Pub Date : 1900-01-01DOI: 10.1109/INTELSE.2016.7475120
M. Tahir, Ayyaz Hussain, S. Badshah
A new diagnostic scheme is presented for ball bearing localized faults based on pattern recognition (PR) methods, which utilize preprocessed time domain features. The features are statistically processed (FP) using their central tendency (CT) estimations, prior to the classification process. Vibration data is acquired from faulty bearings, and the features are extracted to form data set. The FP algorithm deals with outliers present in the features by suppressing them. Utilization of the smoother feature distributions reduces the unwanted impact of vibration randomness and background noise in PR based fault diagnostic procedure. This significantly enhances the classification accuracy of classifiers. The results are compared with similar work in terms of maintaining an optimum classification accuracy of a diagnostic system with minimum number of features. The proposed scheme provides 93.6% classification accuracy for four bearing faults employing three features only, and even higher using additional features.
{"title":"Enhancing classification accuracy of ball bearing faults using statistically processed features","authors":"M. Tahir, Ayyaz Hussain, S. Badshah","doi":"10.1109/INTELSE.2016.7475120","DOIUrl":"https://doi.org/10.1109/INTELSE.2016.7475120","url":null,"abstract":"A new diagnostic scheme is presented for ball bearing localized faults based on pattern recognition (PR) methods, which utilize preprocessed time domain features. The features are statistically processed (FP) using their central tendency (CT) estimations, prior to the classification process. Vibration data is acquired from faulty bearings, and the features are extracted to form data set. The FP algorithm deals with outliers present in the features by suppressing them. Utilization of the smoother feature distributions reduces the unwanted impact of vibration randomness and background noise in PR based fault diagnostic procedure. This significantly enhances the classification accuracy of classifiers. The results are compared with similar work in terms of maintaining an optimum classification accuracy of a diagnostic system with minimum number of features. The proposed scheme provides 93.6% classification accuracy for four bearing faults employing three features only, and even higher using additional features.","PeriodicalId":127671,"journal":{"name":"2016 International Conference on Intelligent Systems Engineering (ICISE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125822507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/INTELSE.2016.7475172
M. Imran, F. Kunwar
Finding path in a given environment seems trivial so research, these days, is focused at finding optimal and quality path. Among others, distance traversed by a robot from start point to reach goal is an important measure of optimality and so is safety of robot while traveling through identified path. In this paper, we present a hybrid technique developed by integrating visibility graph as global path planners and potential field method as local or reactive planner. The hybrid technique not only generates a near optimal path in terms of distance but also ensures that robot, at no point from start to goal, touches any obstacle or comes closer than a user defined distance. The results of proposed technique are really encouraging as robot is kept sufficiently away from obstacles while navigating through them. While maintaining safe distance, increase in distance as compared to shortest possible path is only 3.93 %.
{"title":"A hybrid path planning technique developed by integrating global and local path planner","authors":"M. Imran, F. Kunwar","doi":"10.1109/INTELSE.2016.7475172","DOIUrl":"https://doi.org/10.1109/INTELSE.2016.7475172","url":null,"abstract":"Finding path in a given environment seems trivial so research, these days, is focused at finding optimal and quality path. Among others, distance traversed by a robot from start point to reach goal is an important measure of optimality and so is safety of robot while traveling through identified path. In this paper, we present a hybrid technique developed by integrating visibility graph as global path planners and potential field method as local or reactive planner. The hybrid technique not only generates a near optimal path in terms of distance but also ensures that robot, at no point from start to goal, touches any obstacle or comes closer than a user defined distance. The results of proposed technique are really encouraging as robot is kept sufficiently away from obstacles while navigating through them. While maintaining safe distance, increase in distance as compared to shortest possible path is only 3.93 %.","PeriodicalId":127671,"journal":{"name":"2016 International Conference on Intelligent Systems Engineering (ICISE)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133541503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/INTELSE.2016.7475144
Sajid Ali Bhatti, Amil Daraz, S. A. Malik
In this paper we use Ziegler-Nichols tuning method for tuning of a Proportional-Integral (P-I) and Integral-Proportional (I-P) controller for a DC motor to control its speed. P-I controller is the most common controller used for speed control of D.C motor. However P-I controller has some disadvantages like high overshoots and sensitivity to controller gains. Therefore to overcome these disadvantages, I-P controller has been implemented for speed control of DC motor. The overshoots in I-P are 30.4% less of P-I controller overshoots. In this work both P-I and I-P controllers are implemented in MATLAB (Simulink) and compare the performance of these two controllers on the basis of their transient response.
{"title":"Comparison of P-I and I-P controller by using Ziegler-Nichols tuning method for speed control of DC motor","authors":"Sajid Ali Bhatti, Amil Daraz, S. A. Malik","doi":"10.1109/INTELSE.2016.7475144","DOIUrl":"https://doi.org/10.1109/INTELSE.2016.7475144","url":null,"abstract":"In this paper we use Ziegler-Nichols tuning method for tuning of a Proportional-Integral (P-I) and Integral-Proportional (I-P) controller for a DC motor to control its speed. P-I controller is the most common controller used for speed control of D.C motor. However P-I controller has some disadvantages like high overshoots and sensitivity to controller gains. Therefore to overcome these disadvantages, I-P controller has been implemented for speed control of DC motor. The overshoots in I-P are 30.4% less of P-I controller overshoots. In this work both P-I and I-P controllers are implemented in MATLAB (Simulink) and compare the performance of these two controllers on the basis of their transient response.","PeriodicalId":127671,"journal":{"name":"2016 International Conference on Intelligent Systems Engineering (ICISE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130483022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/INTELSE.2016.7475167
W. A. Khan, G. Shah, Y. Saleem, A. Farooq
Mobile phones are commonly used by web servers to validate user's identification and authentication. It enhances user's trust in online transactions and empowers him to use his mobile phone network as an additional layer of security. This mechanism is known as Mobile Transaction Authentication Number System (mTAN) which is used by e-banks and social media sites. This system has some weakness and users are still vulnerable to serious security risks. Unauthorized individuals can find their ways to get unauthorized access in traditional mTAN system. In this paper, security risks associated with current mTAN system are discussed and some modifications in existing system are proposed for using mTAN in a more secure way.
{"title":"Modified Mobile Transaction Authentication Number System for 2-layer security","authors":"W. A. Khan, G. Shah, Y. Saleem, A. Farooq","doi":"10.1109/INTELSE.2016.7475167","DOIUrl":"https://doi.org/10.1109/INTELSE.2016.7475167","url":null,"abstract":"Mobile phones are commonly used by web servers to validate user's identification and authentication. It enhances user's trust in online transactions and empowers him to use his mobile phone network as an additional layer of security. This mechanism is known as Mobile Transaction Authentication Number System (mTAN) which is used by e-banks and social media sites. This system has some weakness and users are still vulnerable to serious security risks. Unauthorized individuals can find their ways to get unauthorized access in traditional mTAN system. In this paper, security risks associated with current mTAN system are discussed and some modifications in existing system are proposed for using mTAN in a more secure way.","PeriodicalId":127671,"journal":{"name":"2016 International Conference on Intelligent Systems Engineering (ICISE)","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122536870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/INTELSE.2016.7475156
Muhammad Usman, Koo Insoo
Network lifetime and energy consumption are major issues in wireless sensor networks while protection of the primary user is the most important activity in a cognitive radio network that necessitates the cognitive radios to detect the primary user signal promptly and accurately. We propose a network architecture that increases lifetime of the network by efficiently consuming energy and guarantees protection of the primary user by enhancing the sensing accuracy of a single radio. The proposed network consists of mobile cognitive radios and infrastructure wireless sensor nodes. The sensor nodes, exploiting their spatial diversity, perform spectrum sensing for the mobile cognitive radios. In the proposed network, sensor nodes laying in the communication range of the cognitive radios form clusters based on their distances. The clusters are regularly updated due to mobility of the cognitive radios and are further divided into disjoint sub-clusters, which are formed by deactivating the redundant sensor nodes. For energy conservation, one of the sub-clusters in a cluster remains active while others are switched to sleep mode. Effectiveness of the proposed network, which is determined in terms of energy consumption, lifetime, and detection error, is shown through simulations.
{"title":"Sensor network-based spectrum sensing for cognitive radio network","authors":"Muhammad Usman, Koo Insoo","doi":"10.1109/INTELSE.2016.7475156","DOIUrl":"https://doi.org/10.1109/INTELSE.2016.7475156","url":null,"abstract":"Network lifetime and energy consumption are major issues in wireless sensor networks while protection of the primary user is the most important activity in a cognitive radio network that necessitates the cognitive radios to detect the primary user signal promptly and accurately. We propose a network architecture that increases lifetime of the network by efficiently consuming energy and guarantees protection of the primary user by enhancing the sensing accuracy of a single radio. The proposed network consists of mobile cognitive radios and infrastructure wireless sensor nodes. The sensor nodes, exploiting their spatial diversity, perform spectrum sensing for the mobile cognitive radios. In the proposed network, sensor nodes laying in the communication range of the cognitive radios form clusters based on their distances. The clusters are regularly updated due to mobility of the cognitive radios and are further divided into disjoint sub-clusters, which are formed by deactivating the redundant sensor nodes. For energy conservation, one of the sub-clusters in a cluster remains active while others are switched to sleep mode. Effectiveness of the proposed network, which is determined in terms of energy consumption, lifetime, and detection error, is shown through simulations.","PeriodicalId":127671,"journal":{"name":"2016 International Conference on Intelligent Systems Engineering (ICISE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124339941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/INTELSE.2016.7475134
Zubair Mehmood, Y. Bilal, Muniba Bashir, A. Asghar
Maximum Power Point Tracking (MPPT) charge controller is used as an intermediate device in solar system between photovoltaic (PV) panels and batteries. Multiple panels are usually used to meet higher energy demands in large solar PV systems by connecting them in series/parallel configurations. This piece of work is based on performance analysis of MPPT charge controller with series and parallel connections of solar PV panels. The effect of each configuration is analyzed using software and hardware setup. Reason for varying output behavior of MPPT with different connecting schemes of PV panels is discussed. The combined results of electrical tacker (MPPT) and mechanical sun tracker are also presented in this paper for both of above said configurations.
{"title":"Performance analysis of MPPT charge controller with single and series/parallel connected PV panels","authors":"Zubair Mehmood, Y. Bilal, Muniba Bashir, A. Asghar","doi":"10.1109/INTELSE.2016.7475134","DOIUrl":"https://doi.org/10.1109/INTELSE.2016.7475134","url":null,"abstract":"Maximum Power Point Tracking (MPPT) charge controller is used as an intermediate device in solar system between photovoltaic (PV) panels and batteries. Multiple panels are usually used to meet higher energy demands in large solar PV systems by connecting them in series/parallel configurations. This piece of work is based on performance analysis of MPPT charge controller with series and parallel connections of solar PV panels. The effect of each configuration is analyzed using software and hardware setup. Reason for varying output behavior of MPPT with different connecting schemes of PV panels is discussed. The combined results of electrical tacker (MPPT) and mechanical sun tracker are also presented in this paper for both of above said configurations.","PeriodicalId":127671,"journal":{"name":"2016 International Conference on Intelligent Systems Engineering (ICISE)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131518247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/INTELSE.2016.7475145
Haris Mansoor, I. Shaikh, Shoaib Habib
A hovercraft can move on any rough surface or water, it uses propulsion force of air and is supported by cushion that has high compressed air in it. Hovercraft is suitable for many military and ordinary purposes. In this paper a LQR controller is designed for hovercraft. The performance of LQR depends upon selection of Q and R matrix the optimal value of Q and R is found using genetic algorithm with a new method based on function of first derivative of position is used as a fitness function. The results show that the fitness function not only stabilizes system very efficiently but the step response is also very satisfactory.
{"title":"Genetic algorithm based LQR control of hovercraft","authors":"Haris Mansoor, I. Shaikh, Shoaib Habib","doi":"10.1109/INTELSE.2016.7475145","DOIUrl":"https://doi.org/10.1109/INTELSE.2016.7475145","url":null,"abstract":"A hovercraft can move on any rough surface or water, it uses propulsion force of air and is supported by cushion that has high compressed air in it. Hovercraft is suitable for many military and ordinary purposes. In this paper a LQR controller is designed for hovercraft. The performance of LQR depends upon selection of Q and R matrix the optimal value of Q and R is found using genetic algorithm with a new method based on function of first derivative of position is used as a fitness function. The results show that the fitness function not only stabilizes system very efficiently but the step response is also very satisfactory.","PeriodicalId":127671,"journal":{"name":"2016 International Conference on Intelligent Systems Engineering (ICISE)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130713940","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/INTELSE.2016.7475175
Sumayya Abbas, T. M. Khan, Salar B. Javaid, Sayed A. Ahmed, S. S. Haider, Zeenat Rajar
A low cost embedded hardware based multi frequency Eddy Current System has been designed and developed to detect cracks in metallic structures. It includes a constant peak alternating current source capable of operating at multiple frequencies for detecting surface and near sub-surface cracks in metals. Eddy Current Testing probes for different frequency ranges are also designed using the Numerical Approach. The output signal from the probe is demodulated in terms of amplitude and phase. It is then sent to the embedded hardware via a specially designed Data Acquisition (DAQ) card. The test results are plotted in real time and using a Graphical User Interface (GUI), impedance signal is also generated. Multi-frequency data comparison feature is also incorporated.
{"title":"Low cost embedded hardware based multi-frequency Eddy Current Testing System","authors":"Sumayya Abbas, T. M. Khan, Salar B. Javaid, Sayed A. Ahmed, S. S. Haider, Zeenat Rajar","doi":"10.1109/INTELSE.2016.7475175","DOIUrl":"https://doi.org/10.1109/INTELSE.2016.7475175","url":null,"abstract":"A low cost embedded hardware based multi frequency Eddy Current System has been designed and developed to detect cracks in metallic structures. It includes a constant peak alternating current source capable of operating at multiple frequencies for detecting surface and near sub-surface cracks in metals. Eddy Current Testing probes for different frequency ranges are also designed using the Numerical Approach. The output signal from the probe is demodulated in terms of amplitude and phase. It is then sent to the embedded hardware via a specially designed Data Acquisition (DAQ) card. The test results are plotted in real time and using a Graphical User Interface (GUI), impedance signal is also generated. Multi-frequency data comparison feature is also incorporated.","PeriodicalId":127671,"journal":{"name":"2016 International Conference on Intelligent Systems Engineering (ICISE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131217693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/INTELSE.2016.7475118
Adil Waheed, Saqib Ubaid, G. Rasool, F. Ghaffar
Design patterns and their variants detection from source code using different techniques and tools are keys to understand complex architecture of different applications. Design patterns are key to develop quality applications and well know solutions to well know problems. The discussion is on accuracy of existing techniques and tools is debatable because of multiple advanced technologies and a lot of variations in Gang of Four (GOF) design patterns. In fact, during development developers modified standard patterns according to their needs and design, but intent remain same. In this research, we will find different variants of Gang of Four design patterns from source code of legacy applications through various techniques that developers are using to tackle commonly occurring problems. These discovered variants are detected and validated through different design patterns detection techniques and tools.
{"title":"Discovery of design patterns variants for quality software development","authors":"Adil Waheed, Saqib Ubaid, G. Rasool, F. Ghaffar","doi":"10.1109/INTELSE.2016.7475118","DOIUrl":"https://doi.org/10.1109/INTELSE.2016.7475118","url":null,"abstract":"Design patterns and their variants detection from source code using different techniques and tools are keys to understand complex architecture of different applications. Design patterns are key to develop quality applications and well know solutions to well know problems. The discussion is on accuracy of existing techniques and tools is debatable because of multiple advanced technologies and a lot of variations in Gang of Four (GOF) design patterns. In fact, during development developers modified standard patterns according to their needs and design, but intent remain same. In this research, we will find different variants of Gang of Four design patterns from source code of legacy applications through various techniques that developers are using to tackle commonly occurring problems. These discovered variants are detected and validated through different design patterns detection techniques and tools.","PeriodicalId":127671,"journal":{"name":"2016 International Conference on Intelligent Systems Engineering (ICISE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129526188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/INTELSE.2016.7475158
M. Khalid, I. Arshad
We are living in the society of information where it is vital to communicate information as quickly and efficiently as possible. In order to improve the efficiency of telecommunication industry, latest technology of fibers has to be studied, analyzed and implemented. The journey of optical fibers to Photonic Crystal Fibers during the last few years is a positive step towards the improvement of communication industry. This research work presents a model for electromagnetic wave propagation through the photonic crystal fiber with the help of a technique known as Finite Difference Time Domain (FDTD). For the efficient and effective propagation of light through this fiber, it is first important to have a PCF design with lowest possible loss and dispersion. In this work, we first analyzed different designs of PCF, compared them with the commercially available designs and then selected the one model with lowest possible loss and dispersion. Light was then passed through that fiber and simulations were done for 25 km long fiber.
{"title":"Analysis of light propagation through Photonic Crystal Fiber Design with reduced losses","authors":"M. Khalid, I. Arshad","doi":"10.1109/INTELSE.2016.7475158","DOIUrl":"https://doi.org/10.1109/INTELSE.2016.7475158","url":null,"abstract":"We are living in the society of information where it is vital to communicate information as quickly and efficiently as possible. In order to improve the efficiency of telecommunication industry, latest technology of fibers has to be studied, analyzed and implemented. The journey of optical fibers to Photonic Crystal Fibers during the last few years is a positive step towards the improvement of communication industry. This research work presents a model for electromagnetic wave propagation through the photonic crystal fiber with the help of a technique known as Finite Difference Time Domain (FDTD). For the efficient and effective propagation of light through this fiber, it is first important to have a PCF design with lowest possible loss and dispersion. In this work, we first analyzed different designs of PCF, compared them with the commercially available designs and then selected the one model with lowest possible loss and dispersion. Light was then passed through that fiber and simulations were done for 25 km long fiber.","PeriodicalId":127671,"journal":{"name":"2016 International Conference on Intelligent Systems Engineering (ICISE)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117054960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}