The recent rapid progress in ICT technologies such as smart/intelligent sensor devices, broadband / ubiquitous networks, and Internet of everything (IoT) has advanced the penetration of sensor networks and their applications. The requirements of human daily life, security, energy efficiency, safety, comfort, and ecological, can be achieved with the help of these networks and applications. Traditionally, if we want some information on, for example, environment status, a variety of dedicated sensors is needed. This will increase the number of sensors installed and thus system cost, sensor data traffic loads, and installation difficulty. Therefore, we need to find redundancies in the captured information or interpret the semantics captured by non-dedicated sensors to reduce sensor network overheads. This paper clarifies the feasibility of recognizing human presence in a space by processing information captured by other than dedicated sensors. It proposes a method and implements it as a cost-effective prototype sensor network for a university library. This method processes CO2 concentration, originally designed to check environment status. In the experiment, training data is captured with none, one, or two subjects. The information gain (IG) method is applied to the resulting data, to set thresholds and thus judge the number of people. Human presence (none, one or two people) is accurately recognized from the CO2 concentration data. The experiments clarify that a CO2 sensor in set in a small room to check environment status can recognize the number of humans in the room with more than 70 % accuracy. This eliminates the need for an extra sensor, which reduces sensor network cost.
A Unique Approach for Data Hiding Using Audio SteganographyIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
Development of real-time indoor human tracking system using LoRa technology IJECEIAES
Industrial growth has increased the number of jobs hence increase thenumber of employees. Therefore, it is impossible to track the location of allemployees in the same building at the same time as they are placed in adifferent department. In this work, a real-time indoor human tracking systemis developed to determine the location of employees in a real-timeimplementation. In this work, the long-range (LoRa) technology is used asthe communication medium to establish the communication between thetracker and the gateway in the developed system due to its low power withhigh coverage range besides requires low cost for deployment. The receivedsignal strength indicator (RSSI) based positioning method is used to measurethe power level at the receiver which is the gateway to determine thelocation of the employees. Different scenarios have been considered toevaluate the performance of the developed system in terms of precision andreliability. This includes the size of the area, the number of obstacles in theconsidered area, and the height of the tracker and the gateway. A real-timetestbed implementation has been conducted to evaluate the performance ofthe developed system and the results show that the system has high precisionand are reliable for all considered scenarios.
Using SBR Algorithm To Hide The Data Into The JPEG ImageCSCJournals
Data hiding is the art of hiding data for various purposes such as--- to maintain private data, secure confidential data. Well known technique is the Steganography; Steganography has evolved into a digital strategy of hiding a file in some form of multimedia, such as an image, an audio file or even a video file. This paper presents a new Steganography technique in spatial domain for encoding extra information in an image by making small modifications to its pixels. The proposed method focuses on one particular popular technique, Least Significant Bit (LSB) Embedding. Instead of using the LSB-1 of the cover for embedding the message, LSB-2 has been used to increase the robustness of system. and protect the message against the external influences such as noise, filter, compression…etc.[Using SBR Algo].
For more protection to the message bits a Stego-Key has been used to permute the message bits before embedding it. An experimental result of the modified method shows that this paper helps to successfully hide the secret data into the image file with minimum distortion made to the image file.
Fingerprint indoor positioning based on user orientations and minimum computa...TELKOMNIKA JOURNAL
Indoor Positioning System (IPS) has an important role in the field of Internet of Thing. IPS works
based on many existing radio frequency technologies. One of the most popular methods is WLAN
Fingerprint because this technology has been installed widely inside buildings and it provides a high level
of accuracy. The performance is affected by people who hold mobile devices (user) and also people
around the users. This research aimed to minimize the computation time of kNN searching process.
The results showed that when the value of k in kNN was greater, the computation time increased,
especially when using Cityblock and Minkowski distance function. The smallest average computation time
was 2.14 ms, when using Cityblock. Then the computational time for Euclidean and Chebychev were
relatively stable, i.e. 2.2 ms and 2.23 ms, respectively.
Solution for intra/inter-cluster event-reporting problem in cluster-based pro...IJECEIAES
In recent years, wireless sensor networks (WSNs) have been considered one of the important topics for researchers due to their wide applications in our life. Several researches have been conducted to improve WSNs performance and solve their issues. One of these issues is the energy limitation in WSNs since the source of energy in most WSNs is the battery. Accordingly, various protocols and techniques have been proposed with the intention of reducing power consumption of WSNs and lengthen their lifetime. Cluster-oriented routing protocols are one of the most effective categories of these protocols. In this article, we consider a major issue affecting the performance of this category of protocols, which we call the intra/inter-cluster event-reporting problem (IICERP). We demonstrate that IICERP severely reduces the performance of a cluster-oriented routing protocol, so we suggest an effective Solution for IICERP (SIICERP). To assess SIICERP’s performance, comprehensive simulations were performed to demonstrate the performance of several cluster-oriented protocols without and with SIICERP. Simulation results revealed that SIICERP substantially increases the performance of cluster-oriented routing protocols.
A Unique Approach for Data Hiding Using Audio SteganographyIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
Development of real-time indoor human tracking system using LoRa technology IJECEIAES
Industrial growth has increased the number of jobs hence increase thenumber of employees. Therefore, it is impossible to track the location of allemployees in the same building at the same time as they are placed in adifferent department. In this work, a real-time indoor human tracking systemis developed to determine the location of employees in a real-timeimplementation. In this work, the long-range (LoRa) technology is used asthe communication medium to establish the communication between thetracker and the gateway in the developed system due to its low power withhigh coverage range besides requires low cost for deployment. The receivedsignal strength indicator (RSSI) based positioning method is used to measurethe power level at the receiver which is the gateway to determine thelocation of the employees. Different scenarios have been considered toevaluate the performance of the developed system in terms of precision andreliability. This includes the size of the area, the number of obstacles in theconsidered area, and the height of the tracker and the gateway. A real-timetestbed implementation has been conducted to evaluate the performance ofthe developed system and the results show that the system has high precisionand are reliable for all considered scenarios.
Using SBR Algorithm To Hide The Data Into The JPEG ImageCSCJournals
Data hiding is the art of hiding data for various purposes such as--- to maintain private data, secure confidential data. Well known technique is the Steganography; Steganography has evolved into a digital strategy of hiding a file in some form of multimedia, such as an image, an audio file or even a video file. This paper presents a new Steganography technique in spatial domain for encoding extra information in an image by making small modifications to its pixels. The proposed method focuses on one particular popular technique, Least Significant Bit (LSB) Embedding. Instead of using the LSB-1 of the cover for embedding the message, LSB-2 has been used to increase the robustness of system. and protect the message against the external influences such as noise, filter, compression…etc.[Using SBR Algo].
For more protection to the message bits a Stego-Key has been used to permute the message bits before embedding it. An experimental result of the modified method shows that this paper helps to successfully hide the secret data into the image file with minimum distortion made to the image file.
Fingerprint indoor positioning based on user orientations and minimum computa...TELKOMNIKA JOURNAL
Indoor Positioning System (IPS) has an important role in the field of Internet of Thing. IPS works
based on many existing radio frequency technologies. One of the most popular methods is WLAN
Fingerprint because this technology has been installed widely inside buildings and it provides a high level
of accuracy. The performance is affected by people who hold mobile devices (user) and also people
around the users. This research aimed to minimize the computation time of kNN searching process.
The results showed that when the value of k in kNN was greater, the computation time increased,
especially when using Cityblock and Minkowski distance function. The smallest average computation time
was 2.14 ms, when using Cityblock. Then the computational time for Euclidean and Chebychev were
relatively stable, i.e. 2.2 ms and 2.23 ms, respectively.
Solution for intra/inter-cluster event-reporting problem in cluster-based pro...IJECEIAES
In recent years, wireless sensor networks (WSNs) have been considered one of the important topics for researchers due to their wide applications in our life. Several researches have been conducted to improve WSNs performance and solve their issues. One of these issues is the energy limitation in WSNs since the source of energy in most WSNs is the battery. Accordingly, various protocols and techniques have been proposed with the intention of reducing power consumption of WSNs and lengthen their lifetime. Cluster-oriented routing protocols are one of the most effective categories of these protocols. In this article, we consider a major issue affecting the performance of this category of protocols, which we call the intra/inter-cluster event-reporting problem (IICERP). We demonstrate that IICERP severely reduces the performance of a cluster-oriented routing protocol, so we suggest an effective Solution for IICERP (SIICERP). To assess SIICERP’s performance, comprehensive simulations were performed to demonstrate the performance of several cluster-oriented protocols without and with SIICERP. Simulation results revealed that SIICERP substantially increases the performance of cluster-oriented routing protocols.
Intelligent Sensing Using Metal Oxide Semiconductor Based-on Support Vector M...IJECEIAES
Classifying odor in real experiment presents some challenges, especially the uncertainty of the odor concentration and dispersion that can lead to a difficulty in obtaining an accurate datasets. In this study, to enhance the accuracy, datasets arrangement based on MOS sensors parameters using SVM approach for odor classification is proposed. The sensors are tested to determine the sensors' time response, sensors' peak duration, sensors' sensitivity, and sensors' stability when applied to the various sources at different range. Three sources were used in experimental test, namely: ethanol, methanol, and acetone. The gas sensors characteristics are analyzed in open sampling method to see the sensors' performance in real situation. These performances are considered as the base of choosing the position in collecting the datasets. The sensors in dynamic experiment have average of precision of 93.8-97.0%, the accuracy 93.3-96.7%, and the recall 93.3-96.7%. This values indicates that the collected datasets can support the SVM in improving the intelligent sensing when conducting odor classification work.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Implementation of Steganographic Model using Inverted LSB InsertionDr. Amarjeet Singh
The most important thing in this insecure world is
the secrecy of everything. In today’s world, any important
data costs more than money. Steganography is the technique
in which one can hide data as a secrete in selected image. In
case of spatial domain, LSB approach is most popular in
steganography, where all the LSBs of pixels of image are
replaced by the bits of secret data. But the problem is that
the secrete can be easily guessed by the hacker and the data is
obtained by extracting it from direct LSBs. To make the
system more robust and to improve the signal to noise ratio,
the conventional LSB insertion method is replaced by
inverted LSB technic. The decision to invert or not the LSB
depends on combination of the 2nd and 3rd LSB. As not each
and every LSB is inverted, it makes the steganalysis very
difficult.
Weeds detection efficiency through different convolutional neural networks te...IJECEIAES
The preservation of the environment has become a priority and a subject that is receiving more and more attention. This is particularly important in the field of precision agriculture, where pesticide and herbicide use has become more controlled. In this study, we propose to evaluate the ability of the deep learning (DL) and convolutional neural network (CNNs) technology to detect weeds in several types of crops using a perspective and proximity images to enable localized and ultra-localized herbicide spraying in the region of Beni Mellal in Morocco. We studied the detection of weeds through six recent CNN known for their speed and precision, namely, VGGNet (16 and 19), GoogLeNet (Inception V3 and V4) and MobileNet (V1 and V2). The first experiment was performed with the CNNs architectures from scratch and the second experiment with their pre-trained versions. The results showed that Inception V4 achieved the highest precision with a rate of 99.41% and 99.51% on the mixed image sets and for its version from scratch and its pre-trained version respectively, and that MobileNet V2 was the fastest and lightest with its size of 14 MB.
Abstract: Wireless location finding is one of the key technologies for wireless sensor networks. GPS is the technology used but it can be used for the outdoor location. When we deal with the indoor locations GPS does not work. Indoor locations include buildings like supermarkets, big malls, parking, universities, and locations under the same roof. In these areas the accuracy of the GPS location is greatly reduced. Location showed on the map in not correct when the GPS is used under the indoor environments. But for the indoor localization it requires the higher accuracy sp GPS is not feasible for the current view. And also when the GPS is used in the mobile device it consumes a lot of the mobile battery to run the application which causes the drainage of the mobile battery within some hours. So to find out the accurate location for indoor environment we use the RSSI based trilateral localization algorithm. The algorithm has the low cost and the algorithm does not require any additional hardware support and moreover the algorithm is easy to understand. The algorithm consumes very less battery as compared to the battery consumption of the GPS. Because of these this algorithm has become the mainstream localization algorithm in the wireless sensor networks. With the development of the wireless sensor networks and the smart devices the WIFI access points are also increasing. The mobile smart devices detect three or more known WIFI hotspots positions. And using the values from the WIFI routers it calculates the current location of the mobile device. In this paper we have proposed a system so that we can find out the exact location of the mobile device under the indoor environment and can navigate to the destination using the navigation function and also can enable the low consumption of the smart mobile battery for the tracking purpose.
Goals:
1. Useful at the places where GPS cannot work
2. Reduces the battery consumption
3. Routers are used.
4. Provides the path as well as the information of the location as per the requirement of user.
Analytical framework for optimized feature extraction for upgrading occupancy...IJECEIAES
The adoption of the occupancy sensors has become an inevitable in commercial and non-commercial security devices, owing to their proficiency in the energy management. It has been found that the usages of conventional sensors is shrouded with operational problems, hence the use of the Doppler radar offers better mitigation of such problems. However, the usage of Doppler radar towards occupancy sensing in existing system is found to be very much in infancy stage. Moreover, the performance of monitoring using Doppler radar is yet to be improved more. Therefore, this paper introduces a simplified framework for enriching the event sensing performance by efficient selection of minimal robust attributes using Doppler radar. Adoption of analytical methodology has been carried out to find that different machine learning approaches could be further used for improving the accuracy performance for the feature that has been extracted in the proposed system of occuancy system.
Applications of Artificial Neural Networks in Civil EngineeringPramey Zode
An artificial brain-like network based on certain mathematical algorithms developed using a numerical computing environment is called as an ‘Artificial Neural Network (ANN)’. Many civil engineering problems which need understanding of physical processes are found to be time consuming and inaccurate to evaluate using conventional approaches. In this regard, many ANNs have been seen as a reliable and practical alternative to solve such problems. Literature review reveals that ANNs have already being used in solving numerous civil engineering problems. This study explains some cases where ANNs have been used and its future scope is also discussed.
In this project, an efficient method is proposed to remove the high level of salt and pepper noise in image using median filter. The objective of any noise removal technique is to remove the noise completely from the image, such that the resulting image is better than original image. Salt and pepper noise can be added to image during acquisition process. This noise is removed by the proposed method. This plays a vital role in digital images. The proposed approach is used to improve the quality of the image by removing high tone salt and pepper noise. The time consumption for removing salt and pepper noise in image can be reduced in this approach. The verification is based on filtered images. The resultant image is the converted into binary code. Then the binary code of the resultant image is simulated in Xilinx software. Then it is implemented in FPGA kit using Xilinx software. The resultant image will have good noise removal efficiency.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
COMPLEX EVENT PROCESSING USING IOT DEVICES BASED ON ARDUINOijccsa
Complex event processing systems have gained importance since recent developments in communication
and integrated circuits technologies. Developers can easily develop many smart space systems by
connecting various sensors to an Arduino as an internet of thing device. These systems are useful for many
places such as factories, greenhouses (plant house) and smart-homes. Especially in plant houses when the
desired humidity, temperature, light and soil moisture drops the certain level, the users should be notified
through their smartphones. The sensor information is sent to a central server over the internet via an
access point. The collected sensor data needs to be processed online to check whether an event is occurred
or not. The event processing system based on a complex event processing tool is created on the central
server. It is also an important issue to inform mobile users whenever an event occurs. A publish-subscribe
event based system is implemented on the central server. A mobile user is subscribed to the desired event
topic. When an event occurred, which is related with a specific topic, an alarm notification is sent to the
mobile users about the event information so as to take necessary precautions.
Intelligent Sensing Using Metal Oxide Semiconductor Based-on Support Vector M...IJECEIAES
Classifying odor in real experiment presents some challenges, especially the uncertainty of the odor concentration and dispersion that can lead to a difficulty in obtaining an accurate datasets. In this study, to enhance the accuracy, datasets arrangement based on MOS sensors parameters using SVM approach for odor classification is proposed. The sensors are tested to determine the sensors' time response, sensors' peak duration, sensors' sensitivity, and sensors' stability when applied to the various sources at different range. Three sources were used in experimental test, namely: ethanol, methanol, and acetone. The gas sensors characteristics are analyzed in open sampling method to see the sensors' performance in real situation. These performances are considered as the base of choosing the position in collecting the datasets. The sensors in dynamic experiment have average of precision of 93.8-97.0%, the accuracy 93.3-96.7%, and the recall 93.3-96.7%. This values indicates that the collected datasets can support the SVM in improving the intelligent sensing when conducting odor classification work.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Implementation of Steganographic Model using Inverted LSB InsertionDr. Amarjeet Singh
The most important thing in this insecure world is
the secrecy of everything. In today’s world, any important
data costs more than money. Steganography is the technique
in which one can hide data as a secrete in selected image. In
case of spatial domain, LSB approach is most popular in
steganography, where all the LSBs of pixels of image are
replaced by the bits of secret data. But the problem is that
the secrete can be easily guessed by the hacker and the data is
obtained by extracting it from direct LSBs. To make the
system more robust and to improve the signal to noise ratio,
the conventional LSB insertion method is replaced by
inverted LSB technic. The decision to invert or not the LSB
depends on combination of the 2nd and 3rd LSB. As not each
and every LSB is inverted, it makes the steganalysis very
difficult.
Weeds detection efficiency through different convolutional neural networks te...IJECEIAES
The preservation of the environment has become a priority and a subject that is receiving more and more attention. This is particularly important in the field of precision agriculture, where pesticide and herbicide use has become more controlled. In this study, we propose to evaluate the ability of the deep learning (DL) and convolutional neural network (CNNs) technology to detect weeds in several types of crops using a perspective and proximity images to enable localized and ultra-localized herbicide spraying in the region of Beni Mellal in Morocco. We studied the detection of weeds through six recent CNN known for their speed and precision, namely, VGGNet (16 and 19), GoogLeNet (Inception V3 and V4) and MobileNet (V1 and V2). The first experiment was performed with the CNNs architectures from scratch and the second experiment with their pre-trained versions. The results showed that Inception V4 achieved the highest precision with a rate of 99.41% and 99.51% on the mixed image sets and for its version from scratch and its pre-trained version respectively, and that MobileNet V2 was the fastest and lightest with its size of 14 MB.
Abstract: Wireless location finding is one of the key technologies for wireless sensor networks. GPS is the technology used but it can be used for the outdoor location. When we deal with the indoor locations GPS does not work. Indoor locations include buildings like supermarkets, big malls, parking, universities, and locations under the same roof. In these areas the accuracy of the GPS location is greatly reduced. Location showed on the map in not correct when the GPS is used under the indoor environments. But for the indoor localization it requires the higher accuracy sp GPS is not feasible for the current view. And also when the GPS is used in the mobile device it consumes a lot of the mobile battery to run the application which causes the drainage of the mobile battery within some hours. So to find out the accurate location for indoor environment we use the RSSI based trilateral localization algorithm. The algorithm has the low cost and the algorithm does not require any additional hardware support and moreover the algorithm is easy to understand. The algorithm consumes very less battery as compared to the battery consumption of the GPS. Because of these this algorithm has become the mainstream localization algorithm in the wireless sensor networks. With the development of the wireless sensor networks and the smart devices the WIFI access points are also increasing. The mobile smart devices detect three or more known WIFI hotspots positions. And using the values from the WIFI routers it calculates the current location of the mobile device. In this paper we have proposed a system so that we can find out the exact location of the mobile device under the indoor environment and can navigate to the destination using the navigation function and also can enable the low consumption of the smart mobile battery for the tracking purpose.
Goals:
1. Useful at the places where GPS cannot work
2. Reduces the battery consumption
3. Routers are used.
4. Provides the path as well as the information of the location as per the requirement of user.
Analytical framework for optimized feature extraction for upgrading occupancy...IJECEIAES
The adoption of the occupancy sensors has become an inevitable in commercial and non-commercial security devices, owing to their proficiency in the energy management. It has been found that the usages of conventional sensors is shrouded with operational problems, hence the use of the Doppler radar offers better mitigation of such problems. However, the usage of Doppler radar towards occupancy sensing in existing system is found to be very much in infancy stage. Moreover, the performance of monitoring using Doppler radar is yet to be improved more. Therefore, this paper introduces a simplified framework for enriching the event sensing performance by efficient selection of minimal robust attributes using Doppler radar. Adoption of analytical methodology has been carried out to find that different machine learning approaches could be further used for improving the accuracy performance for the feature that has been extracted in the proposed system of occuancy system.
Applications of Artificial Neural Networks in Civil EngineeringPramey Zode
An artificial brain-like network based on certain mathematical algorithms developed using a numerical computing environment is called as an ‘Artificial Neural Network (ANN)’. Many civil engineering problems which need understanding of physical processes are found to be time consuming and inaccurate to evaluate using conventional approaches. In this regard, many ANNs have been seen as a reliable and practical alternative to solve such problems. Literature review reveals that ANNs have already being used in solving numerous civil engineering problems. This study explains some cases where ANNs have been used and its future scope is also discussed.
In this project, an efficient method is proposed to remove the high level of salt and pepper noise in image using median filter. The objective of any noise removal technique is to remove the noise completely from the image, such that the resulting image is better than original image. Salt and pepper noise can be added to image during acquisition process. This noise is removed by the proposed method. This plays a vital role in digital images. The proposed approach is used to improve the quality of the image by removing high tone salt and pepper noise. The time consumption for removing salt and pepper noise in image can be reduced in this approach. The verification is based on filtered images. The resultant image is the converted into binary code. Then the binary code of the resultant image is simulated in Xilinx software. Then it is implemented in FPGA kit using Xilinx software. The resultant image will have good noise removal efficiency.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
COMPLEX EVENT PROCESSING USING IOT DEVICES BASED ON ARDUINOijccsa
Complex event processing systems have gained importance since recent developments in communication
and integrated circuits technologies. Developers can easily develop many smart space systems by
connecting various sensors to an Arduino as an internet of thing device. These systems are useful for many
places such as factories, greenhouses (plant house) and smart-homes. Especially in plant houses when the
desired humidity, temperature, light and soil moisture drops the certain level, the users should be notified
through their smartphones. The sensor information is sent to a central server over the internet via an
access point. The collected sensor data needs to be processed online to check whether an event is occurred
or not. The event processing system based on a complex event processing tool is created on the central
server. It is also an important issue to inform mobile users whenever an event occurs. A publish-subscribe
event based system is implemented on the central server. A mobile user is subscribed to the desired event
topic. When an event occurred, which is related with a specific topic, an alarm notification is sent to the
mobile users about the event information so as to take necessary precautions.
Complex Event Processing Using IOT Devices Based on Arduinoneirew J
Complex event processing systems have gained importance since recent developments in communication
and integrated circuits technologies. Developers can easily develop many smart space systems by
connecting various sensors to an Arduino as an internet of thing device. These systems are useful for many
places such as factories, greenhouses (plant house) and smart-homes. Especially in plant houses when the
desired humidity, temperature, light and soil moisture drops the certain level, the users should be notified
through their smartphones. The sensor information is sent to a central server over the internet via an
access point. The collected sensor data needs to be processed online to check whether an event is occurred
or not. The event processing system based on a complex event processing tool is created on the central
server. It is also an important issue to inform mobile users whenever an event occurs. A publish-subscribe
event based system is implemented on the central server. A mobile user is subscribed to the desired event
topic. When an event occurred, which is related with a specific topic, an alarm notification is sent to the
mobile users about the event information so as to take necessary precautions.
Architecture design for a multi-sensor information fusion processorTELKOMNIKA JOURNAL
This paper discusses the design of the architecture of an information fusion processor. This processor emulates the way of human thinking, namely by drawing conclusions from the obtained collection of information. Architecture design for this processor is based on Knowledge Growing System (KGS) algorithm. KGS is a novelty in Artificial Intelligence field. Compared to other AI methods, KGS focuses on the observation of the process of the knowledge growth within human brain based on information received from the surrounding environment. By using KGS algorithm, this processor works by receiving inputs from a set of sensors and possible hypotheses obtained after the processing of the information. The processor generates a value which is called as Degree of Certainty (DoC), which show the most possible hypothesis among all alternative ones. The Processor Elements which are used to perform KGS algorithm is designed based on systolic array architecture. The design of this processor is realized with VHSIC Hardware Design Language (VHDL) and synthesized by using FPGA Quartus II.13.1. The results show that the data path which has been design is able to perform the mechanism of KGS computation
Application and Network Layers Design for Wireless Sensor Network to Supervis...IJCSEA Journal
Wireless sensor networks have profound effects on many application fields like security management which need an immediate and fast system reaction. Indeed, the monitoring of a dangerous product warehouse is a major issue in chemical industry field. This paper describes the design of chemical warehouse security system using the concept of active products and wireless sensor networks. A security application layer is developed to supervise and exchange messages between nodes and the control center to prevent industrial accident. Different security rules are proposed on this layer to monitor the internal state and incompatible products distance. If a critical event is detected, the application generates alert message which need a short end to end delay and low packet loss rate constraints by network layer. Thus, a QoS routing protocol is also developed in the network layer. The proposed solution is implemented in Castalia/OMNeT++ simulator. Simulation results show that the system reacts perfectly for critical event and can meet the QoS constraints of alert message.
Mobile Radiation Measuring System using Small Linux box and GPS sensorIJMER
The effect of radiation and the measuring the radiation dose rate amount has become as
important research topics among the researcher, after the nuclear accident happened in Japan. Several
commercial equipments are available that can measure the dose amount but most of them have some
limitations. However designing mobile radiation measuring system using PC is generally expensive, and
complicated. It also requires electrical power. In this paper, we propose a new technique to combine this
type of equipments and GPS sensor using small Linux box. The power consumption and data access are also
discussed
Energy Efficiency in Key Management of Body Sensor Networkiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Wireless sensor networks have profound effects on many application fields like security management which
need an immediate and fast system reaction. Indeed, the monitoring of a dangerous product warehouse is a
major issue in chemical industry field. This paper describes the design of chemical warehouse security
system using the concept of active products and wireless sensor networks. A security application layer is
developed to supervise and exchange messages between nodes and the control center to prevent industrial
accident. Different security rules are proposed on this layer to monitor the internal state and incompatible
products distance. If a critical event is detected, the application generates alert message which need a short
end to end delay and low packet loss rate constraints by network layer. Thus, a QoS routing protocol is
also developed in the network layer. The proposed solution is implemented in Castalia/OMNeT++ simulator. Simulation results show that the system reacts perfectly for critical event and can meet the QoS constraints of alert message.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Data repository for sensor network a data mining approachijdms
The development of sensor data repositories will aid the researchers to create benchmark dataset. These
benchmark dataset will provide a platform for all the researchers to access the data, test and compare the
accuracy of their algorithms. However, the storage and management of sensor data itself is a challenging
task due to various reasons such as noisy, redundant, missing, and faulty data. Therefore it is very
important to create a data repository which contains the precise and accurate data and also storage and
management of data is effective. Hence, in this paper we are proposing to use the combination of
quantitative association rules and decision tree for classification of faulty data and normal data. Usage of
multiple linear regression models for the estimation of missing data. A symbolic table approach for storage
and management of sensor data. And development of a graphical user interface for visualization of sensor
data.
Comparison of two deep learning methods for detecting fire hotspotsIJECEIAES
Every high-rise building must meet construction requirements, i.e. it must have good safety to prevent unexpected events such as fire incident. To avoid the occurrence of a bigger fire, surveillance using closed circuit television (CCTV) videos is necessary. However, it is impossible for security forces to monitor for a full day. One of the methods that can be used to help security forces is deep learning method. In this study, we use two deep learning methods to detect fire hotspots, i.e. you only look once (YOLO) method and faster region-based convolutional neural network (faster R-CNN) method. The first stage, we collected 100 image data (70 training data and 30 test data). The next stage is model training which aims to make the model can recognize fire. Later, we calculate precision, recall, accuracy, and F1 score to measure performance of model. If the F1 score is close to 1, then the balance is optimal. In our experiment results, we found that YOLO has a precision is 100%, recall is 54.54%, accuracy is 66.67%, and F1 score is 0.70583667. While faster R-CNN has a precision is 87.5%, recall is 95.45%, accuracy is 86.67%, and F1 score is 0.913022.
Lightweight digital imaging and communications in medicine image encryption f...TELKOMNIKA JOURNAL
Diagnosis in healthcare systems relies heavily on the use of medical images. Images such as X-rays, ultrasounds, computed tomography (CT) scans, magnetic resonance imaging (MRIs), and other scans of the brain and other internal organs of patients include private and personal information. However, these images are vulnerable to unauthorized users who unlawfully use them for non-diagnostic reasons due to the lack of security in communication routes and the gaps in the storage systems of hospitals or medical centers. Image encryption is a prominent technique used to protect medical images from unauthorized access in addition to enhancing the security of communication networks. In this paper, researchers offer a lightweight cryptosystem for the secure encryption of medical images that makes use of the present block cipher and a five-dimensional chaotic map. More than 25 images from the open science framework (OSF) public database of patients with coronavirus disease 2019 (COVID-19) were used to evaluate the proposed system. DICOM stands for “digital imaging and communications in medicine”. The efficiency of the proposed system is proved in terms of adjacent pixels’ correlation analysis, National Institute of Standards and Technology (NIST) analysis, mean square error, information entropy, unified average changing intensity, peak-to-signal noise ratio, entropy, and structure similarity index image.
Air Quality Monitoring and Control System in IoTijtsrd
Air pollution that refers to the contamination of the air, irrespective of indoors or outside. A physical, biological or chemical alteration to the air in the atmosphere can be termed as pollution. It occurs when any harmful gases, dust, smoke enters into the atmosphere and makes it difficult for plants, animals, and humans to survive as the air becomes dirty. Proposed system considers pollution due to automobiles and provide a real time solution which is not just monitors pollution levels but also take into consideration control measures for reducing traffic and industrial zone in highly polluted areas. The solution is provided by a sensor based hardware module which can be placed along roads and plants. These modules can be placed on lamp posts and they transfer information about air quality wirelessly to cloud server. The proposed system also provides about air quality information through a mobile application which enables commuters to take up routes where air quality is good. Soe Soe Mon | Thida Soe | Khin Aye Thu "Air Quality Monitoring and Control System in IoT" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd26554.pdfPaper URL: https://www.ijtsrd.com/computer-science/embedded-system/26554/air-quality-monitoring-and-control-system-in-iot/soe-soe-mon
Sensor Network to monitor Atmosphere for Green House and Agriculture SciencesKarthik Sharma
Greenhouses are one of the major ways in agricultural sciences to conduct research when they need a controlled environment. For the environment, the most important factors are temperature, pressure, humidity, etc. Providing a way of continuous monitoring of these environmental changes helps the users to understand and analyze these components in a better way. These facilities are spread over the vast area, which makes it ideal for a use of Wireless Sensor Network with a large number of nodes for monitoring data. The sensor network is a collection of the sensor nodes which will send the data to the base station at a particular interval. Here we used the MTS400 and IRIS notes to collect and send data. The main idea of this project is to collect the atmosphere changes and send data wirelessly to a central server, processes raw data and stores it and allows it to be analyzed and displayed as needed. In our project, we used a mySQL database to store the data. The data is then displayed in web pages which are developed using PHP and Javascript.
Similar to 11 15020 ijeecs 1570306569 v2 human(edit) (20)
Development of depth map from stereo images using sum of absolute differences...nooriasukmaningtyas
This article proposes a framework for the depth map reconstruction using stereo images. Fundamentally, this map provides an important information which commonly used in essential applications such as autonomous vehicle navigation, drone’s navigation and 3D surface reconstruction. To develop an accurate depth map, the framework must be robust against the challenging regions of low texture, plain color and repetitive pattern on the input stereo image. The development of this map requires several stages which starts with matching cost calculation, cost aggregation, optimization and refinement stage. Hence, this work develops a framework with sum of absolute difference (SAD) and the combination of two edge preserving filters to increase the robustness against the challenging regions. The SAD convolves using block matching technique to increase the efficiency of matching process on the low texture and plain color regions. Moreover, two edge preserving filters will increase the accuracy on the repetitive pattern region. The results show that the proposed method is accurate and capable to work with the challenging regions. The results are provided by the Middlebury standard dataset. The framework is also efficiently and can be applied on the 3D surface reconstruction. Moreover, this work is greatly competitive with previously available methods.
Model predictive controller for a retrofitted heat exchanger temperature cont...nooriasukmaningtyas
This paper aims to demonstrate the practical aspects of process control theory for undergraduate students at the Department of Chemical Engineering at the University of Bahrain. Both, the ubiquitous proportional integral derivative (PID) as well as model predictive control (MPC) and their auxiliaries were designed and implemented in a real-time framework. The latter was realized through retrofitting an existing plate-and-frame heat exchanger unit that has been operated using an analog PID temperature controller. The upgraded control system consists of a personal computer (PC), low-cost signal conditioning circuit, national instruments USB 6008 data acquisition card, and LabVIEW software. LabVIEW control design and simulation modules were used to design and implement the PID and MPC controllers. The performance of the designed controllers was evaluated while controlling the outlet temperature of the retrofitted plate-and-frame heat exchanger. The distinguished feature of the MPC controller in handling input and output constraints was perceived in real-time. From a pedagogical point of view, realizing the theory of process control through practical implementation was substantial in enhancing the student’s learning and the instructor’s teaching experience.
Control of a servo-hydraulic system utilizing an extended wavelet functional ...nooriasukmaningtyas
Servo-hydraulic systems have been extensively employed in various industrial applications. However, these systems are characterized by their highly complex and nonlinear dynamics, which complicates the control design stage of such systems. In this paper, an extended wavelet functional link neural network (EWFLNN) is proposed to control the displacement response of the servo-hydraulic system. To optimize the controller's parameters, a recently developed optimization technique, which is called the modified sine cosine algorithm (M-SCA), is exploited as the training method. The proposed controller has achieved remarkable results in terms of tracking two different displacement signals and handling external disturbances. From a comparative study, the proposed EWFLNN controller has attained the best control precision compared with those of other controllers, namely, a proportional-integralderivative (PID) controller, an artificial neural network (ANN) controller, a wavelet neural network (WNN) controller, and the original wavelet functional link neural network (WFLNN) controller. Moreover, compared to the genetic algorithm (GA) and the original sine cosine algorithm (SCA), the M-SCA has shown better optimization results in finding the optimal values of the controller's parameters.
Decentralised optimal deployment of mobile underwater sensors for covering la...nooriasukmaningtyas
This paper presents the problem of sensing coverage of layers of the ocean in three dimensional underwater environments. We propose distributed control laws to drive mobile underwater sensors to optimally cover a given confined layer of the ocean. By applying this algorithm at first the mobile underwater sensors adjust their depth to the specified depth. Then, they make a triangular grid across a given area. Afterwards, they randomly move to spread across the given grid. These control laws only rely on local information also they are easily implemented and computationally effective as they use some easy consensus rules. The feature of exchanging information just among neighbouring mobile sensors keeps the information exchange minimum in the whole networks and makes this algorithm practicable option for undersea. The efficiency of the presented control laws is confirmed via mathematical proof and numerical simulations.
Evaluation quality of service for internet of things based on fuzzy logic: a ...nooriasukmaningtyas
The development of the internet of thing (IoT) technology has become a major concern in sustainability of quality of service (SQoS) in terms of efficiency, measurement, and evaluation of services, such as our smart home case study. Based on several ambiguous linguistic and standard criteria, this article deals with quality of service (QoS). We used fuzzy logic to select the most appropriate and efficient services. For this reason, we have introduced a new paradigmatic approach to assess QoS. In this regard, to measure SQoS, linguistic terms were collected for identification of ambiguous criteria. This paper collects the results of other work to compare the traditional assessment methods and techniques in IoT. It has been proven that the comparison that traditional valuation methods and techniques could not effectively deal with these metrics. Therefore, fuzzy logic is a worthy method to provide a good measure of QoS with ambiguous linguistic and criteria. The proposed model addresses with constantly being improved, all the main axes of the QoS for a smart home. The results obtained also indicate that the model with its fuzzy performance importance index (FPII) has efficiently evaluate the multiple services of SQoS.
Low power architecture of logic gates using adiabatic techniquesnooriasukmaningtyas
The growing significance of portable systems to limit power consumption in ultra-large-scale-integration chips of very high density, has recently led to rapid and inventive progresses in low-power design. The most effective technique is adiabatic logic circuit design in energy-efficient hardware. This paper presents two adiabatic approaches for the design of low power circuits, modified positive feedback adiabatic logic (modified PFAL) and the other is direct current diode based positive feedback adiabatic logic (DC-DB PFAL). Logic gates are the preliminary components in any digital circuit design. By improving the performance of basic gates, one can improvise the whole system performance. In this paper proposed circuit design of the low power architecture of OR/NOR, AND/NAND, and XOR/XNOR gates are presented using the said approaches and their results are analyzed for powerdissipation, delay, power-delay-product and rise time and compared with the other adiabatic techniques along with the conventional complementary metal oxide semiconductor (CMOS) designs reported in the literature. It has been found that the designs with DC-DB PFAL technique outperform with the percentage improvement of 65% for NOR gate and 7% for NAND gate and 34% for XNOR gate over the modified PFAL techniques at 10 MHz respectively.
A review on techniques and modelling methodologies used for checking electrom...nooriasukmaningtyas
The proper function of the integrated circuit (IC) in an inhibiting electromagnetic environment has always been a serious concern throughout the decades of revolution in the world of electronics, from disjunct devices to today’s integrated circuit technology, where billions of transistors are combined on a single chip. The automotive industry and smart vehicles in particular, are confronting design issues such as being prone to electromagnetic interference (EMI). Electronic control devices calculate incorrect outputs because of EMI and sensors give misleading values which can prove fatal in case of automotives. In this paper, the authors have non exhaustively tried to review research work concerned with the investigation of EMI in ICs and prediction of this EMI using various modelling methodologies and measurement setups.
Smart monitoring system using NodeMCU for maintenance of production machinesnooriasukmaningtyas
Maintenance is an activity that helps to reduce risk, increase productivity, improve quality, and minimize production costs. The necessity for maintenance actions will increase efficiency and enhance the safety and quality of products and processes. On getting these conditions, it is necessary to implement a monitoring system used to observe machines' conditions from time to time, especially the machine parts that often experience problems. This paper presents a low-cost intelligent monitoring system using NodeMCU to continuously monitor machine conditions and provide warnings in the case of machine failure. Not only does it provide alerts, but this monitoring system also generates historical data on machine conditions to the Google Cloud (Google Sheet), includes which machines were down, downtime, issues occurred, repairs made, and technician handling. The results obtained are machine operators do not need to lose a relatively long time to call the technician. Likewise, the technicians assisted in carrying out machine maintenance activities and online reports so that errors that often occur due to human error do not happen again. The system succeeded in reducing the technician-calling time and maintenance workreporting time up to 50%. The availability of online and real-time maintenance historical data will support further maintenance strategy.
Design and simulation of a software defined networkingenabled smart switch, f...nooriasukmaningtyas
Using sustainable energy is the future of our planet earth, this became not only economically efficient but also a necessity for the preservation of life on earth. Because of such necessity, smart grids became a very important issue to be researched. Many literatures discussed this topic and with the development of internet of things (IoT) and smart sensors, smart grids are developed even further. On the other hand, software defined networking is a technology that separates the control plane from the data plan of the network. It centralizes the management and the orchestration of the network tasks by using a network controller. The network controller is the heart of the SDN-enabled network, and it can control other networking devices using software defined networking (SDN) protocols such as OpenFlow. A smart switching mechanism called (SDN-smgrid-sw) for the smart grid will be modeled and controlled using SDN. We modeled the environment that interact with the sensors, for the sun and the wind elements. The Algorithm is modeled and programmed for smart efficient power sharing that is managed centrally and monitored using SDN controller. Also, all if the smart grid elements (power sources) are connected to the IP network using IoT protocols.
Efficient wireless power transmission to remote the sensor in restenosis coro...nooriasukmaningtyas
In this study, the researchers have proposed an alternative technique for designing an asymmetric 4 coil-resonance coupling module based on the series-to-parallel topology at 27 MHz industrial scientific medical (ISM) band to avoid the tissue damage, for the constant monitoring of the in-stent restenosis coronary artery. This design consisted of 2 components, i.e., the external part that included 3 planar coils that were placed outside the body and an internal helical coil (stent) that was implanted into the coronary artery in the human tissue. This technique considered the output power and the transfer efficiency of the overall system, coil geometry like the number of coils per turn, and coil size. The results indicated that this design showed an 82% efficiency in the air if the transmission distance was maintained as 20 mm, which allowed the wireless power supply system to monitor the pressure within the coronary artery when the implanted load resistance was 400 Ω.
Grid reactive voltage regulation and cost optimization for electric vehicle p...nooriasukmaningtyas
Expecting large electric vehicle (EV) usage in the future due to environmental issues, state subsidies, and incentives, the impact of EV charging on the power grid is required to be closely analyzed and studied for power quality, stability, and planning of infrastructure. When a large number of energy storage batteries are connected to the grid as a capacitive load the power factor of the power grid is inevitably reduced, causing power losses and voltage instability. In this work large-scale 18K EV charging model is implemented on IEEE 33 network. Optimization methods are described to search for the location of nodes that are affected most due to EV charging in terms of power losses and voltage instability of the network. Followed by optimized reactive power injection magnitude and time duration of reactive power at the identified nodes. It is shown that power losses are reduced and voltage stability is improved in the grid, which also complements the reduction in EV charging cost. The result will be useful for EV charging stations infrastructure planning, grid stabilization, and reducing EV charging costs.
Topology network effects for double synchronized switch harvesting circuit on...nooriasukmaningtyas
Energy extraction takes place using several different technologies, depending on the type of energy and how it is used. The objective of this paper is to study topology influence for a smart network based on piezoelectric materials using the double synchronized switch harvesting (DSSH). In this work, has been presented network topology for circuit DSSH (DSSH Standard, Independent DSSH, DSSH in parallel, mono DSSH, and DSSH in series). Using simulation-based on a structure with embedded piezoelectric system harvesters, then compare different topology of circuit DSSH for knowledge is how to connect the circuit DSSH together and how to implement accurately this circuit strategy for maximizing the total output power. The network topology DSSH extracted power a technique allows again up to in terms of maximal power output compared with network topology standard extracted at the resonant frequency. The simulation results show that by using the same input parameters the maximum efficiency for topology DSSH in parallel produces 120% more energy than topology DSSH-series. In addition, the energy harvesting by mono-DSSH is more than DSSH-series by 650% and it has exceeded DSSHind by 240%.
Improving the design of super-lift Luo converter using hybrid switching capac...nooriasukmaningtyas
In this article, an improvement to the positive output super-lift Luo converter (POSLC) has been proposed to get high gain at a low duty cycle. Also, reduce the stress on the switch and diodes, reduce the current through the inductors to reduce loss, and increase efficiency. Using a hybrid switch unit composed of four inductors and two capacitors it is replaced by the main inductor in the elementary circuit. It’s charged in parallel with the same input voltage and discharged in series. The output voltage is increased according to the number of components. The gain equation is modeled. The boundary condition between continuous conduction mode (CCM) and discontinuous conduction mode (DCM) has been derived. Passive components are designed to get high output voltage (8 times at D=0.5) and low ripple about (0.004). The circuit is simulated and analyzed using MATLAB/Simulink. Maximum power point tracker (MPPT) controls the converter to provide the most interest from solar energy.
Third harmonic current minimization using third harmonic blocking transformernooriasukmaningtyas
Zero sequence blocking transformers (ZSBTs) are used to suppress third harmonic currents in 3-phase systems. Three-phase systems where singlephase loading is present, there is every chance that the load is not balanced. If there is zero-sequence current due to unequal load current, then the ZSBT will impose high impedance and the supply voltage at the load end will be varied which is not desired. This paper presents Third harmonic blocking transformer (THBT) which suppresses only higher harmonic zero sequences. The constructional features using all windings in single-core and construction using three single-phase transformers explained. The paper discusses the constructional features, full details of circuit usage, design considerations, and simulation results for different supply and load conditions. A comparison of THBT with ZSBT is made with simulation results by considering four different cases
Power quality improvement of distribution systems asymmetry caused by power d...nooriasukmaningtyas
With an increase of non-linear load in today’s electrical power systems, the rate of power quality drops and the voltage source and frequency deteriorate if not properly compensated with an appropriate device. Filters are most common techniques that employed to overcome this problem and improving power quality. In this paper an improved optimization technique of filter applies to the power system is based on a particle swarm optimization with using artificial neural network technique applied to the unified power flow quality conditioner (PSO-ANN UPQC). Design particle swarm optimization and artificial neural network together result in a very high performance of flexible AC transmission lines (FACTs) controller and it implements to the system to compensate all types of power quality disturbances. This technique is very powerful for minimization of total harmonic distortion of source voltages and currents as a limit permitted by IEEE-519. The work creates a power system model in MATLAB/Simulink program to investigate our proposed optimization technique for improving control circuit of filters. The work also has measured all power quality disturbances of the electrical arc furnace of steel factory and suggests this technique of filter to improve the power quality.
Studies enhancement of transient stability by single machine infinite bus sys...nooriasukmaningtyas
Maintaining network synchronization is important to customer service. Low fluctuations cause voltage instability, non-synchronization in the power system or the problems in the electrical system disturbances, harmonics current and voltages inflation and contraction voltage. Proper tunning of the parameters of stabilizer is prime for validation of stabilizer. To overcome instability issues and get reinforcement found a lot of the techniques are developed to overcome instability problems and improve performance of power system. Genetic algorithm was applied to optimize parameters and suppress oscillation. The simulation of the robust composite capacitance system of an infinite single-machine bus was studied using MATLAB was used for optimization purpose. The critical time is an indication of the maximum possible time during which the error can pass in the system to obtain stability through the simulation. The effectiveness improvement has been shown in the system
Renewable energy based dynamic tariff system for domestic load managementnooriasukmaningtyas
To deal with the present power-scenario, this paper proposes a model of an advanced energy management system, which tries to achieve peak clipping, peak to average ratio reduction and cost reduction based on effective utilization of distributed generations. This helps to manage conventional loads based on flexible tariff system. The main contribution of this work is the development of three-part dynamic tariff system on the basis of time of utilizing power, available renewable energy sources (RES) and consumers’ load profile. This incorporates consumers’ choice to suitably select for either consuming power from conventional energy sources and/or renewable energy sources during peak or off-peak hours. To validate the efficiency of the proposed model we have comparatively evaluated the model performance with existing optimization techniques using genetic algorithm and particle swarm optimization. A new optimization technique, hybrid greedy particle swarm optimization has been proposed which is based on the two aforementioned techniques. It is found that the proposed model is superior with the improved tariff scheme when subjected to load management and consumers’ financial benefit. This work leads to maintain a healthy relationship between the utility sectors and the consumers, thereby making the existing grid more reliable, robust, flexible yet cost effective.
Energy harvesting maximization by integration of distributed generation based...nooriasukmaningtyas
The purpose of distributed generation systems (DGS) is to enhance the distribution system (DS) performance to be better known with its benefits in the power sector as installing distributed generation (DG) units into the DS can introduce economic, environmental and technical benefits. Those benefits can be obtained if the DG units' site and size is properly determined. The aim of this paper is studying and reviewing the effect of connecting DG units in the DS on transmission efficiency, reactive power loss and voltage deviation in addition to the economical point of view and considering the interest and inflation rate. Whale optimization algorithm (WOA) is introduced to find the best solution to the distributed generation penetration problem in the DS. The result of WOA is compared with the genetic algorithm (GA), particle swarm optimization (PSO), and grey wolf optimizer (GWO). The proposed solutions methodologies have been tested using MATLAB software on IEEE 33 standard bus system
Intelligent fault diagnosis for power distribution systemcomparative studiesnooriasukmaningtyas
Short circuit is one of the most popular types of permanent fault in power distribution system. Thus, fast and accuracy diagnosis of short circuit failure is very important so that the power system works more effectively. In this paper, a newly enhanced support vector machine (SVM) classifier has been investigated to identify ten short-circuit fault types, including single line-toground faults (XG, YG, ZG), line-to-line faults (XY, XZ, YZ), double lineto-ground faults (XYG, XZG, YZG) and three-line faults (XYZ). The performance of this enhanced SVM model has been improved by using three different versions of particle swarm optimization (PSO), namely: classical PSO (C-PSO), time varying acceleration coefficients PSO (T-PSO) and constriction factor PSO (K-PSO). Further, utilizing pseudo-random binary sequence (PRBS)-based time domain reflectometry (TDR) method allows to obtain a reliable dataset for SVM classifier. The experimental results performed on a two-branch distribution line show the most optimal variant of PSO for short fault diagnosis.
A deep learning approach based on stochastic gradient descent and least absol...nooriasukmaningtyas
More than eighty-five to ninety percentage of the diabetic patients are affected with diabetic retinopathy (DR) which is an eye disorder that leads to blindness. The computational techniques can support to detect the DR by using the retinal images. However, it is hard to measure the DR with the raw retinal image. This paper proposes an effective method for identification of DR from the retinal images. In this research work, initially the Weiner filter is used for preprocessing the raw retinal image. Then the preprocessed image is segmented using fuzzy c-mean technique. Then from the segmented image, the features are extracted using grey level co-occurrence matrix (GLCM). After extracting the fundus image, the feature selection is performed stochastic gradient descent, and least absolute shrinkage and selection operator (LASSO) for accurate identification during the classification process. Then the inception v3-convolutional neural network (IV3-CNN) model is used in the classification process to classify the image as DR image or non-DR image. By applying the proposed method, the classification performance of IV3-CNN model in identifying DR is studied. Using the proposed method, the DR is identified with the accuracy of about 95%, and the processed retinal image is identified as mild DR.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
2. ISSN: 2502-4752
IJEECS Vol. 5, No. 3, March 2017 : 549 – 555
550
This paper clarifies the feasibility of recognizing human presence in small spaces by
processing information captured without dedicated sensors. It introduces and verifies the
proposed CO2 method, originally intended to check environment status, as implemented in a
cost-effective prototype CO2 sensor network for a university library.
This paper is structured as follows: in Section 2, library requirements in terms of
environmental management are first overviewed. Then, the experimental method is described.
The information gain (IG) method for judgement is also described. In Section 3, the results are
discussed, and a conclusion and future works are given in Section 4.
Parts of the research background, the general requirements for the university library
described in Section 2 have already been presented by the authors’ laboratory [5, 6]. However,
the sensor chip used and the human presence recognition procedure, the IG method, differ from
those of the previous papers.
2. Research Method
2.1. Requirements for University Library
Generally speaking, environmental requirements for libraries differ greatly from those for
the office/home as they are heterogeneous spaces where human(s), books and other stored
materials co-exist.
Our survey on the environmental systems in 28 large libraries in Japan that covered the
current situation with regard to building structures and air conditioning systems identified the
following important issues [7].
1. Most libraries building have a large atrium with at least one glass wall and a high
roof,
2. In most libraries, the managers have to manually fine-tune the air conditioning
system,
3. Most libraries do not have a sofisticated IT infrastructure e.g. sensor network (SN),
4. The air conditioning system must be able to create a comfortable environment for
both users and books, and
5. Most users and managers are dissatisfied with their current air-conditioning systems.
In addition to those requirements, the Seikei University library needs to check whether
small personal-use rooms are actually occupied, regardless of its reservation state. The reason
is sometimes a booked room is not used. Lower system cost and strong privacy concerns are
other issues that need to be addressed.
To resolve these issues and to create smart/intelligent library environments for both
users and books, the use of Information Communication Technologies (ICTs), especially SNs is
essential with minimum sensor installation.
2.2. General System Configuration of the Proposed Method
Basic configuration of the proposed CO2 method is depicted in Figure 1. Even though
just a single CO2 sensor is discussed in this paper, a transmitter (Tx) generally has one or more
sensors that capture several kinds of environmental information. The processing unit (PU)
gathers the data from a set of sensors, and transfers them to the next node. Sometimes the PU
performs data reduction in terms of capacity, or analyzes them for triggering alerts/actions.
Figure 1. Basic configuration of the proposed CO2 method.
Sx: Variety of Sensors,
CO2 sensor in the experiment
Tx: Transmitter
PU: Process Unit
Sx Tx
CO2
PU
Closed space
3. IJEECS ISSN: 2502-4752
Human Presence Recognition in a Closed Space by Using Cost-effective CO2… (Kimio Oguchi)
551
Experimental procedures are as follows:
1. Collect CO2 data (training data) in the laboratory with none, 1, 2 and 3 people,
2. Determine threshold value for the IG method to judge whether a room is occupied,
3. Collect CO2 data (test data) in a small room in the university library,
4. Estimate occupation state by applying the threshold, and
5. Discuss accuracy.
2.3. Judgement Method
In order to judge whether or not a small room is occupied, the notion of relative
information gain (RIG), or relative value of information gain (IG) is used in the experiment. IG is
a machine learning method and a measure of the amount of uncertainty of the input of a system
given the value of the output, simply the expected reduction in entropy; details are found in [8].
The IG between two random variables x and y is defined as:
IG(y, x) = H(y) – H(y|x), (1)
Where H(y) is the general entropy equivalent to the inherent uncertainty of random value y, and
is given as:
H(y) = -
n
i=1 p(yi) log2 p(yi). (2)
Here, n equals the total number of values. H(y|x) is the entropy of y when variable x is known.
The relative information gain, RIG is defined as:
RIG(y, x) = IG(y, x) / H(y). (3)
After obtaining training data, the CO2 ratio over time is evaluated. Several CO2
reference values (RVs) are compared by using IG and RIG. Here, base RV is set by using the
general CO2 increase ratio (IR) as detailed in the next subsection. Most probable RV, the one
that has highest RIG value, is selected.
2.4. General CO2 Increase Ratio
CO2 is being created in large quantities and its concentration is continuously increasing
that is one reason for global warming [9]. About 400 ppm is the current value (this is called the
baseline hereafter).
The increase in CO2 concentration by human respiration in a closed space (INCCO2) is
given simply as:
INCCO2 = Volexhaled x ConCO2 x nbreath / Volspace, (4)
Where Volexhaled is the volume of each exhaled breath, ConCO2 the CO2 concentration in an
exhaled breath, nbreath the respiratory rate per minute, Volspace the volume of the closed space.
Typical values for adults are Volexhaled = 0.5 L, ConCO2 = 4 %, nbreath = 15 times per min. Thus (4)
is rewritten as:
INCCO2 =0.3 / Volspace [ min
-1
]. (4a)
As the volume of the closed space used in the experiment was 4,540 L (details below in 2.6),
equation (4a) gives the INCCO2 value of 66.7 ppm/min. This means that if a person is present in
the space, CO2 concentration will typically increase at the rate of 66.7 ppm per minute from the
baseline. This value is used for base RV (bRV) as described in 2.3.
2.5. Sensor Configuration
Two sensor modules used in the experiments are i) a prototype unit consisting of a K30
sensor chip (CO2 Meter [10]) and an Arduino Uno [11] as a signal processor (e.g. analog to
digital conversion) and transmitter (Tx) with USB connection, and, ii) commercially available unit
that is a digital CO2 meter (MCH-383SD, Mother Tool [12]). The PU is a Laptop PC (Lenovo
4. ISSN: 2502-4752
IJEECS Vol. 5, No. 3, March 2017 : 549 – 555
552
G580; Win8; Celeron 1000M 1.8 GHz; 4 GB). Basic characteristics of these sensors are given in
Table 1. Photographs are given in Figure 2 (a) and (b).
Table 1. Basic Characteristics of CO2 Sensors Used
Item Prototype: K30 chip
(Module-K30)
MCH-383SD
(Module-383)
Measureable CO2 range [ppm] 0 – 5,000 0 – 4,000
Operating temperature [degree C] 0 - 50 0 – 50
Size (L x W x D) [mm] 51 x 57 x 12.5 132 x 38 x 32**
Operating voltage [V] 4.5 – 14* 9
Note * 5.0 V with Arduino **Sensor module only
(a) (b)
Figure 2. (a) Prototype; K30 chip (left) and Arduino module (Module-K30), and (b) commercially
available MCH-383SD (Module-383) where the upper part is sensor module
(a) (b)
Figure 3. (a) Closed space for training data capture in the laboratory, and (b) a small room in the
library. Photos do not have the same scale
2.6. Spaces in the Experiment and Subjects
The closed space used for training data in the laboratory is a walk-in greenhouse with
durable clear plastic cover and a roll up door; its dimensions are roughly 1.2 x 1.9 x 1.9 m (W x
L x H); a photo is given in Figure 3(a). This was assembled in the laboratory for this test.
The small room in the library has dimensions of about 1.6 x 1.8 x 3.0 m (W x L x H); a
photo is given in Figure 3(b). All subjects were young male volunteers with ages of 22 or 23y.
3. Results and Analysis
3.1. Training Data
Training data were collected in the closed space in the laboratory with none, 1, 2, and 3
people present as indicated in Figure 3(a). Starting with none, people entered the closed space
one after the other at 5-minute intervals. Thirteen trials in total were conducted.
5. IJEECS ISSN: 2502-4752
Human Presence Recognition in a Closed Space by Using Cost-effective CO2… (Kimio Oguchi)
553
According to the data collected, CO2 concentration increased with the addition of each
person. However, the increase was delayed by about 2 min due to the delay in sensor
response.
The increase ratio of each trial was calculated by linear approximation. Table 2
summarizes the increase ratio of CO2 concentration for none, 1, 2 and 3 people.
3.2. Reference Value (RV)
Most probable RV is selected by comparing IG and RIG. Here, the base RV (bRV) is set
to 66.7 ppm/min as discussed in 2.4. Seventeen RV ranges were examined starting with bRV
+/- 5 ppm, i.e. 61.7 ≤ RV ≤ 71.7 and extending in +/- 5 ppm increments.
IG and RIG are calculated as follows for the first RV range, 61.7 ≤ RV ≤ 71.7. Here,
assume S is a collection containing 52 examples as indicated in Table 2, and O is the number of
occupants. The notation [2+, 50-] means 2 positive (matched) and 50 negative (unmatched)
examples were present in the 52 examples included in S [8].
S(61.7≤RV≤71.7) = [2+, 50-] (5)
H(S)= -(2/52) log2(2/52) -(50/52) log2(50/52)
= 0.2351
S(O=1, 61.7≤RV≤71.7) = [2+, 11-] (6)
H(S)= -(2/13) log2(2/13) -(11/13) log2(11/13)
= 0.6194
S(O≠1, 61.7≤RV≤71.7) = [0, 39-] (7)
H(S)= -(0/39) log2(0/39) -(39/39) log2(39/39)
= 0
Therefore, IG and RIG for the first RV range are given as:
IG(S, RV) = H(S) – v∊ {O=1, O≠1} |Sv| H(Sv) / |S| (8)
= 0.2351 – 0.1548 – 0
= 0.0803
RIG(S, RV) = IG(S, RV) / H(S) (9)
= 0.0803 /0.235
= 34.2 (%)
Table 2. Increase Ratio of CO2 Concentration for None, 1, 2 and 3 Person Occupancy
Data No Number of occupants
None 1 2 3
1 1.938 54.92 139.1 272.0
2 -3.126 72.96 128.9 161.3
3 -6.58 97.06 155.6 257.9
4 1.443 119.3 151 228.2
5 11.05 76.22 188 270.1
6 35.05 66.41 126.4 219.5
7 5.323 47.12 194.9 214.5
8 -14.52 106 181.9 196
9 10.95 63.49 191.5 232.2
10 2.492 111.1 169.9 129.1
11 -2.368 103.5 136.1 146.3
12 -7.385 91.46 100.5 226.1
13 -13.91 87.59 204.7 242.8
Average 1.57 84.39 159.1 215.1
6. ISSN: 2502-4752
IJEECS Vol. 5, No. 3, March 2017 : 549 – 555
554
Figure 4. RIG values for all RV ranges (solid brown line), together with its approximation curve
(dashed line)
Figure 5. Test data collected in the university library. Dashed brown line corresponds to actual
occupancy and solid blue line to estimated result
This means that the assumption of “measured CO2 concentration range 61.7 to 71.7
ppm implies a single occupant” is 34.2 % correct.
The second and following RV ranges are also calculated in the same manner. Figure 4
plots RIG values for all 17 RV ranges evaluated. Among these RV ranges, 36.7 ≤ RV ≤ 96.7
was selected as the threshold for estimation of single occupant, and used to verify the test data.
3.3. Test Data Collected in the Small Room in the University Library
Test data was collected in the small room in the university library with none, 1 and 2
people as indicated in Figure 3(b). People randomly entered/left the room at 7 min intervals.
Total time period was 147 min. Details are depicted by the dashed line in Figure 5 where the
vertical axis is the number of occupants and the horizontal axis is time.
3.4. Estimation Results from Test Data
The RV range used for analyzing training data was 36.7 ≤ RV ≤ 96.7. However, as the
small room in the university library is larger, a new range is needed. By applying the volume
ratio of 4,540 /8,640 = 0.525, the adjusted RV range used for assessing the test data was taken
to be 19.3 ≤ RV ≤ 50.1.
Solid blue line in Figure 5 depicts estimated values. The estimation judged the
occupancy rate to be zero when the value is smaller than RV. It was taken to be two when the
value is larger than RV. Judgment was done at every minute. Therefore, total number of
judgments was 147 for the time period. Most judgments were accurate. However, the system
exhibits some delay in capturing increases in the occupancy rate, e.g. 0 to 1, and 1 to 2 people.
This might be due to the sensor response as also observed in subsection 3.1. 97 of the 147
estimation results were accurate, so that accuracy was 66.0 %.
7. IJEECS ISSN: 2502-4752
Human Presence Recognition in a Closed Space by Using Cost-effective CO2… (Kimio Oguchi)
555
3.5. Enhancing Estimation Accuracy
As the slow sensor response might yield lower estimation accuracy, several window
widths that were not used for estimation were considered. With enlarging the window’s width not
used by 30 sec each, estimation accuracy increased, until reaching its maximum of 70.0 % with
150 sec window. Thereafter, it decreased. This implies the sensor module used (Module-K30)
for the small room in the library has a response time for CO2 sensing of 150 sec and eliminating
the window would increase estimation accuracy.
4. Conclusion and Future Work
Libraries are heterogeneous spaces for humans and books. In order to create
smart/intelligent environments for libraries with ICTs, the conventional approach with sensor
networks using dedicated sensors, increases the number of sensors, system cost, sensor data
traffic loads, and installation difficulty. Therefore, finding some redundancy in the captured
information, or interpreting the semantics captured by non-dedicated sensors can reduce the
number of sensors, sensor network loads and system cost.
This paper proposed a method to recognize human presence in spaces by analyzing
CO2 data with the information gain method; its feasibility was experimentally verified.
Experiments showed that human presence can be recognized with an accuracy of about 70 %
for occupancy of none, 1 and 2 people, without any dedicated sensors. This accuracy may or
may not satisfy the requirement. It depends on what system/application will be used, together
with considering e.g. total system cost.
Future works include integrating other methods e.g. humidity change, for higher
accuracy without any dedicated sensors, and verifying the performance of human recognition
and original environmental information capture as well. Continuous information capture in the
field is also planned.
References
[1] Oguchi K. Content Transfer and Supporting Technologies in a Home Environment over Next
Generation Convergence Home Network - From Vital Information Transfer to Broadband Content
Transfer. International Journal of Digital Content Technology and its application (IDCTA). 2009; 3(3):
124-135.
[2] Oguchi K, Enomoto Y, Terada S, Hanawa D. Sensor-based e-Healthcare in a next generation
convergence home network. 4th International Symposium on Applied Sciences in Biomedical and
Communication Technologies. Barcelona. 2011.
[3] Hanawa D, Yamamoto H, Koide T, Shoji T, Suzuki K, Yamakawa S, Watanabe I, Oguchi K. Sensor
networks for creating comfortable environments in university libraries. Journal of CIE. 2010; 33(5):
645-652.
[4] Igarashi K, Hanawa D, Oguchi K. Estimation for spatial distribution of temperature and humidity by
using sensor networks. 34th International Conf. on Telecommunications and Signal Processing.
Budapest. 2011: 227-230.
[5] Oguchi K, Maruta S, Hanawa D. Human positioning estimation method using received signal strength
indicator (RSSI) in a wireless sensor network. Procedia Computer Science. 2014; 34: 126-132.
[6] Oguchi K, Tomono T, Hanawa D. Multiple use of the information captured by cost-effective sensor
networks in university library. International Conference on Ubiquitous and Future Networks. Sapporo.
2015: 749-753.
[7] Yamamoto H, Suzuki K, Koide T, Yamakawa S, Hanawa D, Watanabe I, Oguchi K. Investigation on
and air-conditioning system of the library in Japan. 10th International Conference on Computers,
Communications and System. Daegu. 2009: 112-115.
[8] Mitchell TM. Machine Learning. New York: McGraw-Hill. 1997.
[9] IPCC (International Panel on Climate Change). Fourth assessment report: Climate change. 2007.
[10] SenseAir. CO2 Engine®K30 STA. SAKAKI Corp. Tokyo: 2016.
[11] Banzi M. Getting started with Arduino. 2
nd
Edition. O’Reilly. 2011.
[12] Lutron. CO2/Humidity/Temp. Data Recorder Model: MCH-383SD. http://
http://www.sunwe.com.tw/lutron/MCH-383SDeop.pdf