Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,922 Article Results

Academic insight on application and challenges of software to develop educational medical english writing

10.11591/ijict.v9i2.pp140-150
Jafar Asgari Arani
This research has thrown up many questions in need of further investigation.There was an expressive quantitative-qualitative research, which a common investigation form was used in.The dialogue item was also applied to discover if the contributors asserted the media-based attitude supplements their learning of academic English writing classes or not.Data recounted academic” insights toward using Skype as a sustaining implement for lessons releasing based on chosen variables: their occupation, year of education, and knowledge with Skype discovered that there were no important statistical differences in the use of Skype units because of medical academics major knowledge. There are statistically important differences in using Skype units. The findings also, disclosed that there are statistically significant differences in using Skype units due to the practice with Skype variable, in favors of academics with no Skype use practice. Skype instrument as an instructive media is a positive medium to be employed to supply academic medical writing data and assist education. Academics who do not have enough time to contribute in classes believe comfortable using the Skype-based attitude in scientific writing. They who took part in the course claimed that their approval of this media is due to learning academic innovative medical writing.
Volume: 9
Issue: 2
Page: 140-150
Publish at: 2020-08-01

Self-checking method for fault tolerance solution in wireless sensor network

10.11591/ijece.v10i4.pp4416-4425
Muayad Sadik Croock , Saja Dhyaa Khuder , Zahraa Abbas Hassan
Recently, the wireless sensor network (WSN) has been considered in different application, particularly in emergency systems. Therefore, it is important to keep these networks in high reliability using software engineering techniques in the field of fault tolerance. This paper proposed a fault node detection method in WSN using the self-checking technique according to the rules of software engineering. Then, the detected faulted node is covered employing the reading of nearest neighbor nodes (sensors). In addition, the proposed method sends a message for maintenance to solve the fault. The proposed method can reduce the time between the detection and recovery of a fault to prevent the confusion of adopting wrong readings, in which the detection is making with mistake. Moreover, it guarantees the reliability of the WSN, in terms of operation and data transmission. The proposed method has been tested over different scenarios and the obtained results show the superior efficiency in terms of recovery, reliability, and continuous data transmission.
Volume: 10
Issue: 4
Page: 4416-4425
Publish at: 2020-08-01

Acceptance of E-learning among university students in UAE: A practical study

10.11591/ijece.v10i4.pp3660-3671
Ahmad Qasim Mohammad AlHamad
The objective of the study is to find out the factors which affect the acceptance of E-learning among students and how the students’ purpose of using E-learning is determined by these factors. The research was based on the Technology Acceptance Model (TAM). The researcher developed a questionnaire to gather data from a sample of 366 university students who actively used the E-learning system. According to the results of the study, subjective norms, perceived usefulness, perceived ease of use, enjoyment, and accessibility” are the vital predictors behind the intention of students for using E-learning systems. This indicates that extended TAM is applicable in the UAE. The results show that policymakers and education developers should take E-learning system seriously since it can be opted not just as a technological solution but also as a learning platform for students belonging to a distant area. The results present practical implications for education developers, policymakers and practitioners in devising useful plans to implement E-learning systems.
Volume: 10
Issue: 4
Page: 3660-3671
Publish at: 2020-08-01

Dengue vector surveillance (Aedes albopictus) with ovitrap and attractants from imperata immersion (Imperata cylindrica)

10.11591/ijphs.v9i4.20544
M. Rasyid Ridha , Budi Hairani , Akhmad Rosanji , Abdullah Fadilly , Gusti Meliyanie
Efforts to control the vector in reducing the population of Aedes albopictus can be done by using attractants with ovitrap. This study aims to determine the variation of Imperata cylindrica raeusch's immersion straw immersion dose on the number of eggs and hatchability of Aedes albopictus in the laboratory. Research type is a true experiment with a completely randomized design (CRD). The material used is Imperata cylindrica raeusch soaking with 5%, 10%, 15%, 20% concentration and aquadest as a control with 5 replications. The results showed that Imperata grass soaking was proven to be effective as an attractant in Aedes albopictus mosquitoes and was able to inhibit the number of eggs that hatch. Utilization of Imperata straw soaking can be used as an additive in the ovitrap in dengue vector surveillance.
Volume: 9
Issue: 4
Page: 286-291
Publish at: 2020-07-17

E-PAC: efficient password authentication code based RMPN method and diffie-hellman algorithm

10.11591/ijeecs.v19.i1.pp485-491
Salah H. Abbdal Refish , Salam Waley Shneen
Users need more efficient and more secure  when they use the Internet. Password authentication code (PAC) is the critical issue in many applications such as web-sites and data base systems etc. In this paper, PAC between two users to confirm authentication between them based two factors has presented.. Two factors is the most good solution in this field. A legitimate user needs to make sure about his partner to ensure their communication.  So, this solution produces two important algorithms, the first one is utilized the Diffie-Hellman which considered the base of this work. The second is routing in message passing networks (RMPN) algorithm which determine the positions of bits which sent to specific party. The overall of this method convincingly to be more secure against both online and offline attacks. This scheme has some advantages such as secrecy of session key, password privacy, and mutual authentication. The performance and security analyses prove that the scheme is very efficient and mathematically immune for attackers.
Volume: 19
Issue: 1
Page: 485-491
Publish at: 2020-07-01

Classification of healthy and white root disease infected rubber trees based on relative permittivity and capacitance input properties using LM and SCG artificial neural network

10.11591/ijeecs.v19.i1.pp222-228
Mohd Suhaimi Sulaiman , Zuraidi Saad
White root disease is one of the most serious diseases in rubber plantation in Malaysia that originally infects on the root surface of the rubber tree. So, prevention is important compared to treatment. The classification system proposed in the research had the ability of detecting the disease by classifying between healthy rubber trees and white root disease infected rubber trees. 600 samples of latex from healthy rubber trees and white root disease infected rubber trees were taken from the RRIM station in Kota Tinggi, Johor. These samples were measured based on its relative permittivity and capacitance. All of the measurement inputs from the experiment were tested using statistical analysis. These measurement input were then went through the process of classification in ANN to generate the optimized models by using LM and SCG algorithm. There were four optimized models selected from the classification process. The accuracy from the selected most optimized models were greater than 70%. The selected most optimized models were then used to classify between healthy trees and white root infected trees based on single input categories. 
Volume: 19
Issue: 1
Page: 222-228
Publish at: 2020-07-01

Design of 130nm RFCMOS differential low noise amplifier

10.11591/ijeecs.v19.i1.pp172-177
Maizan Muhamad , Hanim Hussin , Norhayati Soin
In this paper, an inductively degenerated CMOS differential low noise amplifier circuit topology is presented. This low noise amplifier is intended to be used for wireless LAN application. The differential low noise amplifier proposed provide high gain, low noise and large superior out of band IIP3. The LNA is designed in 130 nm CMOS technology. Simulated results of gain and NF at 2.4GHz are 20.46 dB and 2.59 dB, respectively. While the simulated S11 and S22 are −11.18 dB and −9.49 dB, respectively. The IIP3 is −9.05 dBm. The LNA consumes 3.4 mW power from 1.2V supply. 
Volume: 19
Issue: 1
Page: 172-177
Publish at: 2020-07-01

Multi-perspectives crowdsourcing ecosystem in Malaysia

10.11591/ijeecs.v19.i1.pp435-441
Norjansalika Janom , Raja Nurul Azhani , Syaripah Ruzaini Syed Aris , Nor Shahniza Kamal Bashah , Noor Habibah Arshad , Muhammad Hakim Nadir
Crowdsourcing has been known as developing industry that able to be used as a platform to get more income and provide opportunity for busineses to conduct their operation in more innovative ways.  Crowdsourcing has become an effective way for the companies to offer work opportunity for crowd outside organization to apply their abilities and skills, and receive more money.  Under the Malaysian government initiatives called Digital economy, various crowdsourcing efforts and programs have been introduced to catch up with the global development.   The ecosystem of crowdsourcing which consists of job provider, platform, micro worker and industry is considered still in a formative stage.  Thus, the integration of all these components is not fully discovered and understood yet which, can cause confusion among the crowdsourcing industry players.   In order to understand the complex integration of multi perspective micro sourcing ecosystem, the components and its significance priority level need to be identified. In this study, the components that involved in crowdsourcing ecosystem were identified and ranked using analytical hierarchy process (AHP) method. The results can be later used by crowdsourcing industry players to plan more proper crowd sourcing strategic development  in Malaysia.
Volume: 19
Issue: 1
Page: 435-441
Publish at: 2020-07-01

Intelligent security system detects the hidden objects in the smart grid

10.11591/ijeecs.v19.i1.pp188-195
Ammar Wisam Altaher , Abdullah Hasan Hussein
Monitoring the general public gathered in large numbers is one of the most challenging tasks faced by the law and order enforcement team. There is swiftly demand to that have inbuilt sensors which can detect the concealed weapon, from a standoff distance the system can locate the weapon with very high accuracy. Objects that are obscure and invisible from human vision can be seen vividly from enhanced artificial vision systems. Image Fusion is a computer vision technique that fuses images from multiple sensors to give accurate information. Image fusion using visual and infrared images has been employed for a safe, non-invasive standoff threat detection system. The fused imagery is further processed for specific identification of weapons. The unique approach to discover concealed weapon based on DWT in conjunction with Meta heuristic algorithm Harmony Search Algorithm and SVM classification is presented. It firstly uses the traditional discrete wavelet transform along with the hybrid Hoteling transform to obtain a fused imagery. Then a heuristic search algorithm is applied to search the best optimal harmony to generate the new principal components of the registered input images which is later classified using the K means support vector machines to build better classifiers for concealed weapon detection. Experimental results demonstrate the hybrid approach which shows the superior performance.
Volume: 19
Issue: 1
Page: 188-195
Publish at: 2020-07-01

Performance evaluation of wireless sensor networks using LEACH protocol

10.11591/ijeecs.v19.i1.pp395-402
Anas Ali Hussien , Shaymaa Waleed Al-Shammari , Mehdi J. Marie
Recent days witnessed considerable developments in the field of wireless sensor networks (WSNs). The applications of these networks can be seen in the simple consumer electronic devices as well as in the advanced space technology. The communication protocols are of prior importance and interest; the low-energy adaptive clustering hierarchy (LEACH) protocol is used to enhance the performance of power consumption for the WSNs nodes. The efficiency of a wireless network can be affected by different factors, such as the size of the WSN and the initial energy of the sensor node. This can inspire the researchers to develop the optimum structure of the WSNs to get its desired functionality. In this paper, the performance of the low-energy adaptive clustering hierarchy (LEACH) protocol is investigated using MATLAB to study the effect of the initial energy of the sensor node and the WSN size on the number of the running nodes. It is found that increasing the initial energy of a sensor node increases the life time of the node and hence the number of the running nodes. It has been also approved that the WSN size has an inverse proportion with the number of running sensor nodes during the use of LEACH protocol.
Volume: 19
Issue: 1
Page: 395-402
Publish at: 2020-07-01

Speaker ethnic identification for continuous speech in malay language using pitch and MFCC

10.11591/ijeecs.v19.i1.pp207-214
Rafizah Mohd Hanifa , Khalid Isa , Shamsul Mohamad
Voice recognition has evolved exponentially over the years. The purpose of voice recognition or sometimes called speaker identification, is to identify the person who is speaking. This can be done by extracting features of speech that differ between individuals due to physiology (shape and size of the mouth and throat) and also behavioral patterns (pitch, accent and style of speaking). This paper explains an approach of voice recognition to identify the ethnicity of Malaysian people. Pitch and 13 Mel-Frequency Cepstrum Coefficients (MFCCs) are extracted from 52 recorded continuous speech in Malay for use as features to train the classifiers using Tree, Naïve Bayes, Nearest Neighbors and Support Vector Machine (SVM) and another 10 recorded speeches are used for testing. The results reveal that the use of a combination of pitch and 13 coefficients for features extraction and training the data using SVM provide better accuracy (57.7%) than the use of only 13 coefficients (53.8%).
Volume: 19
Issue: 1
Page: 207-214
Publish at: 2020-07-01

Modified FCS-MPC algorithm for five-leg voltage source inverter

10.11591/ijeecs.v19.i1.pp47-57
Riyadh Ghanem Omar
This paper represents a test of a modified algorithm to minimize the cost function in the traditional finite control-set model predictive current control (FCS-MPC) to control the (five-leg) DC voltage input inverter. A Matlab/Simulink description of a system presents a certain deviation limits between the reference and the actual measured phase currents, also the model implements a load current limitation. The algorithm picks out a proper switching state, which makes the lower error value between the wanted and the prognosticated currents; the proposed technique sets the chosen switching state as a driving signal to the ten switches. The modified program eliminates the switching combination with error values above the requested ones. Thereafter the system response enhanced by lowering the overshoots. The rigidness of the model is examined by using a step change in reference signals.
Volume: 19
Issue: 1
Page: 47-57
Publish at: 2020-07-01

Detecting learning disabilities based on neuro-physiological interface of affect (NPIoA)

10.11591/ijeecs.v19.i1.pp164-171
Nurul Izzati Mat Razi , Abdul Wahab Abdul Rahman , Norhaslinda Kamaruddin
Learning disability (LD) is a neurological processing disorder that causes impediment in processing and understanding information. LD is not only affecting academic performance but can also influence on relationship with family, friends and colleagues. Hence, it is important to detect the learning disabilities among children prior to the school year to avoid from anxiety, bully and other social problems. This research aims to implement the learning disabilities detection based on the emotions captured from electroencephalogram (EEG) to recognize the symptoms of Autism Spectrum Disorder (ASD), Attention Deficit Hyperactivity Disorder (ADHD) and dyslexia in order to have early diagnosis and assisting the clinician evaluation.  The results show several symptoms that ASD children have low alpha power with the Alpha-Beta Test (ABT) power ratio and ASD U-shaped graph, ADHD children have high Theta-Beta Test (TBT) power ratio while Dyslexia have high Left-over-Right Theta (LRT) power ratio.  This can be concluded that the learning disabilities detection methods proposed in this study is applicable for ASD, ADHD and also Dyslexia diagnosis.
Volume: 19
Issue: 1
Page: 164-171
Publish at: 2020-07-01

An immune memory and negative selection to visualizing clinical pathways from electronic health record data

10.11591/ijeecs.v19.i1.pp336-343
Mouna Berquedich , Oulaid Kamach , Malek Masmoudi , Laurent Deshayes
Clinical pathways indicate the applicable treatment order of interventions. In this paper we propose a data-driven methodology to extract common clinical pathways from patient-centric Electronic Health Record data (EHR). The analysis of  patient's, can lead to better regarding pathologies. The proposed algorithmic methodology consist to designing a system of control and analysis of patient records based on an analogy between the elements of the new EHRs and the biological immune systems. The detection of patient profiles ensured by biclustering Matrix. We rely on biological immunity to develop a set of models for structuring knowledge extracted from EHR and to make pathway analysis decisions. A specific analysis of the functional data leds to the detection of several types of patients who share the same EHR information. This methodology demonstrates its ability to simultaneously processing data, and is able to providing information for understanding and identifying the path of patients as well as predicting the path of future patients.
Volume: 19
Issue: 1
Page: 336-343
Publish at: 2020-07-01

Estimation of the refractivity gradient from measured essential climate variables in Iyamho-Auchi, Edo State, South-South Region of Nigeria

10.11591/ijeecs.v19.i1.pp276-284
Kingsley Eghonghon Ukhurebor , Wilson Nwankwo
Meteorological variables are crucial constituents in the estimation of refractivity disseminations and the uncharacteristic radio wave propagation situations of the troposphere as a result of their impact on radio wave communication relations over the atmosphere. In this study the measurement and assessment of air temperature, relative humidity and atmospheric pressure was carried out for a period of one year; 2018, so as to estimate the refractivity gradient over Iyamho-Auchi, Edo State, Nigeria using a self-implemented inexpensive portable meteorological monitoring device. The measurements of the essential climate variables were done at the administrative building of Edo University Iyamho by placing the meteorological monitoring device on a fixed position. The results show that the monthly estimated refractivity gradient values which would be useful in the prediction of the local radio propagation range from -20.00 N-units/km to -190.00 N-units/km with an average value of -60.67 N-units/km for the period under consideration. The findings also show that the months with limited relative humidity have greater refractivity gradient values compared to the ones with higher relative humidity. It was also observed from the results that the measured essential climate variables were having significant impacts on the estimated refractivity gradient during all the months in 2018, and these impacts were more noticeable in the months with higher relative humidity compared with the months that were having limited relative humidity. 
Volume: 19
Issue: 1
Page: 276-284
Publish at: 2020-07-01
Show 1113 of 1995

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration