Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,922 Article Results

Hybrid TSR-PSR in nonlinear EH half duplex network: system performance analysis

10.11591/ijece.v10i2.pp1255-1262
Phu Tran Tin , Duy-Hung Ha , Tran Thanh Trang
Nowadays, harvesting energy (EH) from green environmental sources and converting this energy into the electrical energy used in purpose to supply the communication network devices is considered the main research direction. In this research, we investigate the hybrid TSR-PSR Nonlinear Energy Harvesting (EH) Half-duplex (HD) Relaying network in terms of the Success Probability (SP). For this purpose, we derive the integral-form of the system SP. In addition, we use the Monte Carlo simulation for verifying the correctness of the analytical expression. We can see in the research results that all the simulation and analytical values are the same in connection with all primary system parameters.
Volume: 10
Issue: 2
Page: 1255-1262
Publish at: 2020-04-01

A study of packet scheduling algorithms in long term evolution-advanced

10.11591/ijeecs.v18.i1.pp516-524
Mohd Mueen Ul Islam Mattoo , Huda Adibah Mohd Ramli
The allocation of radio resources is one of the most critical functions performed by the Radio Resource Management (RRM) mechanisms in the downlink Long Term Evolution – Advanced (LTE-Advanced). Packet scheduling concerns itself with allocation of these radio resources in an intelligent manner such that system throughput/capacity can be maximized whilst the required multimedia Quality of Service (QoS) is met. Majority of the previous studies of packet scheduling algorithms for LTE-Advanced did not take the effect of channel impairments into account. However, in real world the channel impairments cannot be obliterated completely and have a direct impact on the packet scheduling performance. As such, this work studies the impact of channel impairments on packet scheduling performance in a practical downlink LTE-Advanced. The simulation results obtained demonstrate the efficacy of RM2 scheduling algorithm over other scheduling algorithms in maximizing the system capacity and is more robust on the effect of the cellular channel impairments.  
Volume: 18
Issue: 1
Page: 516-524
Publish at: 2020-04-01

Session based cooperation in cognitive radio networks: network level approach

10.11591/ijict.v9i1.pp40-45
Sunil Ghildiyal , Himanshu Goel , Anupam Semwal
The cognitive radio prototype performance is to alleviate the scarcity of spectral resources for wireless communication through intelligent sensing and quick resource allocation techniques. Secondary users (SU’s) actively obtain the spectrum access opportunity by supporting primary users (PU’s) in cognitive radio networks (CRNs). In present generation, spectrum access is endowed through cooperative communication based link-level frame-based cooperative (LLC) principle. In this SUs independently act as conveyors for PUs to achieve spectrum access opportunities. Unfortunately, this LLC approach cannot fully exploit spectrum access opportunities to enhance the throughput of CRNs and fails to motivate PUs to join the spectrum sharing processes. Therefore to overcome this con, network level cooperative (NLC) principle was used, where SUs are integrated mutually to collaborate with PUs session by session, instead of frame based cooperation for spectrum access opportunities. NLC approach has justified the challenges facing in LLC approach. In this paper we make a survey of some models that have been proposed to tackle the problem of LLC. We show the relevant aspects of each model, in order to characterize the parameters that we should take in account to achieve a spectrum access opportunity.
Volume: 9
Issue: 1
Page: 40-45
Publish at: 2020-04-01

Influence of annealing temperature on the sensitivity of nickel oxide nanosheet films in humidity sensing applications

10.11591/ijeecs.v18.i1.pp284-292
N. Parimon , M. H. Mamat , A. S. Ismail , I. B. Shameem Banu , M. K. Ahmad , A. B. Suriani , M. Rusop
Nickel oxide (NiO) nanosheet films were successfully grown onto NiO seed-coated glass substrates at different annealing temperatures for humidity sensing applications. NiO seed layers and NiO nanosheet films were prepared using a sol-gel spin coating and sonicated sol-gel immersion techniques, respectively. The properties of NiO nanosheet films at as-deposited, 300 ℃, and 500 ℃-annealed were examined by X-ray diffraction (XRD), field emission scanning electron microscopy (FESEM), ultraviolet-visible (UV-vis) spectroscopy, and humidity sensor measurement system. The XRD patterns demonstrate that the grown NiO films have crystalline cubic structures at temperature of 300 ℃ and 500 ℃. The FESEM images show that the large porous nanosheet network spread over the layers as the annealing temperature increased. The UV-vis spectra revealed that all the nanosheet films have the average transmittance below than 50% in the visible region, with absorption edges ~ 350 nm. The optical band gap energy was evaluated in ranges of 3.39 to 3.61 eV. From the obtained humidity sensing results, it shows that 500 ℃-annealed film exhibited the best sensitivity of 257, as well as the slowest response time, and the fastest recovery time compared with others.
Volume: 18
Issue: 1
Page: 284-292
Publish at: 2020-04-01

Achieving robust global bandwidth along with bypassing geo-restriction for internet users

10.11591/ijeecs.v18.i1.pp112-123
Gazi Zahirul Islam , Aman Ullah Juman , Al- Nahian Bin Emran , Md. Abbas Ali Khan , Md. Fokhray Hossain , Md. Tarek Habib
Not all Internet Service Providers provide a sufficient amount of bandwidth to their users. Although the amount of local bandwidth is reasonable, global bandwidth is not satisfactory at all. Based on bandwidth allocation, location and price; service providers capped their users’ global bandwidth i.e., reducing global internet speed. As a consequence, we observe severe global bandwidth limitation among Internet users. In this article, we implement a flexible and pragmatic solution for Internet users to bypass global bandwidth restriction. To achieve robust global bandwidth, we utilize a combination of communication technologies and devices namely, Internet Exchange Point, Virtual Private Network, chain VPN technology etc. In this project, we show that internet speed of international route i.e., global bandwidth can enhance significantly if there are multiple ISPs use a common IXP and at least one of those ISPs provides pleasant global bandwidth. Usually, regional ISPs use a common IXP to route their local traffic using local bandwidth within the region without wasting global bandwidth. We show that using our proposed method global internet speed of a user can raise several times effectively utilizing assigned local bandwidth. In addition, we also implement a geo-restriction bypassing technique integrating an offshore ISP with local ISP using VPN. Thus, we enjoy tremendous Internet speed along with unrestricted access to the websites.
Volume: 18
Issue: 1
Page: 112-123
Publish at: 2020-04-01

A review paper on artificial intelligence at the service of human resources management

10.11591/ijeecs.v18.i1.pp32-40
Siham Berhil , Habib Benlahmar , Nasser Labani
In the last few years, all companies have been interested in the analysis of data related to Human Resources and have focused on human capital, which is considered as the major factor influencing the company’s development and all its activities at all levels of human resource policies. Data analysis (HR analytics) will significantly improve business profitability over the next years.We started with an extensive survey of different human resources problems and risks reported by HR specialists, then a comprehensive review of recent research efforts on computer science techniques proposed to solve these problems and finally focusing on suggested artificial intelligence methods. This review article will be an archive and a reference for computer scientists working on HR by summarizing the IT solutions already made in human resources for the period between 2008 and 2018. It aims to present clearly the issues that HR researchers face and for which computer scientists seek solutions. It summarizes at the same time the recent and different methods, IT approaches and tools already used by highlighting those using artificial intelligence.
Volume: 18
Issue: 1
Page: 32-40
Publish at: 2020-04-01

A review on sparse fast fourier transform applications in image processing

10.11591/ijece.v10i2.pp1346-1351
Hadhrami Ab Ghani , Mohamad Razwan Abdul Malek , Muhammad Fadzli Kamarul Azmi , Muhammad Jefri Muril , Azizul Azizan
Fast Fourier Transform has long been established as an essential tool in signal processing. To address the computational issues while helping the analysis work for multi-dimensional signals in image processing, sparse Fast Fourier Transform model is reviewed here when applied in different applications such as lithography optimization, cancer detection, evolutionary arts and wasterwater treatment. As the demand for higher dimensional signals in various applications especially multimedia appplications, the need for sparse Fast Fourier Transform grows higher.
Volume: 10
Issue: 2
Page: 1346-1351
Publish at: 2020-04-01

New algorithm for multi targets detection in clutter edge radar environments

10.11591/ijeecs.v18.i1.pp420-427
Mustafa Subhi Kamal , Jiwa Abdullah
This paper deals with the problem of multi target detection that appears inside clutter cloud which represent the worst radar environments by using constant false alarm rate CFAR algorithm, in order to achieve maximum probability of detection with constant false alarm rate, to detect target in such environments it need to construct robust constant false alarm CFAR algorithm that excise the target spikes from CFAR window and deal with clutter edges in order to give best possible estimation to the noise background. Modified cell averaged (CA-CFAR) is analyzed and compared with Two important algorithms which are cell averaged (CA-CFAR) and ordered statistics (OS-CFAR) algorithms in additional to the modified CA-CFAR algorithm. All these algorithms were simulated with mat lab and applied them to matlab clutter test model that represent different radar environment cases. Tradeoff among these algorithms depending on their responses.
Volume: 18
Issue: 1
Page: 420-427
Publish at: 2020-04-01

Detection and recognition of brain tumor based on DWT, PCA and ANN

10.11591/ijeecs.v18.i1.pp56-63
Nidhal Khdhair El abbadi , Zahraa Faisal Shoman
Brain tumor is one of more dangerous diesis that affected more than 100 persons every day. The challenge is how to detect and recognise benign and malignant tumor without surgery. In this paper, initially, brain images are filtered to remove unwanted particles, then a new method for automatic segmentation of lesion area is carried out based on mean and standard deviation. Combining both solidity property and morphological operation used to detect only the tumor from segmented image. Mathematical morphology such as close used to join narrow breaks regions in an object, fill the small holes and remove small objects. Features extracted from image by using wavelet transform, followed by applying principle component analysis (PCA) to reduce the dimensions of features. Classification of tumor based on neural network, where the inputs to the network are thirteen statistical features and textural features. The algorithm is trained with 20 of brain MRI images and tested with 45 brain MRI images. Accuracy for this method was encourage and reach near 100% in identifying normal and abnormal tissues from MRI images.
Volume: 18
Issue: 1
Page: 56-63
Publish at: 2020-04-01

Role of heat source/sink on time dependent free convective flow in a coaxial cylinder filled with porous material: a semi analytical approach

10.11591/ijape.v9.i1.pp67-77
Taiwo S. Yusuf , Gambo Dauda
In this article, the semi analytical solution for a fully developed time dependent free convective flow of a viscous incompressible fluid with heat source/sink in an infinite vertical coaxial cylinder saturated with porous material has been analyzed. The flow was induced by buoyancy forces due to temperature differences caused by the thermal insulation of the inner wall and constant heating of the outer wall. The Laplace transform technique was employed to transform the governing equation from time domain to the Laplace domain. Notwithstanding, a numerical inversing scheme known as Riemann-sum approximation (RSA), renowned for its precision has been utilized to transform the Laplace domain solution to time domain. The accuracy of the numerical technique employed was tested by presenting a comparison with the numerical values obtained using RSA, PDEPE, and steady state solution at large time. The effects of the various flow parameters on the flow formation are exhibited graphically. It is interesting to note that the fluid temperature and velocity increases as time passes. In addition, the velocity can be enhanced and minimized by gradually increasing Darcy number and the viscosity ratio respectively. However, the increase is seen to be more prominent when heat source is applied. The drag on both walls are seen to increase with increase in Darcy number, the reverse trend is observed with increase in the viscosity ratio.
Volume: 9
Issue: 1
Page: 67-77
Publish at: 2020-04-01

Diacritic segmentation technique for arabic handwritten using region-based

10.11591/ijeecs.v18.i1.pp478-484
Ahmed Abdalla Shiekh , Mohd Sanusi Azmi , Maslita Abd Aziz , Mohammed Nasser Al-Mhiqani , Salem Saleh Bafjaish
Arabic is a broadly utilized alphabetic composition framework on the planet, and it has 28 essential letters. The letters in order was first used to compose messages in Arabic, most prominently the Qur'an the holy book of Islam. However, Arabic language has diacritics in the word or letters which are not something extra or discretionary to the language, rather they are a vital piece of it. By changing some diacritics may change both the syntax and semantics of a word by turning a word into another. However, the current researches address the foreground image and consider the diacritics as noises or secondary images. Thus, it is not suitable for Arabic handwritten. The diacritics will be removed from the image and this will lead to losing some good features.   Furthermore, to extract the diacritics, the region-based segmentation technique is used. The image will be measured based on the region properties by first finding the connected component in binary image, and then we will determine the best area range measurement in that region for each image. The proposed technique region based has been tested in nine different images with different handwritten style, and successfully extracted secondary foreground images (diacritics) for each image.
Volume: 18
Issue: 1
Page: 478-484
Publish at: 2020-04-01

Type-2 fuzzy logic controller optimized by wavelet networks for mobile robot navigation

10.11591/ijeecs.v18.i1.pp326-334
Fatma Affane , Kadda Zemalache Meguenni , Abdelhafid Omari
In this work, we will use a new control strategy based on the integration of a type-2 fuzzy reasoning optimized by wavelet networks as part of a navigation system of a mobile robot. The proposed approach is able to facilitate the navigation task in an autonomous manner, in order to determine which commands must be sent at each moment to the mobile robot. This operation must take into account convergence towards a goal with the shortest possible path in the minimum delay between the starting position and the target position. Once the goal is reached, the robot stops.  
Volume: 18
Issue: 1
Page: 326-334
Publish at: 2020-04-01

Reinforcement learning based multi core scheduling (RLBMCS) for real time systems

10.11591/ijece.v10i2.pp1805-1813
Dhruva R. Rinku , M. AshaRani
Embedded systems with multi core processors are increasingly popular because of the diversity of applications that can be run on it. In this work, a reinforcement learning based scheduling method is proposed to handle the real time tasks in multi core systems with effective CPU usage and lower response time. The priority of the tasks is varied dynamically to ensure fairness with reinforcement learning based priority assignment and Multi Core MultiLevel Feedback queue (MCMLFQ) to manage the task execution in multi core system.
Volume: 10
Issue: 2
Page: 1805-1813
Publish at: 2020-04-01

Transient development of MHD natural convection flow in vertical concentric annulus

10.11591/ijape.v9.i1.pp58-66
Basant K. Jha , Taiwo S. Yusuf
This paper examines the role of magnetic field on fully developed natural convection flow in an annulus due to symmetric of surfaces. The transport equations concerned with the model under consideration are rendered non-dimensional and transformed into the ordinary differential equation using Laplace transform technique. The solution obtained is then transformed to time domain using the Riemann-sum approximation approach. The governing equations are also solved using implicit finite difference method so as to establish the accuracy of the Riemann-sum approximation approach at transient as well as at steady state solution. The solutions obtained are graphically represented and the effects of pertinent parameters on the flow formation are investigated in detail. The Hartmann number (M), is seen to have a retarding effect on the velocity, skin-frictions and the mass flow rate. Also, skin-friction at both surfaces and the mass flow rate within the annulus are found to be directly proportional to the radii ratio (λ).
Volume: 9
Issue: 1
Page: 58-66
Publish at: 2020-04-01

Multiple watermarking technique using optimal threshold

10.11591/ijeecs.v18.i1.pp368-376
Noruhida Alias , Ferda Ernawan
The multiple watermarking technique has drawn more attention due to high demand for embedding more than one copyright. This paper proposes a multiple watermarking scheme using DWT-SVD by utilizing HVS characteristics. Our scheme embeds multiple watermarks in red and blue colors. The proposed scheme examines the coefficients of U orthogonal matrix for embedding and extracting watermarks. Watermarks are scrambled by Arnold transform before embedded in the host image in order provide additional security. The optimal thresholds for red and blue colors are revealed by finding a trade-off between normalized-cross correlation and imperceptibility from quantization steps. The experimental results demonstrate that our scheme achieves high resistant under JPEG and JPEG2000 compression for both inserted watermarks. 
Volume: 18
Issue: 1
Page: 368-376
Publish at: 2020-04-01
Show 1153 of 1995

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration