Journal of Communications Technology Electronics and Computer Science
Latest Publications


TOTAL DOCUMENTS

47
(FIVE YEARS 0)

H-INDEX

4
(FIVE YEARS 0)

Published By "Journal Of Communications Technology, Electronics And Computer Science (Jctecs)"

2457-905x

Author(s):  
Abiodun Ogunseye ◽  
Daniel Ogheneovo Johnson

A power inverter circuits is normally designed to meet its design specifications when the applied input DC voltage is within specified tolerance limits. Thus, single input inverters are usually specified to work from a DC source having a fixed nominal voltage. This limits the usefulness of the inverter circuit when a DC source having the specified nominal voltage is not available. In this work, a modified square wave inverter system that is specified to work properly from batteries with nominal voltages of 6, 12, 18 and 24 V was designed.  A model of the microcontroller-based circuit was developed with Proteus® software and its firmware was written in C language using the MicroC® development tool. A prototype of the circuit was constructed and then tested.  The constructed circuit was found to work properly by producing a 50 Hz modified square waveform when it was powered from batteries having nominal voltages of 6 V, 12 V, 18 V and 24 V.


Author(s):  
Abubakar Muhammad Miyim ◽  
Mahamod Ismail ◽  
Rosdiadee Nordin

The importance of network selection for wireless networks, is to facilitate users with various personal wireless devices to access their desired services via a range of available radio access networks. The inability of these networks to provide broadband data service applications to users poses a serious challenge in the wireless environment. Network Optimization has therefore become necessary, so as to accommodate the increasing number of users’ service application demands while maintaining the required quality of services. To achieve that, the need to incorporate intelligent and fast mechanism as a solution to select the best value network for the user arises. This paper provides an intelligent network selection strategy based on the user- and network-valued metrics to suit their preferences when communicating in multi-access environment. A user-driven network selection strategy that employs Multi-Access Service Selection Vertical Handover Decision Algorithm (MASS-VHDA) via three interfaces; Wi-Fi, WiMAX and LTE-A is proposed, numerically evaluated and simulated. The results from the performance analysis demonstrate some improvement in the QoS and network blocking probability to satisfy user application requests for multiple simultaneous services.


Author(s):  
Anant Gupta ◽  
Imran Tasgavkar ◽  
Pranav Murali ◽  
Utsav Jain ◽  
Gresha Bhatia

Energy has become a detrimental factor for survival and progress of anthropology. For the past decade, we have become totally dependent on  unlimited and continuous supply of  electrical energy. However, the generation of such huge amount of electrical energy is done from nonrenewable sources of energy like coal, oil gas etc. This way of producing electricity involves heavy consumption of non-conventional sources of energy and has given rise to the ominous problem of global warming. Thus, energy conservation has become an important concern all over the world. Switching to the use of renewable sources like solar, wind and hydro energy  has become a recent trend. This is the reason why our project, aims to maximise the use of solar energy by analyzing the present system such that it can be beneficial for the economy of our country. The analysing process is done using the smart meter, which captures the readings on an hourly basis.


Author(s):  
Saurabh Fegade ◽  
Amey Bhadkamka ◽  
Kamlesh Karekar ◽  
Jaikishan Jeshnani ◽  
Vinayak Kachare

There is a great concern about the security of computer these days. The number of attacks has increased in a great number in the last few years, intrusion detection is the main source of information assurance. While firewalls can provide some protection, they fail to provide protection fully and they even need to be complemented with an intrusion detection system (IDS). A newer approach for Intrusion detection is data mining techniques.IDS system can be developed using individual algorithms like neural networks, clustering, classification, etc. The result of these systems is good detection rate and low false alarm rate. According to a recent study, cascading of multiple algorithms gives a way better performance than single algorithm. Single algorithm systems have a high alarm rate. Therefore, to solve this problem, a combination of different algorithms are required. In this research paper, we use the hybrid algorithm for developing the intrusion detection system. C4.5 Support Vector Machine (SVM) and Decision Tree combined to achieve high accuracy and diminish the false alarm rate. Intrusions can be classified into types like Normal, DOS, R2L and U2R.Intrusion detection with Decision trees and SVM were tested with benchmark standard NSL- KDD, which is the extended version of  KDD Cup 1999 for intrusion detection (ID).


Author(s):  
Takialddin Al Smadi

This paper mainly studies Driving Assistance Systems and Detection Pedestrian Crossings of traffic and control, many years around the world and company studies have been conducted on intelligent transport systems (ITS). Intelligent vehicle, (IV) the system is part of a system which is designed to assist drivers in the perception of any dangerous situations before, to avoid accidents after sensing and understanding the environment around it.  Methodology: we made an analysis of the peculiarities of the task of surveillance for pedestrian crossings and presented a detection system which these features into account. The system consists of a detector based on histograms of oriented gradients, and activity detector. The proposed Results tested detection precision and performance of the proposed system. The motion of the work is to combine the proposed system and the tracker. The results show that an adequate application of the quality and performance of the developed algorithm of detection of objects of interest in the work.


Author(s):  
Maaz Sirkhot ◽  
Ekta Sirwani ◽  
Aishwarya Kourani ◽  
Akshit Batheja ◽  
Kajal Jethanand Jewani

In this technological world, smartphones can be considered as one of the most far-reaching inventions. It plays a vital role in connecting people socially. The number of mobile users using an Android based smartphone has increased rapidly since last few years resulting in organizations, cyber cell departments, government authorities feeling the need to monitor the activities on certain targeted devices in order to maintain proper functionality of their respective jobs. Also with the advent of smartphones, Android became one of the most popular and widely used Operating System. Its highlighting features are that it is user friendly, smartly designed, flexible, highly customizable and supports latest technologies like IoT. One of the features that makes it exclusive is that it is based on Linux and is Open Source for all the developers. This is the reason why our project Mackdroid is an Android based application that collects data from the remote device, stores it and displays on a PHP based web page. It is primarily a monitoring service that analyzes the contents and distributes it in various categories like Call Logs, Chats, Key logs, etc. Our project aims at developing an Android application that can be used to track, monitor, store and grab data from the device and store it on a server which can be accessed by the handler of the application.


Author(s):  
Michael S Okundamiya

The rising demands for a sustainable energy system have stimulated global interests in renewable energy sources. Wind is the fastest growing and promising source of renewable power generation globally. The inclusion of wind power into the electric grid can severely impact the monetary cost, stability and quality of the grid network due to the erratic nature of wind. Power electronics technology can enable optimum performance of the wind power generation system, transferring suitable and applicable energy to the electricity grid. Power electronics can be used for smooth transfer of wind energy to electricity grid but the technology for wind turbines is influenced by the type of generator employed, the energy demand and the grid requirements. This paper investigates the constraints and standards of wind energy conversion technology and the enabling power electronic technology for integration to electricity grid.


Author(s):  
Tomas Ruzgas ◽  
Kristina Jakubėlienė ◽  
Aistė Buivytė

The article dealt with exploration methods and tools for big data. It identifies the challenges encountered in the analysis of big data. Defined notion of big data. describe the technology for big data analysis. Article provides an overview of tools which are designed for big data analytics.


Author(s):  
Xin Song ◽  
MingLei Zhang ◽  
WenMIn Liu ◽  
ShengBao Wang

Abstract—To minimize total transmit power in a system while guaranteeing the outage probability at the same time in a cooperative system, we propose and analyse two threshold-based hybrid relay selection and power allocation schemes for a three-node cooperative relaying system. They are designated as: the hybrid amplify-direct-forward relaying (HADF) and incremental hybrid decode-direct-forward relaying (IHDDF) schemes. In the HADF scheme, a specific outage probability threshold is derived to determine that the system chooses to optimize power allocation of its source and relay in amplify-and-forward (AF) mode or optimize the power of its source in direct-transmit (DT) mode without a relay. In IHDDF, according to the outage probability threshold, the system chooses to optimize its power in turn with incremental decode-and-forward opportunistic relaying (IDFO) mode or DT mode. Closed-form expressions of the total transmit power of the proposed HADF and IHDDF schemes are derived. The proposed schemes have low computational complexity and system cost. Theoretical analysis and simulation results show that the HADF scheme outperforms the AF and DT schemes, and the total transmission power of the IHDDF scheme is reduced significantly compared with the IDFO and DT schemes. Compared with the HADF scheme, the IHDDF scheme has a better total transmit power in special channel condition.Keywords—power allocation, three-node cooperative relaying system, amplify-and-forward, incremental decode-and-forward opportunistic relaying.


Author(s):  
Rachana Kamat ◽  
Aishwarya Danoji ◽  
Aishwarya Dhage ◽  
Priya Puranik ◽  
Sharmila Sengupta

Human communication is the most valuable foundation in developing a cooperative environment for sharing information and knowledge by interactive sessions. Normal individual vocalizes his views through shared intentions like facial expressions and hand gestures. People with acoustical disabilities are obligated to rely on interpreters for day-to-day conversations. Interpretation of various Sign Languages is important as it will shorten the social drift and act as an agent of communal integration. This paper proposes an Android Application for a coherent interpretation of Sign Languages. MonVoix- a French remark for my voice, would act as a boon for the deaf and the mute by completely eliminating the requisite of a human interpreter. This approach utilizes a user’s Smartphone camera to capture a series of hand gestures and convert the image file to the corresponding message and audio using image processing techniques and database emulation for identification of image. 


Sign in / Sign up

Export Citation Format

Share Document