Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,922 Article Results

Traffic lane controller using RFID and IoT

10.11591/csit.v1i1.p13-16
Veera Boopathy E
Traffic in urban areas is increasing day by day which leads to most critical issues of traffic management this paper proposes a smart and fully automatic traffic control system that will detect and control the congestion in real time, detect a stolen vehicle and also passes emergency vehicles smoothly with the use of passive RFID device. This effectively reduces travel delays and relieves congestion, it is necessary to control lane merge behaviours of freeway. Depending upon the count of vehicles green passage will be set dynamically and the proposed system provides special privileges for emergency vehicles like police vehicle, ambulance, VIP vehicles, etc.
Volume: 1
Issue: 1
Page: 13-16
Publish at: 2020-05-01

An ensemble technique for speech recognition in noisy environments

10.11591/ijeecs.v18.i2.pp835-842
Imad Qasim Habeeb , Tamara Z. Fadhil , Yaseen Naser Jurn , Zeyad Qasim Habeeb , Hanan Najm Abdulkhudhur
Automatic speech recognition (ASR) is a technology that allows a computer and mobile device to recognize and translate spoken language into text. ASR systems often produce poor accuracy for the noisy speech signal. Therefore, this research proposed an ensemble technique that does not rely on a single filter for perfect noise reduction but incorporates information from multiple noise reduction filters to improve the final ASR accuracy. The main factor of this technique is the generation of K-copies of the speech signal using three noise reduction filters. The speech features of these copies differ slightly in order to extract different texts from them when processed by the ASR system. Thus, the best among these texts can be elected as final ASR output. The ensemble technique was compared with three related current noise reduction techniques in terms of CER and WER. The test results were encouraging and showed a relatively decreased by 16.61% and 11.54% on CER and WER compared with the best current technique. ASR field will benefit from the contribution of this research to increase the recognition accuracy of a human speech in the presence of background noise.
Volume: 18
Issue: 2
Page: 835-842
Publish at: 2020-05-01

Modern design approach of faults (toggling faults, bridge faults and SAT) of reduced ordered binary decision diagram based on combo & sequential blocks

10.11591/ijres.v9.i2.pp158-168
Kurada Veera Bhoga Vasantha Rayudu , Jahagirdar Jahagirdar , P Rao
In this Research we are going to develop ROBDD (Reduced Ordered Binary Decision Diagram) designs to detect toggling faults, bridge faults and SAT (Stuck at Fault), Here we are going to develop sequential blocks using ROBDD and applying to the mux to detect stuck at faults and also connecting the combo & Sequential blocks to find the toggling faults by connecting or using automatic test pattern generator. In this research we are going to develop the bridges between the blocks of ROBDD designs and converting them to and or logic to find the bridge faults of the design. Finding bridge and toggle faults are more difficult in logic designs, here we use an advance technique to find the faults of the design by calculating the path delays of the individual blocks of the design. More concentrating on the path delays by using basic stuck at faults methods to refer the faults (toggling and bridge faults) at mux output. In our research the basic design modules are ROBDD circuit of both combinational and sequential blocks are designed and tested using Multiplexer and K-map Simplification Methods. The main purpose of the research to find the faults at all levels of all logic designs which involves in both combinational and sequential blocks of the design.
Volume: 9
Issue: 2
Page: 158-168
Publish at: 2020-04-16

A system verilog approach for verification of memory controller

10.11591/ijres.v9.i2.pp153-157
Sowmya K B , Gagana P
Memory performance has become the major bottleneck to improve the overall performance of the computer system. By using memory controller, there is effective control of data between processor and memory. In this paper, a memory controller for interfacing Synchronous Static Random Access Memory (SSRAM), Synchronous Dynamic Random Access Memory (SDRAM), Read Only Memory (ROM) and FLASH which is Electrically Erasable Programmable Read-Only Memory is designed and a coverage driven Constraint random verification environment is built for the designed memory controller. Verification plays an important role in any design flow as it is done before silicon development. It is done at time of product development for quality checking and bug fixing in design.
Volume: 9
Issue: 2
Page: 153-157
Publish at: 2020-04-16

New proposed spherical slotted antenna covered by the layers of dielectric material and plasma

10.11591/ijece.v10i2.pp1728-1735
Osman Shakirovich Dautov , Mohammad Sadon AL-Abadi , Haidar N. Al-Anbagi
The operation of the new proposed spherical slotted antenna covered by layers of dielectric material and plasma was analyzed numerically in this paper. By utilizing the Integra-functional equations method, the optimum thickness of dielectric material layer and suitable conditions which improve the operation of this antenna are analyzed here by MATHCAD. The thickness of dielectric layer must not be less or more than λ/6. Furthermore, the authors propose manipulating the operation frequency to enable such antenna to work in most circumstances.
Volume: 10
Issue: 2
Page: 1728-1735
Publish at: 2020-04-01

A multi-levels RNG permutation

10.11591/ijeecs.v18.i1.pp412-419
Ammar Khaleel Abdulsadah , Abdullah Aziz Lafta , Mohammad Dosh
The paper proposes a new general method for producing a multilevel permutation functioning as an m-tree traversal. It is composed of two basic steps: a random number generator of period length equal m to determine which child to traverse, and recursive permutation in which permutated the subtree if found. The test results proved that the suggested method of permutation is successful depending on the correlation measure.
Volume: 18
Issue: 1
Page: 412-419
Publish at: 2020-04-01

Implementation of deep neural networks (DNN) with batch normalization for batik pattern recognition

10.11591/ijece.v10i2.pp2045-2053
Ida Nurhaida , Vina Ayumi , Devi Fitrianah , Remmy A. M. Zen , Handrie Noprisson , Hong Wei
One of the most famous cultural heritages in Indonesia is batik. Batik is a specially made drawing cloth by writing Malam (wax) on the cloth, then processed in a certain way. The diversity of motifs both in Indonesia and the allied countries raises new research topics in the field of information technology, both for conservation, storage, publication and the creation of new batik motifs. In computer science research area, studies about Batik pattern have been done by researchers and some algorithms have been successfully applied in Batik pattern recognition. This study was focused on Batik motif recognition using texture fusion feature which is Gabor, Log-Gabor, and GLCM; and using PCA feature reduction to improve the classification accuracy and reduce the computational time. To improve the accuracy, we proposed a Deep Neural Network model to recognise batik pattern and used batch normalisation as a regularises to generalise the model and to reduce time complexity. From the experiments, the feature extraction, selection, and reduction gave better accuracy than the raw dataset. The feature selection and reduction also reduce time complexity. The DNN+BN significantly improve the accuracy of the classification model from 65.36% to 83.15%. BN as a regularization has successfully made the model more general, hence improve the accuracy of the model. The parameters tuning also improved accuracy from 83.15% to 85.57%.
Volume: 10
Issue: 2
Page: 2045-2053
Publish at: 2020-04-01

Enhancing the photocatalytic activity of commercial P25 TiO2 powder by combining with handmade ni-doped TiO2 powder

10.11591/ijece.v10i2.pp1782-1790
Yoshiki Kurokawa , Dang Trang Nguyen , kozoK Taguchi
Titanium dioxide (TiO_2) is the most popular photocatalytic material. However, its operation is limited to UV light only. In this paper, we tried to improve the visible light responsiveness of TiO_2 by doping Nickel (Ni) using sol-gel method. By combining Ni-doped TiO_2 powder with commercially available P25 TiO_2 powder to make photocatalytic thin films, significant improvement in photocatalytic activity has been obtained. Furthermore, we also studied the relationship between the surface condition of photocatalytic thin films and their photocatalytic activity. The surface condition was improved by multilayer electrophoresis deposition method. Based on experimental results, by combining 10 - 20 wt% Ni-doped TiO_2 with P25 TiO_2, we could significantly enhance the photocatalytic activity of P25 TiO_2.
Volume: 10
Issue: 2
Page: 1782-1790
Publish at: 2020-04-01

Switching pulse generation for DC-DC boost converter using Xilinx-ISE with FPGA processor

10.11591/ijece.v10i2.pp1722-1727
R. Palanisamy , C. S. Boopathi , K. Selvakumar , K. Vijayakumar
This paper explains steps to generate switching pulse using Xilinx-ISE with FPGA processor for DC-DC boost converter. The switching pulse generated using Very high speed integrated circuit Hardware Description Language (VHDL) with Xilinx-ISE. VHDL is a programming language, which is used to model and design any complex circuits in a dynamic environment. This paper gives the course of action for generation of switching pulses for dc-dc boost converter using Xilinx-ISE and matlab simulink. The switching pulse generated using Xilinx-ISE with FPGA-Spartan 6 processor compared with switching pulse generated using matlab.
Volume: 10
Issue: 2
Page: 1722-1727
Publish at: 2020-04-01

A secure image steganography based on JND model

10.11591/ijece.v10i2.pp2088-2096
Tuan Duc Nguyen , Dung Huu Le
Minimizing distortion produced by embedding process is very important to improve the security of hidden message and maintain the high visual quality of stego images. To achieve these objectives, an effective strategy is to perform pixel selection which is well-known as a channel selection rule. In this approach, a pixel associated with the smallest image degradation is chosen to carry secret bits. From these facts, in this paper, a new secure channel selection rule for digital images in spatial domain is designed and proposed. In this new approach, the modified matrix embedding method is utilized as data hiding method because it introduces more than one embedding change to be performed. This enables us to select a suitable pixel to embed message bits with less degradation yielded in a stego-image. In pixel selection of the proposed method, a just noticeable difference value and gradient value of a considering pixel are employed together. The experimental results (which were conducted on 10,000 uncompressed images) indicate that stego images of the proposed approach achieve a higher perceptual quality and security than those of the stego-images created by the previous approaches.
Volume: 10
Issue: 2
Page: 2088-2096
Publish at: 2020-04-01

Battery health and performance monitoring system: a closer look at state of health (SoH) assessment methods of a Lead-Acid battery

10.11591/ijeecs.v18.i1.pp261-267
D Selvabharathi , N Muruganantham
Batteries are one of the most compact and reliable sources of sustainable energy. Lead-Acid batteries are the battery-powered sort of batteries concocted during the 1980s. The significant utilization of lead-acid battery is in beginning, lighting and start frameworks of vehicles.To guarantee the health and to dodge potential disappointments of a battery it is important to examine its Territory of health precisely. This examination expects to give efficiently evaluating the accessible writing on the condition of health estimation techniques. This study focuses on many factors and provides a suggestion for the defended battery manufacturing process. This study provides increasing efforts toward the advancement of battery interms of specific power, energy density, durability, invulnerability, economics, and performance in various applications.
Volume: 18
Issue: 1
Page: 261-267
Publish at: 2020-04-01

Influence of annealing temperature on the sensitivity of nickel oxide nanosheet films in humidity sensing applications

10.11591/ijeecs.v18.i1.pp284-292
N. Parimon , M. H. Mamat , A. S. Ismail , I. B. Shameem Banu , M. K. Ahmad , A. B. Suriani , M. Rusop
Nickel oxide (NiO) nanosheet films were successfully grown onto NiO seed-coated glass substrates at different annealing temperatures for humidity sensing applications. NiO seed layers and NiO nanosheet films were prepared using a sol-gel spin coating and sonicated sol-gel immersion techniques, respectively. The properties of NiO nanosheet films at as-deposited, 300 ℃, and 500 ℃-annealed were examined by X-ray diffraction (XRD), field emission scanning electron microscopy (FESEM), ultraviolet-visible (UV-vis) spectroscopy, and humidity sensor measurement system. The XRD patterns demonstrate that the grown NiO films have crystalline cubic structures at temperature of 300 ℃ and 500 ℃. The FESEM images show that the large porous nanosheet network spread over the layers as the annealing temperature increased. The UV-vis spectra revealed that all the nanosheet films have the average transmittance below than 50% in the visible region, with absorption edges ~ 350 nm. The optical band gap energy was evaluated in ranges of 3.39 to 3.61 eV. From the obtained humidity sensing results, it shows that 500 ℃-annealed film exhibited the best sensitivity of 257, as well as the slowest response time, and the fastest recovery time compared with others.
Volume: 18
Issue: 1
Page: 284-292
Publish at: 2020-04-01

SαS noise suppression for OFDM wireless communication in rayleight channel

10.11591/ijece.v10i2.pp2003-2010
Heyem Hamlili , Samir Kameche , Abdelhafid Abdelmalek
Orthogonal frequency division multiplexing (OFDM) is a form of multi-carrier transmission technique widely used in the modern wireless network to achieve high-speed data transmission with good spectral efficiency. However, in impulsive noise environement BER performances of these systems, originally designed for a Gaussian noise model, are much degraded. In this paper, a new symmetric-alpha-stable (SαS) noise suppression technique based conjointly on adaptive modulation, convolutional coding (AMC) and Recursive Least Square (RLS) filtering is presented. The proposed scheme is applied on OFDM system in Rayleigh fading channel. The transmissions are analyzed under different combinations of digital modulation schemes (BPSK, QPSK, 16-QAM, 64-QAM) and convolutional code rates (1/2, 2/3, 3/4). Simulation results show that our proposed hybrid technique provides effective impulsive noise cancelation in OFDM system and exhibits better BER performance.
Volume: 10
Issue: 2
Page: 2003-2010
Publish at: 2020-04-01

Operation cost reduction in unit commitment problem using improved quantum binary PSO algorithm

10.11591/ijece.v10i2.pp1149-1155
Ali Nasser Hussain , Ali Abduladheem Ismail
Unit Commitment (UC) is a nonlinear mixed integer-programming problem. UC is used to minimize the operational cost of the generation units in a power system by scheduling some of generators in ON state and the other generators in OFF state according to the total power outputs of generation units, load demand and the constraints of power system. This paper proposes an Improved Quantum Binary Particle Swarm Optimization (IQBPSO) algorithm. The tests have been made on a 10-units simulation system and the results show the improvement in an operation cost reduction after using the proposed algorithm compared with the ordinary Quantum Binary Particle Swarm Optimization (QBPSO) algorithm.
Volume: 10
Issue: 2
Page: 1149-1155
Publish at: 2020-04-01

Preemptive modelling towards classifying vulnerability of DDoS attack in SDN environment

10.11591/ijece.v10i2.pp1599-1611
Narender M. , Yuvaraju B. N.
Software-Defined Networking (SDN) has become an essential networking concept towards escalating the networking capabilities that are highly demanded future internet system, which is immensely distributed in nature. Owing to the novel concept in the field of network, it is still shrouded with security problems. It is also found that the Distributed Denial-of-Service (DDoS) attack is one of the prominent problems in the SDN environment. After reviewing existing research solutions towards resisting DDoS attack in SDN, it is found that still there are many open-end issues. Therefore, these issues are identified and are addressed in this paper in the form of a preemptive model of security. Different from existing approaches, this model is capable of identifying any malicious activity that leads to a DDoS attack by performing a correct classification of attack strategy using a machine learning approach. The paper also discusses the applicability of best classifiers using machine learning that is effective against DDoS attack.
Volume: 10
Issue: 2
Page: 1599-1611
Publish at: 2020-04-01
Show 1149 of 1995

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration