Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,922 Article Results

Noval advance non-linear descriptor and characteristic equivalency to predict CT from MRI image

10.11591/ijict.v9i1.pp46-56
Sowmya Bachu , Shrutibhargava Choubey , Abhishek Choubey
Attenuation correction designed for PET/MR hybrid imaging frameworks along with portion making arrangements used for MR-based radiation treatment remain testing because of lacking high-energy photon weakening data. We present a new method so as to uses the learned nonlinear neighborhood descriptors also highlight coordinating toward foresee pseudo-CT pictures starting T1w along with T2w MRI information. The nonlinear neighborhood descriptors are acquired through anticipating the direct descriptors interested in the nonlinear high-dimensional space utilizing an unequivocal constituent guide also low-position guess through regulated complex regularization. The nearby neighbors of every near descriptor inside the data MR pictures are looked during an obliged spatial extent of the MR pictures among the training dataset. By that point, the pseudo-CT patches are evaluated through k-closest neighbor relapse. The planned procedure designed for pseudo-CT forecast is quantitatively broke downward on top of a dataset comprising of coordinated mind MRI along with CT pictures on or after 13 subjects.
Volume: 9
Issue: 1
Page: 46-56
Publish at: 2020-02-11

Area calculation based on GADM geographic information system database

10.12928/telkomnika.v18i3.14901
Adi; Universitas Kristen Satya Wacana Setiawan , Eko; Universitas Kristen Satya Wacana Sediyono
This paper aims to provide an overview of the calculation of the area of Indonesia based on the boundaries of sub-district/village, district, regency/city. The circle approach method is proposed as a fast method for determining the land area of Indonesia. The total area of Indonesia can be obtained by adding up to 33 provinces or 502 regencies/cities or 6696 districts or 77474 sub-districts. Calculation of the area of the area using district boundaries is better used in the calculation of the area of Indonesia which is obtained 1,965,443.51 km2. The results obtained are 2.53% bigger than the reference area.
Volume: 18
Issue: 3
Page: 1416-1421
Publish at: 2020-02-07

Unified adaptive framework for contrast enhancement of blood vessels

10.11591/ijece.v10i1.pp767-777
Pearl Mary S. , Thanikaiselvan V.
Information about blood vessel structures influences a lot of diseases in the medical realm. Therefore, for proper localization of blood vessels, its contrast should be enhanced properly. Since the blood vessels from all the medical angio-images have almost similar properties, a unified approach for the contrast enhancement of blood vessel structures is very useful. This paper aims to enhance the contrast of the blood vessels as well as the overall contrast of all the medical angio-images. In the proposed method, initially, the vessel probability map is extracted using hessian eigenanalysis. From the map, vessel edges and textures are derived and summed at every pixel location to frame a unique fractional differential function. The resulting fractional value from the function gives out the most optimal fractional order that can be adjusted to improve the contrast of blood vessels by convolving the image using Grunwald-Letnikov (G-L) fractional differential kernel. The vessel enhanced image is Gaussian fitted and contrast stretched to get overall contrast enhancement. This method of enhancement, when applied to medical angio-images such as the retinal fundus, Computerised Tomography (CT), Coronary Angiography (CA) and Digital Subtraction Angiography (DSA), has shown improved performance validated by the performance metrics.
Volume: 10
Issue: 1
Page: 767-777
Publish at: 2020-02-01

The transient stability analysis of wind turbines interconected to grid under fault

10.11591/ijece.v10i1.pp600-608
Anass Gourma , Abdelmajid Berdai , Moussa Reddak
Wind farm has been growing in recent years due to its very competitive electricity production cost. Wind generators have gone from a few kilowatts to megawatts. However, the participation of the wind turbine in the stability of the electricity grid is a critical point to check, knowing that the electricity grid is meshed, any change in active and reactive flux at the network level affects its stability. With a rate of 50% wind turbine penetration into the electricity grid, the stability of the rotor angle is a dynamic phenomenon which is only visible by the variation of the active energy. The purpose of this journal is to verify the impact of wind turbine integration on an electrical grid, by exploiting the relationship between the reactive energy produced by the Doubly Fed Induction Generator equipping most wind energy systems, and the stability of the rotor angle of the synchronous generators equipping the conventional power plants in the electrical system.
Volume: 10
Issue: 1
Page: 600-608
Publish at: 2020-02-01

Identification of hijaiyah letters using wirelessly controlled arabic braille module

10.11591/ijeecs.v17.i2.pp826-833
Nik Azimah Zainab Nik Mohd Rahimi , Noor Hazrin Hany Mohamad Hanif , Zuriati Janin
Among the major issues faced by the visually impaired people is the inability to read, and this is could be addressed by learning braille. However the scarcity of skilled instructors to teach the braille codes to the visually impaired people limits the learning process. This paper presents a psychophysical study on the ability of people with visual challenges to identify hijaiyah letters from a specially developed Arabic braille module. This module consists of six miniature solenoids that are wirelessly controlled via a Bluetooth and an Arduino Uno microcontroller. Five different hijaiyah letters were provided to the participants and were randomly repeated for three times. The participants were required to touch the Arabic braille module and state the hijaiyah letters that were displayed. With priori knowledge and initial familiarization of the braille patterns, 72.9% of the trials showed accuracy between the braille display and the stated hijaiyah letters. 20% of the participants have the highest repeatability responses of 80%. The outcome of this work showed the optimistic capability of the wirelessly controlled Arabic braille display to assist visually impaired individual to read hijaiyah braille letters and ultimately promotes independence in learning.  
Volume: 17
Issue: 2
Page: 826-833
Publish at: 2020-02-01

DNA computing based stream cipher for internet of things using MQTT protocol

10.11591/ijece.v10i1.pp1035-1042
Noor A. Hussein , Mohamed Ibrahim Shujaa
Internet of Things (IoT) is a rapidly developing technology that enables “devices” to communicate and share information amongst them without human control. The devices have the features of internet connectivity and networking. Due to the increasing demands of a secure environment in IoT application, security has become a crucial aspect on which researchers have been increasingly focused. Connecting devices to the internet can facilitate intruders to attack devices as they can access the data from anywhere in the globe. In this work, an encryption–decryption process-based stream cipher has been used. The messages between IoT nodes were encrypted using One Time Pad (OTP) and DNA computing. Furthermore, the required key sequence was generated using a linear feedback shift register (LFSR) as a pseudo number key generator. This key sequence was combined to generate a unique key for each message. The algorithm was implemented using source python and tested on a Raspberry pi under Linux open operation system.
Volume: 10
Issue: 1
Page: 1035-1042
Publish at: 2020-02-01

Design of carbon nanotube field effect transistor (CNTFET) small signal model

10.11591/ijece.v10i1.pp180-187
Soheli Farhana
The progress of Carbon Nanotube Field Effect Transistor (CNTFET) devices has facilitated the trimness of mobile phones, computers and all other electronic devices. CNTFET devices contribute to model these electronics instruments that require designing the devices. This research consists of the design and verification of the CNTFET device's small signal model. Scattering parameters (S-parameters) is extracted from the CNTFET model to construct equivalent small model circuit. Current sources, capacitors and resistors are involved to evaluate this equivalent circuit. S-parameters and small signal models are elaborated to analyze using a technique to form the small signal equivalent circuit model. In this design modeling process, at first intrinsic device's Y-parameters are determined. After that series of impedances are calculated. At last, Y-parameters model are transformed to add parasitic capacitances. The analysis result shows the acquiring high frequency performances are obtained from this equivalent circuit.
Volume: 10
Issue: 1
Page: 180-187
Publish at: 2020-02-01

Novel authentication framework for securing communication in internet-of-things

10.11591/ijece.v10i1.pp1092-1100
Shamshekhar S. Patil , Arun Biradar
Internet-of-Things (IoT) offers a big boon towards a massive network of connected devices and is considered to offer coverage to an exponential number of the smart appliance in the very near future. Owing to the nascent stage of evolution of IoT, it is shrouded by security loopholes because of various reasons. Review of existing research-based solution highlights the usage of conventional cryptographic-based solution over the traditional mechanism of data forwarding process between IoT nodes and gateway. The proposed system presents a novel solution to this problem by a model that is capable of performing a highly secured and cost-effective authentication process. The proposed system introduces Authentication Using Signature (AUS) as well as Security with Complexity Reduction (SCR) for the purpose to resist participation of any form of unknown threats. The outcome of the model shows better security strength with faster response time and energy saving of the IoT nodes.
Volume: 10
Issue: 1
Page: 1092-1100
Publish at: 2020-02-01

Vertex markers: Modification of grid methods as markers to reproduce large size augmented reality objects to afford hands

10.11591/ijece.v10i1.pp1063-1069
Wahyu Teja Kusuma , Ahmad Afif Supianto , Herman Tolle
The weakness of the research on developing Marker Based Augmented Reality applications found is using small digital content. Weakness is caused by the area of view of Augmented Reality cameras is limited by the placement of markers that are affordable to the user's hand. This study reproducing large digital objects by cutting large digital objects into many pieces. But to keep continuity accuracy between digital object pieces, this study aims to modify the grid method to become a vertex marker. Vertex marker is produced by removing the edge and using the vertex to place the marker. Vertex markers inherit the advantages of the Grid method. Therefore, vertex markers can be used to reproduce large digital objects accurately and can be reached by hand when displayed. The aim of this study is to measure the accuracy of the grid method that has been modified into a marker. The fundamental contributions and advantages of the vertex marker are innovations in the field of Marker Based Augmented Reality research.
Volume: 10
Issue: 1
Page: 1063-1069
Publish at: 2020-02-01

Healthcare information exchange using blockchain technology

10.11591/ijece.v10i1.pp421-426
A. Murugan , Tushar Chechare , B. Muruganantham , S. Ganesh Kumar
Current trend in health-care industry is to shift its data on the cloud, to increase availability of Electronic Health Records (EHR) e.g. Patient’s medical history in real time, which will allow sharing of EHR with ease. However, this conventional cloud-based data sharing environment has data security and privacy issues. This paper proposes a distributed solution based on blockchain technology for trusted Health Information Exchange (HIE). In addition to exchange of EHR between patient and doctor, the proposed system is also used in other aspects of healthcare such as improving the insurance claim and making data available for research organizations. Medical data is very sensitive, in both social as well as legal aspects, so permissioned block-chain such as Hyperledger Fabric is used to retain the necessary privacy required in the proposed system. As, this is highly permissioned network where the owner of the network i.e. patient holds all the access rights, so in case of emergency situations the proposed system has a Backup Access System which will allow healthcare professionals to access partial EHR and this backup access is provided by using wearable IOT device.
Volume: 10
Issue: 1
Page: 421-426
Publish at: 2020-02-01

A survey of data recovery on flash memory

10.11591/ijece.v10i1.pp360-376
Van Dai Tran , Dong-Joo Park Park
In recent years, flash memory has become more widely used due to its advantages, such as fast data access, low power consumption, and high mobility. However, flash memory also has drawbacks that need to be overcome, such as erase-before-write, and the limitations of block deletion. In order to address this issue, the FTL (Flash Translation Layer) has been proposed with useful functionalities like address mapping, garbage collection, and wear-leveling. During the process of using, the data may be lost on power failure in the storage systems. In some systems, the data is very important. Thus recovery of data in the event of the system crash or a sudden power outage is of prime importance. This problem has attracted attention from researchers and many studies have been done. In this paper, we investigate previous studies on data recovery for flash memory from FTL processing solutions to PLR (Power Loss Recovery) solutions that have been proposed by authors in the conference proceeding, patents, or professional journals. This will provide a discussion of the proposed solutions to the data recovery in flash memory as well as an overview.
Volume: 10
Issue: 1
Page: 360-376
Publish at: 2020-02-01

A hybrid non-dominated sorting genetic algorithm for a multi-objective demand-side management problem in a smart building

10.11591/ijece.v10i1.pp559-574
Zineb Garroussi , Rachid Ellaia , El-Ghazali Talbi , Jean-Yves Lucas
One of the most significant challenges facing optimization models for the demand-side management (DSM) is obtaining feasible solutions in a shorter time. In this paper, the DSM is formulated in a smart building as a linear constrained multi-objective optimization model to schedule both electrical and thermal loads over one day. Two objectives are considered, energy cost and discomfort caused by allowing flexibility of loads within an acceptable comfort range. To solve this problem, an integrative matheuristic is proposed by combining a multi-objective evolutionary algorithm as a master level with an exact solver as a slave level. To cope with the non-triviality of feasible solutions representation and NP-hardness of our optimization model, in this approach discrete decision variables are encoded as partial chromosomes and the continuous decision variables are determined optimally by an exact solver. This matheuristic is relevant for dealing with the constraints of our optimization model. To validate the performance of our approach, a number of simulations are performed and compared with the goal programming under various scenarios of cold and hot weather conditions. It turns out that our approach outperforms the goal programming with respect to some comparison metrics including the hypervolume difference, epsilon indicator, number of the Pareto solutions found, and computational time metrics.
Volume: 10
Issue: 1
Page: 559-574
Publish at: 2020-02-01

Characterization and modeling the effect of temperature on power HBTs InGaP/GaAs

10.11591/ijece.v10i1.pp581-588
Mokeddem Nadjet , Ghaffour Kheireddine
The variation and stability of HBT’s parameters at different temperatures are important for utilizing these devices in high-power integrated circuits. The temperature dependence of the DC current gain of bipolar transistors, as a key device parameter, has been extensively investigated. A major issue of the power HBT’s is that the current gain is decreased with junction temperature due to self-heating effect. Hence, how to stabilize the DC current gain and RF performances is important issue to develop the power HBTs. This work describes the DC and high-frequency temperature dependence of InGaP/GaAs HBT’s. The substrate temperature (T) was varied from 25 to 150°C. The static and dynamic performances of the HBT are degraded at high temperature, due to the reduced of carrier mobility with increasing temperature. The current gain (β) decreases at high temperatures; from 140 to 127 at 25 to 150°C, while the decreases in the peak Ft and Fmax are observed from about 110 GHz to 68 GHz and from 165 GHz to 53 GHz respectively in the temperature range of 25 to 150°C.
Volume: 10
Issue: 1
Page: 581-588
Publish at: 2020-02-01

Performance evaluation of random forest with feature selection methods in prediction of diabetes

10.11591/ijece.v10i1.pp353-359
Raghavendra S , Santosh Kumar J
Data mining is nothing but the process of viewing data in different angle and compiling it into appropriate information. Recent improvements in the area of data mining and machine learning have empowered the research in biomedical field to improve the condition of general health care. Since the wrong classification may lead to poor prediction, there is a need to perform the better classification which further improves the prediction rate of the medical datasets. When medical data mining is applied on the medical datasets the important and difficult challenges are the classification and prediction. In this proposed work we evaluate the PIMA Indian Diabtes data set of UCI repository using machine learning algorithm like Random Forest along with feature selection methods such as forward selection and backward elimination based on entropy evaluation method using percentage split as test option. The experiment was conducted using R studio platform and we achieved classification accuracy of 84.1%. From results we can say that Random Forest predicts diabetes better than other techniques with less number of attributes so that one can avoid least important test for identifying diabetes.
Volume: 10
Issue: 1
Page: 353-359
Publish at: 2020-02-01

Software reusability development through NFL approach for identifying security based inner relationships of affecting factors

10.11591/ijece.v10i1.pp333-345
T. Rajani Devi , B. Rama
In component based software reusability development process, the software developers have to choose the best components which are self adaptive future to overcome the functional errors, framework mismatches, violation of user level privacy issues and data leakage feasibilities. The software developers can build high quality software applications by taking the consideration of the reusable components which are more suitable to provide high level data security and privacy. This paper has proposing the neural based fuzzy framework based approach to estimate the reusable components which are directly and indirectly involve the security and privacy to improve the quality of the software system. This approach has considered the twenty effecting factors and fifty three attribute matrices. It has formed with three stages of execution scenarios. The first stage has executed with eleven effecting factors and eighteen attribute matrices for identification of supporting software reusability components, the second stage has executed with four effecting factors and thirty five attribute matrices for identification of sub-internal relationships in terms of security-privacy, and the third stage has executed with eight effecting factors and six attribute matrices for identification of sub of sub-internal relationships in terms of security risk estimation. This analytical finding proposes a fuzzy logic model to evaluate the most feasible effecting factors that influence the enterprise level data security-privacy practices at real time environment.
Volume: 10
Issue: 1
Page: 333-345
Publish at: 2020-02-01
Show 1181 of 1995

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration