Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,922 Article Results

Security system testing on electronic integrated antenatal care (e-iANC)

10.11591/ijece.v10i1.pp346-352
Hosizah Hosizah , Fachmi Tamzil
Electronic Integrated Antenatal Care (e-iANC) was built as a web-based application to assist midwives in recording Antenatal Care (ANC) data including Patient Registration; Anamnesis; Physical Examination; Laboratory Test, Screening of Risk Pregnancy; Communication, Information and Education; Treatment and follow-up; Patient Disposition. To ensure e-iANC becomes a safe system, security system testing was needed. Our goals were to test the security system by using the Open Web Application Security Project (OWASP). It was conducted in computer laboratory at Universitas Esa Unggul Jakarta in August 2017. The OWASP detect include Injection, Broken Authentication and Session Management, Cross-Site Scripting (XSS), Insecure Direct Object References, Security Misconfiguration, Sensitive Data Exposure, Missing Level Access Control, Cross Site Request Forgery (CSRF), Using Known Vulnerable Components, Unvalidated Redirects and Forwards. The results indicated the risk level of e-iANC was the low category in the aspect of Cross-Domain JavaScript Source File Inclusion, Private IP Disclosure, XSS Protection Not Enabled Web Browser.
Volume: 10
Issue: 1
Page: 346-352
Publish at: 2020-02-01

Evaluating the tracking e-Files prototype project based on the task technology fit model

10.11591/ijeecs.v17.i2.pp728-738
Nassir Jabir Al-khafaji , Riyad Mubarak Abdullah , Mohammed A. Kashmoola
Locating files in an exact time is considered one of the greatest problems and the tedious process in universities nowadays. This problem becomes greater when the university has a large number of departments and transactions, as well as the documents are moving from one department to another. Especially, developing countries that have many problems and unstable environment and that may lead to lost or damage the important documents that influence on the decision making. Furthermore, the traditional manner not only wasted the time and energy, but also the paper cost for printing copies of required file. And with the advancement of technology and the increase of Internet users, documents are still being sent in Iraqi universities manually between departments. Although the higher education and scientific research ministry was recommended the public universities for using modern technologies during the daily transactions between the departments or amongst the units.  Therefore, this study sought to design and evaluate the prototype system which tracks movements of the documents from one department to another as well as check the completion rate for each department. For providing opportunities to assess how well the use of e-file tracking system meets the needs of management units in universities. The systems implementation research notes the need to fit between tasks, technologies and users.  Thus, this empirical study utilized the task technology fit model for this purpose. The results from selected participants indicated that all the factors significant effect on the employee’s performance in E-file Tracking System, excepted, task characteristics. This study will be contributed to reduce the corruption and enhance the transparency and help the decision-makers make the right decision at the right time.
Volume: 17
Issue: 2
Page: 728-738
Publish at: 2020-02-01

Low complexity DCO-FBMC visible light communication system

10.11591/ijece.v10i1.pp928-934
Abdullah A. Qasim , M. F. L. Abdullah , Rahmat Bin Talib , Mohammed N. Nemah , Ahmed T. Hammoodi
Filter Bank Multicarrier (FBMC) is a new waveform candidate in the visible light communication system (VLC). FBMC is a distinctive kind of multi-carrier modulation that can be regarded as an alternative to orthogonal frequency Division Multicarrier (OFDM) with CP (cyclic prefix). DCO-FBMC (DC-bias optical FBMC) has recently been used in VLC, because it overcomes all defects in the optical-OFDM system and has high spectral efficiency. but at the same time the traditional DCO-FBMC suffers from high complexity due to the use of Hermitian Symmetry for real signal, by using 2N-point subcarrier IFFT (Inverse Fast Fourier Transformer) in the modulator, and the output is N-point subcarrier FFT (Fast Fourier Transform) in the demodulator. In this paper, for the first time, the possibility of minimizing complexity and generating a real signal without the use of Hermitian Symmetry or any other technique has been verified. The proposed technology provides 50% of the size of the IFFT / FFT and this results in a significant reduction in power consumption and occupied chip area.
Volume: 10
Issue: 1
Page: 928-934
Publish at: 2020-02-01

A proposed java forward slicing approach

10.12928/telkomnika.v18i1.12655
Rana; Al-Zaytoonah University of Jordan Bader , Basem; Al-Zaytoonah University of Jordan Alukosh , Mohammad; Al-Zaytoonah University of Jordan Abdallah , Khalil; Al-Zaytoonah University of Jordan Awad , Amir; Universiti Malaysia Terengganu Ngah
Many organization, programmers, and researchers need to debug, test and make maintenance for a segment of their source code to improve their system. Program slicing is one of the best techniques to do so. There are many slicing techniques available to solve such problems such as static slicing, dynamic slicing, and amorphous slicing. In our paper, we decided to develop a tool that supports many slicing techniques. Our proposed tool provides new flexible ways to process simple segments of Java code, and it generates needed slicing according to the user needs, our tool will provide the user with direct and indirect dependencies for each variable in the code segments. This tool can work under various operating systems and does not need particular environments. Thus, our tool is helpful in many aspects such as debugging, testing, education, and many other elements.
Volume: 18
Issue: 1
Page: 311-316
Publish at: 2020-02-01

The performance of the vehicular communication-clustering process

10.12928/telkomnika.v18i1.13565
Omar; Philadelphia University Daoud , Ahlam; Philadelphia University Damati , Qadri; Philadelphia University Hamarsheh
For the new wireless systems and beyond, the intelligent transportation system is considered as one of the main features that could be covered in the new research topics. Furthermore, both high-speed data transmission and data processing play a crucial role for these generations. Our work covers two main propositions in order to attain an improvement in such intelligent systems performance. A clustering algorithm is proposed and presented for grouping mobile nodes based on their speeds with some modified head assignments processes. This will be combined with a parallel-processing technique that enhances the QoS. Mainly, this work concerns enhancing the V2V data transmission and the processing speed. Thus, a wavelet processing stage has been imposed to optimize the transmitted power phenomenon. In order to check the validity of such proposition, five main efficiency factors have been investigated; namely complementary cumulative distributions, bit rates, energy efficiency, the lifetime of cluster head and the ordinary nodes reattaching-head average times. 
Volume: 18
Issue: 1
Page: 57-71
Publish at: 2020-02-01

Analysis of energy losses reduction potential on the distribution line of campus building through electric power quality improvement

10.11591/ijeecs.v17.i2.pp868-876
Andi Pawawoi , Zuheldi Zuheldi , Fajril Akbar , Refdinal Nazir
In public and commercial buildings, the reduction of electricity consumption activities can be conducted through 3 paths, including improving the quality level of electric power, increasing the efficiency of electrical equipment, and reducing the waste of electric energy use. In this paper, the energy losses reduction potential on the distribution line of Engineering Faculty, Andalas University buildings through electric power quality improvement are analyzed. Power Quality (PQ) variables that considered in this analysis include power factor, unbalance current load and harmonics distortion. Analysis of correlation between PQ variables is required to determine the power loss on the distribution line of buildings. Using data of PQ variables recorded by Fluke Power Analyzer 435 series II, the energy losses of the distribution line without/with PQ improvement for each building is calculated. Analysis results have shown that the reduction potential is proportional to the value of PQ variables. Administrative faculty building with poor power quality has the potential to reduce its energy losses on the distribution line by 52.62% through power quality improvement. Civil engineering building group with quite good power quality only has the potential to reduce energy losses by 32.81%. Overall, the buildings in this faculty have the potential to reduce energy losses on distribution lines by 34.42% through its power quality improvement.
Volume: 17
Issue: 2
Page: 868-876
Publish at: 2020-02-01

Security techniques for intelligent spam sensing and anomaly detection in online social platforms

10.11591/ijece.v10i1.pp275-287
Monther Aldwairi , Loai Tawalbeh
The recent advances in communication and mobile technologies made it easier to access and share information for most people worldwide. Among the most powerful information spreading platforms are the Online Social Networks (OSN)s that allow Internet-connected users to share different information such as instant messages, tweets, photos, and videos. Adding to that many governmental and private institutions use the OSNs such as Twitter for official announcements. Consequently, there is a tremendous need to provide the required level of security for OSN users. However, there are many challenges due to the different protocols and variety of mobile apps used to access OSNs. Therefore, traditional security techniques fail to provide the needed security and privacy, and more intelligence is required. Computational intelligence adds high-speed computation, fault tolerance, adaptability, and error resilience when used to ensure security in OSN apps. This research provides a comprehensive related work survey and investigates the application of artificial neural networks for intrusion detection systems and spam filtering for OSNs. In addition, we use the concept of social graphs and weighted cliques in the detection of suspicious behavior of certain online groups and to prevent further planned actions such as cyber/terrorist attacks before they happen.
Volume: 10
Issue: 1
Page: 275-287
Publish at: 2020-02-01

Vascular dementia classification based on hilbert huang transform as feature extractor

10.11591/ijeecs.v17.i2.pp968-974
Wan Siti Nur Shafiqa Wan Musa , Mohd Ibrahim Shapiai , Hilman Fauzi , Aznida Firzah Abdul Aziz
Impairment of cognitive and working memory after stroke was common. Vascular dementia (VaD) was a prevalent type of dementia that was caused by an impaired blood supply to the brain because of a series of small strokes. Electroencephalogram (EEG) gives information about brain status and activity, so it had a lot of potential to be used in diagnosing people with dementia. Since the EEG signal is extremely non-linear and non-stationary data, traditional Fourier analysis such as Fast Fourier Transform (FFT) that broadens sinusoidal signals cannot describe the amplitude contribution of each frequency value in specific time. Meanwhile, Hilbert Huang Transform (HHT) was based on the characteristic local time scale of the signal, it can efficiently obtain instantaneous frequency and instantaneous amplitude for nonstationary and nonlinear data. In this paper, HHT was employed as feature extraction method to extract the energy features of frequency bands from post stroke patients and healthy subjects. The extracted features were fed into extreme learning machine (ELM) for classifying post stroke patient with VaD and healthy subjects. The results of classification accuracy using HHT as feature extractor and FFT as feature extractor were compared. The mean accuracy of classification using HHT was 59.14%, respectively, while mean accuracy of classification using FFT was 94.4%, respectively, in classifying post stroke patient with VaD and healthy subjects.
Volume: 17
Issue: 2
Page: 968-974
Publish at: 2020-02-01

Amplitude independent versus amplitude dependent muscle activity detection algorithms: a comparative study

10.11591/ijeecs.v17.i2.pp583-593
Husamuldeen K. Hameed , W. Z. Wan Hasan , Suhaidi Shafie , Siti Anom Ahmad , Haslina Jaafar
The amplitude dependent muscle activity detection algorithms of the surface electromyography (sEMG) signals are very sensitive to the changes in the background noise levels and the performance of these amplitude-based methods is highly deteriorated when the Signal to Noise ratio (SNR) of the sEMG signal is low. sEMG signals of deep and small muscles as well as sEMG signals recorded from patients that have neuromuscular diseases may not meet this SNR requirement which motivates the need for amplitude independent algorithms that can detect weak muscle activities. Moreover, the sEMG signal amplitude is not constant during the recording time due to the variation in the characteristics of the electrode-skin interface and due to the changes in the ground reference level. Therefore, the performance of the muscle activity detection algorithms should not be affected by the involuntary amplitude variations of the sEMG signal in order to achieve reliable control of robotic devices intended for disabled people.To accentuate the importance of the amplitude independent muscle activity detection methods over the amplitude dependent detection methods, a comparative study has been conducted in this paper between the performance of an amplitude independent muscle activity detection algorithm (FLA-MSE algorithm) and three amplitude dependent algorithms with respect to the detection capability of weak muscle activities and with respect to the immunity against false alarms. The results have showed that the performance of the amplitude independent algorithm outperformed the performance of the amplitude dependent algorithms for detecting weak muscle activities and for robustness against false alarms.
Volume: 17
Issue: 2
Page: 583-593
Publish at: 2020-02-01

Analysis of light tubes in interior daylighting system for building

10.11591/ijeecs.v17.i2.pp710-719
Badri Narayan Mohapatra , M Ravi Kumar , Sushanta Kumar Mandal
Analysis of vertical light tubes, and diffuser as daylighting system in buildings is presented. The solar light energy is directly addressed to the chosen area of the building with a light tube and diffuser guiding structure. This work highlights illuminance obtained by light tubes in a three storied office building. Field investigation with a scaled prototype, and simulations with HOLIGILM, and DIALux are analyzed. It is observed that light tubes can offer large savings in electricity usage by using natural daylight.
Volume: 17
Issue: 2
Page: 710-719
Publish at: 2020-02-01

Partial discharge detection device using ultrasonic sensor on medium voltage XLPE cable

10.11591/ijeecs.v17.i2.pp886-894
I. F Radzi , N H Nik , N Rameli , A. Mohd Ariffin , M. S. Abd Rahman , M. R Rahman , M. R Ahmad , A. S Salleh
There are many methods that have been studied by earlier researchers in order to detect the acoustic properties of Partial Discharge (PD) emitted by PD sources. One of the methods known as ultrasonic sensing on medium voltage Cross-Linked Polyethylene (XLPE) cable was adopted to detect partial discharges on commercial applications, usually by using Acoustic Emission (AE) sensors. This paper presents the processes of designing a PD sensor to detect the acoustic properties of the partial discharges on medium voltage XLPE cable. This PD sensor method works by detecting the partial discharges occurred at the joint of the cable which can act as an early warning device to help minimize the repair and maintenance costs of degrading cable. Result of the experiment shows the complete design of the prototype device, the device after fabrication and the functionality of the device. This design of the prototype can be beneficial for future uses in designing cost efficient and smaller sized PD detection devices. By positioning the sensor in horizontal position directly to the source of PD on the cable, the sensor will be able to detect acoustic properties of PD, by picking up the frequencies beyond 40 kHz. By varying the voltage applied values, a design of experiment (DOE) is carried out accordingly. Result of the experiment shows that the prototype device is functioning as expected, and hence this finding will be very useful to the consumers of power industries as the sensor device can serve as an alternative device to the commercialized PD sensing devices which are bulky and expensive.
Volume: 17
Issue: 2
Page: 886-894
Publish at: 2020-02-01

Network intrusion detection system using immune-genetic algorithm (IGA)

10.11591/ijeecs.v17.i2.pp1059-1065
Hamizan Suhaimi , Saiful Izwan Suliman , Ismail Musirin , Afdallyna Harun , Roslina Mohamad , Murizah Kassim , Shahrani Shahbudin
Network security is an important aspect in maintaining computer network systems and personal information from being illegally accessed by third parties. The major problem that frequently occurs in computer network systems is the failure in detecting possible network-attacks. Apart from that, the process of recognizing the type of attack that occurs is very crucial as it will determine the elimination process that should take place to counter the intrusion. This paper proposes the application of standard Genetic Algorithm (GA) that combines with immune algorithm process to enhance the computer system’s capability in recognizing possible intrusion occurrence in a computer system. Simulation was conducted numerous times to test the effectiveness of the proposed intrusion detection system by manipulating the parameter values for genetic operators utilized in GA. The effectiveness of the proposed method is shown in the gathered results and the analysis conducted further supports and proves that Immune Genetic Algorithm (IGA) has the capability to predict the occurrence of intrusion in computer network.
Volume: 17
Issue: 2
Page: 1059-1065
Publish at: 2020-02-01

Safety and security solution for school bus through RFID and GSM technologies

10.11591/ijeecs.v17.i2.pp804-814
Hasmah Mansor , Tun Mohamad Aqil Mohamad Fadzir , Teddy Surya Gunawan , Zuriati Janin
All children throughout the world aged 4 to 17 are going to schools every weekdays. The most common transport used by children is school bus.  In many countries accross the globe, most children uses school bus services to go to school and return back home especially to working parents.  Although safety of their children is always the main concern of all parents especially the young ones, they have to rely on the bus services due to time constraints during working hours. Sometimes parents need to call the bus driver to ensure their children has reached home or school.  This will create inconvenience to bus driver and may lead to other unwanted consequences. Realizing the root of this problem, a school bus safety and security system has been proposed. The school bus safety and security system is a solution based on Short Messaging System that notifies parents if their children have safely arrived at home or school. RFID and GSM technologies are the main technique proposed in this project. RFID is used for several purposes; to identify the children and parents’ contact number, and attendance monitoring through head count system. GSM is used as a commucation platform to inform parents’ on their children’s movement via SMS. Several tests have been conducted to analyse the overall performance of the developed hardware prototype. From the results, it can be concluded that the developed project is successfully identify the children based on their unique ID, send a text message through SMS to parents with required information; and additional feature of attendance checker. The hardware prototype was successfully tested for children’s identification, attendance and SMS notifications to parents. As a consequence, this project could increase the safety and security solution for children travelling with school bus transportation and give parents peace of mind.
Volume: 17
Issue: 2
Page: 804-814
Publish at: 2020-02-01

PSS/E based placement wind/PV hybrid system to improve stability of Iraqi grid

10.11591/ijece.v10i1.pp91-104
Nadheer A. Shalash , Yasar N. Lafta
Proper employment of Hybrid Wind/ PV system is often implemented near the load, and it is linked with the grid to study dynamic stability analysis. Generally, instability is because of sudden load demand variant and variant in renewable sources generation. As well as, weather variation creates several factors that affect the operation of the integrated hybrid system. So this paper introduces output result of a PV /wind via power electronic technique; DC chopper; that is linked to Iraqi power system to promote the facilitating achievement of Wind/ PV voltage. Moreover, PSS/E is used to study dynamic power stability for hybrid system which is attached to an effective region of Iraqi Network. The hybrid system is connected to Amara Old bus and fault bus is achieved to that bus and the stability results reflects that settling time after disturbance is not satisfactory. But, it is found that PV/wind generation system influences Iraqi grid stability to be better than that with only PV generation and the latter is better than stability of the grid that is enhanced with only wind generation. These results represent an important guideline for Iraqi power system planner.
Volume: 10
Issue: 1
Page: 91-104
Publish at: 2020-02-01

A service-oriented cloud modeling method and process

10.11591/ijece.v10i1.pp962-977
Chee-Yang Song , Eun-Sook Cho
The transition of software development from web to cloud has been accelerated. The development of cloud services requires a modeling method that reflects the characteristics of cloud including personalized service, resource sharing service, grouped and distributed services, and cross-platform operability. This study aimed to suggest a method of developing UML-based cloud services suitable for the characteristics of cloud services. A cloud service metamodel was defined using cloud applications’ characteristic modeling elements, and after that, how these cloud modeling elements are expressed into UML modeling elements was defined with an integrated metamodel between cloud and UML. By applying this hierarchical cloud metamodel, an MDA and MVC-based service-oriented cloud modeling process was established. By doing so, it will be possible to easily design services (applications) and solutions that are suitable for cloud computing environments, and in particular, to create hierarchical reuse models by the level of the abstraction of model-driven development.
Volume: 10
Issue: 1
Page: 962-977
Publish at: 2020-02-01
Show 1194 of 1995

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration