Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,922 Article Results

A new parallel bat algorithm for musical note recognition

10.11591/ijece.v11i1.pp558-566
ِAnsam Nazar Younis , Fawzia Mahmood Ramo
Music is a universal language that does not require an interpreter, where feelings and sensitivities are united, regardless of the different peoples and languages, The proposed system consists of two main stages: the process of extracting important properties using the linear discrimination analysis (LDA) This step is carried out after the initial treatment process using various procedures to remove musical lines, The second stage describes the recognition process using the bat algorithm, which is one of the metaheuristic algorithms after modifying the bat algorithm to obtain better discriminating results. The proposed system was supported by parallel implementation using the (Developed Bat Algorithm DBA), which increased the speed of implementation significantly. The method was applied to 1250 different images of musical notes. The proposed system was implemented using MATLAB R2016a, Work was done on a Windows10 Processor OS (Intel ® Core TM i5-7200U CPU @ 2.50GHZ 2.70GHZ) computer.
Volume: 11
Issue: 1
Page: 558-566
Publish at: 2021-02-01

A powerful comparison of deep learning frameworks for Arabic sentiment analysis

10.11591/ijece.v11i1.pp745-752
Youssra Zahidi , Yacine El Younoussi , Yassine Al-Amrani
Deep learning (DL) is a machine learning (ML) subdomain that involves algorithms taken from the brain function named artificial neural networks (ANNs). Recently, DL approaches have gained major accomplishments across various Arabic natural language processing (ANLP) tasks, especially in the domain of Arabic sentiment analysis (ASA). For working on Arabic SA, researchers can use various DL libraries in their projects, but without justifying their choice or they choose a group of libraries relying on their particular programming language familiarity. We are basing in this work on Java and Python programming languages because they have a large set of deep learning libraries that are very useful in the ASA domain. This paper focuses on a comparative analysis of different valuable Python and Java libraries to conclude the most relevant and robust DL libraries for ASA. Throw this comparative analysis, and we find that: TensorFlow, Theano, and Keras Python frameworks are very popular and very used in this research domain.
Volume: 11
Issue: 1
Page: 745-752
Publish at: 2021-02-01

Design of a miniaturized wideband disc monopole antenna used in RFID systems

10.11591/ijeecs.v21.i2.pp994-1004
Sufyan Hazzaa Ali , Ahmed Hameed Reja , Yousif Azzawi Hachim
Radio-frequency identification (RFID) is an important wireless technology which utilizes radio frequencies (RFs) for exchanging data between two or more points (tags and readers), that represent an automatic identification (Auto-ID) system. This paper introduces an omnidirectional microstrip antenna operates at 2.45 GHz used for a radio-frequency identification (RFID) technology. The length of the proposed antenna is 36.5 mm and the width is 27 mm. The substrate material which has been used as a base of antenna is FR4 that has dielectric constant value of 4.3 and dielectric thickness value of 1.6 mm. Regarding the resonance frequency, return loss of the proposed antenna design is -34.8 dB. A promising directivity outcome of 2.8 dB has been achieved with omnidirectional radiation pattern as well as an acceptable efficiency of 66%. The proposed antenna design accomplishes a wideband frequency of 1.21 GHz in the frequency range of (2.14  3.35) GHz. The computer simulation technology (CST) microwave studio software has been used for implementing the proposed antenna design. The antenna design fabricatation and its characteristics have been measured using vector network analyzer (type MS4642A). The obtained results of the experimental design achieve a little bit differences as compared with the simulation results
Volume: 21
Issue: 2
Page: 994-1004
Publish at: 2021-02-01

Design of a model reference adaptive PID control algorithm for a tank system

10.11591/ijece.v11i1.pp300-318
Yohan Darcy Mfoumboulou
This paper describes the design of an adaptive controller based on model reference adaptive PID control (MRAPIDC) to stabilize a two-tank process when large variations of parameters and external disturbances affect the closed-loop system. To achieve that, an innovative structure of the adaptive PID controller is defined, an additional PI is designed to make sure that the reference model produces stable output signals and three adaptive gains are included to guarantee stability and robustness of the closed-loop system. Then, the performance of the model reference adaptive PID controller on the behaviour of the closed-loop system is compared to a PI controller designed on MATLAB when both closed-loop systems are under various conditions. The results demonstrate that the MRAPIDC performs significantly better than the conventional PI controller.
Volume: 11
Issue: 1
Page: 300-318
Publish at: 2021-02-01

Enhanced space vector modulated scalar control of induction motor

10.11591/ijeecs.v21.i2.pp707-713
Ramana Vasu. R , George Fernandez S. , Vijayakumar K.
A conventional vector control of the asynchronous machine makes an analogy of an equivalent separately excited DC machine. It offers a decoupled control of torque and flux which is perpendicular to each other hence one vector is not interfered by other parameters. So, torque and speed control is achieved in an isolated manner even though they are closely interlinked. This is implemented by aligning the rotor flux with the direct axis of the synchronously rotating reference frame. PI controllers play a key role to achieve the desired topology of the VFD. Three controllers are used in the system, flux, speed and torque controller. Tuning of flux controller is quite simple, but in case of speed and torque, it became quite tricky because the output of the speed controller is the reference signal of torque controller. Moreover, there is no distinct method to tune the controllers in the vector control system. Still, the entire high-performance dynamic response of the machine depends on the perfect tuning of those controllers. From the above analysis, it is understood that system identification is essential to tune the PI controllers. But being an asynchronous machine, to obtain system transfer function in a decoupled manner is very difficult. To overcome this problem, the proposed model will be Conventional sine PWM modulated switching pulses are used to implement variable frequency drives for induction motor. Space vector modulated PWM switching pulse is used to fire IGBT. In the case of sine, PWM modulated switching; DC bus voltage utilization is 50% whereas in space vector modulated inverter 57.73% DC Bus voltage utilization can be achieved.
Volume: 21
Issue: 2
Page: 707-713
Publish at: 2021-02-01

Adaptive key generation algorithm based on software engineering methodology

10.11591/ijece.v11i1.pp589-595
Muayad Sadik Croock , Zahraa Abbas Hassan , Saja Dhyaa Khudhur
Recently, the generation of security keys has been considered for guaranteeing the strongest of them in terms of randomness. In addition, the software engineering methodologies are adopted to ensure the mentioned goal is reached. In this paper, an adaptive key generation algorithm is proposed based on software engineering techniques. The adopted software engineering technique is self-checking process, used for detecting the fault in the underlying systems. This technique checks the generated security keys in terms of validity based on randomness factors. These factors include the results of National Institute of standard Test (NIST) tests. In case the randomness factors are less than the accepted values, the key is regenerated until obtaining the valid one. It is important to note that the security keys are generated using shift register and SIGABA technique. The proposed algorithm is tested over different case studies and the results show the effective performance of it to produce well random generated keys.
Volume: 11
Issue: 1
Page: 589-595
Publish at: 2021-02-01

V2X communication system with non-orthogonal multiple access: outage performance perspective

10.11591/ijeecs.v21.i2.pp854-864
Tu-Trinh Nguyen , Dinh-Thuan Do
To achieve low-latency and high-reliability (LLHR) for applications in the vehicle-toeverything (V2X) networks, the non-orthogonal multiple access (NOMA) based Long Term Evolution (LTE)-based is introduced a promising technology. NOMA-V2X provides higher spectrum efficiency compared with the orthogonal multiple access (OMA) based V2X. This study propose two-way relay assisted NOMA-V2X transmission by exploiting amplify-and-forward (AF) and full-duplex. We derive expressions of outage probability to evaluate performance of two vehicles and to improve the quality of service (QoS) for the device with the poor channel conditions. These expressions are further verified by Monte-Carlo simulations.
Volume: 21
Issue: 2
Page: 854-864
Publish at: 2021-02-01

Smart job searching system based on information retrieval techniques and similarity of fuzzy parameterized sets

10.11591/ijece.v11i1.pp636-645
Malek Alksasbeh , Tamer Abukhalil , Bassam A. Y. Alqaralleh , Mohammed Al-kaseasbeh
Job searching for the proper vacancy among several choices is one of the most important decision-making problems. The necessity of dealing with uncertainty in such real-world problems has been a long-term research challenge which has originated from different methodologies and theories. The main contribution of this work is to match the applicant curriculum vitae (CV) with the best available job opportunities based on certain criteria. The proposed job searching system (JSS) implements a series of approaches which can be broken down into segmentation, tokenization, part of speech, gazetteer, and fuzzy inference to extract and arrange the required data from the job announcements and CV. Moreover, this study designs a fuzzy parameterized structure to store such data as well as a measuring tool to calculate the degree of similarity between the job requirements and the applicant’s CV. In addition, this system analyses the computed similarity scores in order to get the optimal job opportunities for the job seeker in descending order. The performance evaluation of the proposed system shows high recall and precision percentages for the matching process. The results also confirm the viability of the JSS approach in handling the fuzziness that is associated with the problem of job searching.
Volume: 11
Issue: 1
Page: 636-645
Publish at: 2021-02-01

Developing digital signal clustering method using local binary pattern histogram

10.11591/ijece.v11i1.pp872-878
Rashad J. Rasras , Bilal Zahran , Mutaz Rasmi Abu Sara , Ziad AlQadi
In this paper we presented a new approach to manipulate a digital signal in order to create a features array, which can be used as a signature to retrieve the signal. Each digital signal is associated with the local binary pattern (LBP) histogram; this histogram will be calculated based on LBP operator, then k-means clustering was used to generate the required features for each digital signal. The proposed method was implemented, tested and the obtained experimental results were analyzed. The results showed the flexibility and accuracy of the proposed method. Althoug different parameters of the digital signal were changed during implementation, the results obtained showed the robustness of the proposed method.
Volume: 11
Issue: 1
Page: 872-878
Publish at: 2021-02-01

SQL injection attacks countermeasures assessments

10.11591/ijeecs.v21.i2.pp1121-1131
Mamdouh Alenezi , Muhammad Nadeem , Raja Asif
SQL injections attacks have been rated as the most dangerous vulnerability of web-based systems over more than a decade by OWASP top ten. Though different static, runtime and hybrid approaches have been proposed to counter SQL injection attacks, no single approach guarantees flawless prevention/ detection for these attacks. Hundreds of components of open source and commercial software products are reported to be vulnerable for SQL injection to CVE repository every year. In this mapping study, we identify different existing approaches in terms of the cost of computation and protection offered. We found that most of the existing techniques claim to offer protection based on the testing on a very small or limited scale. This study dissects each proposed approach and highlights their strengths and weaknesses and categorizes them based on the underlying technology used to detect or counter the injection attacks.
Volume: 21
Issue: 2
Page: 1121-1131
Publish at: 2021-02-01

Design of spark ignition engine speed control using bat algorithm

10.11591/ijece.v11i1.pp794-801
Herlambang Setiadi , Karl O. Jones , Teguh Aryo Nugroho , Muhammad Abdillah , Herri Trilaksana , Tahta Amrillah
The most common problem in spark ignition engine is how to increase the speed performance. Commonly researchers used traditional mathematical approaches for designing speed controller of spark ignition engine. However, this solution may not be sufficient. Hence, it is important to design the speed controller using smart methods. This paper proposes a method for designing speed controller of a spark ignition engine using the bat algorithm (BA). The simulation is carried out using the MATLAB/SIMULINK environment. Time domain simulation is carried out to investigate the efficacy of the proposed method. From the simulation results, it is found that by designing speed controller of spark ignition engine using PI based bat algorithm, the speed performance of spark ignition engine can be enhanced both in no load condition and load condition compared to conventional PI controler.
Volume: 11
Issue: 1
Page: 794-801
Publish at: 2021-02-01

An end to end key establishment scheme for detecting black hole attacks in mobile ad hoc networks

10.11591/ijeecs.v21.i2.pp1193-1200
Baban Ahmed Mahmood , Aso Ahmed Majeed , Ahmed Chalak Shakir
The wireless technology is in consistent and rapid development in this century such that it produces fast data rate and strong connectivity. Mobile ad hoc network (MANET) is an independent network wherein nodes function as both host and router. Routing protocols in MANET are prone to different attacks. Malicious nodes usually interfere the process of establishing routes and make it hard to build a valid route. In the literature, different mechanisms proposed to prohibit black hole attacks in which an adversary node blindly drops data packets. In this paper, a study is fulfilled of the advantages and disadvantages of some of the protocols presented in the literature and a novel method proposed that detects black hole attacks. A thorough, precise, and theoretical analysis is presented to show how the proposed method can prevent malicious nodes from impersonating benign nodes. A theoretical compareison conducted between the proposed method and some of the other methods presented in the literature. The comparison shows that the attacks exist on these protocols are detected and prevented by the proposed protocol.
Volume: 21
Issue: 2
Page: 1193-1200
Publish at: 2021-02-01

GPON and V-band mmWave in green backhaul solution for 5G ultra-dense network

10.11591/ijece.v11i1.pp390-401
Ayodeji Akeem Ajani , Vitalice Kalecha Oduol , Zachaeus Kayode Adeyemo
Ultra-dense network (UDN) is characterized by massive deployment of small cells which resulted into complex backhauling of the cells. This implies that for 5G UDN to be energy efficient, appropriate backhauling solutions must be provided. In this paper, we have evaluated the performance of giga passive optical network (GPON) and V-band millimetre wave (mmWave) in serving as green backhaul solution for 5G UDN. The approach was to first reproduce existing backhaul solutions in Very Dense Network (VDN) scenario which served as benchmark for the performance evaluation for the UDN scenario. The best two solutions, GPON and V-band solutions from the VDN were then deployed in 5G UDN scenario. The research was done by simulation in MATLAB. The performance metrics used were power consumption and energy efficiency against the normalized hourly traffic profile. The result revealed that GPON and V-band mmWave outperformed other solutions in VDN scenario. However, this performance significantly dropped in the UDN scenariodue to higher data traffic requirement of UDN compared to VDN. Thus, it can be concluded that GPON and V-band mmWave are not best suited to serve as green backhaul solution for 5G UDN necessitating further investigation of other available backhaul technologies.
Volume: 11
Issue: 1
Page: 390-401
Publish at: 2021-02-01

Quality and energy optimized scheduling technique for executing scientific workload in cloud computing environment

10.11591/ijeecs.v21.i2.pp1039-1047
Nagendra Prasad S , Subash Kulkarni S
Modern BigData data-intensive and scientific workload execution is challenging. The major issues are reliable processing, performance efficiency and energy efficacy perquisite of BigData processing framework. This work assume self-aware MC architectures that autonomously adjust or optimize their performance to accommodate users quality of service (QoS) performance requirement, job execution performance, energy efficiency, and resource accessibility. Extensive workload scheduling has been presented to minimize energy consumption in cloud computing (CC) environment. However, the existing workload scheduling model induces higher amount of interaction cost between inter-processors communications. Further, due to poor resource utilization, routing inefficiency these existing model induces higher energy cost and fails to meet workload QoS prerequisite. For overcoming research challenges, this paper presented quality and energy optimized scheduling (QEOS) technique for executing data-intensive workload by employing dynamic voltage and frequency scaling (DVFS) technique. Experiment outcome shows QEOS model attains good trade-off between system performance and energy consumption in multi-core cloud computing (CC) architectures when compared with existing model.
Volume: 21
Issue: 2
Page: 1039-1047
Publish at: 2021-02-01

Performance evaluation of PV penetration at different locations in a LV distribution network connected with an off-load tap changing transformer

10.11591/ijeecs.v21.i2.pp987-993
Dilini Almeida , Jagadeesh Pasupuleti , Janaka Ekanayake
Solar photovoltaic (PV) power generation has shown a worldwide remarkable growth in recent years. In order to achieve the increasing energy demand, a large number of residential PV units are connected to the low voltage (LV) distribution networks. However, high integration of solar PV could cause negative impacts on distribution grids leading to violations of limits and standards. The voltage rise has been recognized as one of the major implications of increased PV integration, which could significantly restrict the capacity of the distribution network to support higher PV penetration levels. This study addresses the performance of the off-load tap changing transformer under high solar PV penetration and a detailed analysis has been carried out to examine the maximum allowable PV penetration at discrete tap positions of the transformer. The maximum PV penetration has been determined by ensuring that all nodal voltages adhere to grid voltage statutory limits. The simulation results demonstrate that the first two tap positions could be adopted to control the grid voltage under higher PV penetrations thus facilitating further PV influx into the existing network.
Volume: 21
Issue: 2
Page: 987-993
Publish at: 2021-02-01
Show 1022 of 1995

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration