Articles
48 Documents
Search results for
, issue
"Vol 9, No 1: January 2018"
:
48 Documents
clear
Controlling Pornography Over The Web
Archenaa J;
E. A. Mary Anitha
Indonesian Journal of Electrical Engineering and Computer Science Vol 9, No 1: January 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v9.i1.pp104-106
This investigation analyzed the degree to which youngsters are protected on the web with an emphasis on web erotica. The goals of this investigation incorporate (a) to find out the degree to which kids peer connections impact their web get to; (b) to decide the effect of sex on understudy utilization of web for long range informal communication; (c) to test whether sex have huge impact on understudy utilization of web for texting; (d) to test whether sex affect on understudy utilization of web for Email; (e) to decide the commitment of sex understudy utilization of web for video posting/seeing; (f) to test whether sex have huge commitment on understudy utilization of web for their homework; and (g) to discover the degree of youngsters open to erotica on the web. Essential wellspring of information gathering was utilized in this investigation and the factual devices utilized for information examination incorporate the Chi-square test measurement, Bar outline, Pie diagram and rate circulation. The outcome got was that greater part of kids don't approach web through associate connections which suggests that the degree to which youngsters peer connections impact their web get to is low. It was uncovered that understudies utilize the web for long range interpersonal communication, video posting/review, and Emailing yet don't utilize it for texting and in getting their work done. It was discovered that dominant part of the kids are not presented to online erotica, in opposite it ought to be noticed that the couple of kids who utilize the web for these exercises are at danger of being presented to obscenity on the web.
Impact of Inter-eNodeB Handover Pameters on Performance Optimization of LTE Networks
Mina Malekzadeh;
Fatemeh Rezaiee
Indonesian Journal of Electrical Engineering and Computer Science Vol 9, No 1: January 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v9.i1.pp212-220
Handover, as a resource consuming process, is an important issue in mobile communications which can highly affect the overall performance of the LTE networks. Since the handover process mainly relies on four main entry condition parameters, optimizing these parameters will in turn improve the handover process. In this work, we investigate the effectiveness of the four handover parameters by measuring the resulting downlink throughput and number of the required handovers. We furthermore determine the optimized values of the parameters through implementing different sets of experiments. Finally, by applying the obtained optimized parameters on two main LTE handover algorithms i.e. A3RSRP and A2A4RSRQ, their performance is compared regarding to different speeds of the mobile equipment. We determine how to accurately select the optimal settings for the parameters so that greater LTE performance can be achieved.
A Review on ZIGBEE in WSN
Karthikeyan V
Indonesian Journal of Electrical Engineering and Computer Science Vol 9, No 1: January 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v9.i1.pp29-32
Zigbee is fastidious for a group of abnormal state communication conventions. Zigbee is a run of the mill remote correspondence innovation. ZigBee uses low rate, low-control advanced radios taking into account an IEEE 802 standard for individual region systems. The change characterised by the ZigBee particular is proposed to be easier and less extravagant than the different WPANs remote single zone system, for example, Bluetooth. ZigBee is focused on radio-recurrence applications that compel a low in order rate, long battery life, and secure systems administration. ZigBee has a characterized rate of 250 kbps most appropriate for occasional or irregular information or a single sign transmission from a sensor or data gadget. It is a standard Open convention with no or unimportant permitting charges, chipsets accessible from various sources, remotely redesigned firmware, completely remote and low power, lattice systems administration to work on batteries, low support and bigger system size with standard based high security.
Adaptive Link Aware on-demand Multicast Routing Scheme in MANET
Ruban Chakravarthy;
G. Ranganathan
Indonesian Journal of Electrical Engineering and Computer Science Vol 9, No 1: January 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v9.i1.pp56-59
The main objective of this paper is to propose a new multicast routing scheme to adopt with the dynamic topology of MANET at the same time to provide high multicast efficiency and packet delivery ratio. The proposed scheme is named as Link Aware on Demand Multicast Routing (LAOMR) scheme. In this scheme, initially the source node forms the multicast group by announcing itself as a multicast source agent to all the nodes in the network. The nodes which are eager to join in the group are sending the join request to the source node. Then the source node finds the route to reach the multicast group through some intermediate nodes. The intermediate nodes are not interested to hear the multicast message but they are act as the routers to forward the packets to the multicast group. The intermediate nodes are chosen based on the link residual life (LRL) of the nodes. The node which has the highest LRL and closer to the multicast group is selected as the forwarder node. So, the proposed scheme reduces the link failure in the multicast route and increases the multicast efficiency, throughput. The performance is evaluated by using the simulation results obtained from NS2 Simulator.
Chaos Based Image Encryption
Suresh. G. B;
V. Mathivanan
Indonesian Journal of Electrical Engineering and Computer Science Vol 9, No 1: January 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v9.i1.pp97-100
New method of secure image encryption and decryption scheme based on the chaos is proposed. There are two steps are followed after the preprocessing step in the proposed system namely, Encryption and Decryption. In preprocessing, images are denoised using median filter. Then the original input images will be encrypted by using the chaos mapping algorithm. At last the original images are retrieved back from the encrypted image by using the key that is specified during the encryption process for the decryption of the original images. Then the histogram mapping is done for the encrypted and the decrypted images. The proposed system is tested on well-known images like Lena, Mandrill, Clown and Barbara. The experimental results have demonstrated that the introduced image encryption scheme can achieve high security for practical image encryption.
Encryption Techniques and Wireless Power Transfer Schemes
Nur Hazwani Hussin
Indonesian Journal of Electrical Engineering and Computer Science Vol 9, No 1: January 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v9.i1.pp183-190
Wireless power transfer (WPT) is one of the most useful ways to transfer power. Based on power transfer distances, the WPT system can be divided into three categories, namely, near, medium, and far fields. Inductive coupling and capacitive coupling contactless techniques are used in the near-field WPT. Magnetic resonant coupling technique is used in the medium-field WPT. Electromagnetic radiation is used in the far-field WPT. This paper reviews the techniques used in WPT. In addition, energy encryption plays a major role in ensuring that power is transferred to the true receiver. Therefore, this paper reviews the energy encryption techniques in WPT. A comparison between different techniques shows that the distance, efficiency, and number of receivers are the main factors in selecting the suitable energy encryption technique.
A View on Creep Failure in Distribution Transformers
R. Elavarasi
Indonesian Journal of Electrical Engineering and Computer Science Vol 9, No 1: January 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v9.i1.pp49-52
This paper insight about reasons of disappointment in distribution transformers. It has been suggested that crawl may be a noteworthy purpose behind such disappointments. The impact of anxiety, temperature, and material on unfaltering state killjoy rate on aluminum and copper wires (utilized as a part of 25 KVA distribution transformers) have been introduced. Proposed study affirms that the disappointment rate of aluminum wound DTs is higher than the disappointment rate of copper injury DTs in force insufficient ranges and poor conveyance systems. The higher disappointment rate of aluminum wound DTs has been credited to the lifted enduring state wet blanket rate of the aluminum wire than copper wire.
Application of Artificial Neural Network in Electrical Power System
P. Palanichamy
Indonesian Journal of Electrical Engineering and Computer Science Vol 9, No 1: January 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v9.i1.pp77-80
The artificial neural network used to detect the fault in electrical machines and can increase the function of new entry detection when compared to the conventional method. In proposed artificial neural network has increased the precision and stability of system performance. The time-area vibration signs of a pivoting machine with ordinary and flawed apparatuses are handled for highlight extraction. The separated elements from unique and preprocessed signs are utilized as contributions to both classifiers in view of ANNs and SVMs for two-class (typical or blame) acknowledgment. The quantity of hubs in the concealed layer, if there should be an occurrence of ANNs, and the extend basis work section parameter, in the event of SVMs, alongside the choice of information components are enhanced utilizing genetic algorithm (GAs).