Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,922 Article Results

Satellite image inpainting with deep generative adversarial neural networks

10.11591/ijai.v10.i1.pp121-130
Mohamed Akram Zaytar , Chaker El Amrani
This work addresses the problem of recovering lost or damaged satellite image pixels (gaps) caused by sensor processing errors or by natural phenomena like cloud presence. Such errors decrease our ability to monitor regions of interest and significantly increase the average revisit time for all satellites. This paper presents a novel neural system based on conditional deep generative adversarial networks (cGAN) optimized to fill satellite imagery gaps using surrounding pixel values and static high-resolution visual priors. Experimental results show that the proposed system outperforms traditional and neural network baselines. It achieves a normalized least absolute deviations error of (  &  decrease in error compared with the two baselines) and a mean squared error loss of  (  &  decrease in error) over the test set. The model can be deployed within a remote sensing data pipeline to reconstruct missing pixel measurements for near-real-time monitoring and inference purposes, thus empowering policymakers and users to make environmentally informed decisions.
Volume: 10
Issue: 1
Page: 121-130
Publish at: 2021-03-01

Smart metering system data analytics platform using multicore edge computing

10.11591/ijres.v10.i1.pp11-17
Juan C. Olivares-Rojas , Enrique Reyes-Archundia , José A. Gutiérrez-Gnecchi , Ismael Molina-Moreno , Adriana C. Téllez-Anguiano , Jaime Cerda-Jacobo
The smart grid revolution has only been possible, thanks to the development and proliferation of smart meters. The increasingly growing computing capabilities for Internet of Things devices have made it possible for data to be processed directly from the devices where it is produced; this has been called edge computing. Edge computing is allowing the smart grid to become increasingly intelligent to solve problems that make electricity consumption more efficient and environmentally friendly. This work presents the implementation of a smart metering system that allows data analytics using a multiprocessing architecture directly on the smart meter. The results show that the development of smart meters with data analytics capabilities at the edge is a reality today, and the use of multiprocessing permits the improvement of data processing.
Volume: 10
Issue: 1
Page: 11-17
Publish at: 2021-03-01

Monolayer and bilayer graphene field effect transistor using Verilog-A

10.11591/ijres.v10.i1.pp56-64
Nayana G. H. , Vimala P.
Monolayer and bilayer graphene field effect transistor modeling is presented in this paper. The transport model incorporated, works well for both drift diffusive and ballistic conditions. The validity of the model was checked for various device dimensions and bias voltages. Performance parameters affecting operation of graphene field effect transistor in various region of operation are optimized. Model was developed to verify transfer characteristics for monolayer and bilayer graphene field effect transistor. Results obtained prove the ambipolar property in Graphene. MATLAB is used for numerical modeling for systematic performance evaluation of parameters in graphene. The tool used to simulate the characteristics is cadence Verilog-A which describe analog component structure.
Volume: 10
Issue: 1
Page: 56-64
Publish at: 2021-03-01

The effects of instructional design based web course on pre-service teachers’ competencies

10.11591/ijere.v10i1.20475
M. Anas Thohir , Moh. Irma Sukarelawan , Jumadi Jumadi , Warsono Warsono , Alfina Citrasukmawati
Web Pedagogical Content Knowledge (WPACK) is an important competence for pre-service teachers in the educational technology course. However, novice pre-service teachers require the preparation stage to integrate the Web into instruction. The purpose of the study was to develop and to investigate the new instructional model for pre-service teachers in integrating the Web. The Preparation, Isolation, Transformation, Action, Reflection, and Revision (PINTARR) and two other models were implemented in three physics education technology groups with seventy-four participants. The instrument test was constructed to assess the pre-service teachers’ competencies, namely Student analysis, Curriculum organization, Instructional strategy selection, Evaluation, Technological knowledge, and Physics knowledge. The result of MANOVA showed pre-service teachers in PINTARR group outperformed overall the pre-service teachers’ competencies rather than the Multimedia and Web Design Learning group. The results indicated that the Preparation and the Isolation stage were the most important for novice pre-service teachers in improving the competencies.
Volume: 10
Issue: 1
Page: 230-236
Publish at: 2021-03-01

Ultra high speed full adder for biomedical applications

10.11591/ijres.v10.i1.pp25-31
Basavoju Harish , M. S. S. Rukmini
In the field of bio medical engineering high performance CPU for digital signal processing plays a significant role. Frequency efficient circuit is a paramount requirement for the portable digital devices employing various digital processors. In this work a novel high speed one-bit 10T full adder with complemented output was described. The circuit was constructed with XOR gates which were built using two CMOS transistors. The XOR gate was constructed using 2T multiplexer circuit style. It was observed that power consumption of the designed circuit at 180nm with supply voltage 1.8V is 183.6 uW and delay was 1.809 ps whereas power consumption at 90nm with supply voltage 1.2V is 25.74 uW and delay was 8.245 ps. The observed Power Delay Product (PDP) in 180nm (at supply voltage 1.8V) is 0.33 and in 90nm (at supply voltage 1.2V) is 0.212. The work was extended by implementing a 32-bit Ripple Carry Adder (RCA) and was found that the delay at 180nm is 93.7ps and at 90nm is 198ps. The results were drawn at 180nm and also 90nm technology using CAD tool. The results say that the present work offered significant enhancement in speed and PDP compared with existing designs.
Volume: 10
Issue: 1
Page: 25-31
Publish at: 2021-03-01

Second order noise shaping for data-weighted averaging technique to improve sigma-delta DAC performance

10.11591/ijaas.v10.i1.pp79-87
Ali Kerem Nahar , Ansam Subhi Jaddar , Hussain K. Khleaf , Mohmmed Jawad Mortada Mobarek
In general, the noise shaping responses, a cyclic second-order response is delivered by the method of data weighted averaging (DWA) in which the output of the digital-to-analog converter (DAC) is restricted to one of two states. DWA works efficiently for rather low levels of quantizing; it begins presenting considerable difficulties when internal levels of quantizing are extended further. Though, each added bit of internal quantizing causes an exponentially increasing in power dissipation, complexity, and size of the DWA logic and the DAC. This gives a controlled second-order response accounting for the mismatch of the elements of DAC. The multi-bit DAC is made up of numerous single-bit DACs having values thereof chosen via a digital encoder. This research presents a discussion of the influence of mismatching between unit elements of the delta-sigma DAC. This results in a constrained second-order response accounting for a mismatch of DAC elements. The results of the simulation showed how the effectiveness of the DWA method in reducing band tones. Furthermore, the DWA method has proved its efficiency in solving the mismatching of DAC unit elements. The noise of the mismatching elements is enhanced by 11 dB at 0.01 with the proposed DWA, thereby enhancing the efficiency of the DAC in comparison to the efficiency of the DAC with no use of the circuit of DWA.
Volume: 10
Issue: 1
Page: 79-87
Publish at: 2021-03-01

Ubiquitous learning in occupational health and safety for vocational education

10.11591/ijere.v10i1.20823
Ketut Ima Ismara , Amin Suharjono , Didi Supriadi
This research aimed to develop instructional media for occupational safety and health android-based for vocational schools. The second aim is to determine the feasibility of instructional media and student responses. The type of research is research and development (R&D) with the Analysis, Design, Development, Implementation, Evaluation (ADDIE) method, namely, analysis, design, development, implementation, and evaluation. The instrument used for data collection was a questionnaire with fourth scales. Data collection used an assessment questionnaire for two experts and 103 users. Research data analysis techniques used quantitative descriptive analysis. This study's results have produced products in the form of android-based instructional media for Occupational Safety and Health. In this study, we designed and developed an application called Zerosicks for mobile devices to help students learn occupational safety and health principles. The results of testing for all features and navigation work well and under their functions. The assessment results by content experts, media experts, and students as users indicate that this media has a very decent level of eligibility. Suggestions for product development are to add videos to the media, provide selected music, and add discussion forums for users.
Volume: 10
Issue: 1
Page: 285-292
Publish at: 2021-03-01

Recurrence relation and DNA sequence: A state-of-art technique for secret sharing

10.11591/ijres.v10.i1.pp65-76
Anirban Bhowmik , Sunil Karforma , Joydeep Dey
During the transmission over the Internet, protection of data and information is an important issue. Efficient cryptographic techniques are used for protection but everything depends on the encryption key and robustness of encryption algorithm. Threshold cryptography provides the development of reliable and strong encryption and key management machine which can reconstruct the message even in the case of destruction of some particular numbers of shares and at the opposite the data cannot be reconstructed unless an allowable set of shares are been gathered. The earlier techniques available in literature result in high computational complexity in the course of both sharing and reconstructing of message. Our method employs a brand new easy protecting technique based totally on unit matrix. The simple AND operation is used for percentage generation and reconstruction can be finished by way of easy ORing the stocks with threshold cost. We are proposing a sharing approach in conjunction with conventional cryptography technique for key control to make the key greater sturdy and for encryption we have used a session key the use of the idea of recurrence relation and DNA series Different types of experimental results confirm authenticity, confidentiality, integrity and acceptance of our technique.
Volume: 10
Issue: 1
Page: 65-76
Publish at: 2021-03-01

Breast cancer prediction model with decision tree and adaptive boosting

10.11591/ijai.v10.i1.pp184-190
Tsehay Admassu Assegie , R. Lakshmi Tulasi , N. Komal Kumar
In this study, breast cancer prediction model is proposed with decision tree and adaptive boosting (Adboost). Furthermore, an extensive experimental evaluation of the predictive performance of the proposed model is conducted. The study is conducted on breast cancer dataset collected form the kaggle data repository. The dataset consists of 569 observations of which the 212 or 37.25% are benign or breast cancer negative and 62.74% are malignant or breast cancer positive. The class distribution shows that, the dataset is highly imbalanced and a learning algorithm such as decision tree is biased to the benign observation and results in poor performance on predicting the malignant observation. To improve the performance of the decision tree on the malignant observation, boosting algorithm namely, the adaptive boosting is employed. Finally, the predictive performance of the decision tree and adaptive boosting is analyzed. The analysis on predictive performance of the model on the kaggle breast cancer data repository shows that, adaptive boosting has 92.53% accuracy and the accuracy of decision tree is 88.80%, Overall, the adaboost algorithm performed better than decision tree.
Volume: 10
Issue: 1
Page: 184-190
Publish at: 2021-03-01

Design and development of a parallelized algorithm for face recognition in mobile cloud environment

10.11591/ijres.v10.i1.pp47-55
K. N. Bhatt , Sanket S Naik Dessai , V. S. Yerragudi
Face recognition is the biometric application to recognise the identity. Face recognition application holds a set of images which are called databases stored by the user at cloud database. Cloud computing environment, database can be stored in the cloud environment to achieve huge data storage area. The problem with these data storages are that because of that huge size processing on this storage takes too much of compiling time. This paper aims to develop face recognition in mobile cloud environment by exploiting data or task parallelism in existing face recognition algorithms. To design and develop parallel PCA based face recognition algorithm. The parallel PCA face recognition algorithm has been deployed in the cloud server for performing PCA by request of user. It matches the image on the cloud server and gives response back to the user in the fewer amounts of time and with reduced latency. The developed Parallel PCA face recognition algorithm has minimized the overall response time for the face recognition algorithm. The performance of the developed system is tested and analysed on real face images. To analyse the developed system, a centralized and distributed based server methods are developed and comparison is being carried out. The conclusion drawn that the distributed server improves the efficiency as well as the computing power as compared with centralized server system. The comparison of centralized and distributed based servers is carried out by observing the time taken while varying the number of images in the training dataset.
Volume: 10
Issue: 1
Page: 47-55
Publish at: 2021-03-01

A survey on IoT application layer protocols

10.11591/ijeecs.v21.i3.pp1663-1672
Harth G. Hamid , Zainab T. Alisa
The constant evolution in internet technology has made. The internet of things (IoT) to be the center of research fields in computer engineering. This review paper discusses the choice of an application layer protocol in an IoT system integration so first, the paper briefly defines the potential protocols. After that, it opens up a comparison between these protocols according to how they manage their overhead and messages which affects traffic management and thus starts the discussion. The main contribution of this work is the simplification of comparison between session layer protocols in the benefit of IoT applications exclusively. IoT system Standards and platforms are being improved constantly. IoT enables application devices to connect and coordinate their tacks, such applications like healthcare, smart home, and industrial automation. Several protocols have been discussed to provide effective communication for resource-limited devices. However, their traffic management is still a field for researches, to find the optimal protocol choice for different situations. The review collects the results of other works that experimentally compared application layer protocols in the IoT environment and presents the graphical and tabular compression. Finally, the conclusion summarize the choice in different applications.
Volume: 21
Issue: 3
Page: 1663-1672
Publish at: 2021-03-01

Design and simulation of an adaptive beam smart antenna using MATLAB

10.11591/ijeecs.v21.i3.pp1584-1593
Aaron Don M. Africa , Rica Rizabel M. Tagabuhin , Jan Jayson S. D. Tirados
Signals transmitted over a long range of distance may pass through several obstacles and scatter, taking multiple paths to reach the receiver. Beamforming antennas are controlled electronically to adjust the radiation pattern following the first received signal. This allows the antenna to maximize the received signal and consequently, suppress the interfering signals received. A smart antenna should be able to diminish noise, increase the signal to noise ratio, and have better system competence. The adaptive beam makes use of the spacing of the several antennas and the phase of the signal of each antenna array to control the shape and direction of the signal beam. This paper focuses on the use of smart antennas using an adaptive beam method as a better system for the transmission of signals. A simulation between the existing Omnidirectional antenna system and the smart antenna system will be made and compared. The paper will discuss the corresponding advantages that a smart antenna system has compared to the Omnidirectional antenna system.
Volume: 21
Issue: 3
Page: 1584-1593
Publish at: 2021-03-01

Systematising troubleshooting of disputes in network

10.11591/ijres.v10.i1.pp32-36
Sowmya K. B. , Thejaswini A.
With the growing network size, virtualization everywhere, it is getting more difficult to configure and manage the network devices. Software Defined Networking (SDN) is a way to address these problems. Application Centric Infrastructure (ACI) is the Cisco’s solution to SDN, with centralized automation and policy-driven application profiles. If there is any bug in the network or problem with the expected functionality of the network, ACI cases are opened in the Technical Assistance Centre (TAC) for troubleshooting the issue. Engineers currently troubleshoot ACI cases manually by using Command Line Interface (CLI) and trace for different events triggered by the policy pushes by logs generated at different stages of the ACI and from different servers responsible for this, which indeed is a very tedious, time consuming task and is prone to manual errors. This paper describes a way to automate the entire ACI troubleshooting process with the user-friendly GUI which can show the entire information needed for troubleshooting by extracting relevant information at every layer. By making use of FSM models the proposed solution can be extended to other areas which involve log analysis using CLI to extract relevant information and is not just limited to ACI.
Volume: 10
Issue: 1
Page: 32-36
Publish at: 2021-03-01

Model of emergence evacuation route planning with contra flow and zone scheduling in disaster evacuation

10.11591/csit.v2i1.p1-10
Dedy Hartama , Herman Mawengkang , Muhammad Zarlis , Rahmad Widia Sembiring
Evacuation is characterized by rapid movement of people in unsafe locations or disaster sites to safer locations. The traffic management strategy for commonly used evacuations is the use of Shoulder-Lane, contra-flowing traffic and gradual evacuation. Contra-flow has been commonly used in traffic management by changing traffic lanes during peak hours. To implement the contra-flow operation, there are two main problems that must be decided, namely Optimal contra-flow lane configuration problem (OCLCP) and optimal contra-flow scheduling. Within the OCSP there are two approaches that can be used: zone scheduling and flow scheduling. Problem of contra-flow and zone scheduling problem is basically an Emergence evacuation route planning (EERP) issue. This research will discuss EERP with contra-flow and zone scheduling which can guarantee the movement of people in disaster area to safe area in emergency situation.
Volume: 2
Issue: 1
Page: 1-10
Publish at: 2021-03-01

Feature extraction and classification methods of facial expression: A survey

10.11591/csit.v2i1.p26-32
Moe Moe Htay
Facial Expression is a significant role in affective computing and one of the non-verbal communication for human computer interaction. Automatic recognition of human affects has become more challenging and interesting problem in recent years. Facial expression is the significant features to recognize the human emotion in human daily life. Facial expression recognition system (FERS) can be developed for the application of human affect analysis, health care assessment, distance learning, driver fatigue detection and human computer interaction. Basically, there are three main components to recognize the human facial expression. They are face or face’s components detection, feature extraction of face image, classification of expression. The study proposed the methods of feature extraction and classification for FER.
Volume: 2
Issue: 1
Page: 26-32
Publish at: 2021-03-01
Show 1009 of 1995

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration