Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,922 Article Results

Perceptions and experiences of students on the use of interactive online learning technologies in Mauritius

10.11591/ijere.v9i4.20692
Parmeswar Ramkissoon , Louis Jinot Belle , Trishnee Bhurosy
With the advent of e-learning, advocates use the term interactivity instead of interaction among students, and between the teacher and the students. Many universities use Moodle for online teaching and learning. This paper explores the perceptions and experiences of students in three Higher Education Institutions (HEIs) in Mauritius. A mixed-methods approach was used, with an online survey questionnaire administered to 600 students and focus group discussions were conducted with 15 students from these institutions. It was found that 68.4% of respondents used WhatsApp compared to only 23.6% of them who used the e-learning platform, Moodle. There were no associations between the use or frequency of using WhatsApp or Facebook and the types of HEI to which the students belonged. Students preferred WhatsApp due to its facility for knowledge sharing and construction, its interactivity, its usability, respect for privacy and instant communication. From the findings, it is recommended that HEIs bring a shift in their approaches to teaching and learning from cognitivism to socio-constructivism, connectivism and heutagogy.
Volume: 9
Issue: 4
Page: 833-839
Publish at: 2020-12-01

Medical remotely caring with COVID-19 virus infected people using optimized wireless arm tracing system

10.12928/telkomnika.v18i6.16331
Mohammed Azher; Al-Furat Al-Awsat Technical University Therib , Ahmed Fahem; Al-Furat Al-Awsat Technical University Al-Baghdadi , Heyam; Al-Furat Al-Awsat Technical University Marzog
A human arm makes many functions that a robotic arm always programmed to make same functions. The human limbs motion can be captured using sensors that they will always copy hand movement. The rapid spread of the Coronavirus (COVID-19) virus and contacting the infections make the number of patients doubled in short time. The system proposed in this research can protect clinicians against infection with virus by reducing the contact with the infected and treat them remotely. This system type can be useful in different other fields of industrial works and defense where dangerous and delicate task can be done remotely without actual touch. Xbee shield is used to allow a hand glove flex sensor to communicate with the robotic arm using Zigbee wirelessly. Zigbee here is based on Xbee module from Max stream that can be communicate outdoor for 300 feet with the line of sight and indoor for 100 feet. Proportional, integral and derivative (PID) controller used in the proposed system to achieve smooth movement of limbs. The desired signal comes from flex sensor that connected to each limb. Kalman estimator proposed to find current state of each limb. In order to get better performance, particle swarm optimization (PSO) is used.
Volume: 18
Issue: 6
Page: 2886-2893
Publish at: 2020-12-01

Best neural simultaneous approximation

10.11591/ijeecs.v20.i3.pp1584-1590
Hawraa Abbas Almurieb , Eman S. Bhaya
For many years, approximation concepts has been investigated in view of neural networks for the several applications of the two topics. Researchers studied simultaneous approximation in the 2-normed space and proved essential theorems concern with existence, uniqueness and degree of best approximation. Here, we define a new 2-norm in Lp-space, with p<1, so we call it Lp quasi 2- normed space (Lp,2). The set of approximations is a space of feedforward neural networks that is constructed in this paper. Existence and uniqueness of best neural approximation for a function from  is proved, describing the rate of best approximation in terms of modulus of smoothness.
Volume: 20
Issue: 3
Page: 1584-1590
Publish at: 2020-12-01

Evaluation of non-parametric identification techniques in second order models plus dead time

10.11591/ijece.v10i6.pp6340-6348
Carlos Robles-Algarín , Omar Rodríguez , Adalberto Ospino
In this paper, a set of non-parametric identification techniques are used in order to obtain second order models plus dead time for an underdamped system. Initially, non-parametric techniques were used to identify the system from the temperature data of a coal-heated oven. In this case, the identification techniques proposed by Stark, Jahanmiri - Fallahi and Ogata were used, which require obtaining two or three points of the step response for the system under study. In addition, the Matlab PID Tuner app was used to identify the underdamped system and compare the results with the other methods. The results show that the PID Tuner and the method proposed by Ogata are the ones that best represent the dynamics of the underdamped system, taking into account the values for the Integral Absolute Error (IAE) and the correlation coefficient. With the Stark method an IAE of 181.56 was obtained, while with the PID Tuner the best performance was achieved with an IAE of 21.59. In terms of the results obtained with the cross correlation, the best performance was achieved with the PID tuner and the Stark method.
Volume: 10
Issue: 6
Page: 6340-6348
Publish at: 2020-12-01

Dual method cryptography image by two force secure and steganography secret message in IoT

10.12928/telkomnika.v18i6.15847
Maisa'a Abid Ali K.; University of Technology Al-Dabbas , Ashwak; University of Kerbala Alabaichi , Ahmed Saleem; University of Babylon Abbas
With the go on the evolution of both computer and internet technology, videos, sounds, and scripts are used more and more often. It can be used in sundry techniques in ciphering and data concealing. The objective of this paper is leading to the suggestion of a new method of the combination between encryption and concealment of information so as to make it difficult to identify the transmitted datavia networks. This study has used two force secure (2FS) to encrypt the images, in other words, the SF is frequent twice on the image, to obtain powerful encryption then the concealing of the secret message is done inside the cryptography of the image has been performed using a secret key (cosine curve), and this stego-encryption image has been transformed forthe Internet of things storage in the database in IoT (data flow), when the user needs any information can be access inviaof internet of things (IoTs). The outcome of the proposed system is obtained tobe evaluated through different measures, such aspeak signal noise ratio (PSNR), mean square error (MSE), entropy,correlation coefficient, and histogram. The proposed system is good, efficient, fast, has high security, robustness, and transparency.
Volume: 18
Issue: 6
Page: 2928-2938
Publish at: 2020-12-01

An approach for a multi-stage under-frequency based load shedding scheme for a power system network

10.11591/ijece.v10i6.pp6071-6100
Mkhululi Elvis Siyanda Mnguni , Yohan Darcy Mfoumboulou
The integration of load shedding schemes with mainstream protection in power system networks is vital. The traditional power system network incorporates different protection schemes to protect its components. Once the power network reaches its maximum limits, and the load demand continue to increase the whole system will experience power system instability. The system frequency usually drops due to the loss of substantial generation creating imbalance. The best method to recover the system from instability is by introducing an under-frequency load shedding (UFLS) scheme in parallel with the protection schemes. This paper proposed a new UFLS scheme used in power systems and industry to maintain stability. Three case studies were implemented in this paper. Multi-stage decision-making algorithms load shedding in the environment of the DIgSILENT power factory platform is developed. The proposed algorithm speeds-up the operation of the UFLS scheme. The load shedding algorithm of the proposed scheme is implemented as a systematic process to achieve stability of the power network which is exposed to different operating conditions. The flexibility of the proposed scheme is validated with the modified IEEE 39-bus New England model. The application of the proposed novel UFLS schemes will contribute further to the development of new types of engineers.
Volume: 10
Issue: 6
Page: 6071-6100
Publish at: 2020-12-01

Powerful processing to three-dimensional facial recognition using triple information

10.11591/ijaas.v9.i4.pp326-332
Mohammad Karimi Moridani , Ahad Karimi Moridani , Mahin Gholipour
Face Detection plays a crucial role in identifying individuals and criminals in Security, surveillance, and footwork control systems. Face Recognition in the human is superb, and pictures can be easily identified even after years of separation. These abilities also apply to changes in a facial expression such as age, glasses, beard, or little change in the face. This method is based on 150 three-dimensional images using the Bosphorus database of a high range laser scanner in a Bogaziçi University in Turkey. This paper presents powerful processing for face recognition based on a combination of the salient information and features of the face, such as eyes and nose, for the detection of three-dimensional figures identified through analysis of surface curvature. The Trinity of the nose and two eyes were selected for applying principal component analysis algorithm and support vector machine to revealing and classification the difference between face and non-face. The results with different facial expressions and extracted from different angles have indicated the efficiency of our powerful processing.
Volume: 9
Issue: 4
Page: 326-332
Publish at: 2020-12-01

A new swarm intelligence information technique for improving information balancedness on the skin lesions segmentation

10.11591/ijece.v10i6.pp5703-5708
H. J. Abd , Ahmad S. Abdullah , Muhammed Salah Sadiq Alkafaji
Methods of image processing can recognize the images of melanoma lesions border in addition to the disease compared to a skilled dermatologist. New swarm intelligence technique depends on meta-heuristic that is industrialized to resolve composite real problems which are problematic to explain by the available deterministic approaches. For an accurate detection of all segmentation and classification of skin lesions, some dealings should be measured which contain, contrast broadening, irregularity quantity, choice of most optimal features, and so into the world. The price essential for the action of progressive disease cases is identical high and the survival percentage is low. Many electronic dermoscopy classifications are advanced depend on the grouping of form, surface and dye features to facilitate premature analysis of malignance. To overcome this problematic, an effective prototypical for accurate boundary detection and arrangement is obtainable. The projected classical recovers the optimization segment of accuracy in its pre-processing stage, applying contrast improvement of lesion area compared to the contextual. In conclusion, optimized features are future fed into of artifical bee colony (ABC) segmentation. Wide-ranging researches have been supported out on four databases named as, ISBI (2016, 2017, 2018) and PH2. Also, the selection technique outclasses and successfully indifferent the dismissed features. The paper shows a different process for lesions optimal segmentation that could be functional to a variation of images with changed possessions and insufficiencies is planned with multistep pre-processing stage.
Volume: 10
Issue: 6
Page: 5703-5708
Publish at: 2020-12-01

Experimental results of vector control for an asynchronous machine

10.12928/telkomnika.v18i6.12707
Zineb; University of Abdelmalek Essaadi Mekrini , Seddik; Moulay Ismail University Bri , Jamal; Superior School of Technology Bouchnaif , Badre; Superior School of Technology Bossoufi
The aim of this article is contributeto the advanced vector control strategy of asynchronous machines. Analyzes of experimental of indirect field-oriented control are presented. In this context, we propose vector control algorithms to provide solutions to the disadvantages of field-oriented control FOC.The results obtained from various methods of determining the parameters for asynchronous machine are compared. We calculate the various parameters and then we present the technical characteristics of each element of the asynchronous machine; finally, we implement the vector control used asbasis of comparison between the simulation under Matlab/Simulink software and experiments. The simulation and experimental tests show that the proposed controller is suitable for medium and high-performance applications.
Volume: 18
Issue: 6
Page: 3285-3292
Publish at: 2020-12-01

Vehicle logo recognition using histograms of oriented gradient descriptor and sparsity score

10.12928/telkomnika.v18i6.16133
Kittikhun; Suan Sunandha Rajabhat University Meethongjan , Thongchai; Suan Sunandha Rajabhat University Surinwarangkoon , Vinh Truong; Ho Chi Minh City Open University Hoang
Most of vehicle have the similar structures and designs. It is extremely complicated and difficult to identify and classify vehicle brands based on their structure and shape. As we requirea quick and reliable response, so vehicle logos are an alternative method of determining the type of a vehicle. In this paper, we propose a method for vehicle logo recognition based on feature  selection method in a hybrid way. Vehicle logo images are first characterized by histograms of oriented gradient descriptors and the final features vector are then applied feature selection method to reduce the irrelevant information. Moreover, we release a new benchmark dataset for vehicle logo recognition and retrieval task namely, VLR-40. The experimental results are evaluated on this database which show the efficiency of the proposed approach.
Volume: 18
Issue: 6
Page: 3019-3025
Publish at: 2020-12-01

PID vs LQR controller for tilt rotor airplane

10.11591/ijece.v10i6.pp6309-6318
Aoued Houari , Imine Bachir , Della Krachai Mohamed , Mohamed Kara Mohamed
The main thematic of this paper is controlling the main manoeuvers of a tilt rotor UAV airplane in several modes such as vertical takeoff and landing, longitudinal translation and the most important phase which deal with the transition from the helicopter mode to the airplane mode and visversa based on a new actuators combination technique for specially the yaw motion with not referring to rotor speed control strategy which is used in controlling the attitude of a huge number of vehicles nowadays. This new actuator combination is inspired from that the transient response of a trirotor using tilting motion dynamics provides a faster response than using rotor speed dynamics. In the literature, a lot of control technics are used for stabilizing and guarantee the necessary manoeuvers for executing such task, a multiple Attitude and Altitude PID controllers were chosen for a simple linear model of our tilt rotor airplane in order to fulfill the desired trajectory, for reasons of complexity of our model the multiple PID controller doesnt take into consideration all the coupling that exists between the degrees of freedom in our model, so an LQR controller is adopted for more feasible solution of complex manoeuvering, the both controllers need linearization of the model for an easy implementation.
Volume: 10
Issue: 6
Page: 6309-6318
Publish at: 2020-12-01

An efficient data masking for securing medical data using DNA encoding and chaotic system

10.11591/ijece.v10i6.pp6008-6018
Siddartha B. K. , Ravikumar G. K.
Data security is utmost important for ubiquitous computing of medical/diagnostic data or images. Along with must consider preserving privacy of patients. Recently, deoxyribose nucleic acid (DNA) sequences and chaotic sequence are jointly used for building efficient data masking model. However, the state-of-art model are not robust against noise and cropping attack (CA). Since in existing model most digits of each pixel are not altered. This work present efficient data masking (EDM) method using chaos and DNA based encryption method for securing health care data. For overcoming research challenges effective bit scrambling method is required. Firstly, this work present an efficient bit scrambling using logistic sine map and pseudorandom sequence using chaotic system. Then, DNA substitution is performed among them to resist against differential attack (DA), statistical attack (SA) and CA. Experiment are conducted on standard considering diverse images. The outcome achieved shows proposed model efficient when compared to existing models.
Volume: 10
Issue: 6
Page: 6008-6018
Publish at: 2020-12-01

Space charge phenomena on low-density poly ethylene film breakdown under heavy water absorption

10.12928/telkomnika.v18i6.16537
Eka Putra; Universitas Andalas Waldi , Rudy; Universitas Andalas Fernandez , Yoshinobu; Toyohashi University of Technology Murakami , Naohiro; Toyohashi University of Technology Hozumi , Masayuki; Toyohashi University of Technology Nagao
The effect of dry and heavy water absorption on the electrical breakdown of low-density poly ethylene film was investigated. The temperature rise of the sample was observed by thermograph until the electrical breakdown using    direct current ramp voltage. The conduction current of low-density poly ethylene film was also measured, and the result was then correlated with thermograph measurement. Meanwhile, the space charge distribution in asample was measured by the pulse electro-acoustic method. From the thermograph, the result can be seen that under the heavy water absorption, the sample was more dissipated than the dry condition. Then, the breakdown occurs at the lower value of the voltage application, but the higher conduction current. Furthermore, the pulse electric acoustic show that increases the charge injection to the sample in the heavy water absorption. Increased space charges associated with an increase in the current conduction and the formation of heating, which results in a thermal breakdown.
Volume: 18
Issue: 6
Page: 3276-3284
Publish at: 2020-12-01

Reframing the effectiveness of feedback in improving teaching and learning achievement

10.11591/ijere.v9i4.20654
Anne Malar Selvaraj , Hazita Azman
Student feedback is established as an imperative learning and teaching technique, but feedback from students is less likely. The potential of feedback to boost learning outcomes refers to scholarly writing and is considered together as one of the most impressive methods for enhancing the success of students. In education, there is, nevertheless a lack of clarification about what feedback means and far less clarification on how one should interpret it. Feedback guides students to learn and supports them in order to achieve the aim of the lesson. The goal of this paper is to discuss teacherwritten reviews and obstacles to student feedback in order to recognise the usefulness of feedback in the education domain. Feedback from students illustrates the comprehensions, boundaries and features that knowledge should be compiled and employed to establish work or learning approach. The assessment study renders the appropriate feedback, and, in this manner, the students learn how to accomplish their learning goals. While feedback is not exclusively evaluated, these are the essential ingredients of making evaluation a mechanism for teachers’ and students’ future learning.
Volume: 9
Issue: 4
Page: 1055-1062
Publish at: 2020-12-01

Fuzzy logic control of hybrid systems including renewable energy in microgrids

10.11591/ijece.v10i6.pp5559-5569
Omar Feddaoui , Riad Toufouti , Labed Jamel , Salima Meziane
With a growing demand for more energy from subscribers, a traditional electric grid is unable to meet new challenges, in the remote areas remains the extension of the conventional electric network very hard to do make prohibitively expensive. Therefore, a new advanced generation of traditional electrical is inevitable and indispensable to move toward an efficient, economical, green, clean and self-correcting power system. The most well-known term used to define this next generation power system is Micro Grid (MG) based on renewable energy sources (RES). Since, the energy produced by RES are not constant at all times, a wide range of energy control techniques must be involved to provide a reliable power to consumers. To solve this problem in this paper we present a Fuzzy Logic Control of isolated Hybrid Systems (HRES) Including Renewable Energy in Micro-Grids to maintain a stability in voltage and frequency output especially in the standalone application. The considered HRES combine a wind turbine (WT) and photovoltaic (PV) panels as primary energy sources and an energy storage system (ESS) based on battery as a backup solution. Simulation results obtained from MATLAB/Simulink environment demonstrate the effectiveness of the proposed algorithm in decreasing the electricity bill of customer.
Volume: 10
Issue: 6
Page: 5559-5569
Publish at: 2020-12-01
Show 1046 of 1995

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration