Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,922 Article Results

APMorph: finite-state transducer for Amazigh pronominal morphology

10.11591/ijece.v11i1.pp699-706
Rachid Ammari , Ahbib Zenkoua
Our work aims to present an amazigh pronominal morphological analyzer (APMorph) based on xerox’s finite-state transducer (XFST). Our system revolves around a large lexicon named “APlex” including the affixed pronoun to the noun and to the verb and the characteristics relating to each lemma. A set of rules are added to define the inflectional behavior and morphosyntactic links of each entry as well as the relationship between the different lexical units. The implementation and the evaluation of our approach will be detailed within this article. The use of XFST remains a relevant choice in the sense that this platform allows both analysis and generation. The robustness of our system makes it able to be integrated in other applications of natural language processing (NLP) especially spellchecking, machine translation, and machine learning. This paper presents a continuation of our previous works on the automatic processing of Amazigh nouns and verbs.
Volume: 11
Issue: 1
Page: 699-706
Publish at: 2021-02-01

Planning multi-terminal direct current grids based graphs theory

10.11591/ijece.v11i1.pp37-46
Mario A. Rios , Fredy A. Acero
Transmission expansion planning in AC power systems is well known and employs a variety of optimization techniques and methodologies that have been used in recent years. By contrast, the planning of HVDC systems is a new matter for the interconnection of large power systems, and the interconnection of renewable sources in power systems. Although the HVDC systems has evolved, the first implementations were made considering only the needs of transmission of large quantities of power to be connected to the bulk AC power system. However, for the future development of HVDC systems, meshed or not, each AC system must be flexible to allow the expansion of these for future conditions. Hence, a first step for planning HVDC grids is the planning and development of multi-terminal direct current (MTDC) systems which will be later transformed in a meshed system. This paper presented a methodology that use graph theory for planning MTDC grids and for the selection of connection buses of the MTDC to an existing HVAC transmission system. The proposed methodology was applied to the Colombian case, where the obtained results permit to migrate the system from a single HVDC line to a MTDC grid.
Volume: 11
Issue: 1
Page: 37-46
Publish at: 2021-02-01

Enhanced sunflower optimization for placement distributed generation in distribution system

10.11591/ijece.v11i1.pp107-113
Thuan Thanh Nguyen
Installation of distribution generation (DG) in the distribution system gains many technical benefits. To obtain more benefits, the location and size of DG must be selected with the appropriate values. This paper presents a method for optimizing location and size of DG in the distribution system based on enhanced sunflower optimization (ESFO) to minimize power loss of the system. In which, based on the operational mechanisms of the original sunflower optimization (SFO), a mutation technique is added for updating the best plant. The calculated results on the 33 nodes test system have shown that ESFO has proficiency for determining the best location and size of DG with higher quality than SFO. The compared results with the previous methods have also shown that ESFO outperforms to other methods in term of power loss reduction. As a result, ESFO is a reliable approach for the DG optimization problem.
Volume: 11
Issue: 1
Page: 107-113
Publish at: 2021-02-01

Determining an optimum zone radius for zone routing protocol (ZRP) based on node mobility

10.11591/ijeecs.v21.i2.pp1230-1237
Khalid W. Al-Ani , Salman Yussof , Hussein M. Haglan , Hothefa Shaker , Linda Mahdi Alani
Mobility is one of the important issues in Mobile Ad hoc Networks (MANET). By definition, MANET nodes are free to move around and this may cause difficulty in routing. MANET routing protocols must consider this factor when making routing decision. Zone Routing Protocol (ZRP) is a hybrid routing protocol, which utilizes the proactive and reactive routing protocols advantages. ZRP proactively maintains routing information within a routing zone, while reactively discovering routes to destinations beyond the routing zone. Since ZRP is based on the concept of routing zone, determining an optimum routing zone radius has the major impact on the performance of that protocol. In this research, we studied the effect of zone radius on the performance of ZRP with different levels of node mobility. Node mobility is defined using two different parameters: node speed and pause time. Based on the simulation results, ZRP protocol using zone radius of two provides the best packet delivery fraction, throughput and normalized routing load. However, a larger zone radius will provide a lower delay.
Volume: 21
Issue: 2
Page: 1230-1237
Publish at: 2021-02-01

Dynamic state estimation of multi-machine power system with UPFC using EKF algorithm

10.11591/ijeecs.v21.i2.pp642-646
Meera R Karamta , Jitendra G Jamnani
Estimation of dynamic state variables in a multi-machine power system connected with UPFC is presented in this paper, using Extended Kalman filter (EKF) algorithm. A two-generator test case is used to estimate the generator rotor angle and rotor speed. The DC link voltage of the UPFC is the additional state variable to be estimated. Dynamic mathematical modeling of the multi-machine system with UPFC is explained in this work. DSE is done under transient condition of three-phase fault.
Volume: 21
Issue: 2
Page: 642-646
Publish at: 2021-02-01

Revealing and evaluating the influence of filters position in cascaded filter: application on the ECG de-noising performance disparity

10.11591/ijeecs.v21.i2.pp829-838
Abdenour Allali , Arres Bartil , Lahcene Ziet , Amar Hebibi
In this paper, a new optimization on windowing technique based on finite impulse response (FIR) filters is proposed for revealing and evaluating the Influence of filters position in cascaded filter tested on the ECG signal de-noising. baseline wander (BLW), power line interference (PLI) and electromyography (EMG) noises are getting removed. The performance of the adopted method is evaluated on the PTB diagnostic database. Subsequently, the comparisons are based on signal to noise ratio (SNR) improvement and mean square error (MSE) minimization. Where the Rectangular, and Kaiser windows have been used for the more potent performances. The disparity average (DA) of SNR values is detected; in both Kaiser and Rectangular windows are assessed by ±0.38046dB and ±0.70278dB respectively, while the MSE values were constant. The excellent configuration or filters position (H-B-L) of the filtration system is selected according to high measurements of SNR and low MSE too, to de-noise the ECG signals. First of all, this applied approach has led to 31.30 dB SNR improvement with MSE minimization of 26. 43%. This means that there is a significant contribution to improving the field of filtration.
Volume: 21
Issue: 2
Page: 829-838
Publish at: 2021-02-01

Improved feature exctraction process to detect seizure using CHBMIT-dataset

10.11591/ijece.v11i1.pp827-843
Raveendra Kumar T. H. , C. K. Narayanappa
One of the most dangerous neurological disease, which is occupying worldwide, is epilepsy. Fraction of second nerves in the brain starts impulsion i.e. electrical discharge, which is higher than the normal pulsing. So many researches have done the investigation and proposed the numerous methodology. However, our methodology will give effective result in feature extraction. Moreover, we used numerous number of statistical moments features. Existing approaches are implemented on few statistical moments with respect to time and frequency. Our proposed system will give the way to find out the seizure-effected part of the brain very easily using TDS, FDS, Correlation and Graph presentation. The resultant value will give the huge difference between normal and seizure effected brain. It also explore the hidden features of the brain.
Volume: 11
Issue: 1
Page: 827-843
Publish at: 2021-02-01

Optimized architecture for SNOW 3G

10.11591/ijece.v11i1.pp545-557
N. B. Hulle , Prathiba B. , Sarika R. Khope , K. Anuradha , Yogini Borole , D. Kotambkar
SNOW 3G is a synchronous, word-oriented stream cipher used by the 3GPP standards as a confidentiality and integrity algorithms. It is used as first set in long term evolution (LTE) and as a second set in universal mobile telecommunications system (UMTS) networks. The cipher uses 128-bit key and 128 bit IV to produce 32-bit ciphertext. The paper presents two techniques for performance enhancement. The first technique uses novel CLA architecture to minimize the propagation delay of the 232 modulo adders. The second technique uses novel architecture for S-box to minimize the chip area. The presented work uses VHDL language for coding. The same is implemented on the FPGA device Virtex xc5vfx100e manufactured by Xilinx. The presented architecture achieved a maximum frequency of 254.9 MHz and throughput of 7.2235 Gbps.
Volume: 11
Issue: 1
Page: 545-557
Publish at: 2021-02-01

Study on security risks of e-banking system

10.11591/ijeecs.v21.i2.pp1065-1072
Gabriela Mogos , Nor Shahida Mohd Jamail
Online banking and other e-banking modes are a very convenient way to banking in terms of speed, convenience and delivery costs, but they have brought many risks alongside them. Online banking has created a new risk orientation and even new forms of risk. Technology plays an important role as both a source and a tool for risk control. The purpose of this research is to identify the security situation of the e-banking application and to analyze the risks and attacks that could occur to the customers that, although it’s an e-banking application attacks could happen. Several mitigations were mentioned to overcome attacks like, access control is to mitigate eavesdropping this means that, restricting access to sensitive data is mandatory. Another way to mitigate is, update and patch which is for SQL injection meaning, it's vital to apply patches and updates when it’s available. These attacks may attack the whole application or target an individual where private information is stolen or changed. This research also shows how to apply several more different protections measures to protect oneself and organization from being targets of cybercrime. 
Volume: 21
Issue: 2
Page: 1065-1072
Publish at: 2021-02-01

A secure cloud service deployment framework for DevOps

10.11591/ijeecs.v21.i2.pp874-885
Rao Ravinder , V. Sucharita
The advancements in cloud computing and leveraging the benefits from cloud computing to the service providers have increased the deployment of traditional applications to the cloud. The applications once deployed on the cloud, due to various reasons, need migration from development infrastructure to operational infrastructure, one operational instance to other operational instances due to load balancing and the cycle continues due to the use of DevOps as development strategies for cloud computing applications. Advocates of hybrid and public clouds observe cloud computing makes it possible for organizations to avert or minimize upfront IT infrastructure expenses.  Proponents also assert that cloud computing systems permit businesses to receive their software up and running faster, using improved manageability and less maintenance, so it empowers IT teams to rapidly adapt tools to meet the varying and unpredictable requirements. DevOps is a lot of practices that mechanizes the procedures between programming improvement and IT groups, all together that they can fabricate, test, and discharge programming quicker and even more dependably. The idea of DevOps is established on building a culture of a joint effort between groups that generally worked in relative siloes. The guaranteed advantages incorporate expanded trust, quicker programming discharges, capacity to explain basic issues rapidly and better oversee impromptu work. Thus, this work identifies the need for providing multiple security protocols during the complete life cycle of cloud application development and deployment. This work proposes a novel framework for automatic selection and deployment of the security protocols during cloud service deployments. The framework identifies the need for security aspects and selects the appropriate security algorithms for virtual machines. The proposed framework demonstrates nearly 80% improvement over the security policy deployment time. 
Volume: 21
Issue: 2
Page: 874-885
Publish at: 2021-02-01

A pulse amplitude modulation scheme based on in-line semiconductor optical amplifiers (SOAs) for optical soliton systems

10.11591/ijeecs.v21.i2.pp1014-1021
Aadel M. Alatwi , Ahmed Nabih Zaki Rashed
The objective of this work is to simulate a pulse amplitude modulation (PAM) scheme based on in-line semiconductor optical amplifiers for optical soliton systems. The max. power for soliton systems, based on various bits/symbol PAM modulation schemes after a fiber length of 100 km, is simulated and clarified. In addition to the max. Q factor for soliton systems, PAM modulation schemes with various in-line SOA injection currents and a fiber length of 100 km are also simulated and demonstrated in the results. The total electrical power after photo-detectors for soliton systems, based on PAM modulation schemes with various in-line SOA injection currents and a fiber length of 100 km, is also simulated and clarified in the results. The study emphasizes that the higher the SOA injection current, the higher the electrical power and the lower the Q factor that can be achieved in the soliton system.
Volume: 21
Issue: 2
Page: 1014-1021
Publish at: 2021-02-01

Fingerprint positioning of users devices in long term evolution cellular network using K nearest neighbour algorithm

10.11591/ijece.v11i1.pp528-535
Mohammed J. Alhasan , Sarmad Muneer Abdulhussein , Ali H. K. Khwayyir
The rapid exponential growth in wireless technologies and the need for public safety has led to increasing demand for location-based services. Terrestrial cellular networks can offer acceptable position estimation for users that can meet the statutory requirements set by the Federal Communications Commission in case of network-based positioning, for safety regulations. In this study, the proposed radio frequency pattern matching (RFPM) method is implemented and tested to determine a user’s location effectively. The RFPM method has been tested and validated in two different environment. The evaluations show remarkable results especially in the Micro cell scenario, at 67% of positioning error 15m and at 90% 31.78m for Micro cell scenario, with results of 75.66m at 67% and 141.4m at 90% for Macro cell scenario.
Volume: 11
Issue: 1
Page: 528-535
Publish at: 2021-02-01

Energy budget and methods for determining coordinates for a radiomonitoring system based on a small spacecraft

10.11591/ijeecs.v21.i2.pp945-956
Altay Aitmagambetov , Yuri Butuzov , Valery Tikhvinskiy , Aigul Kulakayeva , Zhadyra Ongenbayeva
The existing ground-based radio monitoring systems do not allow performing the functions and tasks of radio spectrum monitoring in a quality manner. Therefore, to improve the efficiency of the radio spectrum monitoring systems for countries with a large territory, such as the Republic of Kazakhstan, it is proposed to use low-orbit small spacecrafts as radio monitoring stations. The analysis of the energy budget of radio lines on the basis of existing radio electronic means on the territory of the Republic of Kazakhstan, carried out in this work, showed the possibility of using low-orbit small spacecrafts for performing the functions and tasks of radio monitoring. The paper proposes and develops a method for determining the coordinates of radio emission sources based on the goniometric method using scanning antennas on board of one spacecraft. The ranges of the antenna scanning angles are substantiated, and the estimates of the coordinates determination errors are made. Algorithms have been developed and computer programs have been compiled to determine the coordinates of the radio emission sources, which will make it possible to use this method at the initial stages of developing a radio spectrum monitoring system based on one small spacecraft.
Volume: 21
Issue: 2
Page: 945-956
Publish at: 2021-02-01

Enhancing PAPR reduction for FBMC-OQAM systems by joint both tone reservation and companding methods

10.11591/ijeecs.v21.i2.pp919-926
Salima Senhadji , Yassine Mohammed Bendimerad , Fathi Tarik Bendimerad
One of the major problems that faces any wireless communication system that apply multicarrier modulation technology is large Peak-to-Average Power Ratio (PAPR). There are divers PAPR reduction methods to solve this problem. Tone Reservation (TR) scheme is one of the most famous PAPR reduction techniques in which a peak cancelling signal is added to the original one in such a way that PAPR will reduce. Companding is another easy PAPR reduction technique in which compression of large amplitude samples and expansion of low one. In this paper, we suggest a new PAPR reduction scheme based on combining tone reservation and companding techniques for FBMC-OQAM systems. The simulation results show that the new scheme (TR&Compd) presents better result in term of PAPR reduction compared to TR and Companding methods taken separately.
Volume: 21
Issue: 2
Page: 919-926
Publish at: 2021-02-01

Current model predictive control for three-phase active power filter using cascaded h-bridge multilevel converter

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/22670
Abdelkader Yousfi , Youcef Bot , Fayçal Mehedi , Abdelkader Chaker
Different technologies in particular in the medium and high-power conversion were implemented and taken into consideration in the last few years. These inverter topologies have been demonstrated to ensure the generation of high-quality voltage waveforms based on power half-conductor switches, which operate on the fundamental frequency. The multilevel inverter H-bridge is a promising alternative among the available multi-level inverter topologies. A predictional current control algorithm for multi-level converters and use on a three-phase cascaded inverter H-bridge. This article reports on a comparison of two check methods associated with a shunt active power filter based on the cascaded inverter of the three- Level type. The first approach is the traditional PI control unit and the second is the predictive current control unit. The reference current for the shunt active power filter is provided by the p-q control strategy for reactive power compensation and current harmonics. The cascade-type three-level inverter has more advantages over a two-leaved inverter; the simulation output of APF is checked by MATLAB/Simulink. The predictive controlled the APF associated with the three-level inverter shows more performances and efficiency compared to the conventional control algorithms.
Volume: 21
Issue: 2
Page: 714-722
Publish at: 2021-02-01
Show 1012 of 1995

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration