime tuff concrete composite are established.
The effect of granulometric composition of tuff stone sawing waste on
the strength characteristics of the gypsum concrete composite is
revealed. The structure of gypsum lime vermiculite tuff composite is
designed and their flame retardant properties are investigated by
experimental and computational methods. The influences of the parameters
of disperse reinforcement on the properties of fiber gypsum tuff
concrete and fiber gypsum vermiculite tuff composites are defined.
Developed fiber gypsum vermiculite tuff composites have higher strength
and fire resistant properties. The proposed algorithm of calculation
with finite-difference implicit scheme for solving the heat conduction
problem and the sweep method allows selecting and specifying the
coefficients and the functional dependencies included in the
mathematical model, and only approximately known a priori and provides
an acceptable coincidence with the experimental data. |
|
|
Full Text |
|
|
Title: |
Risk analysis of drinking water process in
drinking water treatment using fuzzy FMEA approach |
Author (s): |
Dino Rimantho and M. Hatta |
Abstract: |
Drinking water treatment in the local water company in Indonesia faces a
variety of complex and vulnerable problems. In order to know the
potential risks to clean water treatment and selecting action based on
priority is required a risk identification and evaluation model. The
purpose of this paper is to identification and analyze the risk of
drinking water processing. Risk identification will be done using the
Fishbone method approach and risk analyze using the FMEA fuzzy model,
with input data from several experts. The results showed that the main
risk factors in water treatment such as machine, human, method and raw
water material. The result of the calculation using MATLAB shows the
highest FRPN value is incorrect dosing dosage (883) and lack of pumping
machine maintenance periodically (809). In addition, other factors are
still categorized medium and low. Overall this model can be used to
identify risk factors and variables on clean water treatment processes
and choose priority actions. Thus, it will be obtained a recommendation
of the right action to anticipate it. |
|
|
Full Text |
|
|
Title: |
UML based model for displaying Privacy
Preserving Data Mining Systems |
Author (s): |
Anurag, Deepak Arora and Upendra Kumar |
Abstract: |
Physical deployment of Privacy Preserving Data Mining System is a great
challenge for organizations nowadays. What are different hardware and
software files needed for deployment? How different software files
across the system should interlinked together for functioning correctly.
What execution environment should be provided for different platforms on
the same hardware? What are various protocol needed for hardware
communication. Its prior knowledge will assist the developers for
successful implementation of the entire framework. This paper deals with
UML pictorial model for enabling the developers in successful
installation of Privacy Preserving Data Mining Systems during run time
environment. This would enable for the engineers in developing the
software projects within optimum time, within budget, reduce the chances
of errors and in turn minimizes the development and maintenance effort. |
|
|
Full Text |
|
|
Title: |
Development of android application for
controlling children’s usage of smartphone |
Author (s): |
Raymond Joshua P. S., Satrio Yudo Prawiro
and Wansu Lim |
Abstract: |
In a
world of everlasting development of technology, personal digital
assistant such as smartphones have become extremely important among
people around the world. The result, people became addicted to these
devices, which can give negative impact on their mental health and
well-being. The researchers see the importance of this issue and aim to
develop an Android application, namely KidConrol, an application that
can make a rule when their kid try to use smartphone. This application
allow the parent to setting the time when using the smartphone, the
maximum time of using it, and the application allowed for the kid. |
|
|
Full Text |
|
|
Title: |
Scribble legalization cryptographic Aspect
Based on data access control for steam count |
Author (s): |
Yerragudipadu, Subba Rayudu, R. M.
Noorullah and C. Praveen Kumar |
Abstract: |
Recently, healthcare applications adopt the advents of cloud
technologies. Electronic Health Records (EHR) plays a vital role in
healthcare environments. Thus, the proper usage and protection of EHR
systems enabled the growth of cloud based healthcare applications which
implies the patients-safety of their sensitive information. However, the
data owner should be online in order to send the PRE keys to the CSP in
a timely fashion, to prevent the revoked user from accessing the future
data. The delay of issuing the PRE keys may cause potential security
risks in this paper, we have proposed cryptographic Aspect Based access
control system for EHR systems which uses time and location based user’s
authentication process. A defined set of attributes embedded with time
period T to access the data by its intended users. Experimental results
have shown the efficacy of our proposed work in terms of decryption key
compromised, role expiration and lessened key complexity have been
studied. |
|
|
Full Text |
|
|
Title: |
Control of laser-field technological
complexes for tool hardening |
Author (s): |
Bashmakov D. A. and Zvezdin V. V. |
Abstract: |
Specific features formation of hardened layer of metals with unknown
curvature under the joint action of laser radiation and an electrostatic
field are described. It is shown, that the quality of the technological
process of hardening depends on not only the energy characteristics of
the hybrid technological complex, the temperature of the surface layer,
but also on the accuracy of positioning the focus of laser radiation and
its perpendicularity with respect to the surface of the part. The
results of the studies show, that the deviation of the laser radiation
focus from the surface of the part should not exceed 8-10 µm, and its
vertical not more than 1 degree. |
|
|
Full Text |
|
|
Title: |
Enhance peak to average power ratio (PAPR)
in OFDM systems using Partial Transmit Sequence |
Author (s): |
Susritha, N. Bala Subramanyam, T. S.
Arulananth and R. Karthik |
Abstract: |
Orthogonal Frequency Division Multiplexing (OFDM) system is preferred in
many advanced high data rate wireless communication systems such as Wi-max,
WI-FI, Digital Video Broadcasting (DVB), advanced LTE and Hiper-LAN as
it is free from multipath fading. Even though this technique is power
efficient as well as bandwidth efficient, there are a few drawbacks such
as increase in peak power which results in High Peak to Average Power
Ratio (PAPR) and Inter Carrier Interference (ICI). High PAPR leads to
requirement of power amplifiers with large dynamic range A/D, D/A
converters which increases complexity in the system. There are different
techniques to reduce PAPR such as clipping & filtering, Partial Transmit
Sequence (PTS) and Selective Level Mapping (SLM). In this paper we are
implement a distortion less technique is known as Partial Transmits
Sequence (PTS) algorithm is analyzed for the reduction of PAPR. In PTS,
an input data sequence is partitioned into a number of disjoint sub
blocks and each sub block is handled through phase factors. A Low
Density Parity Check (LDPC) block code is used for encoding. In this
paper, the PAPR values with and without PTS for different modulation
techniques are compared. |
|
|
Full Text |
|
|
Title: |
An active learning media of interfacing
microcontroller 8051 to 4x4 keypad using MCU 8051 IDE and ASM-51 |
Author (s): |
Dahlan R. P. Sitompul and Siti Dara
Fadilla |
Abstract: |
On
this occasion, the author discusses the development of an instructional
media of active learning teaching to interface microcontroller 8051 to a
virtual 4 X 4 Keypad by using a simulator called MCU 8051 IDE on Windows
7 (MCU 8051 IDE runs on various operating systems) to support the
implementation of active learning for higher education. The developed
Learning and teaching Media is in the form of simulating program to read
the pressed button of the virtual 4 X 4 Keypad and display the ASCII
code obtained to a virtual structure of 8 common anode LEDs and to the
virtual 2 X 16 LCD display as well. The developed program was built by
using ASM-51 embedded in the MCU 8051 (in assembly language); this
simulator (MCU 8051 IDE) can be downloaded for free at sourceforge.net
site [3]. The scenario of this simulating media is as follows, the
simulating program runs continuously and pooling the virtual keypad.
When a button is pressed by clicking one of the virtual buttons the
program will decode the pressed button to the ASCII code and display it
to the two virtual displays mentioned above and then repeat the program
continuously. According to the writer's observation the developed
simulation program has been stable and successful as a media of teaching
and learning of Microcontroller 8051 in interfacing Microcontroller 8051
to the 4 X 4 Keypad and increase the participation and engagement of the
students in the learning process, allowing the teacher to apply their
teaching strategies more conveniently and successfully in overcoming the
lack of funds to meet the needs for equipment in
supporting active learning. The simulation program
has also been successful in reducing errors in developing or
manufacturing the real equipment (reducing costs). |
|
|
Full Text |
|
|
Title: |
A review on piezoelectric energy harvester
and its power conditioning circuit |
Author (s): |
Nur Amalina Ahmad Nawir, Amat Amir Basari,
Mohd. Shakir Md. Saat, Ng Xue Yan and Seiji Hashimoto |
Abstract: |
The
application of batteries as the main portable power sources is not
applicable any longer as it has limited lifespan. This paper presents
the recent concern on the power requirements of Wireless Sensor Nodes
and the studies on the development of energy harvesting system using
piezoelectric devices. Ambient Energy harvesting is one of the
alternatives in replacing the use of batteries and wiring where small
amounts of energy from environmental sources such as solar, air flow or
vibration is harvested to form an electrical energy. Numerous studies
have shown that power density of energy harvesting devices is in the
range of hundreds of microwatts, while from the literature study it
reveals that power requirements of most of electronic devices are in the
range of milliwatts. Therefore, a key challenge for a successful
deployment of energy harvesting technology remains, in many cases, the
provision of adequate power. General discussion on two types of
rectifier; full-wave bridge rectifier and voltage doubler also presented
at the end of this paper. |
|
|
Full Text |
|
|
Title: |
Geological condition at landslides
potential area based on Microtremor Survey |
Author (s): |
Suhendra, Zul Bahrum C. and Nanang
Sugianto |
Abstract: |
Vulnerability to landslide hazard significant effected by geological
condition such as decrease of material strength. The weakness in the
composition or structure of rock can be estimated by seismic
vulnerability index and shear wave velocity. A hundred seismic stations
have installed at along Central Bengkulu to Kepahyang cross lane
(mountain region: Bukit Barisan) to record ambient noise as rock
response. All of Microtremor data analysed by using HVSR and Dinver to
get amplification factor, resonance frequency of ground motion and 1D
models of shear wave velocity, respectively. Based on distribution of
seismic vulnerability index, it has been divided into four zones,
including brown zone, red zone, yellow zone, and green zone. Brown zone
was a highest seismic vulnerability index (Kg= 25.82) in along of line,
then red zone yellow zone and green zone, respectively. Based on shear
wave velocity model, red and yellow zones were not significant different
with brown zone. Rock structure of them was soft, especially on the
surface with the thickness about 4 meters. Both of these zone still high
risk to landslide like brown zone. Different results have been found on
green zone. Green zone was stable and safe zone because it has the
lowest seismic vulnerability index. In addition, based on shear wave
velocity models, it has hard rock structure on the surface. All of them
were compatible with visual observation results and landslide profile in
the past. These combination showed that Microtremor Survey be able to
describe geological condition of landslide potential area. |
|
|
Full Text |
|
|
|
|
|