Articles
627 Documents
Case Study: Satisfying Skills Needed of Engineering Graduates through a Course on Innovation
Raj L Desai;
M. David Papendick
Bulletin of Electrical Engineering and Informatics Vol 1, No 1: March 2012
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/eei.v1i1.221
The purpose of this paper is to report a case study that develops the skills necessary to compete in a global economy by going through the cycle of product development. The best way to equip students with the skills to survive and thrive in a global economy is to teach innovation. Students can develop their skills by working in small teams to generate, evaluate, develop, and market their innovation.
Designing a Secure Object Oriented Software Using Software Security Life Cycle
Mohammad Obaidullah Bokhari;
Mahtab Alam
Bulletin of Electrical Engineering and Informatics Vol 1, No 1: March 2012
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/eei.v1i1.222
The security of Object oriented software is well managed by software metrics because they promise accurate, reliable, faster and more efficient ways with proven techniques and standard notations. The Software Security Life Cycle (SSLC) was developed providing a basis to help software Security planning. In this paper, software metrics, which have been proposed for Software Security, are used and applied to programming language. In software industries, the cost of Security of large-scale software has put emphasis on the need to manage the in earlier phases and is statistically estimate the security of large software system and to identify error prone modules.
Design And Implementation Of Error Correcting Codes For Transmission in Binary Symmetric Channel
Victor N. Papilaya
Bulletin of Electrical Engineering and Informatics Vol 1, No 1: March 2012
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/eei.v1i1.223
Error Correcting codes are normally used for protecting transmitted information bits in a noisy channel. The information bits are encoded into error correcting codes which will be transmitted into the channel and on the receiver side, the received codes will be decoded back into the transmitted information bits. In this paper, a technique of generating binary error correcting codes that meet the Gilbert-bound and a simple encoding-decoding mechanism will be presented. To show the performance of the error correcting codes, a Binary Symmetric Channel is considered for transmission.
Discrete Design Optimization of Small Open Type Dry Transformers
Raju Basak;
Arabinda Das;
Ajay Sensarma;
Amar Nath Sanyal
Bulletin of Electrical Engineering and Informatics Vol 1, No 1: March 2012
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/eei.v1i1.224
Transformers of small ratings have a wide field of application. They are generally designed and fabricated using standard stampings available in the market. The design is made according to guidelines given in text-books. But such guidelines do not yield a cost-optimal solution. It may even fail to give a feasible solution if design variables are not properly chosen. This paper presents a method to get the cost-optimal solution subject to usual design constraints. The line of approach is completely different from that given in the standard text-books. Computer programs have been developed for finding out the cost-optimal design using standard stampings and case studies have been made on its basis.
Super Resolution Imaging Needs Better Registration for Better Quality Results
Varsha Hemant Patil;
Kharate G K;
Kamlapur Snehal Mohan
Bulletin of Electrical Engineering and Informatics Vol 1, No 1: March 2012
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/eei.v1i1.225
In this paper, trade-off between effect of registration error and number of images used in the process of super resolution image reconstruction is studied. Super Resolution image reconstruction is three phase process, of which registration is of at most importance. Super resolution image reconstruction uses set of low resolution images to reconstruct high resolution image during registration. The study demonstrates the effects of registration error and benefit of more number of low resolution images on the quality of reconstructed image. Study reveals that the registration error degrades the reconstructed image and without better registration methodology, a better super resolution method is still not of any use. It is noticed that without further improvement in the registration technique, not much improvement can be achieved by increasing number of input low resolution images.
A Secure Image Encryption Algorithm Based on Hill Cipher System
S.K. Muttoo;
Deepika Aggarwal;
Bhavya Ahuja
Bulletin of Electrical Engineering and Informatics Vol 1, No 1: March 2012
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/eei.v1i1.226
We present a technique of image encryption based on Hill cipher system that provides better security than existing approach of Bibhudendra Acharya et al. by rendering the image content completely scrambled using multiple self-invertible keys, block shuffling and a new developed pel transformation. The Hill cipher algorithm is one of the symmetric key algorithms having several advantages in encryption. However, the inverse of the matrix used for encrypting the plain text in this algorithm may not always exist. Moreover this algorithm is susceptible to known plain text attack. Our proposed algorithm is aimed at better encryption of all types of images even ones with uniform background and makes the image encryption scheme more secure.
Solving Hashiwokakero Puzzle Game with Hashi Solving Techniques and Depth First Search
Reza Firsandaya Malik;
Rusdi Efendi;
Eriska Amrina Pratiwi
Bulletin of Electrical Engineering and Informatics Vol 1, No 1: March 2012
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/eei.v1i1.227
Hashiwokakero is a logic puzzle game that sharpen the brain and very popular in Japan. This paper discusses about how to find a solution in the Hashi puzzle game using Hashi Solving techniques, such as: Just Enough Neighbor, One Unsolved neighbor, Few Neighbor, Leftovers and Isolation. Hashi Solving techniques are used to find and build bridges that can definitely be built across the island, while Depth First Search (DFS) will search and build bridges that have not been found by Hashi Solving techniques. The results shown that Hashi Solving Techniques and DFS able to solve every Hashi puzzle scenario.
Design and Development of an Automated Multi Axis Solar Tracker Using PLC
Santhosh Krishna Venkata;
J S Rajshekar
Bulletin of Electrical Engineering and Informatics Vol 2, No 3: September 2013
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/eei.v2i3.205
Design of a two dimensional automated solar tracking system is discussed in this paper. The objectives of the proposed work are to design an automated tracking technique using Light Dependent Resistance (LDR), and solar panel power output to position the solar panel to absorb maximum energy. For positioning the solar panel two stepper motors are used, each for positioning in a plane. These stepper motors were driven by a Programmable Logic Controller (PLC). The controller is designed using wonderware software considering the inputs from LDR Sensor and solar panel output to drive the stepper motor connected to solar panels. Then the whole program is implemented with the help of PLC. The system was tested on a real time and results showed the proposed technique had improved the efficiency of solar panel by an amount of 25%.
Relevant Words Extraction Method for Recommendation System
Naw Naw;
Ei Ei Hlaing
Bulletin of Electrical Engineering and Informatics Vol 2, No 3: September 2013
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/eei.v2i3.200
Nowadays, E-commerce is very popular because of information explosion. Text mining is also important for information extraction. Users are more preferable to use the convenience system from many sources such as through web pages, email, social network and so on. This system proposed the relevant words extraction method for car recommendation system from user email. In relevant words extraction, this system proposed the Rule-based approach in Compiling Technique. Context- free grammar is the most suitable for relevant words extraction. Recommendation System (RS) is a most popular tool that helps users to recommend according to their interests. This system implements efficient recommendation system by using proposed key extraction algorithm, Content-based Filtering (CBF) method and Jaccard Coefficient that will help the users who want to buy the car by providing relevant car information.
Relevant Words Extraction Method in Text Mining
Naw Naw
Bulletin of Electrical Engineering and Informatics Vol 2, No 3: September 2013
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/eei.v2i3.201
Nowadays, E-commerce is very popular because of information explosion. Text mining is also important for information extraction. Users are more preferable to use the convenience system from many sources such as through web pages, email, social network and so on. This system proposed the relevant words extraction method for car recommendation system from user email. In relevant words extraction, this system proposed the Rule-based Technique based on Compiling Technique. Context- free grammar is very suitable for relevant words extraction. The extracted keys will be used in recommendation system. Recommendation System (RS) is a most popular tool that helps users to recommend according to their interests. In recommendation, this system proposed Content-based Filtering approach with Jaccard Coefficient that will help the users who want to buy the car by providing relevant car information.