Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,758 Article Results

Mobile robot turned on by sound and directionally controlled by an external light source

10.11591/ijece.v9i4.pp2840-2847
Luis G. Lafaurie , Fredy E. Hoyos , Jhon E. Candelo-Becerra
This paper presents theoretical, numerical, and experimental tests of a mobile robot, which starts on the emission of a strong sound, like an applause, and the direction and speed of the vehicle is controlled by an external pulsed light source (PWM signal). The simulation is performed in MATLAB-Simulink; electrical circuits and the experiment are shown in detail. The results show that the vehicle speed can be controlled with a PWM signal from an external light falling on the LDR sensors. Besides, the circuit was designed to consume less than 1 ampere with the four motors moving at full speed, which can easily be powered by lithium battery.
Volume: 9
Issue: 4
Page: 2840-2847
Publish at: 2019-08-01

A statistical approach to spectrum sensing using bayes factor and p-Values

10.11591/ijece.v9i4.pp2910-2917
Deepa N. Reddy , Y. Ravinder
The sensing methods with multiple receive antennas  in the Cognitive Radio (CR) device, provide a promising solution for reducing the error rates in the detection of the Primary User (PU) signal. The received Signal to Noise Ratio at the CR receiver is enhanced using the diversity combiners. This paper proposes a statistical approach based on minimum Bayes factors and p-Values as diversity combiners in the spectrum sensing scenario. The effect of these statistical measures in sensing the spectrum in a CR environment is investigated. Through extensive Monte Carlo simulations it is shown that this novel statistical approach based on Bayes factors provides a promising solution to combine the test statistics from multiple receiver antennas and can be used as an alternative to the conventional hypothesis testing methods for spectrum sensing. The Bayesian results provide more accurate results when measuring the strength of the evidence against the hypothesis.
Volume: 9
Issue: 4
Page: 2910-2917
Publish at: 2019-08-01

Opinion mining using combinational approach for different domains

10.11591/ijece.v9i4.pp3307-3313
Jyoti Sandesh Deshmukh , Amiya Kumar Tripathy , Dilendra Hiran
An increase in use of web produces large content of information about products. Online reviews are used to make decision by peoples. Opinion mining is vast research area in which different types of reviews are analyzed. Several issues are existing in this area. Domain adaptation is emerging issue in opinion mining. Labling of data for every domain is time consuming and costly task. Hence the need arises for model that train one domain and applied it on other domain reducing cost aswell as time. This is called domain adaptation which is addressed in this paper. Using maximum entropy and clustering technique source domains data is trained. Trained data from source domain is applied on target data to labeling purpose A result shows moderate accuracy for 5 fold cross validation and combination of source domains for Blitzer et al (2007) multi domain product dataset.
Volume: 9
Issue: 4
Page: 3307-3313
Publish at: 2019-08-01

Improving of Fingerprint Segmentation Images Based on K-MEANS and DBSCAN Clustering

10.11591/ijece.v9i4.pp2425-2432
El mehdi Cherrat , Rachid Alaoui , Hassane Bouzahir
Nowadays, the fingerprint identification system is the most exploited sector of biometric. Fingerprint image segmentation is considered one of its first processing stage. Thus, this stage affects typically the feature extraction and matching process which leads to fingerprint recognition system with high accuracy. In this paper, three major steps are proposed. First, Soble and TopHat filtering method have been used to improve the quality of the fingerprint images. Then, for each local block in fingerprint image, an accurate separation of the foreground and background region is obtained by K-means clustering for combining 5-dimensional characteristics vector (variance, difference of mean, gradient coherence, ridge direction and energy spectrum). Additionally, in our approach, the local variance thresholding is used to reduce computing time for segmentation. Finally, we are combined to our system DBSCAN clustering which has been performed in order to overcome the drawbacks of K-means classification in fingerprint images segmentation. The proposed algorithm is tested on four different databases. Experimental results demonstrate that our approach is significantly efficacy against some recently published techniques in terms of separation between the ridge and non-ridge region.
Volume: 9
Issue: 4
Page: 2425-2432
Publish at: 2019-08-01

An Efficient Design Approach of ROI Based DWT Using Vedic and Wallace Tree Multiplier on FPGA Platform

10.11591/ijece.v9i4.pp2433-2442
Vijaya SM , Suresh K
In digital image processing, the compression mechanism is utilized to enhance the visual perception and storage cost. By using hardware architectures, reconstruction of medical images especially Region of interest (ROI) part using Lossy image compression is a challenging task. In this paper, the ROI Based Discrete wavelet transformation (DWT) using separate Wallace- tree multiplier (WM) and modified Vedic Multiplier (VM) methods are designed. The Lifting based DWT method is used for the ROI compression and reconstruction. The 9/7 filter coefficients are multiplied in DWT using Wallace- tree multiplier (WM) and modified Vedic Multiplier (VM). The designed Wallace tree multiplier works with the parallel mechanism using pipeline architecture results with optimized hardware resources, and 8x8 Vedic multiplier designs improves the ROI reconstruction image quality and fast computation. To evaluate the performance metrics between ROI Based DWT-WM and DWT-VM on FPGA platform, The PSNR and MSE are calculated for different Brain MRI images, and also hardware constraints include Area, Delay, maximum operating frequency and power results are tabulated. The proposed model is designed using Xilinx platform using Verilog-HDL and simulated using ModelSim and Implemented on Artix-7 FPGA device.
Volume: 9
Issue: 4
Page: 2433-2442
Publish at: 2019-08-01

n-Tier Modelling of Robust Key management for Secure Data Aggregation in Wireless Sensor Network

10.11591/ijece.v9i4.pp2682-2690
Jyoti Metan , K N Narashinha Murthy
Security problems in Wireless Sensor Network (WSN) have been researched from more than a decade. There are various security approaches being evolving towards resisting various forms of attack using different methodologies. After reviewing the existing security approaches, it can be concluded that such security approaches are highly attack-specific and doesnt address various associated issues in WSN. It is essential for security approach to be computationally lightweight. Therefore, this paper presents a novel analytical modelling that is based on n-tier approach with a target to generate an optimized secret key that could ensure higher degree of security during the process of data aggregation in WSN. The study outcome shows that proposed system is computationally lightweight with good performance on reduced delay and reduced energy consumption. It also exhibits enhanced response time and good data delivery performance to balance the need of security and data forwarding performance in WSN.
Volume: 9
Issue: 4
Page: 2682-2690
Publish at: 2019-08-01

Enhancing the BER and ACLR for the HPA Using Pre-Distortion Technique

10.11591/ijece.v9i4.pp2725-2731
Ehab AbdulRazzaq Hussein
Power amplifiers are key components in wireless transceivers. Their function is to amplify signal and generate the required Radio Frequency (RF) power that allows to transmit the signal over an appropriate range. The Orthogonal Frequency Division Multiplexing (OFDM) systems are highly sensitive to nonlinear distortion introduced by High Power Amplifier (HPA). The HPA nonlinearity causes in-band and out-of-band distortions. The linearization techniques are used to compensate the nonlinear effects of the high power amplifier. These techniques correct the distortion effects resulting from nonlinearities in the transmitted signal. Many linearization techniques have been developed to improve power amplifier linearity and to decrease both Bit Error Rate (BER) and Adjacent Channel Leakage Ratio (ACLR). This work is set to run the high power amplifier in the nonlinear region. It is also attempting to analyze the resulting signal in terms of the BER and ACLR, next employs pre-distortion linearization techniques to reduce the distortion introduced in this region. According to Digital Video Broadcasting-Terrestrial (DVB-T) standard the linearization techniques, circuit and the OFDM transmitter and receiver is designed and implemented through using computer simulation of AWR Design Environment.
Volume: 9
Issue: 4
Page: 2725-2731
Publish at: 2019-08-01

An integration of uml use case diagram and activity diagram with Z language for formalization of library management system

10.11591/ijece.v9i4.pp3069-3076
Zainab Hassan Muhamad , Dhafer AbdulAmeer Abdulmonim , Bashar Alathari
Unified Modeling Language (UML) is the effective standard for modeling object-oriented software systems. However, the ambiguity of semantics and the absence of consistency among UML diagrams lead to lack of precisely defining the requirements of a system. On the other hand, formal methods are techniques and tools use the mathematical notations, and they involve the precise syntax and semantics of the unambiguous software requirements specification. It applied in early stages of Software Development Life Cycle (SDLC). Therefore, an integrated between UML specification and formal specification is required to reduce the requirements' ambiguity and error, and to improve the quality and security of software systems. This paper proposes an approach involves the combining UML use-case diagram and activity diagrams with Z language for formalization of Library Management System (LMS). The focus of this paper is on consistency between the UML diagrams to Z Schema, and then verified by using the Z / EVEs tool.
Volume: 9
Issue: 4
Page: 3069-3076
Publish at: 2019-08-01

Detecting the magnitude of depression in Twitter users using sentiment analysis

10.11591/ijece.v9i4.pp3247-3255
Jini Jojo Stephen , Prabu P.
Today the different social networking sites have enabled everyone to easily express and share their feelings with people around the world. A lot of people use text for communicating, which can be done through different social media messaging platforms available today such as Twitter, Facebook etc, as they find it easier to express their feelings through text instead of speaking them out. Many people who also suffer from stress find it easier to express their feelings on online platform, as over there they can express themselves very easily. So if they are alerted beforehand, there are ways to overcome the mental problems and stress they are suffering from. Depression stands out to be one of the most well known mental health disorders and a major issue for medical and mental health practitioners. Legitimate checking can help in its discovery, which could be useful to anticipate and prevent depression all-together.Hence there is a need for a system, which can cater to such issues and help the user. The purpose of this paper is to propose an efficient method that can detect the level of depression in Twitter users. Sentiment scores calculated can be combined with different emotions to provide a better method to calculate depression scores. This process will help underscore various aspects of depression that have not been understood previously. The main aim is to provide a sense of understanding regarding depression levels in different users and how the scores can be correlated to the main data.
Volume: 9
Issue: 4
Page: 3247-3255
Publish at: 2019-08-01

Prospects of using the UFMC technology In 5g / Imt-2020 networks

10.11591/ijeecs.v15.i2.pp855-860
Ahmed Sabri Ghazi Behadili , Emad Jadeen Abdualsada Alshebaney , Aqeel Lateef Khudhair attaby
The article considers the technology of frequency multiplexing with universal filtering UFMC, planned to be introduced in the fifth generation of mobile communication networks, which allows maximizing the rate of decay of the side lobes of the multifrequency signal spectrum that cause out-of-band emissions. As a method of investigation, a computational experiment was chosen. The parameters of the OFDM and UFMC signals were compared to determine the gain of the UFMC technology in the occupied bandwidth of the signal spectrum, as well as the number of arithmetic operations, required to generate a data symbol compared to the OFDM technology, on the basis of which, conclusions were made about the practical application of UFMC technology in networks mobile communication of the fifth generation. The conducted analysis can help to select the optimal number of sub-channels in groups in order to minimize the amount of computations during the UFMC symbol generation process.
Volume: 15
Issue: 2
Page: 855-860
Publish at: 2019-08-01

Optimal fuzzy-PID controller with derivative filter for load frequency control including UPFC and SMES

10.11591/ijece.v9i4.pp2813-2821
Tarakanta Jena , Manoj Kumar Debnath , Smaran Kumar Sanyal
A newly adopted optimization technique known as sine-cosine algorithm (SCA) is suggested in this research article to tune the gains of Fuzzy-PID controller along with a derivative filter (Fuzzy-PIDF) of a hybrid interconnected system for the Load Frequency Control (LFC). The scrutinized multi-generation system considers hydro, gas and thermal sources in all areas of the dual area power system integrated with UPFC (unified power flow controller) and SMES (Super-conducting magnetic energy storage) units. The preeminence of the offered Fuzzy-PIDF controller is recognized over Fuzzy-PID controller by comparing their dynamic performance indices concerning minimum undershoot, settling time and also peak overshoot. Finally, the sensitiveness and sturdiness of the recommended control method are proved by altering the parameters of the system from their nominal values and by the implementation of random loading in the system.
Volume: 9
Issue: 4
Page: 2813-2821
Publish at: 2019-08-01

A Low Cost Wearable Medical Device for Vital Signs Monitoring in Low-Resource Settings

10.11591/ijece.v9i4.pp2321-2327
Muhammad Niswar , Muhammad Nur , Idar Mappangara
Medical devices are often expensive, so people in low-income countries cannot afford them. This paper presents the design of a low-cost wearable medical device to measure vital signs of a patient including heart rate, blood oxygen saturation level (SpO2) and respiratory rate. The wearable medical device mainly consists of a microcontroller and two biomedical sensors including airflow thermal sensor to measure respiratory rate and pulse oximeter sensor to measure SpO2 and heart rate. We can monitor the vital signs from a smartphone using a web browser through IEEE802.11 wireless connectivity to the wearable medical device. Furthermore, the wearable medical device requires simple management to operate; hence, it can be easily used. Performance evaluation results show that the designed wearable medical device works as good as a standard SpO2 device and it can measure the respiratory rate properly.  The designed wearable medical device is inexpensive and appropriate for low-resource settings. Moreover, as its components are commonly available in the market, it easy to assembly and repair locally.
Volume: 9
Issue: 4
Page: 2321-2327
Publish at: 2019-08-01

Feature Model Configuration Based on Two-Layer Modelling in Software Product Lines

10.11591/ijece.v9i4.pp2648-2658
Elham Darmanaki Farahani , Jafar Habibi
The aim of the Software Product Line (SPL) approach is to improve the software development process by producing software products that match the stakeholders’ requirements. One of the important topics in SPLs is the feature model (FM) configuration process. The purpose of configuration here is to select and remove specific features from the FM in order to produce the required software product. At the same time, detection of differences between application’s requirements and the available capabilities of the implementation platform is a major concern of application requirements engineering. It is possible that the implementation of the selected features of FM needs certain software and hardware infrastructures such as database, operating system and hardware that cannot be made available by stakeholders. We address the FM configuration problem by proposing a method, which employs a two-layer FM comprising the application and infrastructure layers. We also show this method in the context of a case study in the SPL of a sample E-Shop website. The results demonstrate that this method can support both functional and non-functional requirements and can solve the problems arising from lack of attention to implementation requirements in SPL FM selection phase.
Volume: 9
Issue: 4
Page: 2648-2658
Publish at: 2019-08-01

Adapted Branch-and-Bound Algorithm Using SVM With Model Selection

10.11591/ijece.v9i4.pp2481-2490
Mohamed Mustapha Kabbaj , El Afia Abdellatif
Branch-and-Bound algorithm is the basis for the majority of solving methods in mixed integer linear programming. It has been proving its efficiency in different fields. In fact, it creates little by little a tree of nodes by adopting two strategies. These strategies are variable selection strategy and node selection strategy. In our previous work, we experienced a methodology of learning branch-and-bound strategies using regression-based support vector machine twice. That methodology allowed firstly to exploit information from previous executions of Branch-and-Bound algorithm on other instances. Secondly, it created information channel between node selection strategy and variable branching strategy. And thirdly, it gave good results in term of running time comparing to standard Branch-and-Bound algorithm. In this work, we will focus on increasing SVM performance by using cross validation coupled with model selection. 
Volume: 9
Issue: 4
Page: 2481-2490
Publish at: 2019-08-01

Automatic smoke detection system with favoriot platform using internet of things (IoT)

10.11591/ijeecs.v15.i2.pp1102-1108
Mohd Alif bin Suparman , Siat Ling Jong
The available fire alarm system in the market unable to inform occupant that their house is on fire. The occupant remains unknown especially when they are away from their house. Most of the time, the house or building almost destroyed by fire when firefighter comes to the scene due to late inform to Fire and Rescue Department. To this aim, automatic smoke detection system using Internet of Things (IoT) is proposed. The proposed system not only able to monitor the smoke condition of a room but also able to alert user and Fire and Rescue Department when certain level of smoke is detected by a gas sensor via Favoriot platform. Arduino Uno is used in this work to control all the devices and WiFi shield acts as a medium to interconnect devices with the network so that the data from the smoke sensor can be read in the Favoriot platform. In this experiment, the condition of room is tested under several burning materials and the smoke levels are recorded. It is found that when the smoke level more than 100 ppm, it may cause to sore eyes, cough and hard breathing that can bring to death. Therefore, the best threshold level of the automatic smoke detection system is at 80 ppm. By using this system, the user able to take preliminary rescue action to save people and prevent fire breaks out.
Volume: 15
Issue: 2
Page: 1102-1108
Publish at: 2019-08-01
Show 1257 of 1984

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration