Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,922 Article Results

Proposed agorithm for regression-based prediction with bulk noise

10.11591/ijeecs.v17.i1.pp543-550
Chanintorn Jittawiriyanukoon
The noise has incited an original data due to a network with an inferior SNR. In case of the bulk noise, the insightful content within the data is substantially squeezed.  A cost-effective method will challenge to quarantine the insights, so that information can be utilized more resourcefully.  To achieve this aim, it is essential to iron the bulk noise content out, and then calculate the analytics of the clean data. As noise is bulk so some statistical methodologies such as averaging or randomizing are employed. A prediction using the regression-based model with bulk noise for the experiment in practice is introduced. The decomposition approach to separate the insights is exploited. The proposed algorithm achieves a (local) solution at each computing step and selects the best solution in view of global impacts. The correlation coefficient, average error, absolute error and mean squared error are used to constitute the prediction. Results from MOA simulation will be compared to actual data in the succeeding time. The prediction with bulk noise using the proposed algorithm outperforms.
Volume: 17
Issue: 1
Page: 543-550
Publish at: 2020-01-01

Author identification for Under-Resourced language (KadazanDusun)

10.11591/ijeecs.v17.i1.pp248-255
Nursyahirah Tarmizi , Suhaila Saee , Dayang Hanani Abang Ibrahim
This paper presents the task of Author Identification for KadazanDusun language by using tweets as the source of data to perform Author Identification task of short text on KadazanDusun, which is considered as one the under-resourced language in Malaysia. The aim of this paper is to demonstrate Author Identification of short text on KadazanDusun. Besides, this paper also examines the performance of two machine learning algorithms on the KadazanDusun data set by analyzing the stylometric features. Stylometric features are used to quantify the writing styles of the authors which includes character n-grams and word n-grams. The workflow of Author Identification implements the machine learning approach to solve the single-labelled multi-class problem and predict the author of a given message in KadazanDusun. Two classifiers are used to compare the accuracy including Naïve Bayes and Support Vector Machine (SVM). The results show that the combination of n-grams which is word-level unigram and {1-5}-grams with character 3-grams are the most relevant stylometric features in identifying the author of KadazanDusun message with an accuracy of 80.17%. The results also show that SVM classifier has outperformed Naive Bayes in this Author Identification task with the accuracy of 80.17%.
Volume: 17
Issue: 1
Page: 248-255
Publish at: 2020-01-01

A Ku-Band SIW six-port

10.11591/ijeecs.v17.i1.pp273-280
Tan Gan Siang , Siti Zuraidah Ibrahim , Mohd Nazri A. Karim , Aliya A. Dewani , Mohammad Shahrazel Razalli
This paper shows a compact fully integrated six-port Substrate Integrated Waveguide (SIW) operating at Ku-Band frequency range. The SIW six-port is formed by combining two SIW power dividers and two SIW couplers, having the benefit of no additional termination is required as this topology has no excessive port. To achieve the optimized design of the six-port, both of the key components; power divider and coupler are primarily designed, fabricated, and measured individually. Y-junction topology is employed on the power divider structure to achieve a compact size. In turn, the coupling coefficient of the two output ports of the SIW coupler are improved by shifting the position of a row of several vias located at the side wall center closer to the side wall. The simulated six port performance provides an advantage of wide bandwidth within Ku-Band across 13 to 17 GHz with a return loss better than 12 dB and transmission coefficient of 7±1.5 dB. The simulated and measured results show good agreement thus validating the prototype. The SIW six-port can find its application in designing a six-port.
Volume: 17
Issue: 1
Page: 273-280
Publish at: 2020-01-01

A light weight encryption over big data in information stockpiling on cloud

10.11591/ijeecs.v17.i1.pp389-397
Uma Narayanan , Varghese Paul , Shelbi Joseph
Data is growing exponentially in the fast Changing World of Information and Communications Technology. Information from sensors, cell phones, social networking sites, logical information and ventures all are adding to this gigantic blast in the information. One of the best mainstream utilities available for dealing with the colossal measure of data is the Hadoop community. Enterprises are progressively depending on Hadoop for preparing their essential information. In any case, Hadoop is still developing. There is much powerlessness found in Hadoop, which can scrutinize the security of the sensitive data that undertakings have entrusted on it. In this paper, security issues related to the system have been discussed. Besides, we have attempted to give a short overview of the currently accessible arrangements and their constraints. Towards the end, a novel strategy, which can be utilized to kill the detected vulnerabilities in the structure, has been introduced. In the cutting edge period, data security has moved towards becoming a basic need for every single person. Be that as it may, not every person can bear the cost of the specific circulations given by various sellers to their Hadoop group. This paper displays an effective system that anybody can use with their Hadoop to secure Data.
Volume: 17
Issue: 1
Page: 389-397
Publish at: 2020-01-01

Ontology model for intake suggestion and preparation for malay confinement dietary recipes

10.11591/ijeecs.v17.i1.pp481-488
M. Hamiz , Haryani Haron , M. Bakri , Nur Liyana Mohd Lazim
This paper presents the ontology model for Malay Confinement Dietary (MCD) recipes which include the intake suggestion and its preparation. MCD plays a big role to ensure that mothers in confinement get the right nutrient in order to restore back their health. In the current research on MCD, the covered part is only on what are the foods allowed to be taken by mothers during confinement and the nutrients that it can boost in mothers’ body. However, it does not include what are the preparation methods of the food and what is the suggested intake time for that dish. These two aspects could give the certainty factor for mothers to get the sufficient nutrient during confinement. But those knowledges are known by the traditional Malay midwives. Hence, this tacit knowledge should be modeled into an ontology model as one of the knowledge preservation methods. Three new classes together with four new object properties were added to the current model and based on testing that has been done, the extended new model of ontology could retrieve the correct information as needed.
Volume: 17
Issue: 1
Page: 481-488
Publish at: 2020-01-01

Web usability test in 60 seconds: a theoretical foundation and empirical test

10.11591/ijeecs.v17.i1.pp398-403
Imran Mahmud , Mostafijur Rahman , Sharmin Ahmed , Didarul Islam
The aim of this research is to explore the possibility of web usability test in 60 seconds rather than unlimited time by customers.  Usability was tested by two major testing methods: system usability scale (SUS) and NetQu@l.  60 customers as two groups were involved in the experimental design procedure. The assessment included an online shopping website where one group tested in 60 seconds and other group had 3 days to test.  Result shows that there are significance differences in SUS based testing and no significant differences in NetQu@l based testing. Altogether, these results provide further support that SUS based usability testing can be implemented in 60 seconds time frame without imposing additional cognitive load on customers.
Volume: 17
Issue: 1
Page: 398-403
Publish at: 2020-01-01

Intelligent based technique for under voltage load shedding in power transmission systems

10.11591/ijeecs.v17.i1.pp110-117
Saiful Firdaus Abd Shukor , Ismail Musirin , Zulkifli Abd Hamid , Mohamad Khairuzzaman Mohamad Zamani , Mohamed Zellagui , Hadi Suyono
The increasing demand of electric power energy and the presence of disturbances can be identified as the factors of voltage instability condition in a power system. A secure and reliable power system should be considered to ensure smooth delivery of electricity to the consumers. A power system may experience undesired event such as voltage instability condition leading to voltage collapse or cascading collapse if the system experiences lack of reactive power support. Thus, to avoid blackout and cascaded tripping, load shedding is the last resort to prevent a total damage. Under Voltage Load Shedding (UVLS) scheme is one of the possible methods which can be conducted by thepower system operators to avoid the occurrence of voltage instability condition. This paper presents the intelligent based technique for under voltage load shedding in power transmission systems. In this study, a computational based technique is developed in solving problem related to UVLS. The integration between a known computational intelligence-based technique termed as Evolutionary Programming (EP) with the under-voltage load shedding algorithm has been able to maintain the system operated within the acceptable voltage limit. Loss and minimum voltage control as the objective function implemented on the IEEE 30-Bus Reliability Test System (RTS) managed to optimally identify the optimal location and sizing for the load shedding scheme. Results from the studies, clearly indicate the feasibility of EP for load shedding scheme in loss and minimum voltage control in power system.
Volume: 17
Issue: 1
Page: 110-117
Publish at: 2020-01-01

Factors influencing cloud computing adoption in higher education institution

10.11591/ijeecs.v17.i1.pp412-419
Wan Abdul Rahim Wan Mohd Isa , Ahmad Iqbal Hakim Suhaimi , Nurulhuda Noordin , Afdallyna Fathiyah Harun , Juhaida Ismail , Rosshidayu Awang Teh
There are few studies on factors influencing cloud computing adoption in higher education institutions. However, there are lacks of understanding of the cloud computing adoption issues in the university. The main objective of this study is to investigate factors influencing cloud computing adoption in a higher education institution. The research method involved using qualitative interviewing with relevant stakeholders and case study at one public university in Malaysia. The analysis was done by using Atlat.ti. There are eighteen factors that have been coded into three main categories of Technological, Organizational and Environmental. These are among factors to influence the decision of cloud computing adoption for a public university. The first category (Technological) consists of nine factors; (i) relative advantage, (ii) cost reduction, (iii) ease of use, (iv) compatibility, (v) operational requirement, (vi) security, (vii) sustainability, (viii) trialability and (ix) complexity, The second category (organizational) consists of four factors; (i) infrastructure readiness, (ii) top management, (iii) knowledge and IT skillset and (iv) financial. The third category (environmental) consists of five factors; (i) Cloud Service Provider, (ii) Geographical, (iii) Data Privacy, (iv) Guideline and Policy, (v) Service Level Agreement (SLA). The result may provide a reference for the adoption of cloud computing in the area of mobile learning or mobile computing. Future work involves conducting similar studies at other case studies including public and private universities in Malaysia.
Volume: 17
Issue: 1
Page: 412-419
Publish at: 2020-01-01

Effect of increasing the network capacity using device-to-device technology for next generation networks

10.11591/ijeecs.v17.i1.pp303-309
Aws Zuheer Yonis
Device-to-device (D2D) communication is one of the key technologies in the fifth generation of wireless communication systems, which is defined as direct communication between two mobile users without traversing the base station D2D communication plays an increasingly important role and which improves communication capability and reduces communication delay and power consumption. D2D communication that enables direct communication between nearby mobiles is an exciting and innovative feature of next-generation cellular networks. In order to meet the rising subscriber demands and provide them satisfactory services, D2D communication is being looked upon as an emerging technology of the next generation networks.
Volume: 17
Issue: 1
Page: 303-309
Publish at: 2020-01-01

Real-time and Low-cost IoT based farming using raspberry Pi

10.11591/ijeecs.v17.i1.pp197-204
Md. Wahidur Rahman , Md. Elias Hossain , Rahabul Islam , Md. Harun Ar Rashid , Md. Nur A Alam , Md. Mahmodul Hasan
This paper reflects on the implementation of IoT enabled Farming, especially for the people needed a smart way of agriculture. This research focuses on real-time observation with efficient use of cheapest security system. The features of this research including i) Sensor data monitoring using soil moisture sensor which is responsible for measuring moisture of the filed, water level sensor which is liable for detecting flooded water, pH sensor which is accountable for measuring pH of the soil and Temperature and humidity sensor which is responsible for tracking out the present temperature and humidity in the atmosphere ii) Live monitoring of sensor’s value using cloud and a Dashboard iii) Security issues of the farming using Laser shield and IP-Camera through Wi-Fi which is conducted by android application. This paper also assures the analysis of the experimented data through various sensor’s value and gives a momentous way for future application. Result and discussion ensures the contribution in the field of Internet of things
Volume: 17
Issue: 1
Page: 197-204
Publish at: 2020-01-01

Online cloud performance testing in social networks at peak demand scenarios

10.11591/ijeecs.v17.i1.pp372-378
Anitha K L , T.R. Gopalakrishnan Nair
Cloud computing assures to deliver reliable services through advanced data centers built on virtualized compute and storage technologies. Users demanding more cloud services will be able to access applications and data from a Cloud anywhere in the world in a pay-as-you-go model. In this paper, we focus on cloud-based performance testing for the applications. We use Load Storm testing tool to configure and test plans to measure the performance of web applications in online social networks. The experimental observations designed to assess the performance fluctuations of social networks on maximum consumer demand days have given specific data pointers which could be utilized for further studies of web service enhancements.
Volume: 17
Issue: 1
Page: 372-378
Publish at: 2020-01-01

Electrocardiogram profiling of myocardial infarction history using MLP and HMLP networks

10.11591/ijeecs.v17.i1.pp183-190
Fatin Syahirah Ab Gani , Mohd Khairi Nordin , Ahmad Ihsan Mohd Yassin , Idnin Pasya Ibrahim , Megat Syahirul Amin Megat Ali
Narrowing of coronary arteries caused by cholesterol deposits deprives heart tissues of oxygen. In prolonged conditions, these will result in myocardium infarction. The presence of damage tissues modifies the normal sinus rhythm and this can be detected using electrocardiogram (ECG). Hence, this paper characterized history of myocardial infarction from survivors using QRS power ratio features from the ECG. Subsequent profiling is performed using multilayered perceptron (MLP) and hybrid multilayered perceptron (HMLP) networks. ECG with history of anterior and inferior infarctions, along with healthy controls is obtained from PTB Diagnostic ECG Database. The signal is initially pre-processed and the power ratio features are extracted for low- and mid-frequency components. The features are then used as input vector to the MLP and HMLP networks. The optimized MLP has attained accuracies of 99.2% for training and 98.0% for testing. Meanwhile, the optimized HMLP managed to achieve accuracies of 99.4% for training and 97.8% for testing. Despite the similarities in network performance, MLP provides a better alternative due to the reduced computational requirements by as much as 30%.
Volume: 17
Issue: 1
Page: 183-190
Publish at: 2020-01-01

Enhancement transient stability of power system using UPFC with M-PSO

10.11591/ijeecs.v17.i1.pp61-69
Rashid H. AL-Rubayi , Luay G. Ibrahim
During the last few decades, electrical power demand enlarged significantly whereas power production and transmission expansions have been brutally restricted because of restricted resources as well as ecological constraints. Consequently, many transmission lines have been profoundly loading, so the stability of power system became a Limiting factor for transferring electrical power. Therefore, maintaining a secure and stable operation of electric power networks is deemed an important and challenging issue. Transient stability of a power system has been gained considerable attention from researchers due to its importance. The FACTs devices that provide opportunities to control the power and damping oscillations are used. Therefore, this paper sheds light on the modified particle swarm optimization (M-PSO) algorithm is used such in the paper to discover the design optimal the Proportional Integral controller (PI-C) parameters that improve the stability the Multi-Machine Power System (MMPS) with Unified Power Flow Controller (UPFC). Performance the power system under event of fault is investigating by utilizes the proposed two strategies to simulate the operational characteristics of power system by the UPFC using: first, the conventional (PI-C) based on Particle Swarm Optimization (PI-C-PSO); secondly, (PI-C) based on modified Particle Swarm Optimization (PI-C-M-PSO) algorithm. The simulation results show the behavior of power system with and without UPFC, that the proposed (PI-C-M-PSO) technicality has enhanced response the system compared for other techniques, that since it gives undershoot and over-shoot previously existence minimized in the transitions, it has a ripple lower. Matlab package has been employed to implement this study. The simulation results show that the transient stability of the respective system enhanced considerably with this technique.
Volume: 17
Issue: 1
Page: 61-69
Publish at: 2020-01-01

Microstrip array antenna with inset-fed for WLAN application

10.11591/ijeecs.v17.i1.pp340-346
Norfishah Ab Wahab , W. Nor Syafizan W. Muhamad , Zuhani Ismail Khan , Suzi Seroja Sarnin
This paper proposed three designs of microstrip array patch antennas, to resonate at 2.4 GHz. The purpose of the study is to achieve size reduction with acceptable performance for wireless communication system applications. Based on the array concept, the array antennas are arranged using corporate network technique. It is found that the simulated 4x3 patch array antenna achieved the compact size with dimension reduced up to 26% compared to 4x1 and 4x2 array patch antennas. In terms of return loss, the antenna attenuated more than 19 dB. The 4x3 patch array antenna is fabricated and measured using RO4350 microstrip substrate to validate the concept. The responses are found in good agreement between simulation and measurement.
Volume: 17
Issue: 1
Page: 340-346
Publish at: 2020-01-01

Spectrum sensing and energy detection in cognitive networks

10.11591/ijeecs.v17.i1.pp464-471
Mohammed Ayad Saad , Mustafa S. T , Mohammed Hussein Ali , M. M. Hashim , Mahamod Bin Ismail , Adnan H. Ali
It is worth mentioning that the use of wireless systems has been increased in recent years and supposed to highly increase in the few coming years because of the increasing demands of wireless applications such as mobile phones, Internet of Things (IoT), wireless sensors networks (WSNs), mobile applications and tablets. The scarcity of spectrum needs to be into consideration when designing a wireless system specially to answer the two following questions; how to use efficiently the spectrum available for the available networks in sharing process and how to increase the throughput delivered to the serving users. The spectrum sharing between several types of wireless networks where networks are called cognitive networks is used to let networks cooperate with each other by borrowing some spectrum bands between them especially when there is an extra band that is not used. In this project, the simulation of spectrum sensing and sharing in cognitive networks is performed between two cognitive networks. This project discusses the performance of probability of energy detected (Pd) with different values of false alarm (Pf) and Signal-To-Noise Ratio (SNR) values to evaluate the performance of the sensing and sharing process in cognitive networks. The results show that when the request of sharing spectrum increased, the full sharing process occurs for a long time and the error rate decreases for small values of SNR.
Volume: 17
Issue: 1
Page: 464-471
Publish at: 2020-01-01
Show 1200 of 1995

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration