Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,905 Article Results

A new method for voice signal features creation

10.11591/ijece.v9i5.pp4092-4098
Majed O. Al-Dwairi , Amjad Y. Hendi , Mohamed S. Soliman , Ziad A. A. AlQadi
Digital audio is one of the most important types of data at present. It is used in several applications, such as human knowledge and many security and banking applications. A digital voice signal is usually of a large size where the acoustic signal consists of a set of values distributed in one column (one channel) (mono signal) or distributed in two columns (two channels) (stereo signal), these values usually are the results of sampling and quantization of the original analogue voice signal. In this paper we will introduce a method which can be used to create a signature or key, which can be used later to identify or recognize the wave file. The proposed method will be implemented and tested to show the accuracy and flexibility of this method.
Volume: 9
Issue: 5
Page: 4092-4098
Publish at: 2019-10-01

UWB elliptical patch monopole antenna with dual-band notched characteristics

10.11591/ijece.v9i5.pp3591-3598
A H Majeed , K H Sayidmarie
In this paper, a new approach to the design of an UWB monopole antenna with dual band-notched characteristics is presented.   The antenna has the form of an elliptical monopole over a ground plane having an elliptical slot to achieve the UWB. The dual-band notch function is created by inserting a U-shaped and a C-shaped slots on the radiating patch, thus no extra size is needed. The proposed antenna shows a good omnidirectional radiation pattern across the band from 3.2 to more than 14 GHz. The dual band-rejection is for 4.88-5.79GHz centered at 5.4GHz and 7.21-8.46 GHz centered at 7.8 GHz. The antenna prototype using the FR-4 substrate with εr=4.3 has a compact size of 25mm×25 mm ×1.45mm. The fabricated prototype showed experimental results comparable to those obtained from the simulations.
Volume: 9
Issue: 5
Page: 3591-3598
Publish at: 2019-10-01

Enhancing the performance of cascaded three-level VSC STATCOM by ANN controller with SVPWM integegration

10.11591/ijece.v9i5.pp3880-3890
Mohamad Milood Almelian , Izzeldin. I. Mohd , Abu Zaharin Ahmad , Mohamed Salem , Mohamed A. Omran , Awang Jusoh , Tole Sutikno
This article presents a cascaded three-level voltage source converter (VSC) based STATCOM employing an artificial neuron network (ANN) controller with a new simple circuit of space vector pulse width modulation (SVPWM) technique. The main aim of utilizing ANN controller and SVPWM technique is to minimize response time (RT) of STATCOM and improve its performance regard to PF amplitude, and total harmonic distortion (THD) of VSC output current during the period of lagging/leading PF loads (inductive/capacitive loads). The performance of STATCOM is tested using MATLAB/SIMULINK in IEEE 3-bus system. The simulation results clearly proved that the STATCOM with intelligent controller is more efficient compared to a conventional controller (PI controller), where ANN enables the voltage and current to be in the same phase rapidly (during 1.5 cycles) with THD less than 5%.
Volume: 9
Issue: 5
Page: 3880-3890
Publish at: 2019-10-01

Performance analysis of resource scheduling in LTE femtocell with hybrid access mode

10.11591/ijece.v9i5.pp3599-3606
S. Fouziya Sulthana
Femtocell is a promising technology that intends in solving the indoor coverage problems so as to enhance the cell capacity. The overall network performance, in turn depends on the access methods used by the femtocells. The access method is used to identify about the user’s connectivity with the femtocell network. There are three access mechanisms defined in Third Generation partnership Project (3GPP) specification for Long Term Evolution (LTE) femtocells: open, closed and hybrid access mechanisms. Hybrid access mechanism is mostly preferred by the network for the effective utilization of resources. But, it is important to regulate the proper scheduling scheme for them. In this paper, scheduling in femtocell is investigated, where, among the non subscribers, preference is given to the users who have high throughput priority metric, thereby increasing overall throughput of the network.
Volume: 9
Issue: 5
Page: 3599-3606
Publish at: 2019-10-01

A data mining approach for desire and intention to participate in virtual communities

10.11591/ijece.v9i5.pp3714-3719
Özerk Yavuz , Adem Karahoca , Dilek Karahoca
The purpose of this study is to investigate performances of some of the data mining approaches while understanding desire and intention to participate in virtual communities and its antecedents. A research model has been developed following the literature review and the model was tested afterwards. In research part of the study, some of the data mining approaches as JRip, Part, OneR Method, Multilayer Perceptron (Neural Networks), Bayesian Networks have been used. Based on the analysis conducted it has been found out that Multilayer Neural Network had the best correct classification rate and lowest RMSE.
Volume: 9
Issue: 5
Page: 3714-3719
Publish at: 2019-10-01

Multi-scale morphological gradient algorithm based ultra-high-speed directional transmission line protection for internal and external fault discrimination

10.11591/ijece.v9i5.pp3891-3904
Elmahdi Khoudry , Abdelaziz Belfqih , Tayeb Ouaderhman , Jamal Boukherouaa , Faissal Elmariami
This paper introduces an ultra-high-speed directional transmission line protection scheme based on multi-scale morphological gradient algorithm (MSMGA). The directional protection scheme sets down the rules for determining the fault position in relation to the relaying point. The MSMGA is used to extract the fault-induced transient characteristics contained in the voltage and current signals. The associated signals are formed from these transient characteristics and the polarity of their local modulus maxima allow the discrimination between internal and external faults.
Volume: 9
Issue: 5
Page: 3891-3904
Publish at: 2019-10-01

Dynamic analysis and qft-based robust control design of a coaxial micro-helicopter

10.11591/ijece.v9i5.pp4099-4113
Meksi Aissa , Ahmed Hamida Boudinar , Benatman Kouadri
This paper presents the dynamic behavior of a coaxial micro-helicopter, under Quantitative Feedback Theory (QFT) control. The flight dynamics of autonomous air vehicles (AAVs) with rotating rings is non-linear and complex. Then, it becomes necessary to characterize these non-linearities for each flight configuration, in order to provide these autonomous air vehicles (AAVs) with autonomous flight and navigation capabilities. Then, the nonlinear model is linearized around the operating point using some assumptions. Finally, a robust QFT control law over the coaxial micro-helicopter is applied to meet some specifications. QFT (quantitative feedback theory) is a control law design method that uses frequency domain concepts to meet performance specifications while managing uncertainty. This method is based on the feedback control when the plant is uncertain or when uncertain disturbances are affecting the plant. The QFT design approach involves conventional frequency response loop shaping by manipulating the gain variable with the poles and zeros of the nominal transfer function. The design process is accomplished by using MATLAB environment software.
Volume: 9
Issue: 5
Page: 4099-4113
Publish at: 2019-10-01

Sensitivity and packaging improvement of an LCP pressure sensor for intracranial pressure measurement via FEM simulation

10.11591/ijece.v9i5.pp4044-4052
Preedipat Sattayasoonthorn , Jackrit Suthakorn , Sorayouth Chamnanvej
A biocompatible liquid crystal polymer (LCP) pressure sensor is proposed for measuring intracranial pressure (ICP) in Traumatic Brain Injury (TBI) patients. Finite element method using COMSOL multiphysics is employed to study the mechanical behavior of the packaged LCP pressure sensor in order to optimize the sensor design. A 3D model of the 8x8x0.2 mm LCP pressure sensor is simulated to investigate the parameters that significantly influence the sensor characteristics under the uniform pressure range of 0 to 50 mmHg. The simulation results of the new design are compared to the experimental results from a previous design. The result shows that reducing the thickness of the sensing membrane can increase the sensitivity up to six times of that previously reported. An improvement of fabrication methodology is proposed to complete the LCP packaging.
Volume: 9
Issue: 5
Page: 4044-4052
Publish at: 2019-10-01

A new framework to alleviate DDoS vulnerabilities in cloud computing

10.11591/ijece.v9i5.pp4163-4175
A. Saravanan , S. SathyaBama , Seifedine Kadry , Lakshmana Kumar Ramasamy
In the communication age, the Internet has growing very fast and most industries rely on it. An essential part of Internet, Web applications like online booking, e-banking, online shopping, and e-learning plays a vital role in everyday life. Enhancements have been made in this domain, in which the web servers depend on cloud location for resources. Many organizations around the world change their operations and data storage from local to cloud platforms for many reasons especially the availability factor. Even though cloud computing is considered a renowned technology, it has many challenges, the most important one is security. One of the major issue in the cloud security is Distributed Denial of Service attack (DDoS), which results in serious loss if the attack is successful and left unnoticed. This paper focuses on preventing and detecting DDoS attacks in distributed and cloud environment. A new framework has been suggested to alleviate the DDoS attack and to provide availability of cloud resources to its users. The framework introduces three screening tests VISUALCOM, IMGCOM, and AD-IMGCOM to prevent the attack and two queues with certain constraints to detect the attack. The result of our framework shows an improvement and better outcomes and provides a recovered from attack detection with high availability rate. Also, the performance of the queuing model has been analysed.
Volume: 9
Issue: 5
Page: 4163-4175
Publish at: 2019-10-01

Suggesting new words to extract keywords from title and abstract

10.11591/ijece.v9i5.pp4441-4445
Hadeel Qasem Gheni , Ahmed Mohammed Hussein , Wed Kadhim Oleiwi
When talking about the fundamentals of writing research papers, we find that keywords are still present in most research papers, but that does not mean that they exist in all of them, we can find papers that do not contain keywords. Keywords are those words or phrases that accurately reflect the content of the research paper. Keywords are an exact abbreviation of what the research carries in its content. The right keywords may increase the chance of finding the article or research paper and chances of reaching more people who should reach them. The importance of keywords and the essence of the research and address is mainly to attract these highly specialized and highly influential writers in their fields and who specialize in reading what holds the appropriate characteristics but they do not read and cannot read everything. In this paper, we extract new keywords by suggesting a set of words, these words were suggested according to the many mentioned in the researches with multiple disciplines in the field of computer. In our system, we take a number of words (as many as specified in the program) that come before the proposed words and consider it as new keywords. This system proved to be effective in finding keywords that correspond to some extent with the keywords developed by the author in his research.
Volume: 9
Issue: 5
Page: 4441-4445
Publish at: 2019-10-01

Smart monitoring system for pressure regulator based on IOT

10.11591/ijece.v9i5.pp3450-3456
Aktham Hasan Ali , Ahmed Hussein Duhis , Nabeel Aad Lafta Alzurfi , Mohannad Jabbar Mnati
In the last years, the interconnection of everyday instruments with internet using internet of thinks (IOT), is widely used as a monitoring and controlling in engineering as in smart cities, environmental, others. In this paper, a remote monitoring system of a pressure regulator is developed through an internet of thinks (IOT) communication tool, using MATLAB® programming platforms. The development of monitoring system for acquisition and communication corresponds to the NodeMCU as a microcontroller with ESP8266 for Wi-Fi connected. This system allows to monitor the reference of the pressure regulator and monitor the information of the transducers machine of the plant. Among the advantages of this type of development is that the server is free, and the development system is low cost, also with this type of projects can strengthen the infrastructure of laboratory equipment in engineering to be controlling in a way remote.
Volume: 9
Issue: 5
Page: 3450-3456
Publish at: 2019-10-01

Finding a suitable threshold value for an iris-based authentication system

10.11591/ijece.v9i5.pp3558-3568
Narongrit Wangkeeree , Sirapat Boonkrong
Authentication is the first line of defense of any information technology systems. One of the popular methods used today is biometric, and iris authentication is gaining popularity. However, the threshold value is deemed to be secure and appropriate has not been thoroughly studied. Threshold is a value that defines the acceptable amount of the correct bits of the image before securely passing the authentication process. Therefore, the main aim of this research was to find a secure and suitable threshold value used in iris authentication system, where iris localization was done by using Circle Hough Transform technique. Iris image databases v.4 from the Chinese Academy of Sciences Institute of Automatic (CASIA) were used in this research. The way to find the appropriate threshold was to test for the right balance of the GAR, FRR and FAR values when trying to verify the person’s identity. The results of the test revealed that the appropriate threshold had the value of 72.9246 percent of all the available bits of the iris image. Both had a high GAR and very low FAR and FRR values.  It can be concluded that the obtained threshold value was suitable and secure.
Volume: 9
Issue: 5
Page: 3558-3568
Publish at: 2019-10-01

Integration of distributed generation and compensating capacitor in radial distribution system via firefly algorithm

10.11591/ijeecs.v16.i1.pp67-73
N. Khuan , S. R. A. Rahim , M. H. Hussain , A. Azmi , S. A. Azmi
This paper presents an integration of distributed generation and capacitor in radial distribution system via Firefly Algorithm (FA).  In this study, the FA is developed in order to determine the optimal location and size for compensation schemes namely distributed generation (DG) and compensating capacitor (CC). The FA which is a meta-heuristic algorithm is inspired by the flashing behavior of fireflies. The proposed technique was tested on IEEE Reliability Test systems namely the IEEE 69-bus and the program was developed using the MATLAB programming software. The results shown a significant reduction in the line losses and voltage profile improvement has been obtained with the installation of distributed generation and capacitor in the system.
Volume: 16
Issue: 1
Page: 67-73
Publish at: 2019-10-01

Identification of individualization techniques for criminal records in sanction lists

10.11591/ijece.v9i5.pp3798-3803
Gonzalo M Arias , Pablo Peláez , Fredy E Hoyos
Using efficient searching techniques on sanctions list and press articles allows a better filtering on individuals and entities to establish a commercial relationship with, including those who are going to have access to confidential information belonging to the company, in order to minimize the risk of leakage or information mismanagement. That process of filtering on individuals or entities could be automated by using individualization algorithms, searching techniques based on string comparisons, artificial intelligence, and facial recognition. Diverse methods were examined to be applied on each mentioned technique in order to identify which ones are ideal to its application on individualization due to their characteristics, in order to obtain agile and reliable results; taking into account that different methods are complementary and not exclusive, and that their combination allows to minimize human interaction in the classification of information, avoiding analysis of data irrelevant for that particular search.
Volume: 9
Issue: 5
Page: 3798-3803
Publish at: 2019-10-01

A taxonomy of Malay social media text

10.11591/ijeecs.v16.i1.pp465-472
Ruhaila Maskat , Yuda Munarko
In this paper, we proposed a preliminary taxonomy of Malay social media text. Performing text analytics on Malay social media text is a challenge. The formal Malay language follows specific spelling and sentence construction rules. However, the Malay language used in social media differs in both aspects. This impedes the accuracy of text analytics. Due to the complexity of Malay social media text, many researches has chosen to focus on classifying the formal Malay language. To the best of our knowledge, we are the first to propose a formal taxonomy for Malay text in social media. Narrow and informal categorisations of Malay social media text can be found amidst efforts to pre-process social media text, yet cherry-picked only some categories to be handled. We have differentiated Malay social media text from the formal Malay language by identifying them as Social Media Malay Language or SMML. They consists of spelling variations, Malay-English mix sentence, Malay-spelling English words, slang-based words, vowel-les words, number suffixes and manner of expression.This taxonomy is expected to serve as a guideline in research and commercial products.
Volume: 16
Issue: 1
Page: 465-472
Publish at: 2019-10-01
Show 1234 of 1994

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration