Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,905 Article Results

Finding a suitable threshold value for an iris-based authentication system

10.11591/ijece.v9i5.pp3558-3568
Narongrit Wangkeeree , Sirapat Boonkrong
Authentication is the first line of defense of any information technology systems. One of the popular methods used today is biometric, and iris authentication is gaining popularity. However, the threshold value is deemed to be secure and appropriate has not been thoroughly studied. Threshold is a value that defines the acceptable amount of the correct bits of the image before securely passing the authentication process. Therefore, the main aim of this research was to find a secure and suitable threshold value used in iris authentication system, where iris localization was done by using Circle Hough Transform technique. Iris image databases v.4 from the Chinese Academy of Sciences Institute of Automatic (CASIA) were used in this research. The way to find the appropriate threshold was to test for the right balance of the GAR, FRR and FAR values when trying to verify the person’s identity. The results of the test revealed that the appropriate threshold had the value of 72.9246 percent of all the available bits of the iris image. Both had a high GAR and very low FAR and FRR values.  It can be concluded that the obtained threshold value was suitable and secure.
Volume: 9
Issue: 5
Page: 3558-3568
Publish at: 2019-10-01

Integration of distributed generation and compensating capacitor in radial distribution system via firefly algorithm

10.11591/ijeecs.v16.i1.pp67-73
N. Khuan , S. R. A. Rahim , M. H. Hussain , A. Azmi , S. A. Azmi
This paper presents an integration of distributed generation and capacitor in radial distribution system via Firefly Algorithm (FA).  In this study, the FA is developed in order to determine the optimal location and size for compensation schemes namely distributed generation (DG) and compensating capacitor (CC). The FA which is a meta-heuristic algorithm is inspired by the flashing behavior of fireflies. The proposed technique was tested on IEEE Reliability Test systems namely the IEEE 69-bus and the program was developed using the MATLAB programming software. The results shown a significant reduction in the line losses and voltage profile improvement has been obtained with the installation of distributed generation and capacitor in the system.
Volume: 16
Issue: 1
Page: 67-73
Publish at: 2019-10-01

Identification of individualization techniques for criminal records in sanction lists

10.11591/ijece.v9i5.pp3798-3803
Gonzalo M Arias , Pablo Peláez , Fredy E Hoyos
Using efficient searching techniques on sanctions list and press articles allows a better filtering on individuals and entities to establish a commercial relationship with, including those who are going to have access to confidential information belonging to the company, in order to minimize the risk of leakage or information mismanagement. That process of filtering on individuals or entities could be automated by using individualization algorithms, searching techniques based on string comparisons, artificial intelligence, and facial recognition. Diverse methods were examined to be applied on each mentioned technique in order to identify which ones are ideal to its application on individualization due to their characteristics, in order to obtain agile and reliable results; taking into account that different methods are complementary and not exclusive, and that their combination allows to minimize human interaction in the classification of information, avoiding analysis of data irrelevant for that particular search.
Volume: 9
Issue: 5
Page: 3798-3803
Publish at: 2019-10-01

A taxonomy of Malay social media text

10.11591/ijeecs.v16.i1.pp465-472
Ruhaila Maskat , Yuda Munarko
In this paper, we proposed a preliminary taxonomy of Malay social media text. Performing text analytics on Malay social media text is a challenge. The formal Malay language follows specific spelling and sentence construction rules. However, the Malay language used in social media differs in both aspects. This impedes the accuracy of text analytics. Due to the complexity of Malay social media text, many researches has chosen to focus on classifying the formal Malay language. To the best of our knowledge, we are the first to propose a formal taxonomy for Malay text in social media. Narrow and informal categorisations of Malay social media text can be found amidst efforts to pre-process social media text, yet cherry-picked only some categories to be handled. We have differentiated Malay social media text from the formal Malay language by identifying them as Social Media Malay Language or SMML. They consists of spelling variations, Malay-English mix sentence, Malay-spelling English words, slang-based words, vowel-les words, number suffixes and manner of expression.This taxonomy is expected to serve as a guideline in research and commercial products.
Volume: 16
Issue: 1
Page: 465-472
Publish at: 2019-10-01

Bessel Beams and Gaussian Beams as information carriers in free space optical interconnects systems: A comparison study

10.11591/ijece.v9i5.pp3488-3494
Nedal k Alababneh
We introduce a comparison study for the performance of a lens-based   free space optical interconnects system assuming Bessel Beams and Gaussian Beams as information carriers.  The optical field at the detector plane was derived for the two beam profiles. In both cases the expressions for the output optical filed are expressed in terms of complex Gaussian functions. The performance of the system for the two beams is evaluated and compared. Using simulation results we show that the use of Bessel beam gives superior results to that of using Gaussian beam for large interconnects distance.
Volume: 9
Issue: 5
Page: 3488-3494
Publish at: 2019-10-01

IoT based car accident detection and notification algorithm for general road accidents

10.11591/ijece.v9i5.pp4020-4026
Shivani Sharma , Shoney Sebastian
With an increase in population, there is an increase in the number of accidents that happen every minute. These road accidents are unpredictable. There are situations where most of the accidents could not be reported properly to nearby ambulances on time. In most of the cases, there is the unavailability of emergency services which lack in providing the first aid and timely service which can lead to loss of life by some minutes. Hence, there is a need to develop a system that caters to all these problems and can effectively function to overcome the delay time caused by the medical vehicles. The purpose of this paper is to introduce a framework using IoT, which helps in detecting car accidents and notifying them immediately. This can be achieved by integrating smart sensors with a microcontroller within the car that can trigger at the time of an accident. The other modules like GPS and GSM are integrated with the system to obtain the location coordinates of the accidents and sending it to registered numbers and nearby ambulance to notify them about the accident to obtain immediate help at the location.
Volume: 9
Issue: 5
Page: 4020-4026
Publish at: 2019-10-01

Collaborative virtual reality application for interior design

10.11591/ijeecs.v16.i1.pp500-507
Haziq Izwan Rahmat , Suzana Ahmad , Marina Ismail
Virtual Reality (VR) is currently popular technology that has been used by people in various areas such as architecture, medical, training and many more.  In this paper, the researcher proposed collaborative VR for interior design that allows customer and designer work together at different location.  Commonly, the designer draw their design in two-dimensional (2D) graphics at the drawing paper and presents to the customer.  However, 2D drawings led to an ambiguity, indistrinct and uncertainty on the design.  In addition, redesign any changes lead to re-build the prototype.  These will be costly and wasting time, therefore, researcher proposed collaborative VR application which provide an intense feelings about the design which is presented in form of three-dimensional (3D) graphics.  Additionally, proposed application would allow the designer and customer to work in real-time.  In conclusion, collaborative VR will give the benefits for interior design manufacturing to prosper along with current technology.
Volume: 16
Issue: 1
Page: 500-507
Publish at: 2019-10-01

Random routing scheme with misleading dead ends

10.11591/ijece.v9i5.pp4176-4183
Chitra Rajarama , Jagadeesha Narasimhamurthy Sugatoor , Yerri Swamy T
A new method of sink location security in a Wireless Sensor Network is proposed. In the proposed scheme, all the node addresses are encrypted and an attacker cannot determine the real sink address by capturing the packets and analyzing its contents for the final destination. The main contribution of our proposed method is to use random routing scheme with misleading dead ends. This provides security against traffic analysis attack.
Volume: 9
Issue: 5
Page: 4176-4183
Publish at: 2019-10-01

Design of a compact hexagonal structured dual band MIMO antenna using orthogonal polarization for WLAN and satellite applications

10.11591/ijece.v9i5.pp4217-4225
Aziz Dkiouak , Mohssine El Ouahabi , Alia Zakriti , Mohsine Khalladi , Aicha Mchbal
In this paper, a compact dual band multiple-input multiple-output (MIMO) antenna system for WLAN and X-band satellite applications (2.4/9.8 GHz respectively) is proposed. On the top face of the substrate, two antenna elements with a size of 20 × 24 mm2 are placed side by side and fed with matched orthogonal micro-strip lines. The two antenna elements have orthogonal polarization which can reduce the mutual coupling between its ports. The designed antenna system is fabricated and measured to validate the simulation results. The impedance bandwidths are about 370 MHz (2.19 to 2.56 GHz) and 630 MHz (9.44 to 10.07 GHz), while the obtained isolation is greater than 14 dB at the operating bands. Furthermore, the envelope correlation is less than 0.052 and 0.008 at 2.4 and 9.8 GHz, respectively. Hence the diversity gain is higher than 9.98 in the frequency bands of interest.
Volume: 9
Issue: 5
Page: 4217-4225
Publish at: 2019-10-01

Outage probability analysis of EH relay-assisted non-orthogonal multiple access (NOMA) systems over Block Rayleigh Fading Channel

10.11591/ijece.v9i5.pp3607-3614
Tan N. Nguyen , Minh Tran , Van-Duc Phan , Hoang-Nam Nguyen , Thanh-Long Nguyen
Non-orthogonal multiple access (NOMA) has been identified as a promising multiple access technique for the fifth generation (5G) mobile networks due to its superior spectral efficiency. In this paper, we propose and investigate a Non-Orthogonal Multiple Access (NOMA) of energy harvesting (EH) relay assisted system over Block Rayleigh Fading Channel. In order to evaluate the performance of the proposed system, the integral expression of the outage probability is analyzed and derived. Numerical results confirm that our derived analytical results match well with the Monte Carlo simulations in connection with all possible system parameter.
Volume: 9
Issue: 5
Page: 3607-3614
Publish at: 2019-10-01

Efficient error correcting scheme for chaos shift keying signals

10.11591/ijece.v9i5.pp3550-3557
Hikmat N. Abdullah , Thamir R. Saeed , Asaad H. Sahar
An effective error-correction scheme based on normalized correlation for a non coherent chaos communication system with no redundancy bits is proposed in this paper. A modified logistic map is used in the proposed scheme for generating two sequences, one for every data bit value, in a manner that the initial value of the next chaotic sequence is set by the second value of the present chaotic sequence of the similar symbol. This arrangement, thus, has the creation of successive chaotic sequences with identical chaotic dynamics for error correction purpose. The detection symbol is performed prior to correction, on the basis of the suboptimal receiver which anchors on the computation of the shortest distance existing between the received sequence and the modified logistic map’s chaotic trajectory. The results of the simulation reveal noticeable Eb/No improvement by the proposed scheme over the prior to the error- correcting scheme with the improvement increasing whenever there is increase in the number of sequence N. Prior to the error-correcting scheme when N=8, a gain of 1.3 dB is accomplished in Eb/No at 10-3 bit error probability. On the basis of normalized correlation, the most efficient point in our proposed error correction scheme is the absence of any redundant bits needed with minimum delay procedure, in contrast to earlier method that was based on suboptimal method detection and correction. Such performance would render the scheme good candidate for applications requiring high rates of data transmission.
Volume: 9
Issue: 5
Page: 3550-3557
Publish at: 2019-10-01

Enhancing code clone detection using control flow graphs

10.11591/ijece.v9i5.pp3804-3812
Dong Kwan Kim
Code clones are syntactically or semantically equivalent code fragments of source code. Copy-and-paste programming allows software developers to improve development productivity, but it could produce code clones that can introduce non-trivial difficulties in software maintenance. In this paper, a code clone detection framework is presented with a feature extractor and a clone classifier using deep learning. The clone classifier is trained with true and false clones and then is tested with a test dataset to evaluate the performance of the proposed approach to clone detection. In particular, the proposed approach to clone detection uses Control Flow Graphs (CFGs) to extract features of a given code snippet. The selected features are used to compute similarity scores for comparing two code fragments. The clone classifier is trained and tested with similarity scores that quantify the degree of how similar two code fragments are. The experimental results demonstrate that using CFG features is a viable methodology in terms of the effectiveness of clone detection for both syntactic and semantic clones.
Volume: 9
Issue: 5
Page: 3804-3812
Publish at: 2019-10-01

A modified cascaded h-bridge multilevel inverter based on particle swarm optimisation (PSO) technique

10.11591/ijeecs.v16.i1.pp41-51
Mohammed Rasheed , Rosli Omar , Marizan Sulaiman , Wahidah Abd Halim
In this paper, modified multilevel inverter, via addition of an auxiliary bidirectional switch, based on Newton Raphson (NR) and Particle Swarm Optimization (PSO) techniques is presented. The NR and PSO techniques were employed for selective harmonics elimination (SHE) solution in a modified Cascaded H Bridge Multilevel inverter (CHB-MLI). The Selective Harmonic Elimination Pulse-Width Modulation (SHE-PWM) is a powerful technique for harmonic minimization in multilevel inverter. The NR and PSO techniques were used to determine the switching angles by solving the non-linear equations of the output voltage waveform of the modified CHB-MLI in order to control the fundamental component and eliminate some low order harmonics. The proposed NR and PSO techniques are capable to minimize the Total Harmonic Distortion (THD) of the output voltage of the modified inverter within allowable limits. This paper aims to modeling and simulation by MATLAB of the modified topology of the CHB-MLI for a single-phase prototype for 13-levels. The inverter offers less THD and greater efficiency using PSO control algorithm compared with the NR algorithm. The performance of the proposed controllers based on NR and PSO techniques is verified through simulation.
Volume: 16
Issue: 1
Page: 41-51
Publish at: 2019-10-01

Maximizing signal to leakage ratios in MIMO BCH cooperative beamforming scheme

10.11591/ijece.v9i5.pp3701-3713
Mohammed Fadhil , Nor Fadzilah Abdullah , Mahamod Ismail , Rosdiadee Nordin , Cebrail Ciftlikli , Musaab Al-Obaidi
Beamforming (BF) technique in cooperative multiple input multiple output (MIMO) antenna arrays improves signal to noise ratio (SNR) of the intended user. The challenge is to design transmit beamforming vectors for every user while limiting the co-channel interference (CCI) from other users. In this paper, we proposed cooperative beamforming based on Signal-to-Leakage Ratio (SLR) to exploit the leakage power as a useful power in the second time slot after user cooperation, for this purpose successive interference cancellation (SIC) is employed in each user to separate the leakage signal from the desired signal. Without increasing the complexity, Maximizing Signal-to-Leakage Ratio (SLR) subject to proposed power constraint instead of a unity norm is the way to achieve extra leakage power. To reduce the erroneous, Bose–Chaudhuri–Hocquenghem (BCH) codes employed in Beamforming of (SIC) cooperative scheme BF(CS-SIC-BCH). Maximum-likelihood (ML) estimator method is used at each user receiver. Simulation results show that the performance of the proposed scheme BF (CS-SIC-BCH) over Rayleigh and Rician fading channel is significantly better than the performance beamforming based on SLR in Non-cooperative system. More specifically to achieve a BER of about the required SNR for the proposed scheme is about 1 dB less than the Non-cooperative system.
Volume: 9
Issue: 5
Page: 3701-3713
Publish at: 2019-10-01

Obstacle avoidance and distance measurement for unmanned aerial vehicles using monocular vision

10.11591/ijece.v9i5.pp3504-3511
Aswini N , Uma S V
Unmanned Aerial Vehicles or commonly known as drones are better suited for "dull, dirty, or dangerous" missions than manned aircraft. The drone can be either remotely controlled or it can travel as per predefined path using complex automation algorithm built during its development. In general, Unmanned Aerial Vehicle (UAV) is the combination of Drone in the air and control system on the ground. Design of an UAV means integrating hardware, software, sensors, actuators, communication systems and payloads into a single unit for the application involved. To make it completely autonomous, the most challenging problem faced by UAVs is obstacle avoidance. In this paper, a novel method to detect frontal obstacles using monocular camera is proposed. Computer Vision algorithms like Scale Invariant Feature Transform (SIFT) and Speeded Up Robust Feature (SURF) are used to detect frontal obstacles and then distance of the obstacle from camera is calculated. To meet the defined objectives, designed system is tested with self-developed videos which are captured by DJI Phantom 4 pro.
Volume: 9
Issue: 5
Page: 3504-3511
Publish at: 2019-10-01
Show 1235 of 1994

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration