Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,922 Article Results

Random forest application on cognitive level classification of E-learning content

10.11591/ijece.v10i4.pp4372-4380
Benny Thomas , Chandra J.
The e-learning is the primary method of learning for most learners after the regular academics studies. The knowledge delivery through e-learning technologies increased exponentially over the years because of the advancement in internet and e-learning technologies. Knowledge delivery to some people would never have been possible without the e-learning technologies. Most of the working professional do focused studies for carrier advancement, promotion or to improve the domain knowledge. These learner can find many free e-learning web sites from the internet easily in the domain of interest. However it is quite difficult to find the best e-learning content suitable for their learning based on their domain knowledge level. User spent most of the time figuring out the right content from a plethora of available content and end up learning nothing. An intelligent framework using machine learning algorithms with Random Forest Classifier is proposed to address this issue, which classifies the e-learning content based on its difficulty levels and provide the learner the best content suitable based on the knowledge level .The frame work is trained with the data set collected from multiple popular e-learning web sites. The model is tested with real time e-learning web sites links and found that the e-contents in the web sites are recommended to the user based on its difficulty levels as beginner level, intermediate level and advanced level.
Volume: 10
Issue: 4
Page: 4372-4380
Publish at: 2020-08-01

Performance enhancement of DC/DC converters for solar powered EV

10.11591/ijece.v10i4.pp3423-3430
Nagaraj S. , Ranihemamalini R. , Rajaji L.
The paper initially presents the essential drive arrangement required for electric vehicle. It requests high power bidirectional stream ability, with wide info voltage range, and yield voltage of vitality stockpiling gadgets, for example, super capacitors or batteries shift with the adjustment in stack. At that point the tenacity and outline of previously mentioned converter is proposed in this paper. The converter which relates a half extension topology, has high power stream ability and least gadget focuses on that can appropriately interface a super capacitor with the drive prepare of a crossover electric vehicle. Besides, by contrasting the fundamental qualities and applications with some ordinary bidirectional DC/DC converter, the proposed converter has low gadget rating and can be controlled by obligation cycle and stage move. Finally, the most essential attributes of this converter is that it utilizes the transformer spillage inductance as the essential vitality exchange component and control parameters, Simulation waveforms in light of MATLAB recreation are given to exhibit the integrity of this novel topology, and this converter is additionally reasonable for high power application, specifically to control the charge-release of super capacitors or batteries that can be utilized as a part of cross breed solar based electric vehicle.
Volume: 10
Issue: 4
Page: 3423-3430
Publish at: 2020-08-01

The students’ acceptance of learning management systems in Saudi Arabian Universities

10.11591/ijece.v10i4.pp4155-4161
Mutasem K. Alsmadi
For distance learners, continuous official education is very important for improving knowledge and learning experience in order to meet the career challenges in the modern world. This work studies the success factors which affect the use of LMS and evaluates the ability to apply the proposed model in the field of distance learning (DL) particularly in higher education. The survey was carried out on higher education learners who were included in the DL instructions. This work has utilized a questionnaire that was modified from literature to inspect three measurements, system design, system usage, and system outcome. Utilizing the obtained survey data for students of DL (N=149), the path analysis discovered that the design of the system has a significant effect on the satisfaction of users and intention for using LMS which affects the use of the system. Consequently, the satisfaction of users and the system used has a great impact on the net benefit.
Volume: 10
Issue: 4
Page: 4155-4161
Publish at: 2020-08-01

A new variants of quasi-newton equation based on the quadratic function for unconstrained optimization

10.11591/ijeecs.v19.i2.pp701-708
Basim Abbas Hassan , Mohammed W. Taha
The focus for quasi-Newton methods is the quasi-Newton equation. A new quasi-Newton equation is derived for quadratic function. Then, based on this new quasi-Newton equation, a new quasi-Newton updating formulas are presented. Under appropriate conditions, it is shown that the proposed method is globally convergent. Finally, some numerical experiments are reported which verifies the effectiveness of the new method.
Volume: 19
Issue: 2
Page: 701-708
Publish at: 2020-08-01

Evaluation of phase-frequency instability when processing complex radar signals

10.11591/ijece.v10i4.pp4226-4236
Juliy Boiko , Lesya Karpova , Oleksander Eromenko , Yevhen Havrylko
A new radar system for digital signal processing before detection is proposed. These are the guidelines for selecting an intermediate frequency for signal processing. The features of signal processing in the case of echo-signal selection by the features of the correlation properties of their complex bypass are described. This paper presents the study of ambiguity function (AF) when processing complex radar signals. In this work, the AF synthesis was performed considering non-determined components and the presence of phase-frequency instability. The received result enhances the potentials for distinguishing an incoherent radar signal. The numerical simulation results of received AF are presented. Considering fluctuation components in the complex AF, depending on the laws of the distribution of amplitude and frequency fluctuations and their parameters, allowed to get the gain in the width of the main lobe from the units to tens of times. Paper represents original analytical expressions for AF of radio-signals modulated by narrow band random processes with various distribution laws.
Volume: 10
Issue: 4
Page: 4226-4236
Publish at: 2020-08-01

An analytic hierarchy process for quality action researches in education

10.11591/ijere.v9i3.20626
Alvin Bersabal Barcelona
Teachers are expected to engage in the praxis of educational reform, and one of the resurgent interests in the field of education is the conduct of action researches. In the Philippines and in many parts of the world, teachers are encouraged to perpetuate a culture of conducting action researches to improve the teaching and learning process. Considering the scant literature towards evaluation criteria for quality action researches, this exploratory-sequential mixed method study aims to determine the qualities that research experts perceive to be useful in evaluating action researches. Using Analytic Hierarchy Process, which is a multiple decision-making algorithm, research experts asserted that among the identified evaluation criteria, quality action researches should underscore its contribution to theory and practice, and require actionability and reflexivity among researchers and participants. The findings of this study may be of considerable interest and use to teachers, research authorities, and organizations who would like to ensure that teachers produce quality action research to improve educational practices.
Volume: 9
Issue: 3
Page: 517-523
Publish at: 2020-08-01

Multi-stage secure clusterhead selection using discrete rule-set against unknown attacks in wireless sensor network

10.11591/ijece.v10i4.pp4296-4304
Tejashwini N. , D. R. Shashi Kumar , K. Satyanarayana Reddy
Security is the rising concern of the wireless network as there are various forms of reonfigurable network that is arised from it. Wireless sensor network (WSN) is one such example that is found to be an integral part of cyber-physical system in upcoming times. After reviewing the existing system, it can be seen that there are less dominant and robust solutions towards mitigating the threats of upcoming applications of WSN. Therefore, this paper introduces a simple and cost-effective modelling of a security system that offers security by ensuring secure selection of clusterhead during the data aggregation process in WSN. The proposed system also makes construct a rule-set in order to learn the nature of the communication iin order to have a discrete knowledge about the intensity of adversaries. With an aid of simulation-based approach over MEMSIC nodes, the proposed system was proven to offer reduced energy consumption with good data delivery performance in contrast to existing approach.
Volume: 10
Issue: 4
Page: 4296-4304
Publish at: 2020-08-01

Deep-learning based single object tracker for night surveillance

10.11591/ijece.v10i4.pp3576-3587
Zulaikha Kadim , Mohd Asyraf Zulkifley , Nabilah Hamzah
Tracking an object in night surveillance video is a challenging task as the quality of the captured image is normally poor with low brightness and contrast. The task becomes harder for a small object as fewer features are apparent. Traditional approach is based on improving the image quality before tracking is performed. In this paper, a single object tracking algorithm based on deep-learning approach is proposed to exploit its outstanding capability of modelling object’s appearance even during night. The algorithm uses pre-trained convolutional neural networks coupled with fully connected layers, which are trained online during the tracking so that it is able to cater for appearance changes as the object moves around. Various learning hyperparameters for the optimization function, learning rate and ratio of training samples are tested to find optimal setup for tracking in night scenarios. Fourteen night surveillance videos are collected for validation purpose, which are captured from three viewing angles. The results show that the best accuracy is obtained by using Adam optimizer with learning rate of 0.00075 and sampling ratio of 2:1 for positive and negative training data. This algorithm is suitable to be implemented in higher level surveillance applications such as abnormal behavioral recognition.
Volume: 10
Issue: 4
Page: 3576-3587
Publish at: 2020-08-01

Hybrid branch prediction for pipelined MIPS processor

10.11591/ijece.v10i4.pp3476-3482
Ali S. Al-Khalid , Safaa S. Omran
In the modern microprocessors that designed with pipeline stages, the performance of these types of processors will be affected when executing branch instructions, because in this case there will be stalls in the pipeline. In turn this causes in reducing the Cycle Per Instruction (CPI) of the processor. In the case of executing a branch instruction, the processor needs an extra clocks to know if that branch will happen (Taken) or not (Not Taken) and also it requires calculating the new address in the case of the branch is Taken. The prediction that the branch is T / NT is an important stage in enhancing the processor performance. In this research more than one method of branch prediction (hybrid) is used and the designed circuit will choose different types of prediction algoritms depending on the type of the branch. Some of these methods were used are static while the other are dynamic. All circuits were built practically and examined by applying different programs on the designed predictor algorithm to compute the performance of the processor.
Volume: 10
Issue: 4
Page: 3476-3482
Publish at: 2020-08-01

FANET optimization: a destination path flow model

10.11591/ijece.v10i4.pp4381-4389
Bashir Olaniyi Sadiq , A. T. Salawudeen
Closed-loop routing in flying ad hoc networks (FANET) arises as a result of the quick changes of communication links and topology. As such, causing link breakage during information dissemination. This paper proposed a destination path flow model to improve the communication link in FANET. The models utilized Smell Agent Optimization and Particle Swarm Optimization algorithms in managing link establishment between communicating nodes. The modeled scenario depicts the practical application of FANET in media and sports coverage where only one vendor is given the license for live coverage and must relay to other vendors. Three different scenarios using both optimization Algorithms were presented. From the result obtained, the SAO optimizes the bandwidth costs much better than PSO with a percentage improvement of 10.46%, 4.04% and 3.66% with respect to the 1st, 2nd and 3rd scenarios respectively. In the case of communication delay between the FANET nodes, the PSO has a much better communication delay over SAO with percentage improvement of 40.89%, 50.26% and 68.85% in the first, second and third scenarios respectively.
Volume: 10
Issue: 4
Page: 4381-4389
Publish at: 2020-08-01

Role of gamification in classroom teaching: Pre-service teachers’ view

10.11591/ijere.v9i3.20622
Rita Wong Mee Mee , Tengku Shahrom Tengku Shahdan , Md Rosli Ismail , Khatipah Abd Ghani , Lim Seong Pek , Wong Yee Von , Adelaide Woo , Yugeshineey Subba Rao
Planning a creative learning environment is not an easy task. Teachers prefer to teach traditionally in chalk-and-talk approach during language teaching. However, this does not fit learners of the 21st Century as they prefer game-like activities instead of pen-and-paper lessons. Hence, the introduction of gamification in classroom would result in immediate enthusiasm and curiosity, which leads to the learners’ willingness to learn. Gamification prepares learners to be active and take responsibility upon their own learning. Lessons filled with fun games are believed to be more effective in producing a positive outcome as learners are motivated to play more although they do not realise the fact that they are learning subconsciously. This study aimed to explore views of 33 pre-service teachers in using gamification in language teaching during their 16-week internship at local primary schools around Selangor, Malaysia. A quantitative survey research method was used by administering a set of questionnaires at the end of their internship. The data collected was then analysed and presented in the form of tables. The results showed that integrating gamification into language learning improved learners’ creative, critical and problem-solving skills. Thus, interesting and engaging activities spark learners’ interest in language learning subconsciously.
Volume: 9
Issue: 3
Page: 684-690
Publish at: 2020-08-01

Teaching challenges on the use of storytelling in elementary science lessons

10.11591/ijere.v9i3.20596
Hajah Nuruljannah Haji Matamit , Roslinawati Roslan , Masitah Shahrill , Hardimah Mohd Said
This study investigated the use of storytelling in teaching elementary science on the topic of ‘Sense Organs’ at the Grade 1 level. A total of 21 students from one of the elementary schools in Brunei Darussalam participated in the study. The qualitative analyses of the observations and video recordings resulted in the classifications of the challenges faced when storytelling was used in the lessons. The four identified categories were the language aspect, development aspect, external challenges and existing knowledge. These categories were then used to investigate further any aspect that would develop the challenges into the teaching and learning of science using storytelling. Despite identifying the challenges in using storytelling in teaching science, storytelling may enhance the students’ understanding of science concepts.
Volume: 9
Issue: 3
Page: 716-722
Publish at: 2020-08-01

Adaptive management of technical condition of power transformers

10.11591/ijece.v10i4.pp3862-3868
Vladimir M. Levin , Ammar A. Yahya
Ensuring reliable operation of power transformers as part of electric power facilities is assigned to the maintenance and repair system, whose important components are diagnostics and monitoring of the technical condition. Monitoring allows you to answer the question of whether the transformer abnormalities and how to do they manifest, while diagnostics allow determining the nature, the severity of the problem, determine the cause and possible consequences. The article presents the results of the authors ' research on creating an algorithm for adaptive control of the technical condition of power transformers using diagnostic and monitoring data. The developed algorithm implements the decision-making procedure for ensuring the reliable operation of oil-filled transformer equipment as part of the substations of electric power facilities. The decision-making procedure is based on the method of statistical Bayesian identification the states of a transformer based on the results of dissolved gas analysis (DGA) in oil. The method is characterized by high reliability of recognizing defects in the transformer and the ability to adapt the probabilities of the obtained solutions to the newly received diagnostic information. These results illustrate the effectiveness of the developed approach and the possibility of its application in the operation of oil-filled transformer equipment.
Volume: 10
Issue: 4
Page: 3862-3868
Publish at: 2020-08-01

Data loss prevention (DLP) by using MRSH-v2 algorithm

10.11591/ijece.v10i4.pp3615-3622
Basheer Husham Ali , Ahmed Adeeb Jalal , Wasseem N. Ibrahem Al-Obaydy Al-Obaydy
Sensitive data may be stored in different forms. Not only legal owners but also malicious people are interesting of getting sensitive data. Exposing valuable data to others leads to severe Consequences. Customers, organizations, and /or companies lose their money and reputation due to data breaches. There are many reasons for data leakages. Internal threats such as human mistakes and external threats such as DDoS attacks are two main reasons for data loss. In general, data may be categorized based into three kinds: data in use, data at rest, and data in motion. Data Loss Prevention (DLP) are good tools to identify important data. DLP can do analysis for data content and send feedback to administrators to make decision such as filtering, deleting, or encryption. Data Loss Prevention (DLP) tools are not a final solution for data breaches, but they consider good security tools to eliminate malicious activities and protect sensitive information. There are many kinds of DLP techniques, and approximation matching is one of them. Mrsh-v2 is one type of approximation matching. It is implemented and evaluated by using TS dataset and confusion matrix. Finally, Mrsh-v2 has high score of true positive and sensitivity, and it has low score of false negative.
Volume: 10
Issue: 4
Page: 3615-3622
Publish at: 2020-08-01

Analysis of a framework implementation of the transceiver performances for integrating optical technologies and wireless LAN based on OFDM-RoF

10.11591/ijece.v10i4.pp4252-4260
Adnan Hussein Ali , Alaa Desher Farhood , Maham Kamil Naji
The greatest advantages of optical fibers are the possibility of extending data rate transmission and propagation distances. Being a multi-carrier technique, the orthogonal frequency division multiplexing (OFDM) can be applicable in hybrid optical-wireless systems design owing to its best spectral efficiency for the interferences of radio frequency (RF) and minor multi-path distortion. An optical OFDM-RoF-based wireless local area network (W-LAN) system has been studied and evaluated in this work. The outline for integrating an optical technology and wireless in a single system was provided with the existence of OFDM-RoF technology and the microstrip patch antenna; these were applied in the Optisystem communication tool. The design of the proposed OFDM-RoF system is aimed at supporting mm-wave services and multi-standard operations. The proposed system can operate on different RF bands using different modulation schemes like 4,16 and 64QAM, that may be associated to OFDM and multidata rates up to 5 Gbps. The results demonstrate the robustness of the integrated optical wireless link in propagating OFDM-RoF-based WLAN signals across optical fibers.
Volume: 10
Issue: 4
Page: 4252-4260
Publish at: 2020-08-01
Show 1112 of 1995

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration