Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,922 Article Results

A planar UWB semicircular-shaped monopole antenna with quadruple band notch for WiMAX, ARN, WLAN, and X-Band

10.11591/ijece.v10i1.pp908-918
Majed O. Al-Dwairi
This paper proposed quadruple notched frequency bands ultra-wideband (UWB) antenna. The antenna is a semicircular-shaped monopole type of a compact size 36x24 mm, covering frequency range of 3.02-14 GHz. Four rejected narrow bands including WiMAX (3.3-3.7GHz), ARN (4.2-4.5 GHz), WLAN (5.15-5.825GHz), X-Band (7.25-7.75) have been achieved using inserting slots techniques in the patch, feed line, and ground plane. The slots dimensions have been optimized for the required reject bands. The antenna design and analysis have been investigated by simulation study using CST-EM software package. The antenna characteristics including impedance bandwidth, surface current, gain, radiation efficiency, radiation pattern have been discussed.
Volume: 10
Issue: 1
Page: 908-918
Publish at: 2020-02-01

Multi cases optimal reactive power dispatch using evolutionary programming

10.11591/ijeecs.v17.i2.pp662-670
Rahmatul Hidayah Salimin , Ismail Musirin , Zulkiffli Abdul Hamid , Afdallyna Fathiyah Harun , Saiful Izwan Suliman , Hadi Suyono , Rini Hasanah
Evolutionary Programming (EP) is one of many types in Evolutionary Computation (EC) that used for optimization process. EP technique is used to find the optimal reactive power dispatch (ORPD) since it is one of the accessible options schemes that can be used on the system as a reactive power support. Sometimes, it is not necessary to operate all generators in order to perform ORPD to in achieve the objectives. Also, increment of reactive power load to the system will cause voltage decomposes with the increase in transmission loss in the system. Therefore, the proposed method decides the best grouping of generators that should be operated in system by bearing in mind the transmission loss reduction. ORPD will be used to minimize the transmission loss as well the increasing reactive power loading. This method conducted on IEEE 30-bus Test System with multi cases scenario. The best combination of operating generators determined and the transmission loss after optimization is smaller compared to the transmission loss before optimization resulted.
Volume: 17
Issue: 2
Page: 662-670
Publish at: 2020-02-01

Quantum cryptography for secured communication networks

10.11591/ijece.v10i1.pp407-414
B. Muruganantham , P. Shamili , S. Ganesh Kumar , A. Murugan
Quantum cryptography is a method for accessing data with the cryptosystem more efficiently. The network security and the cryptography are the two major properties in securing the data in the communication network. The quantum cryptography uses the single photon passing through the polarization of a photon. In Quantum Cryptography, it's impossible for the eavesdropper to copy or modify the encrypted messages in the quantum states in which we are sending through the optical fiber channels. Cryptography performed by using the protocols BB84 and B92 protocols. The two basic algorithms of quantum cryptography are Shor’s algorithm and the Grover’s’s algorithm. For finding the number of integer factorization of each photon, Shor’s algorithm is used. Grover’s’s algorithm used for searching the unsorted data. Shor’s algorithm overcomes RSA algorithm by high security. By the implementation of quantum cryptography, we are securing the information from the eavesdropper and thereby preventing data in the communication channel.
Volume: 10
Issue: 1
Page: 407-414
Publish at: 2020-02-01

Optimal design of adaptive power scheduling using modified ant colony optimization algorithm

10.11591/ijece.v10i1.pp738-745
Vijo M Joy , S. Krishnakumar
For generating and distributing an economic load scheduling approach, artificial neural network (ANN) has been introduced, because power generation and power consumption are economically non-identical. An efficient load scheduling method is suggested in this paper. Normally the power generation system fails due to its instability at peak load time. Traditionally, load shedding process is used in which low priority loads are disconnected from sources. The proposed method handles this problem by scheduling the load based on the power requirements. In many countries the power systems are facing limitations of energy. An efficient optimization algorithm is used to periodically schedule the load demand and the generation. Ant colony optimization (ACO) based ANN is used for this optimal load scheduling process. The present work analyse the technical economical and time-dependent limitations. Also the works meets the demanded load with minimum cost of energy. Inorder to train ANN back propagation (BP) technics is used. A hybrid training process is described in this work. Global optimization algorithms are used to provide back propagation with good initial connection weights.
Volume: 10
Issue: 1
Page: 738-745
Publish at: 2020-02-01

Side lobe reduction in array antenna by using novel design of EBG

10.11591/ijece.v10i1.pp308-315
Muhannad Kaml Abdulhameed , M. S. Mohamad Isa , I. M. Ibrahim , Z. Zakaria , Mowafak K. Mohsen , Mothana L. Attiah , Ahmed M. Dinar
A novel design of EBG is used to replace the mushroom like EBG for surrounding the array patch antenna. In order to improve its radiation performances, Electromagnetic band stop for reducing the surface waves effects is presented. The novel design of Triple Side Slotted EBG (TSSEBG) showed an improvement in the antenna efficiency, directivity and gain as compared to the reference antenna without using EBG, due to reduce the surface waves effects which leads to decrease the side lobes. TSSEBG has been introduced by some modifications in conventional mushroom-like EBG structure. Reducing the complexity was achieved by reducing the number of unit cells and vias, in case of used TSSEBG instead of mushroom like EBG. Additionally, the TSSEBG provided triple band gap compared with mushroom like EBG structure which had only one band gap frequency at 6 GHz. The placement of TSSEBG is a flexible structure which provides a good choice in the antenna applications. The simulation results of array patch antenna with and without mushroom like EBG and TSSEBG are arranged in Table 1. This structure has vast applications in satellite communications.
Volume: 10
Issue: 1
Page: 308-315
Publish at: 2020-02-01

Preliminary experimental evaluation of a novel loudspeaker featuring magnetorheological fluid surround absorber

10.11591/ijeecs.v17.i2.pp922-928
Endra Dwi Purnomo , Ubaidillah Ubaidillah , Fitrian Imaduddin , Iwan Yahya , Saiful Amri Mazlan
A novel design of magnetorheological fluids (MRF) based surround device in a loudspeaker system was studied in this article. The main objective of this research is to design a new surround device of the loudspeaker that can be easily controlled its damping. Therefore, it was predicted that the audio pressure level on the loudspeaker could be easily manipulated at a different sound source by applying a certain magnetic field. This function could not be reached using one conventional speaker system. Firstly, a set of an electromagnetic device containing MRF was designed to replace the conventional rubber surround. The magnetic circuit was then evaluated using the finite element method magnetics to study the flux distribution in the MRF area. The current was varied from 0.25 to 0.75 A by an interval of 0.25 A. The magnetic flux resulted from the simulation was then logged and used as the based value for predicting the change of shear yield stress. The base properties of the shear yield stress of the MRF against the magnetic flux was obtained from previous experimental result. Therefore, it was hopefully the prediction could be closed to the real system. Based on the simulation result, the shear yield stress varied from 43 to 49 Mpa or about 15 % increment. A simple experimental work was carried out. By applying particular direct current into the coil, the sound quality generated by the loudspeaker shows different values. Based on the preliminary experiment, the level of decibel decreased about 3 dB as the application of magnetic fields. The idea has been proven in this preliminary experimental evaluation.
Volume: 17
Issue: 2
Page: 922-928
Publish at: 2020-02-01

A novel hybrid approach of SVM combined with NLP and probabilistic neural network for email phishing

10.11591/ijece.v10i1.pp486-493
Abhishek Kumar , Jyotir Moy Chatterjee , Vicente García Díaz
Phishing attacks are one of the slanting cyber-attacks that apply socially engineered messages that are imparted to individuals from expert hackers going for tricking clients to uncover their delicate data, the most mainstream correspondence channel to those messages is through clients' emails. Phishing has turned into a generous danger for web clients and a noteworthy reason for money related misfortunes. Therefore, different arrangements have been created to handle this issue. Deceitful emails, also called phishing emails, utilize a scope of impact strategies to convince people to react, for example, promising a fiscal reward or summoning a feeling of criticalness. Regardless of far reaching alerts and intends to instruct clients to distinguish phishing sends, these are as yet a pervasive practice and a worthwhile business. The creators accept that influence, as a style of human correspondence intended to impact others, has a focal job in fruitful advanced tricks. Cyber criminals have ceaselessly propelling their techniques for assault. The current strategies to recognize the presence of such malevolent projects and to keep them from executing are static, dynamic and hybrid analysis. In this work we are proposing a hybrid methodology for phishing detection incorporating feature extraction and classification of the mails using SVM. At last, alongside the chose features, the PNN characterizes the spam mails from the genuine mails with more exactness and accuracy.
Volume: 10
Issue: 1
Page: 486-493
Publish at: 2020-02-01

Improving the selection of MPRs in OLSR protocol: a survey of methods and techniques

10.11591/ijece.v10i1.pp288-295
Omar Barki , Zouhair Guennoun , Adnane Addaim
Multi Point Relays (MPRs) are those nodes that are calculated and determined by the Optimized Link State Routing protocol (OLSR) in order to minimize and avoid overload inside the Mobile Ad hoc Network (MANET). In this paper, we will present a synthetic study of many techniques and methods for calculating and selecting the MPR nodes using a set of criteria namely energy, mobility, bandwidth, the quality of links, etc. The result of this study shows that most techniques consider a limited number of metrics for selecting the MPR nodes and therefore they are insufficient to allow the OLSR protocol to be quite complete and efficient because several metrics can occur at the same time in the real execution environment.
Volume: 10
Issue: 1
Page: 288-295
Publish at: 2020-02-01

Performance analysis of binary and multiclass models using azure machine learning

10.11591/ijece.v10i1.pp978-986
Smitha Rajagopal , Katiganere Siddaramappa Hareesha , Poornima Panduranga Kundapur
Network data is expanding and that too at an alarming rate. Besides, the sophisticated attack tools used by hackers lead to capricious cyber threat landscape. Traditional models proposed in the field of network intrusion detection using machine learning algorithms emphasize more on improving attack detection rate and reducing false alarms but time efficiency is often overlooked. Therefore, in order to address this limitation, a modern solution has been presented using Machine Learning-as-a-Service platform. The proposed work analyses the performance of eight two-class and three multiclass algorithms using UNSW NB-15, a modern intrusion detection dataset. 82,332 testing samples were considered to evaluate the performance of algorithms. The proposed two class decision forest model exhibited 99.2% accuracy and took 6 seconds to learn 1,75,341 network instances. Multiclass classification task was also undertaken wherein attack types like generic, exploits, shellcode and worms were classified with a recall percentage of 99%, 94.49%, 91.79% and 90.9% respectively by the multiclass decision forest model that also leapfrogged others in terms of training and execution time.
Volume: 10
Issue: 1
Page: 978-986
Publish at: 2020-02-01

A test architecture design for SoCs using ATAM method

10.11591/ijece.v10i1.pp719-727
D. R. V. A. Sharath Kumar , Ch. Srinivas Kumar , Ragamayi S. , P. Sampath Kumar , K. Saikumar , Sk. Hasane Ahammad
Test arranging is a basic issue in structure on-a-chip (S.O.C) experiment mechanization. Capable investigation designs constrain the general organization check request time, keep away from analysis reserve conflicts, in addition to purpose of restriction control disseminating in the midst of examination manner. In this broadsheet, we absent a fused method to manage a couple of test arranging issues. We first present a system to choose perfect timetables for sensibly evaluated SOC’s among need associations, i.e., plans that spare alluring orderings among tests. This furthermore acquaints a capable heuristic estimation with plan examinations designed for enormous S.O.Cs through need necessities in polynomial occasion. We portray a narrative figuring with the purpose of uses pre-emption of tests to secure capable date-books in favour of SOCs. Exploratory marks on behalf of an educational S-O-C plus a cutting edge SOC exhibit with the aim of capable investigation timetables be able to subsist gained in sensible CPU occasion.
Volume: 10
Issue: 1
Page: 719-727
Publish at: 2020-02-01

Rain attenuation distribution for satellite microwave links application in Tanzania

10.11591/ijeecs.v17.i2.pp982-987
Promota Haule Linga , Hashim Uledi Iddi , Mussa Kissaka
Rain rate and Rain Attenuation predictions are important in radio system operating at Ku and Ka bands as they affect telecommunication systems performance. To adequately estimate rain-induced attenuation and fading, the International Telecommunication Union (ITU) recommends use of rainfall data collected using 1-minute integration time. For Tanzania, no rainfall data with 1-minute integration time is available either through measurements or conversion from rainfall data with longer integration time. In this paper the rain attenuation is predicted for seven locations in the coastal area of Tanzania. The 1- minute rainfall rate is determined by Chebil’s model using long-term measurements from Tanzania Metrological Agency (TMA) collected for a period of forty years, results obtained are used to estimate rain attenuations. By using the International Telecommunication Union-Recommendation (ITU-R) model, rain attenuation is predicted at horizontal polarization at Ku and Ka band. The results show that Unguja has the highest average annual rainfall accumulation with rain attenuation as high as ~53.22dB for Ka band and ~15.14dB for Ku band making the difference of about 38.08 between the two frequency bands. On the other hand, Kibaha which has the lowest average annual rainfall accumulation along the coast has rain attenuation of ~47.27dB for Ka and ~13.41dB for Ku bands, making the difference of 33.86dB between the frequency bands. Results obtained from this study can be useful in designing earth-satellite microwave links in the coastal area of Tanzania.
Volume: 17
Issue: 2
Page: 982-987
Publish at: 2020-02-01

Random forest age estimation model based on length of left hand bone for Asian population

10.11591/ijece.v10i1.pp549-558
Mohd Faaizie Darmawan , Ahmad Firdaus Zainal Abidin , Shahreen Kasim , Tole Sutikno , Rahmat Budiarto
In forensic anthropology, age estimation is used to ease the process of identifying the age of a living being or the body of a deceased person. Nonetheless, the specialty of the estimation models is solely suitable to a specific people. Commonly, the models are inter and intra-observer variability as the qualitative set of data is being used which results the estimation of age to rely on forensic experts. This study proposes an age estimation model by using length of bone in left hand of Asian subjects range from newborn up to 18-year-old. One soft computing model, which is Random Forest (RF) is used to develop the estimation model and the results are compared with Artificial Neural Network (ANN) and Support Vector Machine (SVM), developed in the previous case studies. The performance measurement used in this study and the previous case study are R-square and Mean Square Error (MSE) value. Based on the results produced, the RF model shows comparable results with the ANN and SVM model. For male subjects, the performance of the RF model is better than ANN, however less ideal than SVM model. As for female subjects, the RF model overperfoms both ANN and SVM model. Overall, the RF model is the most suitable model in estimating age for female subjects compared to ANN and SVM model, however for male subjects, RF model is the second best model compared to the both models. Yet, the application of this model is restricted only to experimental purpose or forensic practice.
Volume: 10
Issue: 1
Page: 549-558
Publish at: 2020-02-01

Fast photovoltaic IncCond-MPPT and backstepping control, using DC-DC boost converter

10.11591/ijece.v10i1.pp1101-1112
Mohamed Moutchou , Atman Jbari
In this paper, we present our contribution in photovoltaic energy optimization subject. In this research work, the goal is to determinate fastly the optimal PV Module working point, allowing maximum power extraction. In this work we use DC-DC Boost converter to control the working point, by adjusting PV voltage trough duty cycle. In order to achieve our goal, we use the combination of incremental conductance MPPT technique and DC-DC Boost converter backstepping control. The validation of this control is made by Matlab simulation; the obtained results prove its effectiveness and its good maximum power tracking dynamics for different irradiance and temperature profiles.
Volume: 10
Issue: 1
Page: 1101-1112
Publish at: 2020-02-01

Optimal packet routing for wireless body area network using software defined network to handle medical emergency

10.11591/ijece.v10i1.pp427-437
B. Manickavasagam , B. Amutha , S. Priyanka
The packet forwarding node selection is one of the main constraints in the Software Defined Network (SDN). To improve the network performance, the SDN controller has to choose the shortest and optimised path between source and destination in routine and emergency packet transmission. In e-health service, information of the emergency patient has to be transferred immediately to remote hospitals or doctors by using efficient packet routing approach in Wireless Body Area Network (WBAN). In WBAN, to improve the packet transmission, the optimal packet routing policy developed based on packets priority with the support of a greedy algorithm for SDN. The SDN Controller selects the forwarding node based on node propagation delay and available bandwidth between two forwarding nodes. The mesh network topology network created for implementation, implementation results are compared with existing research works. Finally, this algorithm implemented in our institution, Software defined communication testbed laboratory (SDCTestbed Lab) with the support of 13 Zodiac-Fx (Forwarding device), 2 Raspberry-Pi3 B+ Model (host) and Arduino kit (sensor node).
Volume: 10
Issue: 1
Page: 427-437
Publish at: 2020-02-01

Security techniques for intelligent spam sensing and anomaly detection in online social platforms

10.11591/ijece.v10i1.pp275-287
Monther Aldwairi , Loai Tawalbeh
The recent advances in communication and mobile technologies made it easier to access and share information for most people worldwide. Among the most powerful information spreading platforms are the Online Social Networks (OSN)s that allow Internet-connected users to share different information such as instant messages, tweets, photos, and videos. Adding to that many governmental and private institutions use the OSNs such as Twitter for official announcements. Consequently, there is a tremendous need to provide the required level of security for OSN users. However, there are many challenges due to the different protocols and variety of mobile apps used to access OSNs. Therefore, traditional security techniques fail to provide the needed security and privacy, and more intelligence is required. Computational intelligence adds high-speed computation, fault tolerance, adaptability, and error resilience when used to ensure security in OSN apps. This research provides a comprehensive related work survey and investigates the application of artificial neural networks for intrusion detection systems and spam filtering for OSNs. In addition, we use the concept of social graphs and weighted cliques in the detection of suspicious behavior of certain online groups and to prevent further planned actions such as cyber/terrorist attacks before they happen.
Volume: 10
Issue: 1
Page: 275-287
Publish at: 2020-02-01
Show 1195 of 1995

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration