Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,758 Article Results

High Level Speaker Specific Features as an Efficiency Enhancing Parameters in Speaker Recognition System

10.11591/ijece.v9i4.pp2443-2450
Satyanand Singh
In this paper, I present high-level speaker specific feature extraction considering intonation, linguistics rhythm, linguistics stress, prosodic features directly from speech signals. I assume that the rhythm is related to language units such as syllables and appears as changes in measurable parameters such as fundamental frequency (  ), duration, and energy. In this work, the syllable type features are selected as the basic unit for expressing the prosodic features. The approximate segmentation of continuous speech to syllable units is achieved by automatically locating the vowel starting point. The knowledge of high-level speaker’s specific speakers is used as a reference for extracting the prosodic features of the speech signal. High-level speaker-specific features extracted using this method may be useful in applications such as speaker recognition where explicit phoneme/syllable boundaries are not readily available. The efficiency of the particular characteristics of the specific features used for automatic speaker recognition was evaluated on TIMIT and HTIMIT corpora initially sampled in the TIMIT at 16 kHz to 8 kHz. In summary, the experiment, the basic discriminating system, and the HMM system are formed on TIMIT corpus with a set of 48 phonemes. Proposed ASR system shows 1.99%, 2.10%,  2.16%  and  2.19 % of efficiency improvements compared to traditional ASR system for and of 16KHz TIMIT utterances.
Volume: 9
Issue: 4
Page: 2443-2450
Publish at: 2019-08-01

An Improved CF-MAC Protocol for VANET

10.11591/ijece.v9i4.pp2668-2674
Ghassan Samara
Vehicular Ad hoc Network (VANET) is one of the emerging research areas in the mobile computing field which is considered as future technology and promising topic in computer science and computer networks. Which provides road safety, updated traffic information, and infotainment. VANET consists of a large number of vehicles moving in high speeds while broadcasting important information like safety and control information which must be sent with high priority. Crowded networks like VANET having many vehicles competing to reserve the channel to send critical information which may lead to high collision scenarios, and therefore, there must be a protocol to send this kind of information with high reliability, low data loss and with no collision. In this research a collision-free protocol will be proposed to manage the channel access among competing vehicles to eliminate the collisions which occur rapidly in VANET especially in dense situations, the proposed protocol hereinafter will be called (I-MAC) protocol expected to enhance the channel performance, achieve load balancing, fairness, and decrease message loss and enhance reliability, The evaluation criteria will examine the channel throughput, message delay, and message loss; the results show that the overall channel performance with regard to collision and packet loss ratio is improved.
Volume: 9
Issue: 4
Page: 2668-2674
Publish at: 2019-08-01

Secure and Proficient Cross Layer (SPCL) QoS Framework for Mobile Ad-hoc

10.11591/ijece.v9i4.pp2603-2613
santosh sahu , Sanjeev Sharma
A cross layer QoS framework is a complete system that provides required QoS services to each node present in the network. All components within it cooperate together for providing the required services. In existing QoS frameworks there is no security mechanism provided while Security is a critical aspect for QoS in the MANET environment. Cross layer QoS framework  tend to be vulnerable to a number of threats and attacks like, over/under-reporting of available bandwidth, over-reservation, state table starvation, QoS degradation,  information disclosure, theft of services timing attack, flooding attack, replay attack, and denial of service (DoS) attack,  attacks on information in transit and attacks against routing. So it is necessary when designing protocols for QoS framework, the harmony between security and QoS must be present as one impacts the others. In this work we proposed secure and proficient cross layer (SPCL) QoS frameworks which prevents from various types of threats and attacks.  The proposed SPCL QoS framework achieves better performance compared to existing QoS frameworks  in metrics of throughput, packet drop ratio, end-to-end delay, and average jitter in both condition when malicious node present in the network and when malicious node not present in the network
Volume: 9
Issue: 4
Page: 2603-2613
Publish at: 2019-08-01

Personal data protection and liability of internet service provider: a comparative approach

10.11591/ijece.v9i4.pp3175-3184
Ni Ketut Supasti Dharmawan , Desak Putu Dewi Kasih , Deris Stiawan
The users of electronic service provider often suffered losses caused by internet services did not work properly including losses due to leakage of personal data protection stored in cloud computing.  The study aims to examine electronic service provider liability upon their failure performing internet services properly and security attacks on cloud computing. This study was normative legal research by examining national and international legal materials. The finding shows that the electronic provider shall be responsible based on right and obligation agreed under the agreement.  Related to cloud computing, providing adequate security to avoid security attacks and misuse of private data that caused losses to the users becoming the liability of service provider. Based on the Federal Trade Commission Act, the liability arises on the grounds of deceptive and unfair trade practices.  Under the General Data Protection Regulation of the European Union, the liability arises on the basis as the controller then provider liable for compensation for user’s suffered damage. In Indonesia, based on the Electronic Information and Transaction Law Amendment, the liability to the owner of personal data whose rights are violated and suffered losses arises due to a failure of ISP protect the data security. For better protection in Indonesia, the protection of big data and clear territorial scope of protection become necessary to consider.
Volume: 9
Issue: 4
Page: 3175-3184
Publish at: 2019-08-01

Real time implementation of a super twisting control of a BLDC motor

10.11591/ijece.v9i4.pp3032-3040
Ali Mousmi , Ahmed Abbou , Yassine El Houm , Anass Bakouri
This paper presents and implements a Super-Twisting high order sliding mode control for a BLDC motor. Conventional sliding mode controller has a very fast response, it allows the convergence in finite time and characterized by its robustness against disturbances and uncertainties; However, the chattering phenomenon due to the discontinuous nature of its control organ degrades its performance, especially in case of mechanical membranes control. To overcome this disadvantage, the most commun solutions are based on the adaptation of its discontinuous nature at static regime, it reduces effectively the chattering phenomenon, but on the other hand impacts performance in terms of robustness. The Super-Twisting is an algorithm of high order sliding mode applicable on systems with relative degree 1, it produces a continuous control which cancels the chattering phenomenon and preserve all traditional sliding mode command performances. To validate the effectiveness and the robustness of the Super-Twisting controller for controlling brushless motors, experimental results using a 3KW BLDC motor are provided and compared with those of a conventional sliding mode controller.
Volume: 9
Issue: 4
Page: 3032-3040
Publish at: 2019-08-01

Resonance frequency analysis of laser optical fiber based on microcantilever

10.11591/ijece.v9i4.pp3090-3099
Mohanad Aljanabi
The normal frequency of smart beams was originated utilizing FEM [Ansys and Comsol] code for first five modes by varying the position of actuator from the fixed end of the structure, and it has a suitable arrangement with analytically found the standard frequency. This paper includes learning a resonance frequency analysis of laser optical fiber based on microcantilever of designing magnetic actuator using Ansys and Comsol simulation. The design of optical fiber includes Nickel cantilever, two magnets and one coil that apply to force on the cantilever. After the current flows in the coil domain, the shape of microcantilever will be deformed. It will move to z- direction that depends on the force direction. Two methods including, Comsol Multiphysics, Ansys and analytical equations have been utilized to calculate the resonance frequency, current and force values. The simulation results include calculating the current (magnetic current density) and effects of the magnetic field of the coil on the cantilever (force calculation). Utilizing this method is to limit faults(errors) of optical fiber laser between transmitter and receiver system (detection system) for any time of cutting coil when the signal of a laser passes through the coil. In conculsions, resonant frequency (f_n) tuning using cantilivier presented in the resrach have larger variable range by using simulations. However,the adjusting of the system and changing the deminsions.Resolutions to this problematic contain tuning the modes of resonant frequency to produce by cantilivier with  2-magnets and coil when the signal  pass from  laser source. Based on these simulations and characterization results, the proposed assembly can be a good applicant for evolving a low price, high material platform for many biological, laser optical fiber, communication, machine learning, biosensors and biomedical applications. 
Volume: 9
Issue: 4
Page: 3090-3099
Publish at: 2019-08-01

Analysis of wave propagation for wireless implantable body area network application

10.11591/ijeecs.v15.i2.pp936-941
N. H. Ramli , Haryati Jaafar , Y. S. Lee , Hazila Othman
The enhancement technologies of wireless body area network improved the health monitoring system. Previous work have been designed the implantable chip printed antenna at 4.8 GHz. This paper is continuing the investigation where the antenna wave propagation in term of attenuation and polarization were studied. The antenna is implanted in human hand voxel model from CST Microwave Studio Software. The performances of the antenna are evaluated in term of return loss, gain and efficiency. Results show that the rate attenuation for the propagation is approximately 0.16 dB up to 0.42 dB. All the results will be guidelines in designing implantable antennas in futures.
Volume: 15
Issue: 2
Page: 936-941
Publish at: 2019-08-01

Reliability estimation for the randomly censored pareto distribution

10.11591/ijece.v9i4.pp3272-3278
Mahmoud M. Smadi , Saiful Islam Ansari , Ahmed A. Jaradat
Widespread applications of random censoring in life testing experiments to estimate reliability of engineering products or systems are avialable. Different parametric statistical models such as exponential, Rayleigh, Weibull and Maxwell distributions are used under random censoring scheme. In this paper, random censoring under Pareto distribution is considered. The maximum likelihood estimators (MLE’s) of the model parameters and survival function were derived along with Fisher information matrix and asymptotic confidence intervals. A simulation study was performed to observe the behavior of the MLE’s. The simulation results showed that the bias and MSE were reasonably small in all cases.
Volume: 9
Issue: 4
Page: 3272-3278
Publish at: 2019-08-01

Genetic Algorithm for Vertical Handover (GAfVH)in a Heterogeneous networks

10.11591/ijece.v9i4.pp2534-2540
iman Zubeiri , Yasmina El morabit , Fatiha Mrabti
The fifth generation (5G) wireless system will deal with the growing demand of new multimedia and broadband application. The 5G network architecture is based on heterogeneous Radio Access Technologies (RATs). In such implementation the Vertical handover is a key issue. Up till now, systems are using simple mechanisms to make handover decision, based on the evaluation of the Received Signal Strength (RSS). In some cases these mechanisms are not Efficient.This paper presents a new vertical handover algorithm based on Genetic Algorithm (GAfVH). It aims to reduce the number of unnecessary handovers, and optimizes the system performance. We compare our simulation results to the Received Signal Strength (RSS) based method. The results show that the number of handovers decreases. Moreover, we demonstrate that the network selection result can differ from an application to another.
Volume: 9
Issue: 4
Page: 2534-2540
Publish at: 2019-08-01

Radio over fiber system based on a hybrid link for next generation of optical fiber communication

10.11591/ijece.v9i4.pp2571-2577
Kaoutar Saidi Alaoui , J. Foshi , Y. Zouine
Radio over fiber technology will play an important role in solving problems facing wireless technology. Envisaging a global village, people could transmit and receive “anytime, anywhere, and anything”. In addition, the explosive growth in internet applications such as the World Wide Web, demonstrates the tremendous increase in bandwidth and low power that the coming world of multimedia interactive applications will require from future networks. ROF technology uses multicarrier modulation like orthogonal frequency division multiplexing (OFDM), which provides an opportunity of having an increased in bandwidth together with an affordable cost and this idea has recently become a suitable topic for many research works. On the other hand, SAC-OCDMA (Spectral Amplitude Coding Optical Code Division Multiple Access) technique is able to enhance the data rate of system and increase the number of user.  In this paper we introduce a ROF link using a hybrid OFDM/SAC-OCDMA technique.
Volume: 9
Issue: 4
Page: 2571-2577
Publish at: 2019-08-01

Modified Timed Efficient Stream Loss-tolerant Authentication to Secure Power Line Communication

10.11591/ijece.v9i4.pp2281-2295
Boyce Sigweni , Mmoloki Mangwala , Joseph Chuma
This paper investigates the feasibility of Timed Efficient Stream Loss-tolerant Authentica- tion to serve security needs of Power Line Communication (PLC) system. PLC network has been identified as the ideal choice to function as the last mile network, deliver load management messages to smart meters. However, there is need to address the security concerns for load management messages delivered over power line communications. The ubiquitous nature of the power line communication infrastructure exposes load management systems (LMS) deployed over it to a security risk. Ordinarily, PLC network does not em- ploy any security measures on which the smart meters and data concentrators can depend on. Therefore, the need to provide a secure mechanism for communication of load man- agement system messages over a PLC network. In LMS, source authentication is of highest priority because we need to respond only to messages from an authenticated source. This is achieved by investigating suitable robust authentication protocols. In this paper we present modifications to Timed Efficient Stream Loss-tolerant Authentication for secure authentica- tion to secure messages for load management over PLC. We demonstrate that PLC can be used to securely and effectively deliver Load Management messages to smart meters, with minimal overhead. 
Volume: 9
Issue: 4
Page: 2281-2295
Publish at: 2019-08-01

Performance investigation of WOFDM for 5G wireless networks

10.11591/ijece.v9i4.pp3153-3158
M. F. Ghanim
Nowadays, emerging wireless networks scenarios such as the proposed systems for 5G is discussed widely with diverse requirements. Orthogonal Frequency Division Multiplexing (OFDM) is a conservative proposal which is used to build 5G WOFDM system (Wavelet OFDM system). The simulation of the system is initialized with BPSK then with QAM and 64-QAM the system is improved by increasing the number of levels of Discrete Wavelet Transform to five levels and finally compared with original system to prove that the it is convenient for 5G Wireless networks.
Volume: 9
Issue: 4
Page: 3153-3158
Publish at: 2019-08-01

Solving output control problems using Lyapunov gradient-velocity vector function

10.11591/ijece.v9i4.pp2874-2879
М. А. Beisenbi , Zh. O Basheyeva
This paper describes a controller and observer parameter definition approach in one input-one output (closed-loop) control systems using Lyapunov gradient-velocity vector function. Construction of the vector function is based on the gradient nature of the control systems and the parity of the vector functions with the potential function from the theory of catastrophe. Investigation of the closed-loop control system’s stability and solution of the problem of controller (determining the coefficient of magnitude matrix) and observer (calculation of the matrix elements of the observing equipment) synthesis is based on the direct methods of Lyapunov. The approach allows to select parameters based on the requested characteristics of the system.
Volume: 9
Issue: 4
Page: 2874-2879
Publish at: 2019-08-01

Design of encrypted transceiver Non-coherent OFDM with ability to correct coding bits of information

10.11591/ijece.v9i4.pp3212-3220
Kareem J. Thajeel , Izz K. Abboud , Laith A. Kunbar
A differential encrypted transceiver was designed in the signal-to-noise ratio systems. A time"-"spread" frequency-"encoded (TSFE) algorithm was proposed using the orthogonal frequency multiplexing multiplier OFDM. The proposed design was verified under the Doppler frequency effect and there was an improvement in the performance of the signal-to-noise ratio system. As a result, the reliability of decoded data was increased and achieves the ability to correct coding bits of information.
Volume: 9
Issue: 4
Page: 3212-3220
Publish at: 2019-08-01

Densely homogeneous fuzzy spaces

10.11591/ijece.v9i4.pp3256-3261
Samer Al Ghour
We extend the concept of being densely homogeneous to include fuzzy topological spaces. We prove that our extension is a good extension in the sense of Lowen. We prove that a-cut topological space (X,I_a) of a DH fuzzy topological space (X,I) is DH in general only for a=0.
Volume: 9
Issue: 4
Page: 3256-3261
Publish at: 2019-08-01
Show 1254 of 1984

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration