Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,922 Article Results

Optimal parameters of inverter-based microgrid to improve transient response

10.11591/ijece.v10i1.pp637-650
Sergio Andrés Pizarro Pérez , John E. Candelo-Becerra , Fredy E. Hoyos Velasco
The inertia issues in a microgrid can be improved by modifying the inverter control strategies to represent a virtual inertia simulation. This method employs the droop control strategy commonly used to share the power of a load among different power sources in the microgrid. This paper utilizes a modified droop control that represents this virtual inertia and applies an optimization algorithm to determine the optimal parameters and improve transient response. The results show better control when different variations are presented in the loads, leading the microgrid to have a better control of the operation. The optimization method applied in this research allows improvement to the transient response, thus avoiding unnecessary blackouts in the microgrid.
Volume: 10
Issue: 1
Page: 637-650
Publish at: 2020-02-01

A new model for iris data set classification based on linear support vector machine parameter's optimization

10.11591/ijece.v10i1.pp1079-1084
Zahraa Faiz Hussain , Hind Raad Ibraheem , Mohammad Alsajri , Ahmed Hussein Ali , Mohd Arfian Ismail , Shahreen Kasim , Tole Sutikno
Data mining is known as the process of detection concerning patterns from essential amounts of data. As a process of knowledge discovery. Classification is a data analysis that extracts a model which describes an important data classes. One of the outstanding classifications methods in data mining is support vector machine classification (SVM). It is capable of envisaging results and mostly effective than other classification methods. The SVM is a one technique of machine learning techniques that is well known technique, learning with supervised and have been applied perfectly to a vary problems of: regression, classification, and clustering in diverse domains such as gene expression, web text mining. In this study, we proposed a newly mode for classifying iris data set using SVM classifier and genetic algorithm to optimize c and gamma parameters of linear SVM, in addition principle components analysis (PCA) algorithm was use for features reduction.
Volume: 10
Issue: 1
Page: 1079-1084
Publish at: 2020-02-01

Hide text depending on the three channels of pixels in color images using the modified LSB algorithm

10.11591/ijece.v10i1.pp809-815
Rusul Mohammed Neamah , Jinan Ali Abed , Elaf Ali Abbood
At the moment, with the great development of information and communications technology, the transfer of confidential and sensitive data through public communications such as the Internet is very difficult to keep them from hackers and attackers. Therefore, it is necessary to work on the development of new and innovative ways to transfer such information and protect it to ensure that it reaches the desired goal. The goal of a new technique to hide information design not only hides the secret message behind the center cover, but it also provides increased security. The most common way to transfer important and confidential data is through embedding it into cover medium files in a way that does not affect the accuracy of the carrier file, which is known as hiding. In this paper, encryption and concealment techniques were used to protect data transferred from attackers. The proposed method relied on encryption of confidential information using the encryption key and the Xnor gate, after which the encrypted information was hidden in a color image using the LSB algorithm. The method of concealment depends on the extraction of chromatic channels of three RGB for each pixel and specifying the channel in which the bit of the encryption message will be hidden. Some metrics have been adopted to measure the quality of the resulting picture after hiding as PSNR and MSE, and achieve good results.
Volume: 10
Issue: 1
Page: 809-815
Publish at: 2020-02-01

Security framework for cloud based electronic health record (EHR) system

10.11591/ijece.v10i1.pp455-466
Raghavendra Ganiga , Radhika M. Pai , Manohara Pai M. M. , Rajesh Kumar Sinha
Health records are an integral aspect of any Hospital Management System. With newer innovations in technology, there has been a shift in the way of recording health information. Medical records which used to be managed using various paper charts have now become easier to organize and maintain, thereby increasing the efficiency of medical staff. The Electronic Health Records (EHR) System is becoming a high-tech medical management technology developed for the economic or emerging economic countries like India. In a national health system, the EHR integrates the Electronic Medical Records (EMR) in all collaborating hospitals through different networks. EHR gives healthcare professionals a way to share and manage patient data quickly and effectively. Due to the mass storage of confidential patient data, healthcare organizations are considered as one of the most targeted sectors by intruders. This paper proposes a security framework for EHR system, which takes into consideration the integrity, availability, and confidentiality of health records. The threats posed to the EHR system are modeled by STRIDE modeling tool, and the amount of risk is calculated using DREAD. The paper also suggests the security mechanism and countermeasures based on security standards, which can be utilized in an EHR environment. The paper shows that the utilization of the proposed methods effectively addresses security concerns such as breach of sensitive medical information.
Volume: 10
Issue: 1
Page: 455-466
Publish at: 2020-02-01

Quality assessment on muscle locations for speech representation

10.11591/ijeecs.v17.i2.pp957-967
Sairul Izwan Safie , Rosuhana Rahim
There are more than 68 muscles, which are activated either simultaneously or sequentially during speech production. To monitor the signals from all these muscles at once, involve a lot of sensors and such system is very expensive. In the Quran therapeutic treatment applications, the use of specific muscles is very important, for the production of correct Arabic pronunciation. The proper pronunciation will improve the reader's understanding of what is being read, thus assisting the effectiveness of the therapy process. The objective of this study is to identify the most optimal muscle location, which is suitable for monitoring the quality of a recitation during the Quran’s therapeutic process, based on the information content embedded in their Electromyogram (EMG) signals. Empirical Mode Decomposition (EMD) technique was used in this study to extract features of the EMG while the combination of Hilbert Huang Spectral Entropy (HHSE) and Kullback Leibler Divergence (KLD) techniques were used to quantify the information content in each feature. Combination of these techniques managed to rank ten widely used speech muscles in the literature based upon their information content. Four muscle locations have been suggested, which is believed to be sufficient in developing a low-cost self-assessment system for monitoring Quran recitation.
Volume: 17
Issue: 2
Page: 957-967
Publish at: 2020-02-01

ICT services features to support intrinsic value activities for productive ageing

10.11591/ijeecs.v17.i2.pp1096-1103
Norisan Abd Karim , Haryani Haron , Wan Adilah Wan Adnan
Intrinsic values associated with ICT services activities in productive ageing. Given the advances made in ICT services that have been widely used, elderlies need to be equipped with the knowledge in using the services. The lack of ICT usage among elderlies is because of the low motivation to use the ICT applications. This in turn could be due to the lack of intrinsic values associated with the use of ICT applications among elderlies. This study explores further the features of ICT services needed to support intrinsic values activities. Brainstorming sessions is conducted in this study where it involved six ICT experts in order to identify ICT services features to support intrinsic value activities. Intrinsic motivation features are significant features in ICT services to support intrinsic value activities for productive ageing. There are five intrinsic motivation features identified in this research, which are autonomy, competence, relatedness, altruism and curiosity. The ICT services to support intrinsic value activities model comprises of the ICT services characteristics that are transactive, community-based with online communication channels, and incorporated with intelligent agents.
Volume: 17
Issue: 2
Page: 1096-1103
Publish at: 2020-02-01

Stand-alone backup power system for electrical appliances with solar PV and grid options

10.11591/ijeecs.v17.i2.pp689-699
A. H. Sabre , Wan Zuha Wan Hasan , Farah Hani Nordin , Mohd Zainal Abidin Ab-Kadir
For a portable backup power system, there is an essential need to contribute to increasing the energy conversion efficiency between the source and the electrical household appliances to overcome the recent issues of global warming. This paper proposes a Backup power system (BPS) compatible with the capability to match with two primary power sources; Grid-Connected power as an AC and solar-PV as a DC power source. This system composes of a rechargeable battery bank of about 300V, while the voltage matching concept keeps maintaining the battery fully charged as long as the source power is available. Matlab-based simulation has performed to prove the concept of the adopted voltage-matching. A relay switch circuit controlled by the main power source is used to change-over the load/appliances between direct link through bypassing the main power and the storage battery power when both options of main power are unavailable. The result shows the excellent utilization of the traditional BPS losses, the proposed topology can achieve about 99% power efficiency as compared with the traditional one.
Volume: 17
Issue: 2
Page: 689-699
Publish at: 2020-02-01

Design of power factor meter using internet of things for power factor improvement, remote monitoring and data logging

10.11591/ijeecs.v17.i2.pp700-709
Teddy Surya Gunawan , Muhamad Hadzir Anuar , Mira Kartiwi , Zuriati Janin
Nowadays, many residential and commercial buildings that used electricity needs to take care the power factor to avoid penalty from the utility companies. A power factor that is close to one provides a good indicator for the overall power quality. Therefore, power factor improvement plays a significant role to reduce electricity consumption and more efficient system operation. In this paper, the design of power factor meter using Internet of Things will be discussed. Voltage and current sensors outputs were interfaced to Arduino, in which the real power and apparent power were calculated to determine the power factor. Results showed the effectiveness of our proposed device in measuring power factor. Moreover, the measured data points were logged in an SD card and can be accessed by computer with Matlab graphical user interface (GUI). In addition, IoT framework analysis for smart meter which can provide power factor improvement, remote monitoring, and data logging was further discussed in this paper.
Volume: 17
Issue: 2
Page: 700-709
Publish at: 2020-02-01

The influence of solar power and solar flux on the efficiency of polycrystalline photovoltaics installed close to a river

10.11591/ijeecs.v17.i2.pp988-996
Armstrong O. Njok , Ferdinand A. Kamgba , Manoj Kumar Panjwani , Fareed H Mangi
There is an increasing focus on utilizing the renewable energy resources, especially solar energy as the fossils are expected to deplete in near future. Solar Photovoltaics have remained of particular interest because of their relative lower overall efficiencies .Most researchers are trying to enhance the overall performance of Solar Photovoltaic and trying to study factor that may possible lead to an increase in the overall performance of a Solar Photovoltaic Panels. A thorough investigation was carried out to study the influence of solar power and solar flux on the performance parameters of Photovoltaic (Polycrystalline). The data used in the research was obtained by in-situ measurement approach using an SM206 precision digital solar power meter, a digital solar flux meter, and an M890C+ digital Multimeter. The result obtained shows an interesting correlation for current, efficiency and solar power as well as for solar flux which indicates that high solar power and solar flux positively enhances the performance of the photovoltaic. The results also reveal that once the solar power or solar flux reaching the photovoltaic exceeds 200W/m2 or 20Klux, the voltage from the photovoltaic approaches maximum and remains fairly stable irrespective of the amount of solar power or solar flux reaching the photovoltaic. The data collected for three months, July, August and September shows prediction efficiency of 87 %, 63% and 71% at 11:30am, 12:30 pm and 10:30 am respectively.
Volume: 17
Issue: 2
Page: 988-996
Publish at: 2020-02-01

Performance evaluation of portable air quality measurement system using raspberry pi for remote monitoring

10.11591/ijeecs.v17.i2.pp564-574
Muhammad Farhan Mohd Pu’ad , Teddy Surya Gunawan , Mira Kartiwi , Zuriati Janin
United Nations’ Sustainable Development Goals focuses on good health and well-being for all. Air pollution becomes a huge threat to delivering on the vision of a better world and related at least to Goal 3, 7, 11, and 13. In Malaysia, air pollution index were monitored on 68 locations. The Department of Environment monitors air quality using costly continuous air quality monitoring stations (CAQMs) installed at fixed locations of highly populated and industrial areas. The objective of this paper is to develop a portable air quality measurement system which can measure particulate matters (PM) smaller than 10 and 2.5 microns, and four hazardous gasses, including carbon monoxide, sulphur dioxide, ground level ozone and nitrogen dioxide, as well as humidity and temperature. Six sensors were used and validated using several rigorous experiments. The functionality of the system was evaluated by measuring sub-API readings in areas with low and high traffic volumes. Experimental results showed that the proposed system was highly responsive and able to detect the types and concentrations of air pollutants instantly. Furthermore, equipped with the mobile internet, geo-tagged GPS location and web server on Raspberry Pi, the developed portable system could be accessed remotely.
Volume: 17
Issue: 2
Page: 564-574
Publish at: 2020-02-01

Performance analysis of routing protocols in MANET

10.11591/ijeecs.v17.i2.pp1047-1052
Gajanan Madhavrao Walunjkar , Koteswara Rao Anne
Popularity of Mobile ad hoc network in research is  due to their ad hoc nature and effectiveness at the time of disaster management when no infrastructure support is available. Due to the limited transmission range of wireless network interfaces, multiple network hops may be needed for nodes to exchange data across the network. In such a network, each mobile node operates as a router, forwarding packets for other mobile nodes in the network that may not be within the direct reach. Routing protocols developed for wired networks such as the distance vector or link state protocols are inadequate here as they not only assume mostly fixed topology but also have high overheads. This has lead to several routing algorithms specifically targeted for ad hoc networks. In this paper, we include the MANET supported routing protocols and their performance analysis over different performance parameters such as packet delivery ratio, delay, throughput, control overhead and energy etc.
Volume: 17
Issue: 2
Page: 1047-1052
Publish at: 2020-02-01

A review of arabic text steganography: past and present

10.11591/ijeecs.v17.i2.pp1040-1046
Suhaibah Jusoh , Aida Mustapha , Azizan Ismail , Roshidi Din
Steganography is a strategy for hiding secret information in a cover document in order to avoid attacker from predict about hidden information. Steganography exploit cover message, for instance text, audio, picture and video to hide the secret message. Before this, linguistic text steganographic techniques are implemented just for the English language. But nowadays different languages are used to hide the data like Arabic language. This language is still new in the steganography and still need practices for empowerment. This paper will present the text steganographic method for Arabic language, scholar paper within 5 year will be analyze and compared. The main objective of this paper is to give the comparative analysis in the Arabic steganography method that has been applied by previous researchers. Finally, the disadvantage and advantage of the method also will be presented in this paper.
Volume: 17
Issue: 2
Page: 1040-1046
Publish at: 2020-02-01

Comparing load balancing algorithms for web application in cloud environment

10.11591/ijeecs.v17.i2.pp1104-1108
Zakaria Benlalia , Karim Abouelmehdi , Abderrahim Beni-hssane , Abdellah Ezzati
Cloud computing has emerged as a new paradigm for providing on-demand computing resources and outsourcing software and hardware infrastructures. Load balancing is one of the major concerns in cloud computing environment means how to distribute load efficiently among all the nodes. For solving such a problem, we need some load balancing algorithms, so in this paper we will compare the existing algorithms for web application.and based on results obtained we choose the best among them.
Volume: 17
Issue: 2
Page: 1104-1108
Publish at: 2020-02-01

Effect of optimal Multi-DG siting and sizing in transmission system using hybrid optimization technique for voltage control

10.11591/ijeecs.v17.i2.pp646-653
Sharifah A. Shaaya , Ismail Musirin , Shahril I. Sulaiman , Mohd H. Mansor , Sharifah A. S.Mustaffa
The advancement of Distributed Generation (DG) technologies have caused great impact to power system operation. Inappropriate installation of DGs may lead to over-compensation or under-compensation situation. Thus, a reliable optimization is urgent to avoid any unwanted effect. This paper analyses the installation impact of different types-multi-DGs determined using a pre-developed hybrid optimization technique termed as Immunized-Brainstorm-Evolutionary Programming (IBSEP). It is imperative to study the effect of multi-DGs installation such that a relevant utility can make a correct decision, whether its installation is worth or vice versa. Rigorous study has been conducted in terms of identifying the optimal location and sizing, installed on transmission system for voltage control involving different DG types. Comprehensive results are embedded in this paper to demonstrate the effect of multi-DGs installation in transmission system which in turns beneficial to the utility.
Volume: 17
Issue: 2
Page: 646-653
Publish at: 2020-02-01

Assistant robot through deep learning

10.11591/ijece.v10i1.pp1053-1062
Robinson Jiménez-Moreno , Javier Orlando Pinzón-Arenas , César Giovany Pachón-Suescún
This article presents a work oriented to assistive robotics, where a scenario is established for a robot to reach a tool in the hand of a user, when they have verbally requested it by his name. For this, three convolutional neural networks are trained, one for recognition of a group of tools, which obtained an accuracy of 98% identifying the tools established for the application, that are scalpel, screwdriver and scissors; one for speech recognition, trained with the names of the tools in Spanish language, where its validation accuracy reach a 97.5% in the recognition of the words; and another for recognition of the user's hand, taking in consideration the classification of 2 gestures: Open and Closed hand, where a 96.25% accuracy was achieved. With those networks, tests in real time are performed, presenting results in the delivery of each tool with a 100% of accuracy, i.e. the robot was able to identify correctly what the user requested, recognize correctly each tool and deliver the one need when the user opened their hand, taking an average time of 45 seconds in the execution of the application.
Volume: 10
Issue: 1
Page: 1053-1062
Publish at: 2020-02-01
Show 1184 of 1995

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration