Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,758 Article Results

A robust authorship attribution on big period

10.11591/ijece.v9i4.pp3167-3174
Mubin Shoukat Tamboli , Rajesh Prasad
Authorship attribution is a task to identify the writer of unknown text and categorize it to known writer. Writing style of each author is distinct and can be used for the discrimination. There are different parameters responsible for rectifying such changes. When the writing samples collected for an author when it belongs to small period, it can participate efficiently for identification of unknown sample. In this paper author identification problem considered where writing sample is not available on the same time period. Such evidences collected over long period of time. And character n-gram, word n-gram and pos n-gram features used to build the model. As they are contributing towards style of writer in terms of content as well as statistic characteristic of writing style. We applied support vector machine algorithm for classification. Effective results and outcome came out from the experiments. While discriminating among multiple authors, corpus selection and construction were the most tedious task which was implemented effectively. It is observed that accuracy varied on feature type. Word and character n-gram have shown good accuracy than PoS n-gram.
Volume: 9
Issue: 4
Page: 3167-3174
Publish at: 2019-08-01

An integrated OPF dispatching model with wind power and demand response for day-ahead markets

10.11591/ijece.v9i4.pp2794-2802
Ricardo Moreno , Johan Obando , Gabriel Gonzalez
In the day-ahead dispatching of network-constrained electricity markets, renewable energy and distributed resources are dispatched together with conventional generation. The uncertainty and volatility associated to renewable resources represents a new paradigm to be faced for power system operation. Moreover, in various electricity markets there are mechanisms to allow the demand participation through demand response (DR) strategies. Under operational and economic restrictions, the operator each day, or even in intra-day markets, dispatchs an optimal power flow to find a feasible state of operation. The operation decisions in power markets use an optimal power flow considering unit commitment to dispatch economically generation and DR resources under security restrictions. This paper constructs a model to include demand response in the optimal power flow under wind power uncertainty. The model is formulated as a mixed-integer linear quadratic problem and evaluated through Monte-Carlo simulations. A large number of scenarios around a trajectory bid captures the uncertainty in wind power forecasting. The proposed integrated OPF model is tested on the standard IEEE 39-bus system.
Volume: 9
Issue: 4
Page: 2794-2802
Publish at: 2019-08-01

Evaluation of routing protocol with multi-mobile sinks in WSNs using QoS and energy consumption parameters

10.11591/ijece.v9i4.pp2880-2892
Nadia A Shiltagh , Mahmood Z. Abdullah , Ahmed R. Zarzoor
An efficient networks’ energy consumption and Quality of Services (QoS) are considered the most important issues, to evaluate the route quality of the designed routing protocol in Wireless Sensor Networks (WSNs). This study is presented an evaluation performance technique to evaluate two routing protocols: Secure for Mobile Sink Node location using Dynamic Routing Protocol (SMSNDRP) and routing protocol that used K-means algorithm to form Data Gathered Path (KM-DGP), on small and large network with Group of Mobile Sinks (GMSs). The propose technique is based on QoS and sensor nodes’ energy consumption parameters to assess route quality and networks’ energy usage. The evaluation technique is conducted on two routing protocols in two phases: The first phase is used to evaluate the route quality and networks’ energy consumption on small WSN with one mobile Sink Node (SN) and GMSs. The second phase, is used to evaluate the route quality and networks’ energy consumption on large network (four WSNs) with GMSs. The two phases are implementated by creating five sceneries via using NS2.3 simulator software. The implementation results of the proposed performance evaluation technique have demonstrated that SMSNDRP gives better networks’ energy consumption on small single network in comparison with KM-DGP. Also, it gives high quality route in large network that used four mobile SN, in contrast to KM-DGP that used sixteen mobile SNs. While in large network, it found that KM-DGP with sixteen mobile SNs gives better networks’ energy consumption in comparison with SMSNDRP with four mobile SNs.
Volume: 9
Issue: 4
Page: 2880-2892
Publish at: 2019-08-01

Resource allocation in cloud computing using advanced imperialist competitive algorithm

10.11591/ijece.v9i4.pp3286-3297
Seyyed-Mohammad Javadi-Moghaddam , Sara Alipour
Cloud computing makes possible free access to computing resources and high-level services for performing complex calculations and mass storage of information on the Internet. Resource management is one of the most important tasks of cloud providers, which is known as resource allocation. Heterogeneous resources and diverse requests at different time intervals makes it difficult to solve resources allocation problems and is considered as a NP-hard problem. Providing an efficient algorithm for resources allocation to satisfy the cloud providers and customers has always attracted much attention of researchers. Heuristic methods have always introduced as a good model for problem solving. However, most algorithms suffer from early convergence. This paper proposes a new approach based on imperialist competitive algorithm (ICA) which emphasizes the optimization of resource allocation in reducing time, cost and energy consumption. The proposed approach has been able to improve the early convergence of colonial competition algorithm by combining with the Tabu Search Algorithm to achieve an optimal solution at an acceptable time. The evaluated results show more efficiency performance than several relevant effective algorithms.
Volume: 9
Issue: 4
Page: 3286-3297
Publish at: 2019-08-01

Denoising performance analysis of adaptive decision based inverse distance weighted interpolation (DBIDWI) algorithm for salt and pepper noise

10.11591/ijeecs.v15.i2.pp804-813
Vorapoj Patanavijit
Due to its superior performance for denoising an image, which is contaminated by impulsive noise, an adaptive decision based inverse distance weighted interpolation (DBIDWI) algorithm is one of the most dominant and successful denoising algorithm, which is recently proposed in 2017, however this DBIDWI algorithm is not desired for denoising the full dynamic intensity range image, which is comprised of min or max intensity. Consequently, the research article aims to study the performance and its limitation of the DBIDWI algorithm when the DBIDWI algorithm is performed in both general images and the images, which are comprised of min or max intensity. In this simulation experiments, six noisy images (Lena, Mobile, Pepper, Pentagon, Girl and Resolution) under salt&pepper noise are used to evaluate the performance and its limitation of the DBIDWI algorithm in denoised image quality (PSNR) perspective.
Volume: 15
Issue: 2
Page: 804-813
Publish at: 2019-08-01

Towards machine learning-based self-tuning of Hadoop-Spark system

10.11591/ijeecs.v15.i2.pp1076-1085
Md. Armanur Rahman , Abid Hossen , J. Hossen , Venkataseshaiah C , Thangavel Bhuvaneswari , Aziza Sultana
Apache Spark is an open source distributed platform which uses the concept of distributed memory for processing big data. Spark has more than 180 predominant configuration parameter. Configuration settings directly control the efficiency of Apache spark while processing big data, to get the best outcome yet a challenging task as it has many configuration parameters.  Currently, these predominant parameters are tuned manually by trial and error. To overcome this manual tuning problem in this paper proposed and developed a self-tuning approach using machine learning. This approach can tune the parameter value when it’s required. The approach was implemented on Dell server and experiment was done on five different sizes of the dataset and parameter. A comparison is provided to highlight the experimented result of the proposed approach with default Spark configuration system. The results demonstrate that the execution is speeded-up by about 33% (on an average) compared to the default configuration.
Volume: 15
Issue: 2
Page: 1076-1085
Publish at: 2019-08-01

Development of android-based apps for courier service management

10.11591/ijeecs.v15.i2.pp1027-1036
A. Mohd , R. A. Rashid , A. H. F. Abdul Hamid , M. A. Sarijari , M. R. A. Rahim , H. Sayuti , M. R. Abdul Rashid
E-commerce has grown exponentially over the years. The growth has been characterized by strong consumer demands and the increasing number of various products available online. This in turn creates a logistical problem and a high demand for an efficient courier service to support the growing markets. It is very important for courier service provider that the delivery of the parcel is being done as fast as possible. One of the courier service’s vital and most crucial business process is in the last mile parcel delivery. This is where an efficient delivery service will be of utmost importance. An efficient system needs to be developed in order to facilitate the interaction between the courier service provider and consumer to precisely determine the optimal route for the parcel delivery. In this paper, an Android-based application system for courier service management with last mile route tracking module is developed. It is a mobile application that eases the courier delivery personnel in finding their way to deliver the parcels to the customer’s doorstep. The application will guide the courier personnel to get a list of courier data such as address and contact information and then navigate them to the selected customers’ addresses based on traffic data retrieved from Google Maps API. It will choose the best route to the address and notify the customers before arriving so that the customers are ready to receive the parcel. This last mile route tracking for parcel delivery will provide the basis for an efficient courier service system.
Volume: 15
Issue: 2
Page: 1027-1036
Publish at: 2019-08-01

Video spam comment features selection using machine learning techniques

10.11591/ijeecs.v15.i2.pp1046-1053
Nabilah Alias , Cik Feresa Mohd Foozy , Sofia Najwa Ramli , Naqliyah Zainuddin
Nowadays, social media (e.g., YouTube and Facebook) provides connection and interaction between people by posting comments or videos. In fact, comments are a part of contents in a website that can attract spammer to spreading phishing, malware or advertising. Due to existing malicious users that can spread malware or phishing in the comments, this work proposes a technique used for video sharing spam comments feature detection. The first phase of the methodology used in this work is dataset collection. For this experiment, a dataset from UCI Machine Learning repository is used. In the next phase, the development of framework and experimentation. The dataset will be pre-processed using tokenization and lemmatization process. After that, the features to detect spam is selected and the experiments for classification were performed by using six classifiers which are Random Tree, Random Forest, Naïve Bayes, KStar, Decision Table, and Decision Stump. The result shows the highest accuracy is 90.57% and the lowest was 58.86%.
Volume: 15
Issue: 2
Page: 1046-1053
Publish at: 2019-08-01

Performance analysis of DCT and successive division based digital image watermarking scheme

10.11591/ijeecs.v15.i2.pp750-757
Prajwalasimha S. N. , Chethan Suputhra .S , Mohan C. S.
In this article, a combined Discrete Cosine Transformation (DCT) and Successive Division based image watermarking scheme is proposed. In many spatial domain approaches, the watermark information is embedded into Least Significant Bits (LSBs) of host image. These LSBs are more vulnerable to noise and other unwanted information contents in the channel, in few cases these are subjected for modifications also. Many frequency domain approaches withstands LSB interference problem but utilizes more execution time. The proposed technique is a frequency domain approach which can withstand LSB attack and utilizes very less execution time than other existing approaches. Performance analysis is done based on robustness, imperceptibility, data embedding capacity and time of execution. The experimental results are better compared to other existing techniques.
Volume: 15
Issue: 2
Page: 750-757
Publish at: 2019-08-01

Performance analysis comparison between non mixed-criticality and mixed-criticality system in microcontroller

10.11591/ijeecs.v15.i2.pp678-687
Siti Nurhafizza Maidin , Noor Azurati Ahmad , Kamilia Kamardin , Shamsul Sahibuddin , Syahrizal Fadhlie Sabri
Nowadays, implementation of real-time embedded system or safety-critical in a real-time system is significant within emerging technologies because the system involves many aspects such as safety and task execution without missing deadlines. The main cause of implementation is to avoid catastrophic loss. Besides that, effectuation of the mixed-criticality system in embedded system making system more complex for task execution. For an embedded system, the main component involves real-time scheduling. The implementation of DPM method in real-time scheduling is well known, but in the mixed-criticality system, DPM method is still lacking. In order to cater this problem, Dynamic Power management (DPM) method is deployed onto the microcontroller of the mixed-criticality system to save energy when executing tasks in order to have better performance in the system. The usage of the DPM method in mixed-criticality of microcontroller resulting decrease of 0.82% in LED output voltage value meanwhile, for the LCD output, the voltage value decreased by 1.37% in the home alarm system. Thus, the energy-saving in the microcontroller of the mixed-criticality system using the DPM method is defined.
Volume: 15
Issue: 2
Page: 678-687
Publish at: 2019-08-01

Efficient datamining model for prediction of chronic kidney disease using wrapper methods

10.11591/ijict.v8i2.pp63-70
Ramaswamyreddy A , Shiva Prasad S , K V Rangarao , A Saranya
In the present generation, majority of the people are highly affected by kidney diseases. Among them, chronic kidney is the most common life threatening disease which can be prevented by early detection. Histological grade in chronic kidney disease provides clinically important prognostic information. Therefore, machine learning techniques are applied on the information collected from previously diagnosed patients in order to discover the knowledge and patterns for making precise predictions. A large number of features exist in the raw data in which some may cause low information and error; hence feature selection techniques can be used to retrieve useful subset of features and to improve the computation performance. In this manuscript we use a set of Filter, Wrapper methods followed by Bagging and Boosting models with parameter tuning technique to classify chronic kidney disease. The capability of Bagging and Boosting classifiers are compared and the best ensemble classifier which attains high stability with better promising results is identified.
Volume: 8
Issue: 2
Page: 63-70
Publish at: 2019-08-01

Adapted Branch-and-Bound Algorithm Using SVM With Model Selection

10.11591/ijece.v9i4.pp2481-2490
Mohamed Mustapha Kabbaj , El Afia Abdellatif
Branch-and-Bound algorithm is the basis for the majority of solving methods in mixed integer linear programming. It has been proving its efficiency in different fields. In fact, it creates little by little a tree of nodes by adopting two strategies. These strategies are variable selection strategy and node selection strategy. In our previous work, we experienced a methodology of learning branch-and-bound strategies using regression-based support vector machine twice. That methodology allowed firstly to exploit information from previous executions of Branch-and-Bound algorithm on other instances. Secondly, it created information channel between node selection strategy and variable branching strategy. And thirdly, it gave good results in term of running time comparing to standard Branch-and-Bound algorithm. In this work, we will focus on increasing SVM performance by using cross validation coupled with model selection. 
Volume: 9
Issue: 4
Page: 2481-2490
Publish at: 2019-08-01

Design of transparent microstrip grid array antenna

10.11591/ijeecs.v15.i2.pp888-893
N. I. Mohd Ali , N. Misran , M. F. Mansor , M. F. Jamlos
A transparent grid array antenna of 28 GHz frequency is presented. The radiating element of the antenna is made of ITO thin film and printed on a glass as the dielectric substrate. The simulation of the antenna executed by using Computer Simulation Technology (CST) Microwave Studio software demonstrated at 28 GHz operating frequency for 5G band applications. This antenna then compared to the rectangular microstrip patch antenna of the same operating frequency. Structural parameters of the proposed antenna were optimized based on parametric studies done.  Grid array antenna gives better performance as it gives 35.7% lower return loss with -43.88 dB, better efficiency and gain with a gain of 7.358 dB, which is more than 40% increases.
Volume: 15
Issue: 2
Page: 888-893
Publish at: 2019-08-01

Model-view-controller approach for e-Zakah

10.11591/ijeecs.v15.i2.pp1054-1065
Ah. Fathonih , Dian Sa’adillah Maylawati , Muhammad Ali Ramdhani
Zakah (alms) has a strategic position in terms of Islamic value and terms of the development of the welfare of the people. In the current digital era, the use of technology can facilitate zakah worship more easily, quickly, efficiently, and secure. This study aims to analyze and design electronic zakah (e-Zakah) structurally and systematically using the Model-View-Controller (MVC) approach. MVC is an approach or pattern of object-oriented analysis and design for software development that widely used today. MVC is implemented in the analysis and design modelling using Unified Modeling Language (UML) for e-Zakah. Based on the traceability result of analysis and design of e-Zakah, it can be concluded that the e-Zakah analysis and design model has been met all of zakah concept, user and software requirements, and all of models can be traced to each other. Therefore, e-Zakah analysis and design model in this study is ready to be built as a software.
Volume: 15
Issue: 2
Page: 1054-1065
Publish at: 2019-08-01

Surface roughness condition of field-aged polymer insulators at different installation area

10.11591/ijeecs.v15.i2.pp600-608
A. Din , M.A. M. Piah , A. R. Abdullah , N. F. Kasri
This paper presents surface degradation assessment based on surface roughness condition for various field-aged high voltage polymer insulators that were installed at different locations. The measurement of arithmetical mean surface roughness is done, and statistical analysis is implemented in this study. Three groups of insulators labeled as 6 years, 12 years, 18 years, and with their respective controlled samples are tested using a surface roughness tester. Data measurements from the testing are analyzed in conjunction with visual observation to investigate an indication of surface degradation within the groups. Further statistical analysis is applied for the comparison of the surface roughness conditions. In order to observe the environmental stress factors that will affect the roughness condition, within the installation area, the virtual three-dimensional mapping program represented the Earth based on satellite imagery is utilized. The correlation analysis on all that three groups has indicated the positive outcomes with the roughness increased with respect to the age of insulator that located in quite similar environmental stress conditions. Regardless of the age of an insulator, the degradation due to surface roughness condition can be used to indicate what levels of environmental stress around the installation area have.
Volume: 15
Issue: 2
Page: 600-608
Publish at: 2019-08-01
Show 1258 of 1984

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration