Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,922 Article Results

Three-wavelength system for practical application in skin oximetry: simultaneous equations with prediction-correction approach

10.11591/ijeecs.v19.i2.pp793-801
Audrey Huong , W. Mahani Hafizah W. Mahmud , Xavier Ngu
This paper presented the use of a three-wavelength system coupled with a prediction-correction model for the measurement of a person’s tissue oxygen levels and in the efforts towards the development of a field-portable system. This study considered light wavelength of market-available emitters in the range 500 − 650 nm for its practical implementation. This approach required the use of light attenuation and hemoglobin absorptivity information of three different wavelengths in determining tissue oxygen saturation value, StO2. It was found through the analysis of results using Monte Carlo method that considerable improvement in the accuracy of the predictions was obtained using the corrective models (ρ =0.874). The low mean prediction errors of similar magnitude, not exceeding 4 %, given by two wavelength combinations 538, 560, 633 nm and 538, 560, 650 nm were observed for signals with signal-noise ratio (SNR) of down to 30 dB. A significant statistical difference was found between the prediction errors and the wavelength combination used under this noise condition (ρ =0.011). This work concluded that the findings of this study provide insights into technology implementation of skin oximetry and the possible impacts it might have in medical arena.
Volume: 19
Issue: 2
Page: 793-801
Publish at: 2020-08-01

Enhancenig OLSR routing protocol using K-means clustering in MANETs

10.11591/ijece.v10i4.pp3715-3724
Y. Hamzaoui , M. Amnai , A. Choukri , Y. Fakhri
The design of robust routing protocol schemes for MANETs is quite complex, due to the characteristics and structural constraints of this network. A numerous variety of protocol schemes have been proposed in literature. Most of them are based on traditional method of routing, which doesn’t guarantee basic levels of Qos, when the network becomes larger, denser and dynamic. To solve this problem we use one of the most popular methods named clustering. In this work we try to improve the Qos in MANETs. We propose an algorithm of clustering based in the new mobility metric and K-Means method to distribute the nodes into several clusters; it is implemented to standard OLSR protocol giving birth a new protocol named OLSR Kmeans-SDE. The simulations showed that the results obtained by OLSR Kmeans-SDE exceed those obtained by standard OLSR Kmeans and OLSR Kmed+ in terms of, traffic Control, delay and packet delivery ratio.
Volume: 10
Issue: 4
Page: 3715-3724
Publish at: 2020-08-01

Predicting depression using deep learning and ensemble algorithms on raw twitter data

10.11591/ijece.v10i4.pp3751-3756
Nisha P. Shetty , Balachandra Muniyal , Arshia Anand , Sushant Kumar , Sushant Prabhu
Social network and microblogging sites such as Twitter are widespread amongst all generations nowadays where people connect and share their feelings, emotions, pursuits etc. Depression, one of the most common mental disorder, is an acute state of sadness where person loses interest in all activities. If not treated immediately this can result in dire consequences such as death. In this era of virtual world, people are more comfortable in expressing their emotions in such sites as they have become a part and parcel of everyday lives. The research put forth thus, employs machine learning classifiers on the twitter data set to detect if a person’s tweet indicates any sign of depression or not.
Volume: 10
Issue: 4
Page: 3751-3756
Publish at: 2020-08-01

Multi-level cyber security system for VANET

10.11591/ijeecs.v19.i2.pp940-948
Muntadher Naeem Yasir , Muayad Sadik Croock
Recently, the cyber security of vehicular ad-hoc network (VANET) including two practicable: car-to-car and car-to-infrastructure has been considered due to importance. It has become possible to keep pace with the development in the world, where the safety of people is a priority in the development of technology in general and in particular in the field of VANET. In this paper, a cyber security system for VANET has been proposed to tackle the DOS attacks. The proposed system includes three security levels. Firstly, the registeration level that ask vehicles to be registered in the system, in which the network exclude the unrigestered ones. Secondly, the authentication level that checks the vehicles before joining the network. This is done by applying a proposed algorithm that considers the hash function and factory number. Thirdly, the proposed system ables to detect the DOS attack by any involved vehicle using the monitoring algorithm that allocate such vehicle to be excluded from the network. The obtained results show the efficient performance of the proposed system in managing the security of the VANET network. The multi-level system increases the security of the network, in which the attacks can be eliminated.
Volume: 19
Issue: 2
Page: 940-948
Publish at: 2020-08-01

Vertical intent prediction approach based on Doc2vec and convolutional neural networks for improving vertical selection in aggregated search

10.11591/ijece.v10i4.pp3869-3882
Sanae Achsas , El Habib Nfaoui
Vertical selection is the task of selecting the most relevant verticals to a given query in order to improve the diversity and quality of web search results. This task requires not only predicting relevant verticals but also these verticals must be those the user expects to be relevant for his particular information need. Most existing works focused on using traditional machine learning techniques to combine multiple types of features for selecting several relevant verticals. Although these techniques are very efficient, handling vertical selection with high accuracy is still a challenging research task. In this paper, we propose an approach for improving vertical selection in order to satisfy the user vertical intent and reduce user’s browsing time and efforts. First, it generates query embeddings vectors using the doc2vec algorithm that preserves syntactic and semantic information within each query. Secondly, this vector will be used as input to a convolutional neural network model for increasing the representation of the query with multiple levels of abstraction including rich semantic information and then creating a global summarization of the query features. We demonstrate the effectiveness of our approach through comprehensive experimentation using various datasets. Our experimental findings show that our system achieves significant accuracy. Further, it realizes accurate predictions on new unseen data.
Volume: 10
Issue: 4
Page: 3869-3882
Publish at: 2020-08-01

Analysis of a framework implementation of the transceiver performances for integrating optical technologies and wireless LAN based on OFDM-RoF

10.11591/ijece.v10i4.pp4252-4260
Adnan Hussein Ali , Alaa Desher Farhood , Maham Kamil Naji
The greatest advantages of optical fibers are the possibility of extending data rate transmission and propagation distances. Being a multi-carrier technique, the orthogonal frequency division multiplexing (OFDM) can be applicable in hybrid optical-wireless systems design owing to its best spectral efficiency for the interferences of radio frequency (RF) and minor multi-path distortion. An optical OFDM-RoF-based wireless local area network (W-LAN) system has been studied and evaluated in this work. The outline for integrating an optical technology and wireless in a single system was provided with the existence of OFDM-RoF technology and the microstrip patch antenna; these were applied in the Optisystem communication tool. The design of the proposed OFDM-RoF system is aimed at supporting mm-wave services and multi-standard operations. The proposed system can operate on different RF bands using different modulation schemes like 4,16 and 64QAM, that may be associated to OFDM and multidata rates up to 5 Gbps. The results demonstrate the robustness of the integrated optical wireless link in propagating OFDM-RoF-based WLAN signals across optical fibers.
Volume: 10
Issue: 4
Page: 4252-4260
Publish at: 2020-08-01

Exploration of the best performance method of emotions classification for arabic tweets

10.11591/ijeecs.v19.i2.pp1010-1020
Mohammed Abdullah Al-Hagery , Manar Abdullah Al-assaf , Faiza Mohammad Al-kharboush
Arab users of social media have significantly increased, thus increasing the opportunities for extracting knowledge from various areas of life such as trade, education, psychological health services, etc. The active Arab presence on Twitter motivates many researchers to classify and analysis Arabic tweets from numerous aspects. This study aimed to explore the best performance scenarios in the classification of emotions conveyed through Arabic tweets. Hence, various experiments were conducted to investigate the effects of feature extraction techniques and the N-gram model on the performance of three supervised machine learning algorithms, which are support vector machine (SVM), naïve bayes (NB), and logistic regression (LR). The general method of the experiments was based on five steps; data collection, preprocessing, feature extraction, emotion classification, and evaluation of results. To implement these experiments, a real-world Twitter dataset was gathered. The best result achieved by the SVM classifier when using a bag of words (BoW) weighting schema (with unigrams and bigrams or with unigrams, bigrams, and trigrams) exceeded the best performance results of other algorithms.
Volume: 19
Issue: 2
Page: 1010-1020
Publish at: 2020-08-01

A new quasi-newton equation on the gradient methods for optimization minimization problem

10.11591/ijeecs.v19.i2.pp737-744
Basim Abbas Hassan , Ghada M. Al-Naemi
The quasi-Newton equation is the very foundation of an assortment of the quasi-Newton methods for optimization minimization problem. In this paper, we deriving a new quasi-Newton equation based on the second-order Taylor’s series expansion. The global convergence is established underneath suitable conditions and numerical results are reported to show that the given algorithm is more effective than those of the normal BFGS method.
Volume: 19
Issue: 2
Page: 737-744
Publish at: 2020-08-01

Loss allocation in distribution networks with distributed generators undergoing network reconfiguration

10.11591/ijece.v10i4.pp3375-3383
Ambika Prasad Hota , Sivkumar Mishra
In this paper, a branch exchange based heuristic network reconfiguration method is proposed for obtaining an optimal network in a deregulated power system. A unique bus identification scheme is employed which makes the load flow and loss calculation faster due to its reduced search time under varying network topological environment. The proposed power loss allocation technique eliminates the effect of cross-term analytically from the loss formulation without any assumptions and approximations. The effectiveness of the proposed reconfiguration and loss allocation methods are investigated by comparing the results obtained by the present approach with that of the existing “Quadratic method” using a 33-bus radial distribution system with/without DGs.
Volume: 10
Issue: 4
Page: 3375-3383
Publish at: 2020-08-01

Self-checking method for fault tolerance solution in wireless sensor network

10.11591/ijece.v10i4.pp4416-4425
Muayad Sadik Croock , Saja Dhyaa Khuder , Zahraa Abbas Hassan
Recently, the wireless sensor network (WSN) has been considered in different application, particularly in emergency systems. Therefore, it is important to keep these networks in high reliability using software engineering techniques in the field of fault tolerance. This paper proposed a fault node detection method in WSN using the self-checking technique according to the rules of software engineering. Then, the detected faulted node is covered employing the reading of nearest neighbor nodes (sensors). In addition, the proposed method sends a message for maintenance to solve the fault. The proposed method can reduce the time between the detection and recovery of a fault to prevent the confusion of adopting wrong readings, in which the detection is making with mistake. Moreover, it guarantees the reliability of the WSN, in terms of operation and data transmission. The proposed method has been tested over different scenarios and the obtained results show the superior efficiency in terms of recovery, reliability, and continuous data transmission.
Volume: 10
Issue: 4
Page: 4416-4425
Publish at: 2020-08-01

The effect of recovery satisfaction on citizens loyalty perception: a case study of mobile government services

10.11591/ijece.v10i4.pp4279-4295
Ibrahim Almarashdeh
Use of mobile services is an integral part of today’s life. Organizations, government agencies as well as service providers in the market employ mobile services or application in reaching their citizens or users worldwide. Notably, service failure issues might frustrate users in using mobile service, but usually, service providers would employ the strategy of recovery as solution. Recovery strategy aims to sustain the relationship with users following service failure. Somehow, the factors that might impact recovery process are unclear. It is also unclear if users will use the service again following the completion of recovery process. Hence, in this study, a survey on 743 adults was carried out, and the data were analyzed using SEM to determine the factors that impact users’ recovery satisfaction the most and the impact of recovery satisfaction on citizens loyalty to use mobile government in the future. The finding of this study illustrated that expect of self-efficacy, all factors proposed in the research model found to has a significant impact on recovery satisfaction. Among all the supported hypothesis, the highest impact on recovery satisfaction comes from perceived trust in government as the initial predictor to use the service
Volume: 10
Issue: 4
Page: 4279-4295
Publish at: 2020-08-01

Texture classification of fabric defects using machine learning

10.11591/ijece.v10i4.pp4390-4399
Yassine Ben Salem , Mohamed Naceur Abdelkrim
In this paper, a novel algorithm for automatic fabric defect classification was proposed, based on the combination of a texture analysis method and a support vector machine SVM. Three texture methods were used and compared, GLCM, LBP, and LPQ. They were combined with SVM’s classifier. The system has been tested using TILDA database. A comparative study of the performance and the running time of the three methods was carried out. The obtained results are interesting and show that LBP is the best method for recognition and classification and it proves that the SVM is a suitable classifier for such problems. We demonstrate that some defects are easier to classify than others.
Volume: 10
Issue: 4
Page: 4390-4399
Publish at: 2020-08-01

Dynamic routing discovery scheme for high mobility in mobile ad hoc wireless networks

10.11591/ijece.v10i4.pp3702-3714
Haider Alani , Maha Abdelhaq , Raed Alsaqour
An innovative technology that is widely used in many applications is the Mobile Ad-hoc Network (MANET). Discovery and maintenance of routes at MANET are important issues. Within MANET, broadcasting is used to discover a path within on-demand routing protocols. Establishing and maintaining a route periodically among the nodes is the challenge that requires the transmitting of control packets across a network. This state leads to the issue of broadcasting storms. Broadcasting control packets increase control packets overhead and decrease network performance. In this paper, we proposed a scheme called AODV-Velocity and Dynamic (AODV-VD) for effective broadcast control packets. The routing protocol for the ad-hoc on-demand distance victor (AODV) is used to implement the proposed AODV-VD scheme. AODV-VD scheme reduces both the excessive route discovery control packets and network overhead. Network simulator version 2.35 (NS2.35) was used to compare the proposed AODV-VD scheme to the AODV routing protocol in terms of end-to-end latency, average throughput, packet transmission ratio and overhead ratio.
Volume: 10
Issue: 4
Page: 3702-3714
Publish at: 2020-08-01

Formalization of SOA concepts with mathematical foundation

10.11591/ijece.v10i4.pp3883-3888
Asha H. V. , Shantharam Nayak , Annamma Abraham
With the development of the IT industry, agility and dynamicity are the two expected characteristics from any business enterprise. Service oriented architecture (SOA) is emerging as a promising approach aiming to address the current trends/needs of enterprise business applications. The current work aims at giving an overview of the conceptual model of SOA based on set theory approach. Also, it posits mathematical definitions for service, logical service, environment service and application definition with the help of general systems theory and mathematical foundation. With the help of mathematical model, the definition and functionality of services enhances SOA principles which can be used efficiently in integrating heterogeneous components.
Volume: 10
Issue: 4
Page: 3883-3888
Publish at: 2020-08-01

Phenomenological model of information operation in social networking services

10.11591/ijeecs.v19.i2.pp1078-1087
Kateryna Molodetska , Yuriy Tymonin , Oleksandr Markovets , Andrii Melnychyn
In modern conditions, social networking services have become the users’ leading channel of communication, which are called actors. Therefore, social networking services are used by intruders to gain benefits in the information space of virtual communities for further influence on political and social processes in the state. In the article the phenomenological model of information operation in social networking services is developed. The model allows to take into account the processes of development of social networking services through the formation of new relationships between actors and the formation of virtual communities. At the same time, behind the model are the processes of degradation of social networking services that are associated with the dissipation of content. The developed model is used for experimental research of real information operation in social networking services. The obtained results will increase the efficiency and effectiveness of counteracting the threats to information security of the state in social networking services by the relevant departments.
Volume: 19
Issue: 2
Page: 1078-1087
Publish at: 2020-08-01
Show 1096 of 1995

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration