Showing papers in "Bulletin of Electrical Engineering and Informatics in 2017"
TL;DR: Various Wireless Network Simulators are surveyed and compared to provide a virtual environment for an assortment of desirable features such as modeling a network based on a specific criteria and analyzing its performance under different scenarios.
Abstract: The Network simulator helps the developer to create and simulate new models on an arbitrary network by specifying both the behavior of the network nodes and the communication channels. It provides a virtual environment for an assortment of desirable features such as modeling a network based on a specific criteria and analyzing its performance under different scenarios. This saves cost and time required for testing the functionality and the execution of network. This paper has surveyed various Wireless Network Simulators and compared them.
TL;DR: A heuristic decision making approach is proposed for producing energy-aware clusters with optimal selection of cluster head to improve the efficiency and accuracy and overcome the drawbacks like getting trapped at a local extreme in the optimization process.
Abstract: Wireless sensor networks idea is envisioned and defined as self-deployed, error prone, long living inexpensive communication devices that are densely deployed to collect data from physical space. Sensor nodes communicate with each other to detect events depending on the application, to collect and process data, and to transmit the sensed information to the base station by hopping the data from node to node. Major challenge in wireless network is energy consumption, since the sensor devices are deployed on unattended wide areas and replacing their batteries is not very feasible. Therefore, designing energy-aware algorithms becomes a major challenge for extending the lifetime of sensors. The lifetime of the network can be maximized by selecting the most optimal cluster head. In this paper, a heuristic decision making approach is proposed for producing energy-aware clusters with optimal selection of cluster head. This helps to improve the efficiency and accuracy and overcome the drawbacks like getting trapped at a local extreme in the optimization process.
TL;DR: The research identified small area in eggs properly and compared preprocessing, the methods, and the results of image processing by using centroid and the bounding box for determining the object and the small area of chicken eggs.
Abstract: The research used watermarking techniques to obtain the image originality. The aims of the research were to identify small area in eggs properly and compared preprocessing, the methods, and the results of image processing. The study has been improved from the previous papers by combined all methods and analysis was obtained.This study was conducted by using centroid and the bounding box for determining the object and the small area of chicken eggs. The segmentation method was used to compare the original image and the watermarked image. Image processing using image data that are subject watermark to maintain the authenticity of the images used in the study will the impact in delivering the desired results. In the identification of chicken eggs using watermark image using several methods are expected to provide results as desired. Segmentation also deployed to process the Image and counted the objects. The results showed that the process of segmentation and objects counting determined that the original image and watermarked image had the same value and recognized eggs. Identification had determined percentage of 100% for all the samples.
TL;DR: A new framework called Fuzzy based contextual recommendation system for classification of customer reviews based on the context given by users is proposed and the sentence based classification and fuzzy based context method are used.
Abstract: The Internet has facilitated the growth of recommendation system owing to the ease of sharing customer experiences online. It is a challenging task to summarize and streamline the online textual reviews. In this paper, we propose a new framework called Fuzzy based contextual recommendation system. For classification of customer reviews we extract the information from the reviews based on the context given by users. We use text mining techniques to tag the review and extract context. Then we find out the relationship between the contexts from the ontological database. We incorporate fuzzy based semantic analyzer to find the relationship between the review and the context when they are not found therein. The sentence based classification predicts the relevant reviews, whereas the fuzzy based context method predicts the relevant instances among the relevant reviews. Textual analysis is carried out with the combination of association rules and ontology mining. The relationship between review and their context is compared using the semantic analyzer which is based on the fuzzy rules.
TL;DR: A new approach to detect DDoS attacks based on network traffic activity was developed using Naive Bayes method and is expected to be a relation with Intrusion Detection System (IDS) to predict the existence of DDoS attacked.
Abstract: Di s tributed Denial of Service (DDoS) is a type of attack using the volume, intensity, and m ore costs m itigation to increase in this era . A ttack ers used many zombie computers to exhaust the resources available to a network, application or service so that authorize users cannot gain access or the network service is down, and it is a great loss for Internet users in computer networks affected by DDoS attacks. In the Network Forensic, a crime that occurs in the system network services can be sued in the court and the attackers will be punished in accordance with law. This research has the goal to develop a new approach to detect DDoS attacks based on network traffic activity were statistically analyzed using Naive Bayes method. Data were taken from the training and testing of network traffic in a core router in Master of Information Technology Research Laboratory University of Ahmad Dahlan Yogyakarta. The new approach in detecting DDoS attacks is expected to be a relation with Intrusion Detection System (IDS) to predict the existence of DDoS attacks.
TL;DR: The advantage of a chaos system which is its unpredictability through the use of multiple keys and the secrecy of the RSA which is based on integer factorization’s difficulty is combined for a more secure and reliable cryptography.
Abstract: Cryptography, which involves the use of a cipher, describes a process of encrypting information so that its meaning is hidden and thus, secured from those who do not know how to decrypt the information. Cryptography algorithms come with the various types including the symmetric key algorithms and asymmetric key algorithms. In this paper, the authors applied the most commonly used algorithm, which is the RSA algorithm together with the Chaos system and the basic security device employed in the worldwide organizations which is the Data Encryption Standard (DES) with the objective to make a hybrid data encryption. The advantage of a chaos system which is its unpredictability through the use of multiple keys and the secrecy of the RSA which is based on integer factorization’s difficulty is combined for a more secure and reliable cryptography. The key generation was made more secure by applying the DES schedule to change the keys for encryption. The main strength of the proposed system is the chaotic variable key generator that chages the value of encrypted message whenever a different number of key is used. Using the provided examples the strength of security of the proposed system was tested and demonstrated.
TL;DR: FPGA based implementation of DWT alongwith Advanced Encryption Standard (AES) based watermarking is discussed and with this approach, improved security can be achieved.
Abstract: Now-a-days, multimedia based applications have been developed rapidly. Digital information is easy to process but it allows illegal users to access the data. For protecting the data from this illegal use, Digital Rights Management (DRM) can be used. DRM allows secure exchange of digital data over internet or other electronic media. In this paper, FPGA based implementation of DWT alongwith Advanced Encryption Standard (AES) based watermarking is discussed. With this approach, improved security can be achieved. The complete system is designed using HDL and simulated using Questasim and MATLAB Simulink model. The synthesis result shows that this implementation occupies only 2117 slices and maximum frequency reported for this design is 228.064 MHz.
TL;DR: This paper study and analysis Bellman-Ford routing algorithm and check the flow of data between these protocol layers and uses Qualnet 5.0.2 simulator tool for simulation purpose.
Abstract: Wireless sensor network consists various sensor nodes that are used to monitor any target area like forest fire detection by our army person and monitoring any industrial activity by industry manager. Wireless sensor networks have been deployed in several cities to monitor the concentration of dangerous gases for citizens. In wireless sensor network when sensor nodes communicate from each other then routing protocol are used for communication between protocol layers. Wireless sensor network protocol stack consist five layers such as Application layer, Transport layer, Network layer, MAC Layer, Physical layer. In this paper we study and analysis Bellman-Ford routing algorithm and check the flow of data between these protocol layers. For simulation purpose we are using Qualnet 5.0.2 simulator tool.
TL;DR: The proposed system performs the face detection and facial components using Gabor filter and the results show accurate detection of facial components.
Abstract: Face detection is a critical task to be resolved in a variety of applications. Since faces include various expressions it becomes a difficult task to detect the exact output. Face detection not only play a main role in personal identification but also in various fields which includes but not limited to image processing, pattern recognition, graphics and other application areas. The proposed system performs the face detection and facial components using Gabor filter. The results show accurate detection of facial components
TL;DR: The sensitivity to initial conditions and control parameters make chaos encryption suitable for image applications, and various chaos encryption techniques are discussed, which are acceptable form of encryption for image data.
Abstract: With increasing dependence on communications over internet and networks, secure data transmission is coming under threat. One of the best solutions to ensure secure data transmissions is encryption. Multiple forms of data, such as text, audio, image, and video can be digitally transmitted, nowadays images being the most popular and old encryption techniques such as: AES,DES,RSA etc., show low security level when used for image encryption. This problem was resolved by using of chaos encryption which is an acceptable form of encryption for image data. The sensitivity to initial conditions and control parameters make chaos encryption suitable for image applications. This study discusses various chaos encryption techniques.
TL;DR: In this paper, a prototype of a remotely operated vehicle (ROV) with three degrees of freedom (DoF) thrusters and UTP (Unshielded Twisted Pair) cables as data transmission between joystick with a microcontroller embedded in the robot is presented.
Abstract: One type of underwater robot is the ROV (Remotely Operated Vehicle) whose movements are controlled directly by humans from the water surface. In this paper, ROV prototype has been designed and tested with three DoF (Degrees of Freedom) and controlled by a joystick which is connected with UTP (Unshielded Twisted Pair) cables as data transmission between joystick with a microcontroller embedded in the robot. This prototype has 3 thrusters with 3 degrees of freedom, 1 rotational motion (heave) and 2 translational motion (yaw and surge), with direction of movement up, down, forward, backward, turn right, and turn left. Speed mode setting when forward movement on PWM (Pulse Width Modulation) 75% = 0,037 m/s, 90% = 0.053 m/s and 100% = 0,071 m/s, while the reverse speed by 75% = 0,034 m/s, 90% = 0.045 m/s and 100% = 0.059 m/s, when the ROV moves up is 0,042 m/s, down 0.032 m/s, turn right 9 o/s and turn left 15 o/s set with fixed PWM value, is 100%.
TL;DR: In this article, a robotic leg has been designed, constructed and controlled from a geometric of human leg model with three joints moving in 2D plane, the robotic leg was able to create the movement from motion capture.
Abstract: In this paper presented the prototype of robotic leg has been designed, constructed and controlled. These prototype are designed from a geometric of human leg model with three joints moving in 2D plane. Robot has three degree of freedom using DC servo motor as a joint actuators: hip, knee and ankle. The mechanical leg constructed using aluminum alloy and acrylic material. The control movement of this system is based on motion capture data stored on a personal computer. The motions are recorded with a camera by use of a marker-based to track movement of human leg. Propose of this paper is design of robotic leg to present the analysis of motion of the human leg swing and to testing the system ability to create the movement from motion capture. The results of this study show that the design of robotic leg was capable for practical use of the human leg motion analysis. The accuracy of orientation angles of joints shows the average error on hip is 1.46o, knee is 1.66o, and ankle is 0.46o. In this research suggesting that the construction of mechanic is an important role in the stabilization of the movement sequence.
TL;DR: An fault aware pattern matching autonomic scheduling for cloud computing based on autonomic computing concepts is proposed and the results show the effectiveness of the scheme.
Abstract: Autonomic fault aware scheduling is a feature quite important for cloud computing and it is related to adoption of workload variation. In this context, this paper proposes an fault aware pattern matching autonomic scheduling for cloud computing based on autonomic computing concepts. In order to validate the proposed solution, we performed two experiments one with traditional approach and other other with pattern recognition fault aware approach. The results show the effectiveness of the scheme.
TL;DR: The effort is made to use MPPT system designed by intelligent controller for implementation in PV based utility systems and the model designed is intended to be a beneficial source for PV engineers and researchers to provide high efficiency with the use of MPPT.
Abstract: There is large potential for generating solar power in Uttarakhand (India) endowed with natural resources. The extensive use of solar energy through solar PV panels in Distributed and Renewable Electricity Generation is significant to utilize multi climatic zones of hilly areas. In this regard, UREDA (Uttarakhand Renewable Energy Development Agency) targets to achieve a huge boost of solar PV battery backup with approved subsidy budget of INR 6 billion to 50 billion by 2019/20 under JNNSM (Jawaharlal Nehru National Solar Mission). This investment will increase productivity, enhance employment opportunities and improve quality of education. However, maximization of power output from panels used for same is achieved through use of MPPT (Maximum Power Point Trackers). The commercially installed solar power systems can be made to accomplish higher efficiency by implementing MPPT systems in start ups. In this paper, the effort is made to use MPPT system designed by intelligent controller for implementation in PV based utility systems. The regulated voltage output from MPPT system is obtained irrespective of fluctuations in environment. These variations are tested for changing temperature and irradiance due to shading or partial unavailability of sun. The results of same have been optimized through MATLAB/SIMULINK. The model designed is intended to be a beneficial source for PV engineers and researchers to provide high efficiency with the use of MPPT.
TL;DR: In this article, a combination of up to six inputs of meteorological data such as Pressure (P), Temperature (T), Relative Humidity (H), Cloud ( C ), Precipitable Water Vapor (PWV ), and Precipitation (Pr) on a daily basis in 2012 were examined in the training process to find the best configuration system.
Abstract: Thunderstorms are dangerous and it has increased due to highly precipitation and cloud cover density in the Mesoscale Convective System area. Climate change is one of the causes to increasing the thunderstorm activity. The present studies aimed to estimate the thunderstorm activity at the Tawau area of Sabah, Malaysia based on the Multiple Linear Regression (MLR), Dvorak technique, and Adaptive Neuro-Fuzzy Inference System (ANFIS). A combination of up to six inputs of meteorological data such as Pressure (P), Temperature (T), Relative Humidity (H) , Cloud ( C ), Precipitable Water Vapor (PWV ) , and Precipitation (Pr) on a daily basis in 2012 were examined in the training process to find the best configuration system. By using Jacobi algorithm, H and PWV were identified to be correlated well with thunderstorms. Based on the two inputs that have been identified, the Sugeno method was applied to develop a Fuzzy Inference System. The model demonstrated that the thunderstorm activities during intermonsoon are detected higher than the other seasons. This model is comparable to the thunderstorm data that was collected manually with percent error below 50% .
TL;DR: In this article, a comparison of PID controller with MPC is made and the responses are presented and the results are compared based on settling time, percent of overshoot and stability analysis.
Abstract: Proportional–Integral–Derivative (PID) controllers are used in many of the Industries for various process control applications. PID controller yields a long settling time and overshoot which is not good for the process control applications. PID is not suitable for many of the complex process control applications. This research paper is about developing a better type of controller, known as MPC (Model Predictive Control). The aim of the paper is to design MPC and PID for a pasteurization process. In this manuscript comparison of PID controller with MPC is made and the responses are presented. MPC is an advanced control strategy that uses the internal dynamic model of the process and a history of past control moves and a combination of many different technologies to predict the future plant output. The dynamics of the pasteurization process was estimated by using system identification from the experimental data. The quality of different model structures was checked using best fit with data validation, residual and stability analysis. Auto-regressive with exogenous input (ARX322) model was chosen as a model structure of the pasteurization process and fits about 80.37% with datavalidation. MPC and PID control strategies were designed using ARX322 model structure. The controller performance was compared based on settling time, percent of overshoot and stability analysis and the results are presented.
TL;DR: What the future of the Internet is is shown, a qualitative prospective analysis on projects and investigations in which the scientific community is currently working is carried out, the information is analyzed, and the highlighted topics are shown.
Abstract: The Internet is currently the largest network of communication worldwide and is where technological advances could be observed. The original creation of the Internet was based on the idea that this network would be formed mainly by multiple independent networks with an arbitrary design. The Internet is the place where all countries communicate and disseminate information in real time, this phenomenon directly affects economies, businesses, and society. This article shows what the future of the Internet is, our research carries out a qualitative prospective analysis on projects and investigations in which the scientific community is currently working, the information is analyzed, and the highlighted topics are shown.
TL;DR: In this survey, several published works related to smart grid system vulnerabilities, potential intentional attacks, and suggested countermeasures for these threats have been investigated.
Abstract: The future power system will be an innovative administration of existing power grids, which is called smart grid. Above all, the application of advanced communication and computing tools is going to significantly improve the productivity and consistency of smart grid systems with renewable energy resources. Together with the topographies of the smart grid, cyber security appears as a serious concern since a huge number of automatic devices are linked through communication networks. Cyber attacks on those devices had a direct influence on the reliability of extensive infrastructure of the power system. In this survey, several published works related to smart grid system vulnerabilities, potential intentional attacks, and suggested countermeasures for these threats have been investigated.
TL;DR: In this paper, a smart integrated payment system for public transportation in Jakarta is presented, which can encourage people to use public transportation rather than private transportation. But, there are some problems that happen in public transportation where the people don't want to use the public transportation and choose to use private transportation that cause more traffic in Jakarta.
Abstract: Jakarta has many types of public transportation such as Kereta Rel Listrik (KRL), Transjakarta, taxi, angkot, metromini, mikrolet, bajaj, ojek, etc. But, there are some problems that happen in public transportation where the people don’t want to use public transportation and choose to use private transportation that cause more traffic in Jakarta. The problems of public transportation are in the facility which is still inappropriate, unclear information, uncomfortable, bad accessibility of public transportation which take more time to reach the destination, more complicated than taking the private transportation, and about the society, people don’t want to be labeled as low-class level. This paper is representing how to make the better system for public transportation in Jakarta with smart integrated payment system. Aim of this system is to encourage people to use public transportation rather than private transportation. The payment system that proposed are using smartphone application by scanning the QR Code or using smart card. User can easily pay through application by scanning QR code to pay the public transportation. The proposed of this smart integrated payment system will have opportunity as profit when collaborate with business when they can advertise their business and get customer from our user.
TL;DR: A hybrid statistical noise suppression technique has been developed for improving the quality of the impulse noisy color images and the performance of the proposed image enhancement scheme is proved using the advanced performance metrics.
Abstract: Image noise is one of the key issues in image processing applications today. The noise will affect the quality of the image and thus degrades the actual information of the image. Visual quality is the prerequisite for many imagery applications such as remote sensing. In recent years, the significance of noise assessment and the recovery of noisy images are increasing. The impulse noise is characterized by replacing a portion of an image’s pixel values with random values Such noise can be introduced due to transmission errors. Accordingly, this paper focuses on the effect of visual quality of the image due to impulse noise during the transmission of images. In this paper, a hybrid statistical noise suppression technique has been developed for improving the quality of the impulse noisy color images. We further proved the performance of the proposed image enhancement scheme using the advanced performance metrics.
TL;DR: This study used 150 images of Muslim women's clothing as a dataset consisting of red, blue, yellow, green and brown images to study human perception in viewing the color of clothing.
Abstract: Clothing is a human used to cover the body. Clothing consist of dress, pants, skirts, and others. Clothing usually consists of various colors or a combination of several colors. Colors become one of the important reference used by humans in determining or looking for clothing according to their wishes. Color is one of the features that fit the human vision. Content Based Image Retrieval (CBIR) is a technique in Image Retrieval that give index to an image based on the characteristics contained in image such as color, shape, and texture. CBIR can make it easier to find something because it helps the grouping process on image based on its characteristic. In this case CBIR is used for the searching process of Muslim fashion based on the color features. The color used in this research is the color descriptor MPEG-7 which is Scalable Color Descriptor (SCD) and Dominant Color Descriptor (DCD). The SCD color feature displays the overall color proportion of the image, while the DCD displays the most dominant color in the image. For each image of Muslim women's clothing, the extraction process utilize SCD and DCD. This study used 150 images of Muslim women's clothing as a dataset consistingclass of red, blue, yellow, green and brown. Each class consists of 30 images. The similarity between the image features is measured using the eucludian distance. This study used human perception in viewing the color of clothing.The effectiveness is calculated for the color features of SCD and DCD adjusted to the human subjective similarity. Based on the simulation of effectiveness DCD result system gives higher value than SCD.
TL;DR: A new normalization approach to the Pyramid Histogram of Oriented Gradients (PHOG) is presented as a mean for shape feature extraction of women Islamic clothing in a retrieval system and showed that NPHOG improved the HOG and PHOG performance in three clothing categories.
Abstract: The designs of Islamic women apparels is dynamically changing, which can be shown by emerging of online shops selling clothing with fast updates of newest models. Traditionally, buying the clothes online can be done by querying the keywords to the retrieval system. The approach has a drawback that the keywords cannot describe the clothes designs precisely. Therefore, a searching based on content–known as content-based image retrieval (CBIR ) –is required. One of the features used in CBIR is the shape. This article presents a new normalization approach to the Pyramid Histogram of Oriented Gradients (PHOG) as a mean for shape feature extraction of women Islamic clothing in a retrieval system. We refer to the proposed approach as normalized PHOG (NPHOG). The Euclidean distance measured the similarity of the clothing. The performance of the system was evaluated by using 340 clothing images, comprised of four clothing categories, 85 images for each category: blouse-pants, long dress, outerwear, and tunic. The recall and precision parameters measured the retrieval performance; the Histogram of Oriented Gradients (HOG) and PHOG were the methods for comparison. The experiments showed that NPHOG improved the HOG and PHOG performance in three clothing categories.
TL;DR: Develop component-based software that is a modern paradigm for software development that produces reusable software components, high quality, and cost-effective for e-learning software.
Abstract: E-learning software is a product of information and communication technology used to help dynamic and flexible learning process between teacher and student. The software technology was first used in the development of e-learning software in the form of web applications. The advantages of this technology because of the ease in the development, installation, and distribution of data. Along with advances in mobile/wireless electronics technology, e-learning software is adapted to this technology known as mobile learning. The ability of this electronic device is the same as a single computer even though it is simpler than a single computer. The problem that arises when e-learning software operates on multiple platforms is that computer programs are made repeatedly depending on the platform being used. This situation will obviously affect the quality of e-learning software. To overcome these problems, in this study developed component-based software that is a modern paradigm for software development that produces reusable software components, high quality, and cost-effective. In software development, software components will be assembled in the software in need. The result of this research is high quality e-learning software based multiplatform component.
TL;DR: In this paper, the authors investigated how individual and organizational factors influence people behavior in using knowledge management, and they found that individual and organization factors and perceived ease of use construct with people behaviour in accept KMS.
Abstract: The aim of this study is to investigates the how individual and organizational factors influence people behavior in using knowledge management. This research applied Technology Acceptance Model (TAM) as a basis theory; TAM was enriched with individual and organizational factors for this study. A survey approach was conducted for data collection. Three of institutions in Banking Sector at Indonesia were invited to join this study and 215 knowledge workers were participated for the survey. Data from survey were analyzed through Structural Equations Model (SEM) using PLS (Partial Least Square) V2. The conclusion specify that ‘‘individual elements’’ and ‘‘organizational elements’’ are the significantly affect people behavior in KMS acceptance factors that influence knowledge worker behavior in knowledge sharing. However this study not found relationship between individual and organization factors and “perceived ease of use” construct with people behavior in accept KMS.
TL;DR: In this paper, the effects of variation of number of quantum wells in material gain characteristics and lasing wavelength of step index separately confined type-I InGaAsP/InP lasing nano-heterostructure for different carrier concentrations at room temperature in TE (Transverse Electric) mode of polarization.
Abstract: This paper reports the effects of variation of number of quantum wells in material gain characteristics and lasing wavelength of step index separately confined type-I InGaAsP/InP lasing nano-heterostructure for different carrier concentrations at room temperature in TE (Transverse Electric) mode of polarization. Peak material gain is found to be highest when the number of quantum well is one in the structure. However, for the case of 3QWs, 5QWs and 7QWs, it is almost same at a particular carrier density. Lasing wavelength at peak material gain considerably increases as the number of quantum well layers vary from single quantum well layer to three quantum well layers in the active region and after that it will remain almost same by any further increase in number of quantum wells for a particular carrier density. Furthermore, negative gain condition in the material gain spectra exists in the case of multiple quantum wells only at carrier concentration of 2×10 18 /cm 3 . The results suggest that the proposed nano-heterostructure is highly suitable as a light source in fiber optic links for long distance communication.
TL;DR: CMA equalizer is used to enhance the performance of OFDM system and results in 52.6% and 96.3% BER reduction as compared to conventional OFDM model without channel coding, channel equalization and channel fading.
Abstract: Orthogonal Frequency Division Multiplexing (OFDM) is a type of Multicarrier Modulation (MCM) technique in which entire bandwidth is divided into large number of small sub-carriers and each subcarrier is transmitted parallel to achieve higher data rates. It has various applications like Digital Audio Broadcasting (DAB), Digital Video Broadcasting (DVB) and wireless LAN.OFDM technique is widely used in wireless communication system because of its very high data rate. The performance of FFT based OFDM system using Linear and cyclic channel coding and Constant Modulus Algorithm (CMA) equalizer is simulated using simulink model. The BER saving using the optimized proposed model with both linear and cyclic channel coding along with CMA equalizer is evaluated. The proposed work using cyclic channel coding with QPSK/QAM modulation and CMA as channel equalization under AWGN channel results in 52.6% and 96.3% BER reduction as compared to conventional OFDM model without channel coding, channel equalization and channel fading. So, CMA equalizer is used to enhance the performance of OFDM system.
TL;DR: The test outcome demonstrates that the model of air cushion vehicle could keep its adjust the axis orientation of the roll in spite of the fact that it was less compelling in the pitch pivot direction.
Abstract: Hovercraft is a method of transportation as an option for clients who remain on the waterway and swamp surface. The issue with hovercraft is when dubious climate and natural condition, e.g. wind speed and wave tallness exasperate solidness of hovercraft to jeopardise the driver. We propose an approach to keep up adjust of the hovercraft by controlling the focal point of gravity (PG) to be determined position. The controller monitors the position of load to change the position. A 6-DOF IMU Sensor MPU 6050 was utilised to create information as an examination with setpoint. PID control strategy was employed. The test outcome demonstrates that the model of air cushion vehicle could keep its adjust the axis orientation of the roll in spite of the fact that it was less compelling in the pitch pivot direction.
TL;DR: A survey of the literature of Z source inverters/converter topologies can be found in this article, where an increasing interest of using Z source in power generation involving renewable energy sources like wind and solar energy for both off grid and grid tied schemes were originated from 2003.
Abstract: Need for alternative energy sources to satisfy the rising demand in energy consumption elicited the research in the area of power converters/inverters. An increasing interest of using Z source inverter/converter in power generation involving renewable energy sources like wind and solar energy for both off grid and grid tied schemes were originated from 2003. This paper surveys the literature of Z source inverters/converter topologies that were developed over the years.
TL;DR: The proposed Z source based PV is implemented using MATLAB/ SIMULINK environment and produces high output without using the transformer.
Abstract: The different converters are developer in recent years for efficient operation of PV based various controllers for ac load application. The Z source inverter is used as both buck and boost operation. But the proposed paper Z source inverter produce more output voltage than input voltage. In proposed converter produce high power without using the transformer. The space vector modulation is used as to control the speed of an induction motor. The IFOC based SVM produce the pulse and given to the three phase inverter. In induction motor has high power application so the proposed Z source produces high output. The dc link voltage regulation using the filter. The proposed Z source based PV is implemented using MATLAB/ SIMULINK environment.
TL;DR: The combination method of classification, clustering and feature selection of internet traffic dataset was successfully modeled internet traffic classification method that higher accuracy and faster performance.
Abstract: K-Nearest Neighbour (K-NN) is one of the popular classification algorithm, in this research K-NN use to classify internet traffic, the K-NN is appropriate for huge amounts of data and have more accurate classification, K-NN algorithm has a disadvantages in computation process because K-NN algorithm calculate the distance of all existing data in dataset. Clustering is one of the solution to conquer the K-NN weaknesses, clustering process should be done before the K-NN classification process, the clustering process does not need high computing time to conqest the data which have same characteristic, Fuzzy C-Mean is the clustering algorithm used in this research. The Fuzzy C-Mean algorithm no need to determine the first number of clusters to be formed, clusters that form on this algorithm will be formed naturally based datasets be entered. The Fuzzy C-Mean has weakness in clustering results obtained are frequently not same even though the input of dataset was same because the initial dataset that of the Fuzzy C-Mean is less optimal, to optimize the initial datasets needs feature selection algorithm. Feature selection is a method to produce an optimum initial dataset Fuzzy C-Means. Feature selection algorithm in this research is Principal Component Analysis (PCA). PCA can reduce non significant attribute or feature to create optimal dataset and can improve performance for clustering and classification algorithm. The resultsof this research is the combination method of classification, clustering and feature selection of internet traffic dataset was successfully modeled internet traffic classification method that higher accuracy and faster performance.