Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,922 Article Results

A new dynamic speech encryption algorithm based on lorenz chaotic map over internet protocol

10.11591/ijece.v10i5.pp4824-4834
Obaida M. Al-hazaimeh
This paper introduces a dynamic speech encryption algorithm based on Lorenz chaotic map over internet protocol to enhance the services of the real-time applications such as increases the security level and reduces latency. The proposed algorithm was divided into two processes: dynamic key generation process using 128-bit hash value to dynamically alter the initial secret keys, and encryption and decryption process using Lorenz system. In the proposed algorithm, the performance evaluation is carried out through efficient simulations and implementations and statistical analysis. In addition, the average time delay in the proposed algorithm and some of the existing algorithms such as AES is compared. The obtained results concluded that, the proposed dynamic speech encryption algorithm is effectually secured against various cryptanalysis attacks and has useful cryptographic properties such as confusion and diffusion for better voice communication in the voice applications field in the Internet.
Volume: 10
Issue: 5
Page: 4824-4834
Publish at: 2020-10-01

A dynamic cruise control system (DCCS) for effective navigation system

10.11591/ijece.v10i5.pp4645-4654
T. Someswari , Anil Kumar Tiwari , Nagraj R
With the fast development of artificial intelligence, robotics, and embedded system along with sensor technologies, the speed control mechanism is required in various other applications such as automatic or self-piloting aircraft, auto-driven vehicles, auto driven lifts and much other robotics based automation plants, etc. For each unpredictable and progressed vehicular framework accompanies a better route that is fit for utilizing the two GPS and INS related sign. There have been a noteworthy number of research works being completed towards creating sliding mode control framework. In case of inaccurate navigational data or no availability of navigational service, the cruise control could also stop working. Hence, there is a need to evolve up with a novel system offering reliable and fault tolerant navigation system in order to minimize the dependencies on GPS-based information and maximize the utilization of INS based information. This manuscript presents a dynamic cruise control system to achieve better navigation under uncertainties. The performance of the system is analyzed by incorporating sliding mode and fuzzy logic and achieves better accuracy in tracking error, computational complexity (28 sec of simulation time) under chattering and switching action operation.
Volume: 10
Issue: 5
Page: 4645-4654
Publish at: 2020-10-01

Framework for reversible data hiding using cost-effective encoding system for video steganography

10.11591/ijece.v10i5.pp5487-5496
Manjunath Kamath K. , R. Sanjeev Kunte
Importances of reversible data hiding practices are always higher in contrast to any conventional data hiding schemes owing to its capability to generate distortion free cover media. Review of existing approaches on reversible data hiding approaches shows variable scheme mainly focussing on the embedding mechanism; however, such schemes could be furthermore improved using encoding scheme for optimal embedding performance. Therefore, the proposed manuscript discusses about a cost-effective scheme where a novel encoding scheme has been used with larger block sizes which reduces the dependencies over larger number of blocks. Further a gradient-based image registration technique is applied to ensure higher quality of the reconstructed signal over the decoding end. The study outcome shows that proposed data hiding technique is proven better than existing data hiding scheme with good balance between security and restored signal quality upon extraction of data.
Volume: 10
Issue: 5
Page: 5487-5496
Publish at: 2020-10-01

Data science for digital culture improvement in higher education using K-means clustering and text analytics

10.11591/ijece.v10i5.pp4569-4580
Dian Sa'adillah Maylawati , Tedi Priatna , Hamdan Sugilar , Muhammad Ali Ramdhani
This study aims to investigate the meaningful pattern that can be used to improve digital culture in higher education based on parameters of the technology acceptance model (TAM). The methodology used is the data mining technique with K-means algorithm and text analytics. The experiment using questionnaire data with 2887 respondents in Universitas Islam Negeri (UIN) Sunan Gunung Djati Bandung. The data analysis and clustering result show that the perceived usefulness and behavioral intention to use information systems are above the normal value, while the perceived ease of use and actual system use is quite low. Strengthened with text analytics, this research found that the EDA and K-means result in harmony with the hope or desire of academic society the information system implementation. This research also found how important the socialization and guidance of information systems, especially the new one information system, in order to improve digital culture in higher education.
Volume: 10
Issue: 5
Page: 4569-4580
Publish at: 2020-10-01

Design of an adaptive state feedback controller for a magnetic levitation system

10.11591/ijece.v10i5.pp4782-4788
Omar Waleed Abdulwahhab
This paper presents designing an adaptive state feedback controller (ASFC) for a magnetic levitation system (MLS), which is an unstable system and has high nonlinearity and represents a challenging control problem. First, a nonadaptive state feedback controller (SFC) is designed by linearization about a selected equilibrium point and designing a SFC by pole-placement method to achieve maximum overshoot of 1.5% and settling time of 1s (5% criterion). When the operating point changes, the designed controller can no longer achieve the design specifications, since it is designed based on a linearization about a different operating point. This gives rise to utilizing the adaptive control scheme to parameterize the state feedback controller in terms of the operating point. The results of the simulation show that the operating point has significant effect on the performance of nonadaptive SFC, and this performance may degrade as the operating point deviates from the equilibrium point, while the ASFC achieves the required design specification for any operating point and outperforms the state feedback controller from this point of view.
Volume: 10
Issue: 5
Page: 4782-4788
Publish at: 2020-10-01

The application of double-layer remote phosphor structures in increasing WLEDs color rendering index and lumen output

10.11591/ijece.v10i5.pp5183-5190
Nguyen Thi Phuong Loan , Nguyen Doan Quoc Anh
The remote phosphor structure often has inferior color quality but better luminous flux in than conformal or in-cup configurations. Therefore, numerous researches study remote phosphor structure for methods to enhance it chromatic quality. This study introduces the use of dual-layer remote phosphor structure in WLEDs with identical structure but at different color temperature, 6600K and 7700K, to demonstrate their effect on quality indicators. The concept is placing a green phosphor layer (Ce,Tb)MgAl11O19:Ce:Tb or a red phosphor layer MgSr3Si2O8:Eu2+,Mn2+ on the layer of yellow-emitting phosphor YAG:Ce3+ and find the suitable concentration of the additional phosphor to create the best color quality. The results showed that the increase of CRI and CQS are affected by MgSr3Si2O8:Eu2+,Mn2+, in particular, the higher the concentration of red phosphor gets the better CRI and CQS because the emitted red light in enhanced. The green phosphor layer (Ce,Tb)MgAl11O19:Ce:Tb, on the other hand, is beneficial for the luminous flux. The concentration of MgSr3Si2O8:Eu2+,Mn2+ and (Ce,Tb)MgAl11O19:Ce:Tb, however, need to be adjusted properly to avoid decreasing the luminous flux due to overgrowth. The Mie scattering theory and Beer’s law are the verification tools for these conclusions, which gives them the credibility to be applied in producing better quality WLEDs.
Volume: 10
Issue: 5
Page: 5183-5190
Publish at: 2020-10-01

An optimise ELM by league championship algorithm based on food images

10.11591/ijeecs.v20.i1.pp132-137
Salwa Khalid Abdulateef , Taj-Aldeen Naser Abdali , Mohanad Dawood Salman Alroomi , Mohamed Aktham Ahmed Altaha
This paper presents an optimisation of extreme learning machine by league championship algorithm based on food images. extreme learning machine (ELM) is an effective classifier because of the performance which is higher than other classifiers’ aspects. However, some important drawbacks still work as a hindrance like failure of optimal selection weights for the weights of the input-hidden layer and the output of the threshold. In spite of the wide number of problem-solving attempts, there was no solution to be considered effective. This paper presents the approach of hybrid learning and the League Championship Algorithm is used by for the purpose of selecting the input weights and the thresholds outputs. The experimental outcomes showed that the performance of proposed technique is superior as compared according to different scenarios of the measures to benchmark. The proposed method has achieved an overall accuracy of 95% for UEC food 100 dataset and 94% for UEC food 256 dataset comparing with 94% and 80% for baseline approaches.
Volume: 20
Issue: 1
Page: 132-137
Publish at: 2020-10-01

Low-cost and portable automatic sheet cutter

10.11591/ijece.v10i5.pp5139-5146
Mohd Syafiq Mispan , Ahmad Hafizzudin Mustafa , Hafez Sarkawi , Aiman Zakwan Jidin
Process automation is crucial to increase productivity, more efficient use of materials, better product quality, improved safety, etc. In small-medium enterprise (SME) businesses related to household retailing, one of the process automation needed is the measurement and cutting of the mat or sheet, made of rubber or polyvinyl chloride (PVC) materials. Most of the household retailers that selling the sheet, the process of measuring and cutting according to the customer’s requirements are manually performed using a measuring tape and scissors. These manual processes can cause inaccuracy in length, inefficient use of material, low productivity and reduce product quality. This paper presents a low cost and portable automatic sheet cutter using the Arduino development board, which is used to control the process of measuring and cutting the materials. The system uses a push-button where the user can set the required length and quantity of the sheet. Once the required information is set, the stepper motor rolls the sheet until the required length is satisfied. Subsequently, another stepper motor moves the cutter horizontally and cut the sheet. With the automatic sheet cutter, the material is cut with acceptable precision. The design of the automatic sheet cutter is low cost and portable which significantly suitable to be used by SME household retailers.
Volume: 10
Issue: 5
Page: 5139-5146
Publish at: 2020-10-01

An adaptive anomaly request detection framework based on dynamic web application profiles

10.11591/ijece.v10i5.pp5335-5346
Cho Do Xuan , Nam Nguyen , Hoa Nguyen Dinh
Web application firewall is a highly effective application in protecting the application layer and database layer of websites from attack access. This paper proposes a new web application firewall deploying method based on Dynamic Web application profiling (DWAP) analysis technique. This is a method to deploy a firewall based on analyzing website access data. DWAP is improved to integrate deeply into the structure of the website to increase the compatibility of the anomaly detection system into each website, thereby improving the ability to detect abnormal requests. To improve the compatibility of the web application firewall with protected objects, the proposed system consists of two parts with the main tasks are: i) Detect abnormal access in web application (WA) access; ii) Semi-automatic update the attack data to the abnormal access detection system during WA access. This new method is applicable in real-time detection systems where updating of new attack data is essential since web attacks are increasingly complex and sophisticated.
Volume: 10
Issue: 5
Page: 5335-5346
Publish at: 2020-10-01

Energy-aware strategy for data forwarding in IoT ecosystem

10.11591/ijece.v10i5.pp4863-4871
K. Nagarathna
The Internet of Things (IoT) is looming technology rapidly attracting many industries and drawing research attention. Although the scale of IoT-applications is very large, the capabilities of the IoT-devices are limited, especially in terms of energy. However, various research works have been done to alleviate these shortcomings, but the schemes introduced in the literature are complex and difficult to implement in practical scenarios. Therefore, considering the energy consumption of heterogeneous nodes in IoT eco-system, a simple energy-efficient routing technique is proposed. The proposed system has also employed an SDN controller that acts as a centralized manager to control and monitor network services, there by restricting the access of selfish nodes to the network. The proposed system constructs an analytical algorithm that provides reliable data transmission operations and controls energy consumption using a strategic mechanism where the path selection process is performed based on the remaining energy of adjacent nodes located in the direction of the destination node. The proposed energy-efficient data forwarding mechanism is compared with the existing AODV routing technique. The simulation result demonstrates that the protocol is superior to AODV in terms of packet delivery rate, throughput, and end-to-end delay.
Volume: 10
Issue: 5
Page: 4863-4871
Publish at: 2020-10-01

The impact of firewall on TCP and UDP throughput in an openflow software defined network

10.11591/ijeecs.v20.i1.pp256-263
Mutaz Hamed Hussien Khairi , Sharifah H. S. Ariffin , N. M. Abdul Latiff , Kamaludin Mohamad Yusof , M. K. Hassan , Mohammad Rava
Software defined networking (SDN) is an emerging networking paradigm that provides more flexibility and adaptability in terms of network definition and control. However, SDN is a logically centralized technology. Therefor the control plane (i.e. controller) scalability in SDN in particular, is also one of the problems that needs further focus. OpenFlow is one of the protocol standards in SDN, which allow the separation of the controller from the forwarding plane. The control plane has an SDN embedded firewall and is able to enforce and monitor the network activity. This firewall can be used to control the throughput. However, it may affect SDN performance. In this paper, throughput will be used as a performance metric to evaluate and assess the firewall impact on two protocols; transmission control protocol (TCP) and user datagram protocol (UDP) that passes through the forwarding planes. The evaluations have been verified through simulating the SDN OpenFlow network using MININET. The results show that an implementation of firewall module in SDN creates a significant 36% average drop for TCP and 87% average drop for UDP in the bandwidth which eventually affect the quality of the network and applications.
Volume: 20
Issue: 1
Page: 256-263
Publish at: 2020-10-01

Image encryption scheme in public key cryptography based on cubic pells quadratic case

10.11591/ijeecs.v20.i1.pp385-394
Raghunandan K. R. , Ganesh Aithal , Surendra Shetty , Bhavya K.
Cryptography systems face new threats with the transformation of time and technology. Each innovation tries to contest challenges posed by the previous system by analyzing approaches that are able to provide impressive outcomes. The prime aim of this work is to urge ways in which the concept of Pell’s equation can be used in Public key Cryptography techniques.The main aim of this approach is secure and can be computed very fast. Using Cubic Pell’s equation defined in Quadratic Case, a secure public key technique for Key generation process is showcased. The paper highlights that a key generation time of proposed scheme using Pell’s Quadratic case equation is fast compared to existing methods.The strength and quality  of the proposed method is proved and analyzed by obtaining the results of entropy, differential analysis, correlation analysis and avalanche effect. The superiority of the proposed method over the conventional AES and DES is confirmed by a 50% increase in the execution speed and shows that Standard diviation and Entropy analysis of proposed scheme gives immunity to guess the encryption key and also it is hard to deduce the private key from public key using  Diffrential analysis.
Volume: 20
Issue: 1
Page: 385-394
Publish at: 2020-10-01

A coplanar waveguide tapered slot antenna with beam switching capabilities

10.11591/ijeecs.v20.i1.pp275-280
Delphine Abijuru , M. R. Hamid , N. Seman , M. Himdi
A wideband tapered slot antenna (TSA) with three radiating elements for beam switching purpose is proposed in this study. The integrated radiating taper slots in assistance with metal strips acting as switches provided the proposed design with the capability of switching its beam into three different directions while maintaining the antenna performance stable. To validate the accuracy of the proposed design, the prototype was fabricated and measurements were conducted in terms of reflection coefficient (S11), radiation pattern and realized gain towards the three different operating modes. By sequentially, activating the switches, the antenna main beam rotated 90º in the XY coordinates. A realized gain ranging from 4.3 to 6.4 dBi and a wide operating bandwidth (|S11| ≤-10dB) from 3.3 GHz to 5 GHz  were observed throughout the antenna performance in simulation as well as in experiment. With the covered bands, the proposed antenna can be suitable for Sub -6GHz wireless communications systems. Improvements of Trapezoid Antenna Gain using Artificial Magnetic Conductor and Frequency Selective Surface.
Volume: 20
Issue: 1
Page: 275-280
Publish at: 2020-10-01

An efficient hybrid model for secure transmission of data by using efficient data collection and dissemination (EDCD) algorithm based WSN

10.11591/ijeecs.v20.i1.pp545-551
Mustafa Mahmood Akawee , Mohanad Ali Meteab Al-Obaidi , Haider Mohammed Turki Al-Hilfi , Sabbar Insaif Jassim , Tole Sutikno
Wireless sensor network (WSN) is one of the most important elements of the Internet of Things paradigm. Energy consumption is a vital issue in IoT and WSN.  Security primitives in the IoT are energy consuming. Addressed the security issue for transmitted data by IoT sensor node add another challenge in term of energy consumption. finding the satisfactory solutions that reduce power consumption at the same time as making sure the required security services is not always an easy undertaking. Therefore, in this article, we proposed an efficient hybrid model for secure transmission of data from sensor nodes to receivers in WSN applications.  The proposed model includes two algorithms rivest–shamir–adleman (RSA) and efficient data collection and dissemination (EDCD). The key idea behind the proposed model is to prevent to secure sensed data if no significant change between the current data and the last transmitted data by the apply EDCD1 algorithm, which that will help in saving the sensor node energy. The reason for that the size of cipher data is so large compared to the sensed data, which that will increase the energy consumption.  The outcome results shown that the proposed model has a high performance compared to RSA in term of energy consumption.
Volume: 20
Issue: 1
Page: 545-551
Publish at: 2020-10-01

Measuring perceptions of students toward game and recreational activity using fuzzy conjoint analysis

10.11591/ijeecs.v20.i1.pp395-404
Siti Siryani Sofian , Azmin Sham Rambely
The effectiveness of game and recreational activity (GaRA) can be determined from the application of fuzzy conjoint analysis (FCA). The analysis was used due to fuzziness in determining individual perceptions. This study involved a survey collected from 1494 students who participated in a Mathematics Discovery Camp organized by a UKM research group. The aim of this research is to determine the effectiveness of modules delivered to cultivate affection and confidence in Mathematics through different factors. There were 11 games conducted for the participants, and their perceptions based on the evaluation of six attributes were measured. A seven-point Likert scale method representing seven linguistic terms was used to collect students’ preferences to indicate their perceptions of each GaRA module. Scores of perceptions were transformed into degrees of similarity. Results found that interest, effort and team work were the strongest values obtained from GaRA as participants strongly agreed that these attributes fulfilled their preferences in most module. The evaluation using fuzzy conjoint model implicated the successfulness of a fuzzy approach to evaluate fuzziness obtained in the Likert-scale, and has shown its ability in ranking the attributes from most preferred to least preferred.
Volume: 20
Issue: 1
Page: 395-404
Publish at: 2020-10-01
Show 1065 of 1995

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration