Статьи журнала - International Journal of Engineering and Manufacturing

Все статьи: 508

Reach Enhanced Is-OWC System using Double Sideband Suppressed (DSS) DP-QPSK

Reach Enhanced Is-OWC System using Double Sideband Suppressed (DSS) DP-QPSK

Raveena Garg, Gurpreet Kaur, Naresh Kumar

Статья научная

Insophisticated situations coming from developing multimedia applications and the exponential increase in the number of smart sensors and devices, future wireless networks will ensure high reliability, low latency, scalability, as well as better quality-of-service.Optical wireless communication (OWC) becomes more important because it can take advantage of the light medium's unique selling points over RF, such as immunity to electromagnetic interference (EMI), ultra-high capacity, the ability to communicate wirelessly through water, and the ability to provide additional security. Dual polarization (DP) enabled multilevel modulations in inter satellite optical wireless communication (Is-OWC) are potential and capacity building techniques to cope up with bandwidth explosive demands. Therefore, inthis work, a reach enhanced single channel Is-OWC is proposed using Double Sideband Suppressed (DSS) dual polarized (DP) Quadrature phase shift keying (QPSK) modulation. Spectral efficiency of carrier is improved through DSS technique using Mach-Zehndar modulator (MZM) and millimeter wave (mm- wave). Further, pulse width reduction, nonlinear effects suppression, carrier phase estimation (CPE) and frequency offset estimation (FPE) is performed by Digital signal processor (DSP) in coherent receiver of PDM-QPSK. Performance comparison of DP-QPSK and DSS-DP-QPSK is performed at different link lengths in terms of log BER and error vector magnitude (EVM%). Results revealed that proposed system i.e., DSS-DP-QPSK at 160 Gbps data rate covers 44,000 km Is-OWC distance with acceptable log BER as compared to 40,000 km in DP-QPSK due to improved spectral efficiency of carrier spectrum of proposed system.

Бесплатно

Reactive Power Market Clearing based on Pay-as-Bid Method with System Security

Reactive Power Market Clearing based on Pay-as-Bid Method with System Security

Indu Maheshwari, Leena G, N.S. Saxena

Статья научная

This paper presents a marketing mechanism based on the Pay-As-Bid (PAB) method for reactive power ancillary services in the deregulated electricity market. Security, reliability and the location is major concern for Independent System Operator (ISO). So a modified Optimal Power Flow (OPF) optimization method is proposed in this paper to provide the system security. Firstly, the reactive power solution is obtained by solving a modified OPF model which maximizes system loadability subject to transmission security constraints imposed by thermal limits, voltage limits and stability limits. This modified OPF model is used for ensuring systemsecurity as well as for contingency analysis. Secondly, the Expected Payment Function (EPF) of generators is used to develop a bidding framework while Total Payment Function (TPF) based OPF is used to clear the PAB market. For the simulation and analysis purposes, a 24 bus RTS network is used in normal condition as well as in worst contingency state. The system security is preserved even in the worst contingency state.

Бесплатно

Real Time Implementation of Driver Drowsiness Monitoring System Using SVM Classifier

Real Time Implementation of Driver Drowsiness Monitoring System Using SVM Classifier

Ashwini Araballi, Sangharsh Shinde

Статья научная

Nowadays, as transportation is increasing day by day and the probability of occurance of it in future is also very high. There are so many people travel an hours together every day, due to lack of rest the driver may feel tired or drowsy and may fall asleep. This may lead to several highway calamities causing to severe injuries, loss of human life etc. So solve this issue we propose a driver drowsiness monitoring system that helps in avoiding major accidents. The proposed method detects the status of the driver of the vehicle using the Eye Aspect Ratio (EAR) and Mouth Opening Ratio (MOR) techniques. The developed system includes a Pi camera, Raspberry Pi module and is used to detect and analyze continuously the eye closure status in real-time. When drowsiness is detected buzzer sound will alert the driver which significantly helps in reducing the percentage of highway calamities by alerting.

Бесплатно

Real-time construction of 3D welding torch in virtual space for welding training simulator

Real-time construction of 3D welding torch in virtual space for welding training simulator

Fangming Yuan

Статья научная

One unsolved problem in the development of an effective welding training simulator is how to construct an accurate 3D welding torch model based on the moving position of this torch in the training process. This paper presents an effective approach to deal with the problem. The whole scene is constructed in the base coordinate system and the torch is modeled as a 3D object in the sub-coordinate system. The sub-coordinate system firstly overlaps the base coordinate system, and it’s continuously changing as the trainer operates the torch. A nine axis sensor is installed in the torch at a selected point, which is the origin of the sub-coordinate system. The sensor can measure the rotation posture of the torch. Another marked point that can be captured by the Binocular Vision System (BVS) is installed with an infrared emitter. The BVS can measure the coordinate values of this point in the base coordinate system. As long as the coordinate values of a certain point on the model and its rotation posture based on this point can be determined, the VR development tool, such as Unity-3d,can track the model in real-time. That is the algorithm of this system, which is verified by Pro/E, a 3D modeling software. The approach presented above is applied to a welding training simulator product, which has been put into use and proved to be effective.

Бесплатно

Relating Interactive System Design and Information Theory from Information Leakage Perspective

Relating Interactive System Design and Information Theory from Information Leakage Perspective

Kushal Anjaria, Arun Mishra

Статья научная

In contemporary interactive software system design, to maintain equilibrium between usability and security is a challenging task because strictly enforced security policies directly affect the usability of the software. As a solution to this problem, information theoretic measure of information leakage in interactive system design has been proposed in the present work. The present paper first models the software system as a coloured Petri net model and after that using information theory and Petri net algebra; it defines the leakage in the interacting system. Based on the leakage definition, the present paper further quantifies information leakage and tries to establish a relation between information leakage and interactive system design principles. The paper also hints to decide consensus on the equilibrium of security and usability.

Бесплатно

Reliability Analysis Techniques in Distribution System: A Comprehensive Review

Reliability Analysis Techniques in Distribution System: A Comprehensive Review

Prakash Kafle, Manila Bhandari, Lalit B. Rana

Статья научная

Quality of electricity with continuity is the reliability of the power system which is inversely proportional with the duration of power supply interruption. It depends on some expected or unexpected faults/failures on the systems, speed of protecting systems, preventive maintenance, and motivation of technical staffs. The detailed study of the distribution system is more crucial as its reliability is the concern of utility’s fame, service, customers’ satisfactions and reflects to the overall revenue. The relevant articles from the various sources has been collected and analyzed different reliability indices with their significance. Also, to realize the methodology related with reliability analysis, a comparative study among its different components has been carried out and the best techniques for maintaining system reliability are suggested.

Бесплатно

Reliability Analysis of Combat Architecture Model based on Complex Network

Reliability Analysis of Combat Architecture Model based on Complex Network

Xiaoguang Wang, Sen Li, Fuxian Liu, Xueyuan Fan

Статья научная

Based on the complex and networking characteristics of the combat system under the informationtization condition, combining the complex network theory, the author put forwards three network extension rules and established the network-based system model. Meanwhile, this article discussed the network characteristic parameters, reliability assessment and some other problems, and further relied on the simulation to analyze the network characteristics, reliability and the vital nodes mining under the different extension rules. The research methods and conclusions in this article can be used as the combat system’s arguments and references to its optimization.

Бесплатно

Remote sensing image scene classification

Remote sensing image scene classification

Md. Arafat Hussain, Emon Kumar Dey

Статья научная

Remote sensing image scene classification has gained remarkable attention because of its versatile use in different applications like geospatial object detection, natural hazards detection, geographic image retrieval, environment monitoring and etc. We have used the strength of convolutional neural network in scene image classification and proposed a new CNN to classify the images. Pre-trained VGG16 and ResNet50 are used to reduce overfitting and the training time in this paper. We have experimented on a recently proposed NWPU-RESISC45 dataset which is the largest dataset of remote sensing scene images. This paper found a significant improvement of accuracy by applying the proposed CNN and also the approaches have applied.

Бесплатно

Research of Association Rule Mining Algorithm Based on Improved FP-Tree

Research of Association Rule Mining Algorithm Based on Improved FP-Tree

Chen zhuo, Lu nannan, Li shiqi, Han tao

Статья научная

Mining algorithm of FP-Tree is one of the most effective mining algorithms in association rule mining. It must produce large amounts of the candidate set and scan database repeatedly, but it generates conditional FPTree recursively in the process of mining frequent pattern and wastes the storage space greatly using the common tree's memory structure. It proposed an algorithm for mining frequent patterns by constructing reverse FP-tree with a binary tree storage structure. In mining process, it mines left son tree recursively, but gets frequent pattern not by generating conditional FP-Tree, so it greatly reduces the storage space and running time. The experiments show that the improved algorithm can realize effective mining on the time and space.

Бесплатно

Research of Distributed Data Mining System Based on Web Services

Research of Distributed Data Mining System Based on Web Services

LIU Weiming, YANG Jian, MAO Yimin

Статья научная

For the following reasons, the original centralized data mining became more and more out of date. First, the data source need to be processed is distributed on different computers in the networks. Second, because of the constrain of networks band, the privacy and safety of data, the incompatibility of systems and so on, it is not realistic to put all data source in a place for centralized data mining. Third, more and more demands have addressed on the openness and easy accessibility. The distributed data mining technology was presented for the problems mentioned above. This article introduced the latest technology for distributed component technology—web services technology into distributed data mining field, and took some tentative efforts in solving the problem of designing for suitable architecture of distributed data mining systems and corresponding distributed mining algorithms.

Бесплатно

Research of Product Classifying and Coding Based on the Things Characteristics and Realization of the Relevant Management System

Research of Product Classifying and Coding Based on the Things Characteristics and Realization of the Relevant Management System

Chen Xi, Hao Lijian, Yang Guichun, Zhang Jialia, Xia Guijiana, Ma Yanlia

Статья научная

In this paper, the advantages and disadvantages of three kinds of information code (subjection code, composite code and parallel code) were analyzed and compared. It was put forward that adopt parallel code method based on things characteristics realizing the information classifying and coding management of the whole life cycle of the products. And the structure model of product classifying code based on parallel code method was established. At the same time, the implementation method of product classifying code was presented for application requirements of the enterprise. Finally, the classifying and coding management system of product was introduced that supported by ORACLE and used JSP to development.

Бесплатно

Research of the QoC-Aware Service Selection for Middleware Based Pervasive Applications

Research of the QoC-Aware Service Selection for Middleware Based Pervasive Applications

Di Zheng, Hang Yan, Jun Wang

Статья научная

With the rapid development of information technology, it is inevitable that the distributed mobile computing will evolve to the pervasive computing gradually whose final goal is fusing the information space composed of computers with the physical space in which the people are working and living in. Furthermore, with the development of SOA, more and more pervasive applications have been composed of different kinds of services. So how to choose a suitable service from all the useable services is the most important step for pervasive computing. Compare to the traditional service selection we must take more care of the context as well as the quality of them in pervasive environment. However, most of existing researches pay no attention to QoC (Quality of Service) which may lead to unreliable selections. Therefore we proposed a middleware based service selection scheme to support QoC-aware service selection efficiently.

Бесплатно

Research on Application of OGSA-based Digital Campus

Research on Application of OGSA-based Digital Campus

Zhang Shunli, Yin Qingshuang

Статья научная

This paper briefly introduces the concept and characteristics of Grid technology and Open Grid System Archi-tecture (OGSA). By analyzing the deficiencies existing in the present campus network and the comparative advantages of campus Grid, it presents and discusses the model and design of OGSA-based campus Grid. Building campus Grid is an important work in Grid gaining ground; therefore, the study on OGSA-based Cam-pus Grid is of great significance in applying Grid computing to educational field.

Бесплатно

Research on Cultivating Undergraduates in the Computer Science Based on Students

Research on Cultivating Undergraduates in the Computer Science Based on Students

Qiongqin Jiang, Tian Jin, Haiyu Chen, Wenguang Song

Статья научная

According to the existing problems in college students' learning, change the teaching method to cultivate students with innovative consciousness and innovative connotation. The article mainly elaborates on the current shortcomings in the teaching process of many ordinary colleges and universities, and proposes that teaching is mainly secondary school; teaching is supplemented, and student-oriented. The main responsibility of teachers is to guide patiently, actively communicate with students, and teach students in accordance with their aptitude. First teachers should understand the student's learning dynamics from the student's perspective, and then prescribe the right medicine to correct its drawbacks, encourage its advantages, and cultivate students' learning enthusiasm. Teachers stimulate students to learn actively, recognize their learning effects, and encourage students to experiment boldly and be creative. The students are more motivated to learn, build self-confidence in learning, and have a sense of innovation. According to the curriculum and being student-oriented, teachers prepare lessons, write lesson plans, design teaching links and do a good job in class counseling, which cultivate students' sense of innovation and enable students to have innovative connotations.

Бесплатно

Research on P2P Service Discovery Model Based on QoS

Research on P2P Service Discovery Model Based on QoS

Gao Xiao Yan

Статья научная

The existing P2P network service discovery lack of service quality assurance consideration, and can not fully utilize the network of some node powerful service quality attributes , in order to improve the efficiency of P2P networks service discovery,this paper proposes a P2P service discovery based on QoS algorithm model by combining QoS attributes and P2P characteristics. It defines P2P service description of based on QoS and introduces semantic information into service description to improve accuracy of service matching by using these service description. On this basis, it builds up P2P service discovery model of QoS guarantee and provides genetic algorithm on P2P service discovery. At last, analysis the feasibility and effectiveness of the service discovery algorithm through the proof.

Бесплатно

Research on Service Discovery Based on QoS in the Composition of Web Services

Research on Service Discovery Based on QoS in the Composition of Web Services

Zhou Min, Tang Xiao-yan, Li Jian-xin, Cai Xiao-li

Статья научная

Web services are applications deployed in network, can be used in some fields such as B2B e-commerce, the integration between portals and content providers. Web services discovery mechanism is the important part of integration. We extended traditional service description and proposed a service discovery mechanism and realized the mechanism in an agent-based Web services integration framework. Results of this study can be applied to a wide range of cross-enterprise business entity docking, thereby promoting the development of electronic commerce.

Бесплатно

Research on the Reform of Practical Teaching Driven By Practical Training under Constructivism

Research on the Reform of Practical Teaching Driven By Practical Training under Constructivism

XinLiang Ou, John Wang, Huafu Liu, Dan Wen, Wende He, Yi Pan

Статья научная

Reform of practical teaching driven by practical training with real projects is a reform to improve every aspect of practical teaching by introducing, processing and decomposing real world projects to create real cases for teaching. In this article, the current reforming process of practical teaching in the area of computer science is analyzed from the point of view of a constructivist. In regard of the characteristics of the educational system in computer science, we also discussed how to organize and implement such enterprise-level project-driven practical teaching under the guidance of constructivism theory.

Бесплатно

Resistance to Intelligently Controlled Low Air Humidity and High Temperature of Cymbidium Luck Gloria

Resistance to Intelligently Controlled Low Air Humidity and High Temperature of Cymbidium Luck Gloria

Chuangui Yang, Yubao Gao, Ling Xu

Статья научная

The paper conducted thorough research on the adaptability of Cymbidium Lucky Gloria (CLG) through different temperature and relative humidity levels by using intelligent artificial climate chamber. The effects of single and tow collaborated factors on plant surviving are explored. It finds that temperature’s role in CLG surviving is the most significant. The surviving rate reaches only 23.0% with the extreme level of temperature (410C, first period; 240C, second period). Extreme high temperature surpasses the endurance of heat shock proteins (HSPs), and leads the plants died. The survived plants under extreme levels are of excellent attributes for the succeeding strain invention.

Бесплатно

Reversible joint watermarking for medical images and videos

Reversible joint watermarking for medical images and videos

Kavitha K. J., B. Priestly Shan

Статья научная

Nowadays Digital Watermarking is widely used in the health care centers to secure the patient’s records. In India, nowadays the hospitals are adapting the telemedicine technology where it is providing facility for the patients and doctors to transmit the reports and as well as to access it easily as and when it is required to do so. In order to protect the privacy, authenticity and the integrity of the Electronic Health Record (EHR), some measure has to be employed. In this regard Digital watermarking (DWM) plays a major role. Digital watermarking is implemented in mainly two domains: one at the pixel level usually called as the spatial domain and the other is at the frequency components of the information called as the frequency domain. Of the two methods, second method is most commonly adapted by most of the researchers. It includes the transforms like Discrete Cosine Transform (DCT), Discrete Fourier Transform (DFT), Discrete Wavelet Transform (DWT) and the variations of DWT viz. Lifting Wavelet Transform (LWT) and Integer Wavelet Transform (IWT). In this paper DWM for the medical scanned images and the medical video is implemented using DWT. The watermark is patient information which will be converted to quick response (QR) code using the built in function. A simple key is used at the embedding part of the DWM technique and the same key is used at the decoder side to retrieve the information which enhances the security of both medical images/videos and the patient details.

Бесплатно

Review of Vehicle Surveillance Using Iot in the Smart Transportation Concept

Review of Vehicle Surveillance Using Iot in the Smart Transportation Concept

Nur Kumala Dewi

Статья научная

The background of this research raises the problem of the development of smart transportation in terms of monitoring and enforcement of traffic on the highway, with the proposed system that will help many parties such as the police and the government. The system that is running is to develop a system using CCTV that is placed on every corner of the capital city to replace the police in carrying out road surveillance and law enforcement against lawbreakers, especially in the traffic sector. The method used in this research is by using literature review of many previous research journals, by reading many journals will be able to add knowledge and can deepen ongoing research. The problem raised in this research is finding solutions to problems in the transportation sector, especially smart transportation, using smart transportation will be able to connect all systems that have been made. This research produces a system proposal that can be used in further research and can be applied in terms of the development of smart cities, especially smart transportation.

Бесплатно

Журнал