|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of Theoretical and Applied Information Technology
September 2013 | Vol. 55 No.1 |
Title: |
A TECHNIQUE FOR TUMOR REGION IDENTIFICATION USING CELLULAR NEURAL NETWORK |
Author: |
M.DURAISAMY, Dr.S.DURAISAMY |
Abstract: |
In recent times, Magnetic Resonance Imaging (MRI) has turn into a competent
appliance for clinical diagnoses and research. For the recognition of different
diseases through segmentation methods, this MRI has become an extremely useful
medical modality. We have presented an effectual CNN based segmentation
technique with lung and brain MRI images in this manuscript. This move towards
the target with the aid of the following major steps, which includes, 1)
Pre-processing of the brain and lung images, 2) Segmentation using cellular
neural network. At first, the MRI image is pre-processed to make it fit for
segmentation. At this point, in the pre-processing step, image de-noising is
made using the linear smoothing filters, such as Gaussian Filter. After that,
the pre-processed image is segmented according to our proposed technique,
CNN-based image segmentation. We have developed a hybrid optimization algorithm
(ABC+PSO) to design a template in cellular neural network. At last, the
different MRI images (brain and lung) are given to the proposed approach to
assess the performance of the proposed approach in segmentation process. Fuzzy
C-means (FCM) and K-means classification accompanies the Comparative analysis.
The accuracy of proposed segmentation approach produces healthier results (93.9%
for lung and 96.4% for brain images) according to the comparative analysis, than
that of existing Fuzzy C-means (FCM) and K-means classification. |
Keywords: |
Brain And Lung MRI Image, Cellular Neural Network, Template Design, Gaussian
Filter, Employed Bee, Onlooker Bee, Scout Bee |
Source: |
Journal of Theoretical and Applied Information Technology
September 2013 -- Vol. 55. No. 1 -- 2013 |
Full
Text |
|
Title: |
STATE FEEDBACK CONTROLLER AND OBSERVER DESIGN FOR TCP NETWORK WITH CONSIDERATION
OF UDP FLOW |
Author: |
NOUREDDINE EL ALAMI, RACHID ELLAIA, KHALID LEFROUNI |
Abstract: |
In this paper we consider the phenomenon of congestion of a router in a
communication network, initially, we propose a model of TCP based on the fluid
flux model and, secondly, we propose a synthesis of an observer and state
feedback to stabilize the system. In this study we have taken into account both
the time variant delay and the perturbations due to UDP flow. Such traffic
control will be implemented by a mechanism of Active Queue Management (AQM),
located at the router. |
Keywords: |
Delay-Dependent Stability, Linear Matrix Inequality (LMI), AQM, TCP network,
Stabilization, Time-Delay Systems |
Source: |
Journal of Theoretical and Applied Information Technology
September 2013 -- Vol. 55. No. 1 -- 2013 |
Full
Text |
|
Title: |
A SEMANTIC APPROACH TO ANNOTATION OF LEARNING OBJECTS |
Author: |
E.A.VIMAL, Dr S..CHANDRAMATHI |
Abstract: |
The primary motto of this paper is to design and develop the semantic annotation
model for e-learning document and to find the presence of the concepts in the
document. The awareness of the semantic web needs the widespread availability of
semantic annotations for the obtainable and new documents on the web. Semantic
annotations are to label ontology class instance data and plot it into ontology
classes. Here, we are first applying the stop word removal technique and
considering other contents of the documents to create the concept matrix and
also we are considering the index terms to create a separate concept matrix. The
concept matrix which are developed using the contents and the index terms are
then combined to find the level of the presence of specific concepts in a
particular document. This technique is implemented in Java and we have
identified the percentage level of the presence of the concepts in the sample
documents. |
Keywords: |
Semantic Annotation, Learning Objects, Concept Matrix, Ontology. |
Source: |
Journal of Theoretical and Applied Information Technology
September 2013 -- Vol. 55. No. 1 -- 2013 |
Full
Text |
|
Title: |
TASK SCHEDULING ALGORITHM BASED ON HYBRID PARTICLE SWARM OPTIMIZATION IN CLOUD
COMPUTING ENVIRONMENT |
Author: |
GOMATHI B, KARTHIKEYAN KRISHNASAMY |
Abstract: |
Cloud computing environment can offer dynamic and elastic virtual resources to
the end users on demand basis. Task scheduling should satisfy the dynamic
requirements of users and also need to utilize the virtual resources efficiently
in cloud environment, so that task scheduling in cloud is an NP-Complete
problem. In this paper, we present a Hybrid Particle Swarm Optimization (HPSO)
based scheduling heuristic to balance the load across the entire system while
trying to minimize the makespan of a given task sets. Finally, experimentation
results show that hybrid PSO is more effective as compared to using existing
simple PSO algorithm. |
Keywords: |
Task scheduling, Particle Swarm Optimization, Cloud computing, Makespan,
Resource Utilization |
Source: |
Journal of Theoretical and Applied Information Technology
September 2013 -- Vol. 55. No. 1 -- 2013 |
Full
Text |
|
Title: |
A MODEL FOR DEVELOPING ONLINE VERIFICATION AMONG E-COMMERCE CONSUMERS |
Author: |
SHARFI M. ABBASS, OTHMAN BIN IBRAHIM |
Abstract: |
This paper aims to increase trust in E-Commerce among consumer-to-consumer (C2C)
using the assurance key (AK) and supporting it by using face recognition (FR)
technology in online verification (OV). This paper considers the development of
our proposed model show in (section 2.1). It reviews previous studies of
e-commerce regarding consumers’ trust, and attempts to identify weaknesses and
provide better solutions using a facial recognition technique and data
encryption between the client and the server for increased security of data
traded between them. It also reports the algorithms used for facial recognition
and encryption and the use of appropriate e-commerce among C2C. Finally, it
evaluates trust models used in similar studies. |
Keywords: |
E-Commerce , Consumer-to-Consumer (C2C) , Assurance Key (AK), Face Recognition
(FR), Online Verification (OV) |
Source: |
Journal of Theoretical and Applied Information Technology
September 2013 -- Vol. 55. No. 1 -- 2013 |
Full
Text |
|
Title: |
USER PREFERENCES AND EXPERT OPINIONS BASED VERTICAL HANDOFF DECISION STRATEGY |
Author: |
DHANARAJ CHEELU, RAJASEKHARA BABU M., VENKATAKRISHNA P |
Abstract: |
Handoff decision is the most vital phase in the entire vertical handoff process
for mobility management in heterogeneous wireless systems. Picking out the most
beneficial network amongst the alternatives is the goal of the handoff decision
operation. Multi criterion decision frameworks are few among the effective
models for fashioning vertical handoff decision schemes. In this paper, user
preferences and expert opinions based strategy is advised with the accompaniment
of analytical hierarchy process (AHP). Motivation for the proposed model and
also simulation and results are acknowledged examining the vantages of the
suggested mechanism. |
Keywords: |
Heterogeneous Wireless Networks, Vertical Handoff, Analytical Hierarchy Process,
User Preferences, Expert Opinions |
Source: |
Journal of Theoretical and Applied Information Technology
September 2013 -- Vol. 55. No. 1 -- 2013 |
Full
Text |
|
Title: |
LEAKAGE POWER REDUCTION IN WALLACE TREE MULTIPLIER USING CURRENT COMAPRISON
BASED DOMINO LOGIC FULL ADDERS |
Author: |
R.NAVEEN, K.THANUSHKKODI, C.SARANYA |
Abstract: |
A lower power current comparison based domino logic 4*4 Wallace tree multiplier
is proposed. Here the multiplier is designed by using low leakage high speed
full adders. These full adders uses current comparison based domino logic to
achieve low leakage and high speed. The technique which is utilized in this
paper is based on comparison of mirrored current of the pull-up network with its
worst leakage case current. This technique decreases the parasitic capacitance
on the dynamic node, yielding a smaller keeper for wide fan-in gates to
implement fast and robust circuits. So that the leakage current and power
consumption and delay are reduced. The proposed 4*4 Wallace tree multiplier
using current comparison based domino logic full adders was simulated using
Mentor graphics ELDO in the temperature of 27o C, which is operated in 3 GHz
shows half of the power reduction when compared to the 4*4 Wallace tree
multiplier using standard full adders. |
Keywords: |
Domino Logic, Wallace Multiplier, Power Dissipation, Full Adder, CMOS Logic |
Source: |
Journal of Theoretical and Applied Information Technology
September 2013 -- Vol. 55. No. 1 -- 2013 |
Full
Text |
|
Title: |
DATA CLASSIFICATION BY SAC “SCOUT ANTS FOR CLUSTERING” ALGORITHM |
Author: |
MOHAMED HAMLICH, MOHAMMED RAMDANI |
Abstract: |
In this paper, we propose a new learning method for clustering heterogeneous
data with continuous class. This method in a first step finds the optimal path
between the data using ant colony algorithms. The distance adopted in our
optimization method takes into account all types of data. In the second step,
instances in the optimal path, are divided into homogeneous groups. A new
criterion for the separation of clusters is used; it is based on transition
probabilities between the instances. A third step is to find the prototype of
each cluster to identify the cluster membership of any new data injected. After
applying a clustering algorithm, we want to know whether the cluster structure
found is valid or not. To validate our approach, we have applied our method on
different types of artificial data and real data from UCI Machine Learning
Repository. The results obtained showed an obvious improvement of validation
indexes compared to those of ACA, ACOC, k-means and KHM algorithms. |
Keywords: |
Data clustering, Best path, Cluster prototype, Continuous class. |
Source: |
Journal of Theoretical and Applied Information Technology
September 2013 -- Vol. 55. No. 1 -- 2013 |
Full
Text |
|
Title: |
AN EFFICIENT METHOD FOR MINING PERIODIC TRANSITIONAL PATTERNS IN TRANSACTION
DATABASE |
Author: |
S.SRIDEVI, Dr.S.RAJARAM |
Abstract: |
Transaction database is used to find frequent itemsets from large datasets along
with their associated timestamps. The existing frequent pattern mining
algorithms such as Apriori, FP-growth, Partition, Pincer Search do not consider
the timestamps associated with the transactions. In real time transactions,
without timestamps it is difficult to identify the constantly changing behaviour
of the frequent patterns in a transaction database. To overcome the above
problem, EP-TP (an Efficient Periodic Transitional Patterns) mining method is
introduced in this paper. Transitional patterns are used to discover transi-frequent
patterns along with their time stamps in a transaction database. The above
patterns include both positive and negative transitional patterns. A pattern is
said to be a positive or negative transitional pattern if their frequencies
dramatically increase or decrease respectively at some point of time in a
transaction database. From the above, the business owners can able to analyze
the trend of the pattern(s) over the period(s). This trend is used to find out
the nature of the pattern and hence the business owner can able to make the
necessary step to improve the performance (or analyze the reason) of the
negative pattern. The above pattern is tested with Textile Dataset and its
performance was compared with existing algorithm. It is also present the
experimental study to verify the usefulness and effectiveness of transitional
patterns. |
Keywords: |
Transaction database, Transitional pattern, Frequent pattern, Periodic pattern,
Linear pattern |
Source: |
Journal of Theoretical and Applied Information Technology
September 2013 -- Vol. 55. No. 1 -- 2013 |
Full
Text |
|
Title: |
NORMALIZED CROSS-CORRELATION BASED FILTERING PROCESS FOR FACE LOCALIZATION |
Author: |
GHASSAN MARWAN ABDULFATTAH, MOHAMMAD NAZIR AHMAD |
Abstract: |
In the real-time face recognition systems, locating faces in the input image
should be fast and accurate. `Therefore, the need to introduce a face
localization method with less complexity rises. Recently, Template-matching
Approach has been used by different researchers to find the region of interest
(face location) with different positions, lighting and cluttered backgrounds.
However, some matching errors always occur with regard to the appearance of
parts of the image as face location because of the variations of image pixels
values. In this paper, faster and reliable pre-processing method is proposed to
reduce the effects of the noise on image pixels values by applying a filtering
process. The result showed an important and significant improvement in
localization accuracy or precision compared to using the traditional NCC alone.
Since this method was implemented, there has been an eleven percent (11%)
increase in accuracy compared to the traditional NCC (80% localization
accuracy). In this study, Yale University’s database is used to evaluate the
proposed method. |
Keywords: |
Image Processing, Face Localization, Normalized Cross Correlation |
Source: |
Journal of Theoretical and Applied Information Technology
September 2013 -- Vol. 55. No. 1 -- 2013 |
Full
Text |
|
Title: |
SPECIFYING CLASS HIERARCHIES IN Z |
Author: |
YOUNES EL AMRANI |
Abstract: |
The main target of this research is to provide a formal meta model for
object-oriented systems. It provides a formal definition of the object-oriented
concepts along with major consistency rules for object-oriented systems. This
research is a contribution to the formalization of object-oriented systems.
Other existing models fail to define the notion of virtual function and virtual
class. In this article both concepts are specified in the proposed model and
used to clarify the OO related concepts. To illustrate the expressiveness of the
model a formal specification of the MOOD metric suite is provided using the
model. The formal definition of the POF metric is successfully defined,
providing one of the first Z formal specification for the POF metric thereof. |
Keywords: |
Formal Language, Z, Metrics, MOOD, Formal Model, Software Engineering,
Measurement |
Source: |
Journal of Theoretical and Applied Information Technology
September 2013 -- Vol. 55. No. 1 -- 2013 |
Full
Text |
|
Title: |
LEED-LIFETIME ENERGY EFFICIENT DATA ACQUISITION TECHNIQUE FOR AIRCRAFT
STRUCTURAL HEALTH MONITORING SYSTEMS |
Author: |
P.VIJAYA LAKSHMI,D.SOMASUNDARESWARI,V.DURAISAMY |
Abstract: |
Implementation of low cost sensor nodes in recent years allows wireless sensor
nodes to be applicable for wide range of applications in aircraft control
systems. Rapid use of composite materials for aircraft structures, calls for the
development of novel methods for aircraft structural health monitoring. Visual
inspection of failures due to delamination of layers and cracks developed in
metal structures does not prove to be a reliable method for failure detection.
However the present scheduled aircraft structure maintenance methods involve a
high maintenance cost. To overcome these shortcomings, wireless sensors can be
embedded into these composite structures to detect the vibration energy and
transmit the same to the central health monitoring unit. For aircraft structural
health monitoring the major challenge lies is in the design and implementation
of wireless sensor networks to extend the node lifetime by minimizing energy
consumption with its limited resources. In this paper we propose a new data
acquisition technique that is aimed to maximize both energy efficiency and the
lifetime by making use of relay nodes and beacon enabled MAC. An energy
efficient route is established between the source and the sink using the relay
nodes. Beacon enabled MAC puts all the redundant nodes into sleep mode to save
the energy further during data transfer. Through simulation we will show that
our technique saves more energy, minimizes packet loss and delay and also
increases the reliability of the network by increasing the active time of the
relay nodes. |
Keywords: |
Wireless Sensor Networks, Energy Efficiency, MAC, Aircraft Structural
Monitoring, Relay Nodes, Lifetime |
Source: |
Journal of Theoretical and Applied Information Technology
September 2013 -- Vol. 55. No. 1 -- 2013 |
Full
Text |
|
Title: |
IMPROVING LINK STABILITY OF MULTICASTING ROUTING PROTOCOL IN MANETS |
Author: |
ABDULMALEK AL-HEMYARI, MAHAMOD ISMAIL, ROSILAH HASSAN, SABRI SAEED |
Abstract: |
Mobile Ad Hoc Networks (MANETs) are a set of mobile nodes collected in groups
with no fixed infrastructure and self organized. MANETs suffers from many
limitations such as scarce resources and unexpected dynamic architectural which
makes finding the most stable route to transmit data packets a challenging task.
Multicasting is designed to improve the group oriented applications. Several
studies proposed multicast routing protocols in MANETs, most of which still lack
route stability. In this paper we propose a new algorithm, Long Lifetime
Multicast Routing Protocol (LLMRP), based on On-Demand Multicast Routing
Protocol (ODMRP). The proposed algorithm modifies the route discovery process
and data packets multicasting in original ODMRP to discover the most stable
route. The main goal of our proposed mechanism is to increase the route lifetime
and reduce the need for route maintenance mechanism, to decrease the control
overhead and average end-to-end delay. |
Keywords: |
Stable Route, MANET, Multicast Routing, ODMRP, LLMRP |
Source: |
Journal of Theoretical and Applied Information Technology
September 2013 -- Vol. 55. No. 1 -- 2013 |
Full
Text |
|
Title: |
MICROSCOPIC RGB COLOR IMAGES ENHANCEMENT FOR BLOOD CELLS SEGMENTATION IN YCbCr
COLOR SPACE FOR K-MEANS CLUSTERING |
Author: |
NAVEED ABBAS, PROF. Dr DZULKIFLI MOHAMAD |
Abstract: |
Blood is the main component of human body. Blood is composed of Red Blood Cells,
White Blood Cells, Platelets and other artifacts. Blood is considered as the
main source of identifying various diseases like Malaria, Anemia, and Leukemia
etc. In these diseases the main region of interests are the blood cells. The
main focus in these diseases is to carefully check the blood cells because these
cells in one way or another are either attacked by the parasites or some
disorder in their shapes, sizes and colors. These features of blood cells have
fundamental importance in the study, because different disorders result in
different diseases. Due to the challenges in the light microscopy the digital
images produced are noisy and need proper processing, that the features like
size, shape, color and internal features like nucleus its size and color (WBC)
of the various blood cells are clearly studied. This work mainly focuses on the
enhancement of contrast in the YCbCr color for algorithms like KNN and K-means
Clustering as because in the YCbCr color space the enhancement results in
different colors for Malarial Parasites, WBCs nucleolus and other artifacts.
Hence, it is easy for grouping these regions into different classes. This work
is the start of a complete automatically diagnosis of Malaria, Anemia and
Leukemia. |
Keywords: |
Anemia, Malaria, Leukemia, Red Blood Cells (RBC), White Blood Cells (WBC), RGB,
YCbCr, K-NN and K-means Clustering |
Source: |
Journal of Theoretical and Applied Information Technology
September 2013 -- Vol. 55. No. 1 -- 2013 |
Full
Text |
|
Title: |
SERVICE ORIENTED ONTOLOGY BASED DATA FEDERATION FOR HETEROGENEOUS DATA SOURCES |
Author: |
HEMA M S, CHANDRAMATHI S |
Abstract: |
Data integration is inevitable in current distributed heterogeneous database
environment. The existing data integration system uses data federation to
integrate the distributed data without duplicating the data sources or creating
a new integrated data store for analysis and decision support. The contemporary
data federation techniques convert the data sources to XML dataset and integrate
the data. These systems do not resolve all conflicts efficiently. This paper
proposes a layered Service Oriented Ontology based Data federation Architecture
[SOOD] and hybrid ontology based data federation methodology over the SOOD
architecture. This converts the metadata of data sources into OWL description
for constructing global ontology using Local as View [LAV] approach for data
federation. In the proposed method global ontology construction process uses the
OWL description to resolve all schema level heterogeneities of data sources and
guarantees quality data federation. The heterogeneities are classified in to two
(schematic and data) and are resolved at two different stages of proposed
ontology based data federation methodology. The storage infrastructure of SOOD
architecture aids to store and fetch the results swiftly. Experimental results
shows that the proposed methodology is relatively efficient than the
conventional hybrid ontology based data federation methodology in recall and
other quality parameters like response time and reusability. It is observed that
the recall of SOOD system is increased by 10% and response time is reduced by
20% than the conventional hybrid ontology system. |
Keywords: |
Data Federation, Data Integration, Ontology, Resolving Heterogeneity, Service
Oriented Computing |
Source: |
Journal of Theoretical and Applied Information Technology
September 2013 -- Vol. 55. No. 1 -- 2013 |
Full
Text |
|
Title: |
WEB CLASSIFICATION APPROACH USING REDUCED VECTOR REPRESENTATION MODEL BASED ON
HTML TAGS |
Author: |
ABDELBADIE BELMOUHCINE, ABDELLAH IDRISSI, MOHAMMED BENKHALIFA |
Abstract: |
Automatic web page classification plays an essential role in information
retrieval, web mining and web semantics applications. Web pages have special
characteristics (such as HTML tags, hyperlinks, etc.…) that make their
classification different from standard text categorization. Thus, when applied
to web data, traditional text classifiers do not usually produce promising
results. In this paper, we propose an approach which categorizes web pages by
exploiting plain text and text contained in HTML tags. Our method operates in
two steps. In step 1, we use Support Vector Machine classifier (SVM) to
generate, for each target web page (page to classify), reduced vector
representation based on plain text and text from HTML tags. In Step 2, we submit
this vector representation to Naive Bayes (NB) algorithm to determine the final
class for the target page. We conducted our experiments on two large datasets of
pages from ODP (Open Directory Project) and WebKB (Web Knowledge Base), which
are accidentally discovered to suffer from a lot of missing HTML tags. The
results prove that NB classifier, supported by our model and using HTML tags
content combined with plain text, (1) performs significantly better than NB
classifier using text alone in terms of both Micro-F1 and Macro-F1 measures and
even with the presence of missing HTML tags, (2) performs consistently with
respect to category distribution and (3) outperforms NB classifier, using text
alone, simply with the use of very basic handling techniques of missing HTML
tags. |
Keywords: |
HTML Tags, Naive Bayes, Semantic Web, SVM, Web Mining, Web Page Classification |
Source: |
Journal of Theoretical and Applied Information Technology
September 2013 -- Vol. 55. No. 1 -- 2013 |
Full
Text |
|
Title: |
JIAC SYSTEMS AND JADE INTEROPERABILITY |
Author: |
ABDELLATIF SOKLABI, MOHAMED BAHAJ, JAMAL BAKKAS |
Abstract: |
In the literature various Mobile Agents Systems (MASs) have been created, but
with different proprietary technologies and application programming interfaces.
In a heterogeneous network, an agent may need to migrate from one mobile agents
system to another. Furthermore, not all the MASs are able to receive foreign
agents, because a few of the MASs attempt to realize the FIPA Ontology Agent,
and each one adopts a particular point of view of the interoperability problem.
As a result, a system of transferring and transformation is needed to permit an
agent created in one multi-agent system to continue realizing its tasks on
another multi-agent system.
Our work was to find an algorithm to transform and transfer mobile agents
between JIAC and JADE taking the information contained in a JIAC agent to create
its equivalent in JADE and saw to that, by migrating an agent from one of the
two systems with its functions, attributes, and its added features, it can
operate on another multi-agents system, based on our previous solution to the
communication between both JIAC and JADE agents, which takes into consideration
the application programming interfaces and the architecture language with which
both systems were developed. |
Keywords: |
Mobile agents, mobile agents system, interoperability, JADE, JIAC |
Source: |
Journal of Theoretical and Applied Information Technology
September 2013 -- Vol. 55. No. 1 -- 2013 |
Full
Text |
|
Title: |
BASIC TOPOLOGIES OF A THREE-PHASE INVERTER (5L) FOR A PHOTOVOLTAIC SYSTEM
CONTROLLED BY MULTI-CARRIER SPWM |
Author: |
ABDELAZIZ FRI, RACHID EL BACHTIRI, ABDELAZIZ EL GHZIZA |
Abstract: |
In this paper, we present a comparative study in the Matlab/Simulink environment
between three topologies of three-phase multilevel inverter MLI (five-level). We
will consider the Flying Capacitor Multilevel Inverter (FCMLI), the Neutral
Point Clamped Multilevel Inverter (NPCMLI), and the Cascaded H-Bridge Multilevel
Inverter (H-bridge MLI). The comparison between these inverters is based on some
criteria: the spectral quality of the output voltage, the complexity of the
power circuits and the cost of implementation. Each inverter is controlled by
the same type of control which is the multi-carrier sinusoidal pulse width
modulation (SPWM). Voltage sources supplying the inverters cells are simulated
by a DC voltage representing photovoltaic panels (PV). We have chosen the 5L
inverter because it is the most widespread. In literature, there is works
dealing on a single topology with several levels, or developing a new
topologies, or achieving a sophisticated control dedicated to very specific
topologies. This study focuses on a comparison of three topologies bases. These
topologies are simpler and easily controlled in an analog or digital manner.
This study shows, on the one hand, that the total harmonic distortion (THD) is
approximately 32% for NPCMLI and PWM H-Bridge topologies, and it is about 36%
for the FCMLI topology. Moreover, the distortion factor (DF) of the FCMLI is
smaller (0.94) than the NPCMLI and H-bridge (0.951). In addition, the rays
spectrum are concentrated on the switching frequency (2500Hz) for the three
topologies. On the other hand, the H-bridge MLI topology has fewer components
compared to the others. Our study confirms that the most promising topology for
photovoltaic systems is the PWM H-bridge one in view of the spectral quality,
the phase shift (2π/3) between voltages, the waveform of the composed output
voltage and the cost. |
Keywords: |
Three-Phase Multilevel Inverters, FCMLI, NPCMLI, H-Bridge MLI, THD, SPWM
Multi-Carrier |
Source: |
Journal of Theoretical and Applied Information Technology
September 2013 -- Vol. 55. No. 1 -- 2013 |
Full
Text |
|
|
|