IJET -Volume 4, Issue 4 , July - Aug 2018
S.No
|
Title/Author Name
|
Serial No
|
11 |
Evaluation of Information Technology Governance with COBIT 5 in XYZ for ISO 27001:2013 Readiness - Destianti Citha Astikasari, Suryanto Elly Chandra 10.29126/23951303/IJET-V4I4P11
Abstract
This journal aims to know the process of COBIT 5, the capability, and mapping those processes with ISO Structure. The need for identification processes are due to the change of corporate objective which in turn triger the development of new work program. Using goal cascade method and survey resulting processes such as five domain processes of EDM with three of the EDM�s capability are level 2 and level 1 for others. With GAP analysis identified a gap between the current capability and the target level of the company�s capability. Keyword: COBIT 5, IT Governance, ISO 27001:2013. × Destianti Citha Astikasari, Suryanto Elly Chandra " Evaluation of Information Technology Governance with COBIT 5 in XYZ for ISO 27001:2013 Readiness " Volume 4 - Issue 4 (76-86) - July- August 2018, International Journal of Engineering and Techniques (IJET),ISSN:2395-1303 , www.ijetjournal.org × |
IJET-V4I4P11 |
12 |
Analysis of Leakage Current Elimination in Single Phase Transformerless Inverter for Grid-Tied Photovoltaic Applications - Indira D, Venmathi Mahendran 10.29126/23951303/IJET-V4I4P12
Abstract
In photovoltaic (PV) application, it is possible to remove the transformer from the PV system in order to reduce size, losses, and cost and improve the efficiency. Due to the characteristics of low cost and high efficiency, the transformerless PV grid-connected inverters have been popularized in the application of solar electric generation system in residential market. Unfortunately, presence of the parasitic capacitor between the panel�s metal frame and cells causes the leakage current issue. The leakage current increases current harmonics injected into the utility grid, the radiated, conducted EMI, and losses. Eliminating the leakage current is one of the most important issues for transformerless single-phase photovoltaic (PV) systems. This paper focuses on analysis of leakage current elimination in single-phase transformerless inverter for PV applications. A simple unipolar Sinusoidal Pulse-Width Modulation (SPWM) technique is used to modulate the inverter to minimize the switching loss, output current ripple, and the filter requirements.The main benefits of the proposed inverter are (1) The neutral of the grid is directly connected to the negative terminal of the PV panel, so the leakage current is eliminated, (2) low cost, (3) its compact size, (4) flexible grounding configuration, (5) capability of reactive power flow, and (6) high efficiency. A complete description of the operating principle and analysis of the proposed inverter are presented and simulation results are verified. Keyword: Charge Pump Circuit, Grid Connected Inverter, Leakage Current Elimination, Photovoltaic, Transformerless Inverter, common mode voltage, parasitic capacitor, sinusoidal pulse width modulation, SPWM. × Indira D, Venmathi Mahendran " Analysis of Leakage Current Elimination in Single Phase Transformerless Inverter for Grid-Tied Photovoltaic Applications " Volume 4 - Issue 4 (87-94) - July- August 2018, International Journal of Engineering and Techniques (IJET),ISSN:2395-1303 , www.ijetjournal.org × |
IJET-V4I4P12 |
13 |
Stochastic Modelling for Child labour Data in Andhrapradesh and Telangana - Talari Prasanti, T. Praveen Goud, C.Jayalakshmi 10.29126/23951303/IJET-V4I4P13
Abstract
In this article we have extracted child labour data from census data of the years 1981, 1991 and 2001in each district. Using these three census data we interpolated the child labour for the year 1986 and 1996 using population interpolation formula from vital statistics theory. For this data we fitted three different models with one explanatory variable and identified the model whichever suited the most. At present as 2011 census data is available; we extracted child labour data from 2011 census and compared with the forecasted values. It has been observed that majority of the predicted values are close to the observed values. Keyword: Interpolation, child labour, stochastic model, adequacy, statistical significance. × Talari Prasanti, T. Praveen Goud, C.Jayalakshmi " Stochastic Modelling for Child labour Data in Andhrapradesh and Telangana " Volume 4 - Issue 4 (95-101) - July- August 2018, International Journal of Engineering and Techniques (IJET),ISSN:2395-1303 , www.ijetjournal.org × |
IJET-V4I4P13 |
14 |
Proposed Approach for Detection of Suspicious Activity using Provenance Data in Cloud Environment - Minal Bharat Pokale, Dr. Sandeep Chaware 10.29126/23951303/IJET-V4I4P14
Abstract
Cloud computing is one of the powerful computing that connect the whole world. Huge amount of data get uploaded over cloud so that it can be accessible by the user at any time and any point. Security must be concerned related to confidentiality of data, integrity of data, availability etc. Data stored over cloud is physically not accessible to the user. Data modification can be done by unauthorized user or by some malicious activity so user needs to be ensure that their data is secure or not. Therefore mechanism is required where user can check if integrity of its data is maintained or compromised. There are various methods are available such as mirroring but it require more storage space. Sometimes we need TPA to verify the data. In this, user check the integrity of its data store over cloud environment and detect the suspicious activity. For this new scheme �Data Provenance� is used, that collect the history data of user. On the basis of which, suspicious activity is detected. Provenance data is used to collect the history data and identify the user behaviour. Using this we reduce the need of TPA and replication of data item on client side for integrity checking as checking part is done over cloud infrastructure. Keyword: TPA (Third Party Auditor), Provenance Data, SHA (Secure Hash Algorithm), Cloud Server. × Minal Bharat Pokale, Dr. Sandeep Chaware " Proposed Approach for Detection of Suspicious Activity using Provenance Data in Cloud Environment " Volume 4 - Issue 4 (102-107) - July- August 2018, International Journal of Engineering and Techniques (IJET),ISSN:2395-1303 , www.ijetjournal.org × |
IJET-V4I4P14 |
15 |
Texture Classification Using SVM Classifier Based on Feature Fusion - Dr.M.Santhanalakshmi 10.29126/23951303/IJET-V4I4P15
Abstract
Texture classification using SVM classifier based on feature fusion is proposed in this paper. There are many image transform approaches are applied to image enhancement, restoration, encoding, description and feature extraction. All image processing techniques can be categorized into two, namely spatial domain and frequency domain. The two main special domain techniques, discrete wavelet transform and discrete curvelet transform are used in the proposed system. Both the transforms are applied to 111 image textures of Bradatz album to extract features and the extracted features are sorted and stored in data base as energy vector for classification. The SVM classifier is employed for classification and the maximum accuracy 99.19% is achieved. Keyword: discrete wavelet transform, discrete curvelet transform, support vector machine, texture classification. × Dr.M.Santhanalakshmi " Texture Classification Using SVM Classifier Based on Feature Fusion " Volume 4 - Issue 4 (108-114) - July- August 2018, International Journal of Engineering and Techniques (IJET),ISSN:2395-1303 , www.ijetjournal.org × |
IJET-V4I4P15 |
16 |
Design and Implementation of Solar Electric System for Village Office and Library Building in Seliu Island Village, Bangka Belitung Province, Indonesia - Iwan Rohman Setiawan, Novan Agung Mahardiono 10.29126/23951303/IJET-V4I4P16
Abstract
The electricity supply of diesel power plant to the village office and library building in Seliu Island Village is still limited, to overcome the limitations of the power supply, then installed solar electric systems. the electrical system is installed by applying the principle of utility priority, Village Office and Library Building each using an automatic transfer switch, Village Office and Library Building will get electricity supply from the solar electric system automatically, if the power source from diesel power plant is not available. The amount of electricity provided by the solar electric system for the Village Office and Library Building on Seliu Island is 920 W respectively, or the total power provided is 1840 W. Keyword: solar electric system, utility priority, automatic transfer switch, seliu island village. × Iwan Rohman Setiawan, Novan Agung Mahardiono " Design and Implementation of Solar Electric System for Village Office and Library Building in Seliu Island Village, Bangka Belitung Province, Indonesia " Volume 4 - Issue 4 (115-123) - July- August 2018, International Journal of Engineering and Techniques (IJET),ISSN:2395-1303 , www.ijetjournal.org × |
IJET-V4I4P16 |
17 |
Individual Handwritten Basic Bengali Character Recognition Using SVM Classifier - Tarek Bin Zahid, Miftahul Jannat Rasna, Mst Fouzia Hoque 10.29126/23951303/IJET-V4I4P17
Abstract
One very popular and useful application of machine learning is character recognition. Very few scientific works regarding character recognition involving Bengali characters have been done in the past years. The aim of this paper was to train a simple classifier that can detect individual handwritten basic Bengali characters. Our work involved collection of basic Bengali character samples, segmentation, noise removal and using different ML algorithms for training the model to test for optimum accuracy in recognition of the basic Bengali characters. Our results suggest that, using SVM classifier best suits our job with an overall accuracy of 86.7%. Keyword: support vector machine, Bengali character, handwritten, supervised learning. × Tarek Bin Zahid, Miftahul Jannat Rasna, Mst Fouzia Hoque " Individual Handwritten Basic Bengali Character Recognition Using SVM Classifier " Volume 4 - Issue 4 (124-130) - July- August 2018, International Journal of Engineering and Techniques (IJET),ISSN:2395-1303 , www.ijetjournal.org × |
IJET-V4I4P17 |
18 |
Measurement of High Temperatures using Optical Pyrometry - Paridhi Gupta, Ravi Choudhary 10.29126/23951303/IJET-V4I4P18
Abstract
Thermocouples are inefficient in measuring the temperature of the detonating carbon particles, whose temperature ranges from 1200K to over 1800K. An accurate and reliable method is required to measure such high temperatures of the carbon particles because temperature measurements will allow us to monitor and control the reaction kinetics of various industrially essential reactions. Optical pyrometry is thought to be one solution to this problem. It can be mono-color, two-color or multi-color. The two-color strategy is broadly utilized as a part of the non-contact temperature estimation of ignition blazes from radiation pictures, generally in view of the spectroscopic qualities of the picture sensor, and the delegate wavelengths for the red, green and blue channels of the picture shaping gadgets, for instance, Charge Coupled Device (CCD) cameras. In this research work, a strategy to get the temperature pictures from a digital advanced camera is delivered. The camera used for this work is Canon EOS750D Rebel T6i. In this strategy, it is important to catch picture data by the picture handling framework from a blackbody heater at various temperatures which cover the conceivable temperature scope of the ignition procedures to be estimated. The temperature measured by this method is validated in the literature. Modification in the existing method to make it more accurate is worthy of study. Keyword: Temperature measurement, Coal particles, Optical pyrometry. × Paridhi Gupta, Ravi Choudhary " Measurement of High Temperatures using Optical Pyrometry " Volume 4 - Issue 4 (131-134) - July- August 2018, International Journal of Engineering and Techniques (IJET),ISSN:2395-1303 , www.ijetjournal.org × |
IJET-V4I4P18 |
19 |
Tuning of a Feedforward 2DOF PID Controller to Control Second Order-Like Processes - Galal Ali Hassaan 10.29126/23951303/IJET-V4I4P19
Abstract
This research paper aims at investigating the use of a 2DOF PID controller to control second order-like processes. The controller is tuned using MATLAB control and optimization toolboxes. Using the suggested tuning technique, it is possible to eliminate completely the kick characteristic associated with PID controllers and produce a step-like step time response to set-point change. The effectiveness of using the 2DOF PID controller is examined by comparison with another tuning technique and another different two controllers (I-PD and PI-PD controllers) Keyword: Second order-like processes, 2DOF PID controller, controller tuning, MATLAB optimization toolbox, Control system performance. × Galal Ali Hassaan " Tuning of a Feedforward 2DOF PID Controller to Control Second Order-Like Processes " Volume 4 - Issue 4 (135-142) - July- August 2018, International Journal of Engineering and Techniques (IJET),ISSN:2395-1303 , www.ijetjournal.org × |
IJET-V4I4P19 |
20 |
Comparison Evaluation for Different Learning Algorithms in Classification Problem Based on ANN - Dr. Hanan A. R. Akkar, Dr. Wael A. H.Hadi, Ibraheem H. M. Al-Dosari 10.29126/23951303/IJET-V4I4P20
Abstract
Out of many recent methods for leakagedetection,there exist a technique based on flow and pressure measurement but off course this need a nonlinear model simulation of fluid pipeline for processing the available data andsimulate the flow of a used fluid with proposed leakage occurrence. These various techniques in pipeline leakagedetection using ANN. The computational detailed analysis handled by accurateneural network models can replace the human intervention in theduty of monitoring fliudflow and pressure waveforms which tend to warnthe technical staff by the leakage occurrence and inform the magnitude andlocation of the leakage along the pipeline . This technique could be applied totrack the distribution networks of natural oil and gas pipelines as well as industrial,commercial and residential gas pipelines in order to have safety operation and avoiding severe human health injuries or hazard environmental conditions causedby toxic gas leakages. The numerical solution is complex and out of this work's scope, however considering the availability for experimental test-bed that can simulate the actual pipeline used in the oil industrial field. Testing the proposed model is satisfied by using a back propagation neural network with the data-set for the normal and different leakage kinds in the oil pipeline to analyze the events and classify the leak existing and its magnitude by using classification performance measure such as error performance and confusion matrix. So different algorithms for training the proposed model is adopted with various transfer function characteristics in the hidden and output layer neurons to investigate for the suitable algorithm and to search for the optimal transfer function for the leak classification problem. Keyword: leak detection,artificial neural network (ANN), confusion matrix,transfer function. × Dr. Hanan A. R. Akkar, Dr. Wael A. H.Hadi, Ibraheem H. M. Al-Dosari " Comparison Evaluation for Different Learning Algorithms in Classification Problem Based on ANN " Volume 4 - Issue 4 (143-157) - July- August 2018, International Journal of Engineering and Techniques (IJET),ISSN:2395-1303 , www.ijetjournal.org × |
IJET-V4I4P20 |