Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,922 Article Results

Secure dynamic source routing protocol for defending black hole attacks in mobile Ad hoc networks

10.11591/ijeecs.v21.i1.pp582-590
M. Mohanapriya , Nitish Joshi , Mohit Soni
Wireless Ad Hoc Network is a dynamically organized network on emergency situations, in which a group of wireless devices send data among themselves without requiring any base stations for forwarding data. Here the nodes itself perform the functions of routing. This important characteristic of mobile ad hoc networks allows the hassle free set up of the network for communications in different crisis such as battlefield and natural disaster zones. Multi hop communication in MANET is achieved by the cooperation of nodes in forwarding data packets. This feature of MANET is largely exploited to launch a security attack called black hole attack. A light weight solution called SEC-DSR is proposed to defend the network from black hole attack and enables communication among nodes even in the presence of attackers. In this scheme, by analyzing only the control packets used for routing in the network, the compromised nodes launching the attack are identified. From the collective judgment by the participating nodes in the routing path, a secure route free of black hole nodes is selected for communication by the host. Simulation results validate and ensure the effectiveness of the proposed solution tested on an ad hoc network with compromised black hole nodes.
Volume: 21
Issue: 1
Page: 582-590
Publish at: 2021-01-01

Deep learning based static hand gesture recognition

10.11591/ijeecs.v21.i1.pp398-405
Dina Satybaldina , Gulzia Kalymova
Hand gesture recognition becomes a popular topic of deep learning and provides many application fields for bridging the human–computer barrier and has a positive impact on our daily life. The primary idea of our project is a static gesture acquisition from depth camera and to process the input images to train the deep convolutional neural network pre-trained on ImageNet dataset. Proposed system consists of gesture capture device (Intel® RealSense™ depth camera D435), pre-processing and image segmentation algorithms, feature extraction algorithm and object classification. For pre-processing and image segmentation algorithms computer vision methods from the OpenCV and Intel Real Sense libraries are used. The subsystem for features extracting and gestures classification is based on the modified VGG-16 by using the TensorFlow&Keras deep learning framework. Performance of the static gestures recognition system is evaluated using maching learning metrics. Experimental results show that the proposed model, trained on a database of 2000 images, provides high recognition accuracy both at the training and testing stages.
Volume: 21
Issue: 1
Page: 398-405
Publish at: 2021-01-01

Fractional order PID controller tuned by bat algorithm for robot trajectory control

10.11591/ijeecs.v21.i1.pp74-83
Mohammad A. Faraj , Abdulsalam Mohammed Abbood
This paper deals with implementing the tuning process of the gains of fractional order proportional-integral-derivative (FOPID) controller designed for trajectory tracking control for two-link robotic manipulators by using a Bat algorithm. Two objective functions with weight values assigned has been utilized for achieving the minimization operation of errors in joint positions and torque outputs values of robotic manipulators. To show the effectiveness of using a Bat algorithm in tuning FOPID parameters, a comparison has been made with particle swarm optimization algorithm (PSO). The validity of the proposed controllers has been examined in case of presence of disturbance and friction. The results of simulations have clearly explained the efficiency of FOPID controller tuned by Bat algorithm as compared with FOPID controller tuned by PSO algorithm. 
Volume: 21
Issue: 1
Page: 74-83
Publish at: 2021-01-01

An analytical method with numerical results to be used in the design of optical slab waveguides for optical communication system applications

10.11591/ijeecs.v21.i1.pp278-286
Aadel M. Alatwi , Ahmed Nabih Zaki Rashed
This study develops an analytical method with numerical results for the design of optical slab waveguides for optical communication system applications. An optical slab waveguide structure made of silicon on silicon dioxide material is designed and analyzed. The effective index of the mode is studied against variations in the waveguide dimensions. Transmission and reflection coefficients are studied and compared to the wavelength and dimensions of the waveguide. Variations are sketched with the x-axis, in addition to the electric field intensity distribution and effective refractive index. Waveguide bending loss is also studied with waveguide thickness and length variations within three waveguide transmission windows of 850 nm, 1300 nm, and 1550 nm.
Volume: 21
Issue: 1
Page: 278-286
Publish at: 2021-01-01

Significant features for steganography techniques using deoxyribonucleic acid: a review

10.11591/ijeecs.v21.i1.pp338-347
Nichirvan Asaad Zebari , Dilovan Asaad Zebari , Diyar Qader Zeebaree , Jwan Najeeb Saeed
Information security and confidentiality are the prime concern of any type of communication. Rapidly evolution of technology recently, leads to increase the intruder’s ability and a main challenge to information security. Therefore, utilizing the non-traditional basics for information security is required, such as DNA which is focused as a new aspect to achieve better security. In this paper, a survey of more recent DNA based on data hiding algorithms are covered. With particular emphasis of different parameters several data hiding algorithms based on DNA has been reviewed. To present a more secure an efficient data hiding algorithms based on DNA for future works, this willbe helpful. 
Volume: 21
Issue: 1
Page: 338-347
Publish at: 2021-01-01

Biometric key generation using crow algorithm

10.11591/ijeecs.v21.i1.pp208-214
Zied O. Ahmed , Abbas Akram Khorsheed
The researchers have been exploring methods to use biometric characteristics of the user as a replacement for using unforgettable pass-word, in an attempt to build robust cryptographic keys, because, human users detect difficulties to call up long cryptographic keys. Biometric recognition provides an authentic solution to the authentication of the user problem in the identity administration systems. With the extensive utilization of biometric methods in different applications, there is growing concern about the confidentiality and security of the biometric technologies. This paper proposes biometric based key recreation scheme. Since human ears are not correlated. Until now, the encryption keys are generated using a swarm intelligence approach. Collective intelligence of simple groups of autonomous agents have been emerged by swarm intelligence. The crow search algorithm which is known as (CSA) is a new meta-intuitive method assembled by the intelligent group behavior of crows. Despite that CSA demonstrates important features, its search approach poses excessive challenges while faced with great multimodal formularization.
Volume: 21
Issue: 1
Page: 208-214
Publish at: 2021-01-01

Fuzzy type 1 PID controllers design for TCP/AQM wireless networks

10.11591/ijeecs.v21.i1.pp118-127
Manal Kadhim Oudah , Mohammed Qasim Sulttan , Salam Waley Shneen
The search of FLC_PID controller for TCP/AQM Wireless Networks, to deal with congestion for Internet users and to get good performance and capabilities of TCP / IP networks. Neglect of controlling the network delay and the number of continuous users that leads to a problem in the transmission process. Recently, automatic control units are adapted to solve this problem with the difficulty of controlling congestion in the presence of wireless links. This modest research presents one of the traditional PID controller methods with fuzzy logic so that wireless networks and congestion can be controlled by various configurations. The proposed methods were simulated with the required comparisons in the adoption of nonlinear systems to determine the best performance and it was found that the use of the Fuzzy logic control can achieve the best performance (reducing the delay time of delivering packets and packets loss). The simulation of the current work shows through its results the possibility of controlling the behavior of the system and through testing the balance when changed with time delay through the impact of communication time and its relationship with the stability of the work of the system.
Volume: 21
Issue: 1
Page: 118-127
Publish at: 2021-01-01

A class skew-insensitive ACO-based decision tree algorithm for imbalanced data sets

10.11591/ijeecs.v21.i1.pp412-419
Muhamad Hasbullah Bin Mohd Razali , Rizauddin Bin Saian , Yap Bee Wah , Ku Ruhana Ku-Mahamud
Ant-tree-miner (ATM) has an advantage over the conventional decision tree algorithm in terms of feature selection. However, real world applications commonly involved imbalanced class problem where the classes have different importance. This condition impeded the entropy-based heuristic of existing ATM algorithm to develop effective decision boundaries due to its biasness towards the dominant class. Consequently, the induced decision trees are dominated by the majority class which lack in predictive ability on the rare class. This study proposed an enhanced algorithm called hellinger-ant-tree-miner (HATM) which is inspired by ant colony optimization (ACO) metaheuristic for imbalanced learning using decision tree classification algorithm. The proposed algorithm was compared to the existing algorithm, ATM in nine (9) publicly available imbalanced data sets. Simulation study reveals the superiority of HATM when the sample size increases with skewed class (Imbalanced Ratio < 50%). Experimental results demonstrate the performance of the existing algorithm measured by BACC has been improved due to the class skew-insensitiveness of hellinger distance. The statistical significance test shows that HATM has higher mean BACC score than ATM.
Volume: 21
Issue: 1
Page: 412-419
Publish at: 2021-01-01

Implementation of a bluetooth attack on controller area network (CAN)

10.11591/ijeecs.v21.i1.pp321-327
Zniti Asmae , El Ouazzani Nabih
In this paper a general overview of the vulnerability of the CAN bus is presented and a practical short-range attack is proposed. There are more and more potential attacks on the CAN bus, which may cause leakage of information and thereby there may be danger for safe driving. The attack combines several techniques, such as how to update a node firmware using a Bluetooth module and inject a priority fake frame, in order to block the legitimate messages. 
Volume: 21
Issue: 1
Page: 321-327
Publish at: 2021-01-01

An image enhancement method based on gabor filtering in wavelet domain and adaptive histogram equalization

10.11591/ijeecs.v21.i1.pp146-153
Jeevan K M , Anne Gowda A B , Padmaja Vijay Kumar
The images are not always good enough to convey the proper information. The image may be very bright or very dark sometime or it may be low contrast or high contrast. Because of these reasons image enhancement plays important role in digital image processing. In this paper we proposed an image enhancement technique in which Gabor and median filtering is performed in wavelet domain and Adaptive Histogram Equalization is performed in spatial domain. Brightness and contrast are the two parameters used for analyzing the performance of the proposed method
Volume: 21
Issue: 1
Page: 146-153
Publish at: 2021-01-01

A modified fractal texture image analysis based on grayscale morphology for multi-model views in MR Brain

10.11591/ijeecs.v21.i1.pp154-163
Usha R , Perumal K
This paper presents a modified fractal texture feature analysis with the use of grayscale image morphology for automatic image classification of different views in MR brain images into normal and abnormal. This main contribution of this approach is a reduction of the total number of a threshold value, and the number of image decomposition, in which only the number of extract threshold value two or three are enough for tumor region extraction - compared to four or more is required in the previous method of SFTA (segmentation based fractal texture analysis). This is achieved by pre-processing of hierarchical transformation technique (HTT), which make use of morphological image transformations with the desired structural element. From this decomposed images, mean, area, fractal dimension and selective shape features are extracted and fed into KNN and ensemble bagged tree classifiers. Finally, some of the post-processing is handled for tumor region extraction and tumor cells computation. It is found that this proposed approach has superior results in the segmentation of diseased tissue from normal tissue and the prediction of image classes in terms of accuracy with the less number of threshold extraction and image decomposition rather than the SFTA algorithm.
Volume: 21
Issue: 1
Page: 154-163
Publish at: 2021-01-01

Corpus-based technique for improving Arabic OCR system

10.11591/ijeecs.v21.i1.pp233-241
Ahmed Hussain Aliwy , Basheer Al-Sadawi
An optical character recognition (OCR) refers to a process of converting the text document images into editable and searchable text. OCR process poses several challenges in particular in the Arabic language due to it has caused a high percentage of errors. In this paper, a method, to improve the outputs of the Arabic Optical character recognition (AOCR) Systems is suggested based on a statistical language model built from the available huge corpora. This method includes detecting and correcting non-word and real words error according to the context of the word in the sentence. The results show that the percentage of improvement in the results is up to (98%) as a new accuracy for AOCR output. 
Volume: 21
Issue: 1
Page: 233-241
Publish at: 2021-01-01

Reversible image authentication scheme based on prediction error expansion

10.11591/ijeecs.v21.i1.pp253-262
Thai-Son Nguyen , Phuoc-Hung Vo
Reversible image authentication scheme is a technique that detects tampered areas in images and allows them to be reconstructed to their original version without any distortion. In this article, a new, reversible, image authentication scheme based on prediction error expansion is proposed for digital images. The proposed scheme classifies the host image into smooth blocks and complex blocks. Then, an authentication code that is created randomly with a seed is embedded adaptively into each image block. Experimental results showed that our proposed scheme achieves the high accuracy of tamper detection and preserved high image quality. Moreover, the proposed scheme achieved the reversibility, which is needed for some special applications, such as fine artwork, military images, and medical images. 
Volume: 21
Issue: 1
Page: 253-262
Publish at: 2021-01-01

An accurate signature verification system based on proposed HSC approach and ANN architecture

10.11591/ijeecs.v21.i1.pp215-223
Mustafa S. Kadhm , Mamoun Jassim Mohammed , Hayder Ayad
With the rapid development of technology in all life fields, and due to the huge daily needs for banking systems process, documents processing and other similar systems. The authentication became more required key for these systems. One of the successful system to verify the any person is the signature verification system. However, a reliable and accurate system is still needed. For this reason, the security challenge is take place via authentic signatures. However, a reliable and accurate system is still needed. For this reason, the security challenge is take place via authentic signatures. Therefore, this paper present a reliable signature verification system using proposed histogram of sparse codes (HSC) feature extraction approach and artificial neural networks (ANN) architecture for classification. The system achieved fast computing 0.09 ms and accurate verification results that is 99.7% using three different signature images datasets CEDAR, UTSig, and ICDAR.
Volume: 21
Issue: 1
Page: 215-223
Publish at: 2021-01-01

Data mining approach to analyzing intrusion detection of wireless sensor network

10.11591/ijeecs.v21.i1.pp516-523
Md Alauddin Rezvi , Sidratul Moontaha , Khadija Akter Trisha , Shamse Tasnim Cynthia , Shamim Ripon
Wireless sensor network (WSN) is a collection of wireless sensor nodes which are distributed in nature and a base station where the dispersed nodes are used to monitor and the physical conditions of the environment is recorded and then these data are organized into the base. Its application has been reached out from critical military application such as battlefield surveillance to traffic, health, industrial areas, intruder detection, security and surveillance. Due to various features in WSN it is very prone to various types external attacks. Preventing such attacks, intrusion detection system (IDS) is very important so that attacker cannot steal or manipulate data. Data mining is a technique that can help to discover patterns in large dataset. This paper proposed a data mining technique for different types of classification algorithms to detect denial of service (DoS) attacks which is of four types. They are Grayhole, Blackhole, Flooding and TDMA. A number of data mining techniques, such as KNN, Naïve Bayes, Logistic Regression, support vector machine (SVM) and ANN algorithms are applied on the dataset and analyze their performance in detecting the attacks. The analysis reveals the applicability of these algorithms for detecting and predicting such attacks and can be recommended for network specialist and analysts. 
Volume: 21
Issue: 1
Page: 516-523
Publish at: 2021-01-01
Show 1025 of 1995

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration