Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,905 Article Results

Ovulation hormonal imbalance recognition system using saliva’s conductivity analysis based on potentiometric method

10.11591/ijeecs.v16.i1.pp176-183
Romeo Jr. Jorda , Kit Erick Bartolome , Christopher Buban , Ma. Aimee De Los Reyes , Angelo Maingat , Micaela Joyce Oledan , Lean Karlo Tolentino
Hormonal imbalance is often pointed out by medical experts to be the cause of menstrual irregularity, a common problem of women. This study aims to develop a device that would determine if a patient has hormonal imbalance by testing saliva’s conductivity onto the device for 28 consecutive days, thus, determining the cause of the patient’s menstrual irregularity. To test the accuracy of the device, the researchers selected three women residing in one home to use the device. To determine if a woman has hormonal imbalance, the data, when plotted in a chart, should have a sudden peak. However, data can’t be analyzed through visual assumptions only. Therefore, the data is analyzed through sample standard deviation. If one data is higher or lower than the sum and difference of the sample standard deviation and the mean, the woman is negative in hormonal imbalance. Comparing the result from the device and from the blood test, it is concluded that the results from the device matched the results from the blood test and medical expert interpretation.
Volume: 16
Issue: 1
Page: 176-183
Publish at: 2019-10-01

Business intelligence addressing service quality for big data analytics in public sector

10.11591/ijeecs.v16.i1.pp491-499
Sadesh Manikam , Shamsul Sahibudin , Vinothini Kasinathan
With the inauguration of Big Data Analytics initiative nationally, many nations have participated and paved way for BDA ecosystem. The initiative is a catalyst to further encourage economic growth in Public Sectors. Some of the common key deliverables identified are increasing productivity involving information communications technology, cost savings, shared benefits, and encourage innovation. The objectives can be further elaborated by driving big data analytics demands in various public sectors agency, adopting big data analytics framework supporting the building of big data industry. This has encouraged talents and startup companies inspiring their capabilities by developing various technology platform, collaborate and innovate amongst public and private sectors, and further strengthen data governance by creating policy and procedures. With the establishment of big data analytics framework, performance measurement can be enforced effortlessly using the principles of business intelligence maturity model and the technological stack comes with it. Various data sources can be used to benchmark service quality using advanced analytics and data science techniques.
Volume: 16
Issue: 1
Page: 491-499
Publish at: 2019-10-01

Comparing machine learning and ensemble learning in the field of football

10.11591/ijece.v9i5.pp4321-4325
Shuaib Khan , Kirubanand V. B
Football has been one of the most popular and loved sports since its birth on November 6th, 1869. The main reason for this is because it is highly unpredictable in nature. Predicting football matches results seems like the perfect problem for machine learning models. But there are various caveats such as picking the right features from an enormous number of available features.  There have been many models which have been applied to various football-related datasets. This paper aims to compare Support Vector Machines a machine learning model and XGBoost an Ensemble learning model and how Ensemble Learning can greatly improve the accuracy of the predictions.
Volume: 9
Issue: 5
Page: 4321-4325
Publish at: 2019-10-01

Obstacle avoidance and distance measurement for unmanned aerial vehicles using monocular vision

10.11591/ijece.v9i5.pp3504-3511
Aswini N , Uma S V
Unmanned Aerial Vehicles or commonly known as drones are better suited for "dull, dirty, or dangerous" missions than manned aircraft. The drone can be either remotely controlled or it can travel as per predefined path using complex automation algorithm built during its development. In general, Unmanned Aerial Vehicle (UAV) is the combination of Drone in the air and control system on the ground. Design of an UAV means integrating hardware, software, sensors, actuators, communication systems and payloads into a single unit for the application involved. To make it completely autonomous, the most challenging problem faced by UAVs is obstacle avoidance. In this paper, a novel method to detect frontal obstacles using monocular camera is proposed. Computer Vision algorithms like Scale Invariant Feature Transform (SIFT) and Speeded Up Robust Feature (SURF) are used to detect frontal obstacles and then distance of the obstacle from camera is calculated. To meet the defined objectives, designed system is tested with self-developed videos which are captured by DJI Phantom 4 pro.
Volume: 9
Issue: 5
Page: 3504-3511
Publish at: 2019-10-01

Insights extraction on cross-cultural interaction through astronomy online labs using data analytics

10.11591/ijeecs.v16.i1.pp508-515
M. Bakri , Norhaslinda Kamaruddin , M. Hamiz , P. Marlia , A. H. S. Nurhasmiza , Z. Othman , N. A. S. Nilam
Dialogical inquiry on astrology offers the participants to gain not only the intellectual and technological knowledge on the subject matter but also the social benefit of the interaction. Different cultures and values may pose as a challenge for adaptation when the participants start to collaborate in order to complete the group work. Hence, multiple sessions of cross-cultural interaction through Astronomy Online Labs had been conducted to give the participants a standardized platform to discuss and communicate. However, it is imperative to observe the content and frequency of the interaction to ensure both parties (Local and Non-local) benefited from such interaction. The interaction had been recorded and analysed to give us some insights for the improvement of the future participants’ engagement. The visualization techniques such as word cloud, word forest, timeline as well as Venn diagram approaches had been used and it is observed that the participants are actively communicating with the Non-local slightly dominating the session. It is hoped that the analysis tool can be embedded in the platform that it can provide dynamic analysis on the go while interaction happens so the moderator can steer the interaction to the intended topic.
Volume: 16
Issue: 1
Page: 508-515
Publish at: 2019-10-01

A voltage electrical distance application for power system load shedding considering the primary and secondary generator controls

10.11591/ijece.v9i5.pp3993-4002
Le Trong Nghia , Quyen Huy Anh , Phan Thi Thanh Binh , N Thai An , P. H. Hau
This paper proposes a method for determining location and calculating the minimum amount of power load needed to shed in order to recover the frequency back to the allowable range. Based on the consideration of the primary control of the turbine governor and the reserve power of the generators for secondary control, the minimum amount of load shedding was calculated in order to recover the frequency of the power system. Computation and analysis of the voltage electrical distance between the outage generator and the loads to prioritize distribution of the amount power load shedding at load bus positions. The nearer the load bus from the outage generator is, the higher the amount of load shedding will shed and vice versa. With this technique, a large amount of load shedding could be avoided, hence, saved from economic losses, and customer service interruption. The effectiveness of the proposed method tested on the IEEE 37 bus 9 generators power system standard has demonstrated the effectiveness of this method.
Volume: 9
Issue: 5
Page: 3993-4002
Publish at: 2019-10-01

Taylor series method in TDOA approach for indoor positioning system

10.11591/ijece.v9i5.pp3927-3933
Diniya Jose , Shoney Sebastian
Localisation technologies have always remained in the limelight of positioning-science as researchers have ever shown keen interest to know the exact positions of things. Ultrasonic sensors are mainly used for localisation of mobile robots since they provide high accuracy. This paper presents Taylor Series Method in Time Difference of Arrival approach using ultrasonic sensors.Signals are send from the sensors periodically.The time difference of arrival of signals from the ultrasonic sensors is used by the receiver unit to estimate the location of the mobile unit. The equations formed by using Time Difference of Approach are solved using Taylor Series Method. Taylor Series Method provides a more accurate result since they give less error compared to other methods and they ignore the measurement errors.
Volume: 9
Issue: 5
Page: 3927-3933
Publish at: 2019-10-01

Comparison of malware detection techniques using machine learning algorithm

10.11591/ijeecs.v16.i1.pp435-440
Nur Syuhada Selamat , Fakariah Hani Mohd Ali
Currently, the volume of malware grows faster each year and poses a thoughtful global security threat. The number of malware developed increases as computers became interconnected, at an alarming rate in the 1990s. This scenario resulted the increment of malware. It also caused many protections are built to fight the malware. Unfortunately, the current technology is no longer effective to handle more advanced malware. Malware authors have created them to become more difficult to be evaded from anti-virus detection. In the current research, Machine Learning (ML) algorithm techniques became more popular to the researchers to analyze malware detection. In this paper, researchers proposed a defense system which uses three ML algorithm techniques comparison and select them based on the high accuracy malware detection. The result indicates that Decision Tree algorithm is the best detection accuracy compares to others classifier with 99% and 0.021% False Positive Rate (FPR) on a relatively small dataset.
Volume: 16
Issue: 1
Page: 435-440
Publish at: 2019-10-01

Numerical solution for a new fuzzy transform of hyperbolic goursat partial differential equation

10.11591/ijeecs.v16.i1.pp292-298
Nur Syazana Saharizan , Nurnadiah Zamri
The main objective of this paper is to present a new numerical method with utilization of fuzzy transform in order to solve various engineering problems that represented by hyperbolic Goursat partial differentical equation (PDE). The application of differential equations are widely used for modelling physical phenomena. There are many complicated and dynamic physical problems involved in developing a differential equation with high accuracy. Some problems requires a complex and time consuming algorithms. Therefore, the application of fuzzy mathematics seems to be appropriate for solving differential equations due to the transformation of differential equations to the algebraic equation which is solvable. Furthermore, development of a numerical method for solving hyperbolic Goursat PDE is presented in this paper. The method are supported by numerical experiment and computation using MATLAB. This will provide a clear picture to the researcher to understand the utilization of fuzzy transform to the hyperbolic Goursat PDE.
Volume: 16
Issue: 1
Page: 292-298
Publish at: 2019-10-01

The optimization of leased line distribution at the EDGE of local access network via WAN convergence network

10.11591/ijeecs.v16.i1.pp333-341
Nor Shahniza Kamal Bashah , Nor Haizon Husin , Syaripah Ruzaini Syed Aris , Norjansalika Janom , Noor Habibah Arshad
Managing the multiple services of the leased line at the same location is quite critical especially when the resource become highly utilized. Bundling the several network resource components into a one box by simplifying the multiple networks to a single network can help to reduce the utilization of network resources. This paper presents a study on optimiziation of leased line distribution at the EDGE of Local Access Network via WAN convergence network. In this study, a WAN Convergence Network is designed which intends to use only a single leased line network in a location rather than multiple leased lines. It is using a simple concept of SDH structured which channelized the time slots and control the transmission line. The time slots will be relocated from the multiple leased lines into a WAN Convergence Network and it will be de-multiplexed through the Data Circuit Terminating Equipment (DCE) at the customer premises. The WAN Convergence Network design starts from the Digital Data Network (DDN) until the DCE which includes the Local Access Network. This approach will be able to save the network resource especially the time slots, cable port, DCE and consequently avoid adding new network infrastructure. This research will result to the new network design which offer multiple leased line networks at the customer end by using only one dedicated leased line network namely WAN Convergence Network.
Volume: 16
Issue: 1
Page: 333-341
Publish at: 2019-10-01

Inside: a model for interactive and immersive synchronous media in MOOC courses

10.11591/ijeecs.v16.i1.pp456-464
Lizzam Abdul Latiff , Azhar Abdul Aziz , Afiza Ismail , Mudiana Mokhsin
MOOC or Massive Online Open Course is increasingly adopted by Universiti Teknologi MARA as one of the e-learning methods. It is estimated that 900 courses will be offered by end of 2018, in line with the Malaysian Government’s push for better utilization of Information and Communication Technology (ICT) in education. This creates an opportunity to introduce MOOC as a legitimate full alternative to lecture classes. However, learners in a MOOC setting are at a disadvantage when compared to conventional classroom in learner-learner and learner-instructor interaction. There is a huge temporal gap that exists by nature of how the courses are conducted. InSIDE is developed as a model that introduces synchronous interactivity and immersive component within MOOC. To facilitate interaction in this setting, InSIDE suggests a dedicated moderator to accompany the lecture. The model also utilizes a “go high and fail gracefully” approach to overcome the devices, connectivity and infrastructural challenge. In pursuant of the creation of a model that can be used in UiTM, interviews with UiTM’s MOOC facilitators and lecturers were conducted to gain insights on the behind-the-scene processes of creating and managing a course. In order to ensure that the model is feasible within existing infrastructure, a Proof of Concept was conducted with an actual lecture. InSIDE was also presented to three experts on MOOC in UITM. From the qualitative data obtained, 2 out of 3 experts agree that the InSIDE have the possibility to improve MOOC delivery, while one expert agree with reservation in regards required hardware and infrastructure required.
Volume: 16
Issue: 1
Page: 456-464
Publish at: 2019-10-01

A detailed investigation of the impact of online transportation on Bangladesh economy

10.11591/ijeecs.v16.i1.pp420-428
Abbas Ali Khan , M. Raki Billah , Chandan Debnath , Sadekur Rahman , Md. Tarek Habib , Gazi Zahirul Islam
Transportation is one of the main part of our daily life especially in Dhaka City where traffic jam, security, harassment of fare and other problems are big issue at conventional vehicle. A couple of year ago since 2016 the online maintain vehicle has introduced by “Pathao” and “Ubar” both have car and motor cycle ride share. The main purpose of this paper is to focus the facilities of IT on transport basis of security, transparent cash-on-delivery, hassle-free communication, reduce waiting time for the passenger and the impact of IT on Bangladesh economy.
Volume: 16
Issue: 1
Page: 420-428
Publish at: 2019-10-01

Pilot reuse sequences for TDD in downlink multi-cells to improve data rates

10.12928/telkomnika.v17i5.12809
Adeeb; Universiti Tun Hussein Onn Malaysia Salh , Lukman; Universiti Tun Hussein Onn Malaysia Audah , Nor S. M.; Universiti Tun Hussein Onn Malaysia Shah , Shipun A.; Universiti Tun Hussein Onn Malaysia Hamzah
The exponential growth in demand for high data rate transmission to users in fifth generation wireless networks, focus there has been a particular research focus on new techniques that achievable high data rate by suppressing interference between neighboring cells. In this paper, we propose that system performance can be improved by using perfect channel estimation and reducing effective interference with pilot reuse that mitigate strong pilot contamination based on the knowledge of large-scale fading coefficients. We derived the lower bounds on the achievable data rate in downlink by analyzing the performance of the zero-forcing precoding method and derive the signal-to-interference noise ratio to mitigate interference between neighboring cells. From the simulation results, the large pilot reuse sequences improved the achievable data rate and provided better estimation for a channel. When the number of users is large, the interference between neighboring cells can be suppressed by using orthogonal pilot reuse sequences.
Volume: 17
Issue: 5
Page: 2161-2168
Publish at: 2019-10-01

Real-time online fingerprint image classification using adaptive hybrid techniques

10.11591/ijece.v9i5.pp4372-4381
Annapurna Mishra , Satchidananda Dehuri
This paper presents three different hybrid classification techniques applied for the first time in real-time online fingerprint classification. Classification of online real time fingerprints is a complex task as it involves adaptation and tuning of classifier parameters for better classification accuracy. To accomplish the optimal adaptation of parameters of functional link artificial neural network (FLANN) for real-time online fingerprint classification, proven and established optimizers, such as Biogeography based optimizer (BBO), Genetic algorithm (GA), and Particle swarm optimizer (PSO) are intelligently infused with it to form hybrid classifiers. The global features of the real-time fingerprints are extracted using a Gabor filter-bank and then passed into adaptive hybrid classifiers for the desired classification as per the Henry system. Three hybrid classifiers, the optimized weight adapted Biogeography based optimized functional link artificial neural network (BBO-FLANN), Genetic algorithm based functional link artificial neural network (GA-FLANN) and Particle swarm optimized functional link artificial neural network (PSO-FLANN), are explored for real-time online fingerprint classification, where the PSO-FLANN technique  is showing superior performance as compared to GA-FLANN and BBO-FLANN techniques. The best accuracy observed by the application of PSO-FLANN, is 98% for real-time online fingerprint classification.
Volume: 9
Issue: 5
Page: 4372-4381
Publish at: 2019-10-01

A new Leach protocol based on ICH-Leach for adaptive image transferring using DWT

10.12928/telkomnika.v17i5.12446
Abdelali; University Mohammed V Zbakh , Mohamed Taj; University of Sidi Mohamed Ben Abdellah Bennani
Nowadays, the rapid development and the miniaturization of CMOS image sensors in the last years allowed the creation of WMSN (Wireless Multimedia Sensor Network). Therefore, transferring images through the network becomes an important field of research. The main goal is to transmit the data from a sensor node to another to reach finally the Sink node. Thus, routing protocols play an important role in managing and optimizing the node's resources particularly the energy consumption. Therefore, some routing protocols are known by their ability to save energy and extend the lifetime of the network such as Leach protocol and derived variants. However, multimedia content transferring was not a priority for these protocols. In this paper, the main idea is to adapt ICH-Leach [1], for image transferring. This protocol was tested in a previous work and has given good performances against Leach [2], balanced Leach [3] and MLD-Leach [4]. In fact, the Haar wavelet transform is used, in the application layer, to extract the resolution level to be used in image transmission, depending on the rate flow between the sensor node and the sink node. This paper provides statistics concerning the lifetime of the network, the energy consumption and statistics related to receive images using the peak signal-to-noise ratio (PSNR). The Castalia framework is used for simulation, obtained results show the efficiency of the proposed approach by network lifetime extending and more images transmitting with better quality compared to other protocols.
Volume: 17
Issue: 5
Page: 2418-2426
Publish at: 2019-10-01
Show 1238 of 1994

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration