Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

27,762 Article Results

SEC-TAED based Error Detection and Correction Technique for Data Transmission Systems

10.11591/ijeecs.v10.i2.pp696-703
Mr. G. Manikandan , Dr. M. Anand
In the OFDM communication system channel encoder and decoder is the part of the architecture. OFDM channel is mostly affected by Additive White Gaussian Noise (AWGN) in which bit flipping of original information leads to fault transmission in the channel. To overcome this problem by using hamming code for error detection and correction. Hamming codes are more attractive and it easy to process the encoding and decoding with low latency. In general the hamming is perfectly detected and corrects the single bit error. In this paper, design of single Error Correction-Triple Adjacent Error Detection (SEC-TAED) codes with bit placement algorithm is presented with less number of parity bits. In the conventional Double Adjacent Error Detection (DAED) and Hamming (13, 8) SEC-TAED are process the codes and detects the error, but it require more parity bits for performing the operation. The higher number of parity bits causes processing delay. To avoid this problem by proposed the Hamming (12, 8) SEC-TAED code, it require only four parity bits to perform the detection process. Bit-reordered format used in the method increases the probability detection of triple adjacent error. It is more suitable for efficient and high speed communication.
Volume: 10
Issue: 2
Page: 696-703
Publish at: 2018-05-01

An Improved Image Steganography Algorithm Based on PVD

10.11591/ijeecs.v10.i2.pp569-577
Sharif Shah Newaj Bhuiyan , Norun Abdul Malek , Othman Omran Khalifa , Farah Diyana Abdul Rahman
In this paper, a modification of PVD (Pixel value differencing) algorithm is used for Image Steganography in spatial domain. It is normalizing secret data value by encoding method to make the new pixel edge difference less among three neighbors (horizontal, vertical and diagonal) and embedding data only to less intensity pixel difference areas or regions. The proposed algorithm shows a good improvemernt for both color and gray-scale images compared to other algorithms. Color images performance are better than gray images. However, in this work the focus is mainly on gray images. The strenght of this scheme is that any random hidden/secret data do not make any shuttle differences to Steg-image compared to original image. The bit plane slicing is used to analyze the maximum payload that has been embeded into the cover image securely. The simulation results show that the proposed algorithm is performing better and showing great consistent results for PSNR, MSE values of any images, also against Steganalysis attack.
Volume: 10
Issue: 2
Page: 569-577
Publish at: 2018-05-01

RF Energy Harvesting with Multiple Sources in Wireless Mesh Network

10.11591/ijeecs.v10.i2.pp606-616
K.N Puniran , Ahmad Robiah , Rudzidatul Akmam Dziyauddin
Energy harvesting (EH) module for wireless sensor network has become a promising feature to prolong the conventional battery inside the devices. This emerging technology is gaining interest from sensor manufacturers as well as academicians across the globe. The concept of employing EH module must be cost effective and practical. In such, the use of EH module type besides RF is more realistic due to the size of the scavenger module, the availability of the resources and conversion efficiency. Most of the oil and gas plants have some drawbacks in scavenging RF from surrounding (i.e. router, Wi-Fi, base station, cell phone) due to its placement in remote area and thus limited energy sources could be a threat in this application. Multiple sources, including co-channel interference (CCI) in any constraint nodes is a feasible way of scavenging several wastes from ambient RF energy via wireless mesh topology. In this paper, a 3-node decode-and-forward (DF) model is proposed where the relay node is subject to an energy constraint. Multiple primary sources and CCI are added in the system model known as Multiple-Source and Single-Relay (MSSR). A mathematical model is derived in Time Switching Relaying (TSR) and Power Splitting Relaying (PSR) schemes to obtain an average system throughput at a destination. Numerical simulation with respect to the average throughput and EH ratio was performed and compared with the Single-Source and Single-Relay (SSSR) and ideal receiver. By applying multiple sources and CCI as an energy enhancement at the constraint node, the optimal value of EH ratio for TSR can be reduced significantly by 10% as compared to the ideal receiver whereas the optimal value of EH ratio for PSR is outweigh TSR in terms of overall system throughput.
Volume: 10
Issue: 2
Page: 606-616
Publish at: 2018-05-01

Multiple Human Body Postures Detection using Kinect

10.11591/ijeecs.v10.i2.pp528-536
Rosdiyana Samad , Law Wen Yan , Mahfuzah Mustafa , Nor Rul Hasma Abdullah , Dwi Pebrianti
This paper presents a method to detect multiple human body postures using Kinect sensor. In this study, a combination of shape features and body joint points are used as input features. The Kinect sensor which used infrared camera to produce a depth image is suitable to be used in an environment that has varying lighting conditions. The method for human detection is done by processing the depth image and joint data (skeleton) which able to overcome several problems such as cluttered background, various articulated poses, and change in color and illumination. Then, the body joint coordinates found on the object are used to calculate the body proportion ratio. In the experiment, the average body proportions from three body parts are obtained to verify the suitableness of golden ratio usage in this work. Finally, the measured body proportion is compared with Golden Ratio to determine whether the found object is a real human body or not. This method is tested for various scenarios, where true positive human detection is high for various postures. This method able to detect a human body in low lighting and dark room. The average body proportions obtained from the experiment show that the value is close to the golden ratio value.
Volume: 10
Issue: 2
Page: 528-536
Publish at: 2018-05-01

A Flexible Optical Sensor for Microalbuminuria Spectroscopy

10.11591/ijeecs.v10.i2.pp521-527
Suhaila Isaak , Yusmeeraz Yusof , Khairunnisa Mohd Yusof , Khoo Ming Kwan
A flexible optical sensor unit was developed for the detection of albumin level in human urine. It consists of polydimethylsiloxane thinfilm with the microscopic glass as the substrate. A gradual increase of albumin level may indicate signs of health problem such as diabetes, hypertension, and endothelial dysfunction. The experimental results showed there are a spectral shift and an increase in absorbed light increase in intensity of light with sodium urate at different concentration as a substitute of urine sample. The transmittance and reflection of PDMS was determined in the 400–1400 nm wavelength range using halogen-detrium as the excitation light source to predict the sensor sensitivity based on the Beer–Lambert law. The results exhibited that the light intensity increases as the concentration of the sodium urate increases. This performance of prototype sensor ignites an alternative for albumin detection using flexible structure.
Volume: 10
Issue: 2
Page: 521-527
Publish at: 2018-05-01

Data Exfiltration of Ultrasonic Signal in Computer Security System: A Review

10.11591/ijeecs.v10.i2.pp490-497
Farah H. A. Jabar , Janatul Islah Mohammad , Ahmad Faizal Mohd Zain , Abu Bakar Hasan
It is crucial for public users and service providers to stay abreast of the progress and trends on data exfiltration in computer security system. In cryptosystem, it is unnoticeable for computer and mobile users to realize that inaudible sound used to transmit signals carrying pervasive sensitive data was in the low frequency ultrasonic range. Acoustic attacks on ultrasonic signal emanated by electronic devices have long been investigated among researchers. This paper is an exploration on the practicality of ultrasonic data exfiltration between computers in term of computer security system. It will discuss some work done by previous researchers in general, based on scientific, technological, and security perspectives. There will be inclusions of practical applications already in existence as well as future studies in related fields.
Volume: 10
Issue: 2
Page: 490-497
Publish at: 2018-05-01

An Enhanced Bandwidth Optimization in Un-reliable Network using Efficient Bandwidth Utilization based Scheduling Algorithm

10.11591/ijeecs.v10.i2.pp596-605
Sivashanmugam N , Jyoti Venkateshwaran
Nowadays, bandwidth utilization is a very challenging task for Subscriber Stations (SS) to predict a large amount of data. The existing techniques allow the SS to maintain the occupied bandwidth via risk of failure which does not satisfy the quality of services (QoS) needs.  Another challenge is the resource handling with QoS. In Web technology life, there is only few research focused on tackling the resource handling issues with different techniques. Current methods do not consider the data interchange during route switching.  To offer the best solution of above problems, An Efficient Bandwidth Utilization based Scheduling (EBS) Algorithm is designed to maintain proper bandwidth utilization in a real-time application. The EBS algorithm predicts the amount of bandwidth which should be requested according to backlogged traffic data. It’s also considering the data rate divergence between a packet received and transmissions in a queue to improve the bandwidth. The main objective of proposed design is to permits other complementary station (CS) and SSs to bring out the unutilized bandwidth by the availability of SS transmission. The unutilized bandwidth is not possible to get regularly. The proposed method is more flexible to apply in real time and research-oriented applications. The methods enhance the bandwidth utilization during maintenance of the same QoS guaranteed network services. A proposed method avoids the current bandwidth reservation collapse at the time of the same QoS guaranteed services.  The techniques permit SSs to find out the portion of un-utilized bandwidth accurately. Based on Experimental evaluations, proposed algorithm reduces 21.26 PLR (Packet Loses Ratio), 3.25 AD (Average Delay), and improves 8.65 BU (Bandwidth Utilization) and 51.2% (Throughput) compared than existing methods.
Volume: 10
Issue: 2
Page: 596-605
Publish at: 2018-05-01

Internet of Things based Wireless Plant Sensor for Smart Farming

10.11591/ijeecs.v10.i2.pp456-468
Monica Subashini M , Sreethul Das , Soumil Heble , Utkarsh Raj , R Karthik
About 10% of the world’s workforce is directly dependent on agriculture for income and about 99% of food consumed by humans comes from farming. Agriculture is highly climate dependent and with global warming and rapidly changing weather it has become necessary to closely monitor the environment of growing crops for maximizing output as well as increasing food security while minimizing resource usage. In this study, we developed a low cost system which will monitor the temperature, humidity, light intensity and soil moisture of crops and send it to an online server for storage and analysis, based on this data the system can control actuators to control the growth parameters. The three tier system architecture consists of sensors and actuators on the lower level followed by an 8-bit AVR microcontroller which is used for data acquisition and processing topped by an ESP8266 Wi-Fi module which communicates with the internet server. The system uses relay to control actuators such as pumps to irrigate the fields; online weather data is used to optimize the irrigation cycles. The prototyped system was subject to several tests, the experimental results express the systems reliability and accuracy which accentuate its feasibility in real-world applications.
Volume: 10
Issue: 2
Page: 456-468
Publish at: 2018-05-01

The Influence of Internet and Social Media on Purchasing Decisions in Kuwait

10.11591/ijeecs.v10.i2.pp792-797
Khalid Abdulkareem Al-Enezi , Imad Fakhri Taha Al Shaikhli , Sufyan Salim Mahmood AlDabbagh
This research aims to measure the role of social networks in influencing purchasing decisions among consumers in Kuwait; the research used the quantitative methods, and analytical the technique to get the results, and the research developed a measure to study the relationship between the variables to the study and selection of a sample of consumers of (100). The results indicated that the social networking variables (exchange of information, evaluation of product) possess influence on purchasing decisions. Furthermore, the results indicate that majority of respondents do their digital scanning more often before intend to go to the store. The unexpected results came from the question “traditional advertising (TV, Newspaper, Magazine, Billboards) are more effective than the social networking; 23% agreed, 36% said no, and 41% said sometimes. In light of these findings, the study made a series of recommendations; the most important are; The executives and sales representatives need to understand the benefits offered by social networks, and understand the advantages and functions and tools of social communication, and knowing how to apply them effectively and efficiently, and then use the appropriate social networking tool.
Volume: 10
Issue: 2
Page: 792-797
Publish at: 2018-05-01

Speech Emotion Recognition Using Deep Feedforward Neural Network

10.11591/ijeecs.v10.i2.pp554-561
Muhammad Fahreza Alghifari , Teddy Surya Gunawan , Mira Kartiwi
Speech emotion recognition (SER) is currently a research hotspot due to its challenging nature but bountiful future prospects. The objective of this research is to utilize Deep Neural Networks (DNNs) to recognize human speech emotion. First, the chosen speech feature Mel-frequency cepstral coefficient (MFCC) were extracted from raw audio data. Second, the speech features extracted were fed into the DNN to train the network. The trained network was then tested onto a set of labelled emotion speech audio and the recognition rate was evaluated. Based on the accuracy rate the MFCC, number of neurons and layers are adjusted for optimization. Moreover, a custom-made database is introduced and validated using the network optimized. The optimum configuration for SER is 13 MFCC, 12 neurons and 2 layers for 3 emotions and 25 MFCC, 21 neurons and 4 layers for 4 emotions, achieving a total recognition rate of 96.3% for 3 emotions and 97.1% for 4 emotions.Speech emotion recognition (SER) is currently a research hotspot due to its challenging nature but bountiful future prospects. The objective of this research is to utilize Deep Neural Networks (DNNs) to recognize human speech emotion. First, the chosen speech feature Mel-frequency cepstral coefficient (MFCC) were extracted from raw audio data. Second, the speech features extracted were fed into the DNN to train the network. The trained network was then tested onto a set of labelled emotion speech audio and the recognition rate was evaluated. Based on the accuracy rate the MFCC, number of neurons and layers are adjusted for optimization. Moreover, a custom-made database is introduced and validated using the network optimized.The optimum configuration for SER is 13 MFCC, 12 neurons and 2 layers for 3 emotions and 25 MFCC, 21 neurons and 4 layers for 4 emotions, achieving a total recognition rate of 96.3% for 3 emotions and 97.1% for 4 emotions.
Volume: 10
Issue: 2
Page: 554-561
Publish at: 2018-05-01

An Hour Ahead Electricity Price Forecasting with Least Square Support Vector Machine and Bacterial Foraging Optimization Algorithm

10.11591/ijeecs.v10.i2.pp748-755
Intan Azmira Wan Abdul Razak , Izham Zainal Abidin , Yap Keem Siah , Aidil Azwin Zainul Abidin , Titik Khawa Abdul Rahman , Nurliyana Baharin , Mohd. Hafiz Bin Jali
Predicting electricity price has now become an important task in power system operation and planning. An hour-ahead forecast provides market participants with the pre-dispatch prices for the next hour. It is beneficial for an active bidding strategy where amount of bids can be reviewed or modified before delivery hours. However, only a few studies have been conducted in the field of hour-ahead forecasting. This is due to most power markets apply two-settlement market structure (day-ahead and real time) or standard market design rather than single-settlement system (real time). Therefore, a hybrid multi-optimization of Least Square Support Vector Machine (LSSVM) and Bacterial Foraging Optimization Algorithm (BFOA) was designed in this study to produce accurate electricity price forecasts with optimized LSSVM parameters and input features. So far, no works has been established on multistage feature and parameter optimization using LSSVM-BFOA for hour-ahead price forecast. The model was examined on the Ontario power market. A huge number of features were selected by five stages of optimization to avoid from missing any important features. The developed LSSVM-BFOA shows higher forecast accuracy with lower complexity than most of the existing models.
Volume: 10
Issue: 2
Page: 748-755
Publish at: 2018-05-01

Design of a New Cryptographic Hash Function – Titanium

10.11591/ijeecs.v10.i2.pp827-832
Mohammad A. AlAhmad
This paper introduces a new cryptographic hash function that follows sponge construction. Paper begins with outlining the structure of the construction. Next part describes the functionality of Titanium and cipher used. A competition between block cipher and stream cipher is presented and showed the reason of using block cipher rather than stream cipher. Speed performance is calculated and analyzed using state-of-art CPUs.
Volume: 10
Issue: 2
Page: 827-832
Publish at: 2018-05-01

To Improve Feature Extraction and Opinion Classification Issues in Customer Product Reviews Utilizing an Efficient Feature Extraction and Classification (EFEC) Algorithm

10.11591/ijeecs.v10.i2.pp587-595
Palaiyah Solainayagi , Ramalingam Ponnusamy
Currently, customer's product review opinion plays an essential role in deciding the purchasing of the online product. A customer prefers to acquire the opinion of other customers by viewing their opinion during online products' reviews, blogs and social networking sites, etc. The majority of the product reviews including huge words. A few users provide the opinion; it is tough to analysis and understands the meaning of reviews. To improve user fulfillment and shopping experience, it has become a general practice for online sellers to allow their users to review or to communicate opinions of the products that they have sold. The major goal of the paper is to solve feature extraction problem and opinion classification problem from customers utilized product reviews which extract the feature words and opinion words from product reviews. To propose an Efficient Feature Extraction and Classification (EFEC) algorithm is implementing to extracts a feature from opinion words. The reviewer usually marks both positive and negative parts of the reviewed product, despite the fact that their general opinion on the product may be positive or negative. An EFEC algorithm is utilized to predict the number of positive and negative opinion in reviews. Based on Experimental evaluations, proposed algorithm improves accuracy 15.05%, precision 13.7%, recall 15.59% and F-measure 15.07% of the proposed system compared than existing methodologies
Volume: 10
Issue: 2
Page: 587-595
Publish at: 2018-05-01

Development of Smart Chicken Poultry Farm

10.11591/ijeecs.v10.i2.pp498-505
Hasmah Mansor , Ammar Nor Azlin , Teddy Surya Gunawan , Mahanijah Md Kamal , Ahmad Zawawi Hashim
In Malaysia, most agriculture industries are still using conventional method to operate. All routines in monitoring and control of chicken poultry farm, for example, utilise man power where the source and energy are very limited. However, the demand from consumers towards the agricultural output is increasing day by day and requires more advanced farming technology in order to obtain maximum efficiency. This paper is focused on the development of smart chicken poultry farm to provide monitoring and control of the farm condition. The electronics, embedded systems and wireless technology are integrated with farm monitoring. Using Master-Slave concept, sensors are used to measure the ambient temperature, ammonia and humidity of the hall of chicken poultry for each slave. The sensors’ readings are then transmitted wirelessly over radio frequency by serial communication using HC-12 RF module to master for further data processing. The design process of both master and slave involved the interfacing of microprocessor, ATMEL ATMega328 with several analogue sensors, LCD, buzzer, relay output, monetary push button and light indicator. Based on the readings from the sensors, the microcontroller produced the output which is connected to the fan for better air ventilation in the chicken poultry farm. Furthermore, PID controller has been integrated to optimize the output control method, hence optimizing hall condition which results to better output for the farm. The system has been successfully implemented and tested at Myra Farm & Services, located at Kalumpang, Tanjung Malim, Perak, Malaysia.In Malaysia, most agriculture industries are still using conventional method to operate. All routines in monitoring and control of chicken poultry farm, for example, utilise man power where the source and energy are very limited. However, the demand from consumers towards the agricultural output is increasing day by day and requires more advanced farming technology in order to obtain maximum efficiency. This paper is focused on the development of smart chicken poultry farm to provide monitoring and control of the farm condition. The electronics, embedded systems and wireless technology are integrated with farm monitoring. Using Master-Slave concept, sensors are used to measure the ambient temperature, ammonia and humidity of the hall of chicken poultry for each slave. The sensors’ readings are then transmitted wirelessly over radio frequency by serial communication using HC-12 RF module to master for further data processing. The design process of both master and slave involved the interfacing of microprocessor, ATMEL ATMega328 with several analogue sensors, LCD, buzzer, relay output, monetary push button and light indicator. Based on the readings from the sensors, the microcontroller produced the output which is connected to the fan for better air ventilation in the chicken poultry farm. Furthermore, PID controller has been integrated to optimize the output control method, hence optimizing hall condition which results to better output for the farm. The system has been successfully implemented and tested at Myra Farm & Services, located at Kalumpang, Tanjung Malim, Perak, Malaysia.
Volume: 10
Issue: 2
Page: 498-505
Publish at: 2018-05-01

Securing Data Communication for Data Driven Applications Using End to End Encryption

10.11591/ijeecs.v10.i2.pp756-762
Subhi Almohtasib , Alaa H Al-Hamami
Many users of smartphones have secret data they want to save it on their devices. The probability of a device damage or stolen prevents them from saving data. Therefore, data driven applications used to save user’s data on a remote server. Protection of the data during its transmission considered as one of the success aspect for these applications. In this paper, an enhanced method for data encryption proposed which guarantees data secrecy during its transmission over network. User’s data encrypted before transmission using Base64 class. Data encryption and decryption implemented to halt reverse encryption process. In this way, data is transmitting in a secure and efficient manner accomplishing the main goal of Cryptography.
Volume: 10
Issue: 2
Page: 756-762
Publish at: 2018-05-01
Show 1316 of 1851

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration