Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,734 Article Results

Development of alcohol triggered vehicle engine lock system

10.11591/ijra.v8i1.pp68-76
Ighalo Joshua , Uzairue Stanley , Ochonogor Charles , Amaize Peter , Kennedy Okokpujie
Drunk driving is a very dangerous behavior caused as a result of excessive consumption of alcohol therefore causing distortion in the thought pattern of its victims with a large percentage being drivers of vehicles of all forms. Most of the traffic accidents recorded in recent years are related to drunk driving. Solutions have been proposed, devices developed, all to the sole aim which is to reduce traffic accidents due to drunk driving but none has been quite cable of impairing the driver’s ability to drive. To this end, we model and design an alcohol triggered vehicle engine lock system. This project’s ability to impair the driver’s ability to drive makes it stand out from previous methods or devices developed to reduce road accidents due to drunk driving. The entire system is based on a microcontroller that is used to set an alcohol limit/ threshold which when reached or crossed upon sensing of alcohol in the air by the alcohol sensor, would trigger the buzzer alarm and warning LED of the circuit to alert the driver that his/her blood alcohol concentration at that moment in time wouldn’t be safe for driving. At this point the system automatically locks the ignition system of the vehicle within which it is embedded while an LCD displays information for the driver’s visuals incase the driver’s sight isn’t also impaired while in the drunk state. This project is a prototype to what is proposed with the vehicle’s engine system represented with a DC motor and its ignition system represented with a push button. The overall work was implemented with a constructed work, tested working and perfectly functional.
Volume: 8
Issue: 1
Page: 68-76
Publish at: 2019-03-01

Evaluating gender-based mobile shopping application using eye-tracking technology

10.11591/ijeecs.v13.i3.pp1095-1101
Aslina Baharum , Emelia Abdul Rahim , Rozita Hanapi , Noorsidi Aizuddin Mat Noor , Nurhafizah Moziyana Mohd Yusop
The mobile applications (apps) development has been gaining popularity for the past few years. Some mobile apps have been failing in its popularity because of the unattractive user interface and bad interaction with the apps. This was proven by previous researchers who have stated that the interaction between a user of mobile application and a graphical user interface could lead to some misunderstandings, errors and frustration from an inability to achieve a goal and could lead to failure of the mobile application. Most of the mobile application developers have been facing proper graphical user interface design recently. There is a noticeable lack of studies and research in the area of mobile application design compared to web application user interface (UI) design. Therefore, this research was done to evaluate the different gender on the mobile shopping application using eye-tracking technology. This research had proposed guidelines based on gender for mobile shopping application. These proposed guidelines can be preferred in the designing process of a mobile shopping application as it could provide a better user interaction and would prevent failure in its popularity by providing fast and user friendly interface.
Volume: 13
Issue: 3
Page: 1095-1101
Publish at: 2019-03-01

M7 subtype leukemic cell edge detection techniques with threshold value comparison and noise filters

10.11591/ijeecs.v13.i3.pp1294-1302
A.S.A. Salam , M.N.M. Isa , M.I. Ahmad
The aim of this paper is to study and identify various threshold values for two prevalently used edge detection techniques, which are Sobel and Canny. The purpose is to determine which value gives an accurate result for identifying a leukemic cell. Moreover, evaluating suitability of edge detectors is also essential as feature extraction of cell depends greatly on image segmentation (edge detection). Firstly, an image of M7 subtype of Acute Myelocytic Leukemia (AML) is selected due to its diagnosing which were found lacking. Next, apply noise filters for the best of image quality. Thus by comparing image with no filter, median and average filters, useful information can be acquired. Each edge detectors is fixed with threshold value of 0-0.5 but for Cann edge detection the value can increase until 0.9. From the research, it is found that Canny edge with no filter and a threshold value of 0.7 gives a clearer image with less noise reduction.
Volume: 13
Issue: 3
Page: 1294-1302
Publish at: 2019-03-01

A new class of BFGS updating formula based on the new quasi-newton equation

10.11591/ijeecs.v13.i3.pp945-953
Basim Abbas Hassan , Hussein K. Khalo
Quasi-Newton methods” are amongst the mainly useful and competent iterative process for solving unrestrained minimization functions. In this paper we derive a new quasi-Newton equation with on the Hessian estimate updates and alterations intended at developing their performance. The “Numerical results” illustrate that the proposed technique useful for the known test functions.
Volume: 13
Issue: 3
Page: 945-953
Publish at: 2019-03-01

Designing lesson plan of integer number operation based on fun and easy math (FEM) approach

10.11591/ijere.v8i1.15514
Darin Fouryza , Siti Maghfirotun Amin , Rooselyna Ekawati
This paper dealt with the design of learning tools, that was the development of learning implementation plan or Rencana Pelaksanaan Pembelajaran (RPP) based on Fun and Easy Math (FEM) approach in the form of a number line model. FEM was an approach in order to teach mathematics effectively to students in a fun and easy way according to the patterns and rules, making it easier for students to understand mathematical concepts and driving them to actively participate in learning activity. Furthermore, the number line model based on the rules aimed to provide the real idea of mathematical concept and avoid the mathematical manipulation. The design of RPP development was intended to create a new RPP which was divided into three activities, namely introduction, core, and closing. The method of lesson plan development used a Plomp’s development model which was consisted of three phases, namely preliminary research, prototype, and evaluation. The results of this development were expected to help students in understanding the mathematical concepts, namely integer calculation operations especially addition and subtraction, increasing student activeness in learning process, and avoiding the existence of mathematical manipulation.
Volume: 8
Issue: 1
Page: 103-109
Publish at: 2019-03-01

The evaluation of AdBlock technique implementation for enterprise network environment

10.11591/ijeecs.v13.i3.pp1102-1109
Mohd Iskandar Bin Samsuddin , Mohamad Yusof Darus , Shamsul J Elias , Abidah Hj Mat Taib , Norkhushaini Awang , Roshidi Din
This paper presents the evaluation of AdBlock technique implementation for enterprise network environment. This study has presented the impact of web browsing activities where it is the most active traffic where is consumed the highest inbound bandwidth usage in enterprise network environment. We can conclude that DNS AdBlock is the best solution for enterprise network environment in term of blocking advertisement compare to extension adblock. Adblock technique also reduce network data request by comparing front-end solution (browser extension AdBlock) at client web browser and networks level adblock. The parameters such as HTTP request, TCP connection and network bandwidth are being examined to measure the effectiveness of blocking online advertisement. Both techniques perform the reduction of traffics and bandwidth utilization. The result shows that DNS AdBlock is the most effective in blocking online advertisement using the examined parameters. DNS AdBlock can sustain the usage of web browsing activity for enterprise network and also generate substantial saving across several fonts. This study has identified current web browsing trends traffic in enterprise network where it consumed 50 percent in average. This number increased when industries are moving to cloud web-based consumption. However, industries such as educational sector, web browsing traffic is one of connectivity that enterprises network should be investing to support openness and heavy traffic from educational users.
Volume: 13
Issue: 3
Page: 1102-1109
Publish at: 2019-03-01

Development of real time internet of things (IoT) based air quality monitoring system

10.11591/ijeecs.v13.i3.pp1039-1047
Huzein Fahmi Hawari , Aideed Ahmad Zainal , Mohammad Radzi Ahmad
The atmospheric air pollution is a major concern in modern cities, especially in developing countries like Malaysia. In this paper, we have reported an effective implementation for Internet of Things used for monitoring the level of air pollution based on Malaysia Air Pollution Index (API). The low-cost and real time system would be able to monitor regular air quality pollutants including Particulate Matter (PM) of PM2.5, PM10 and Carbon Monoxide (CO) gas as well as the temperatures and humidity of the surroundings. The system has capability to detect Good, Moderate, Unhealthy, Very Unhealthy and Hazardous API status. Based on 5 weeks of experimental API monitoring result on specified test location, the system was able to demonstrate promising results in providing a reliable real time monitoring of the air quality condition.
Volume: 13
Issue: 3
Page: 1039-1047
Publish at: 2019-03-01

Cyberbullying among secondary school teachers by parents

10.11591/ijere.v8i1.16549
Rüyam Küçüksüleymanoğlu
Cyberbullying which is known as violence on the Internet is a dimension of peer bullying takes places through electronic communication technologies. Cyberbullying which can occur in any environment regardless of the time and place is the way in which individuals with higher ability to use communication technologies to lead other individuals in a series of negative behaviors over time. With the rapid development of technology and the ease with which internet access becomes easier and cheaper, it becomes a problem that needs to be studied more and more importantly day by day. Facebook, twitter and whatss up, the most widely used social network today, has the potential to become the most commonplace for cyberbullying behaviors. The purpose of this study was to determine cyberbullying towards teachers by parents in secondary schools based on teachers views according to sex, tenure and school size. The sample of the study was 181 teachers from 14 secondary schools. The experiences and perspectives of 181 teachers were assessed regarding the incidence and perceptions of the likelihood of cyber harassment by parents. The results presented here indicate that nearly3/4 of teachers in the sample had received harassing or threatening messages from parents.
Volume: 8
Issue: 1
Page: 151-157
Publish at: 2019-03-01

Rainfall–landslide early warning system (RLEWS) using TRMM precipitation estimates

10.11591/ijeecs.v13.i3.pp1259-1266
Norsuzila Ya’acob , Noraisyah Tajudin , Aziean Mohd Azize
This paper presents Rainfall–Landslide Early Warning System (RLEWS) using Tropical Rainfall Measuring Mission (TRMM) precipitation estimates to notify the warning level for the possibility of landslide occurrences in Ulu Kelang, Selangor. In this study, RLEWS is developed to monitor the possibility of rainfall-induced landslide occurrences by comparing real time TRMM rainfall data with a landslide rainfall threshold. The landslide rainfall threshold is constructed by using the accumulated rainfall-accumulated rainfall (E-E) diagram method. The warning levels of rainfall threshold are classified into three levels; high, moderate and low. The analysis and notification are updating every 24 hours to provide the initial potential landslide information signal. The rainfall threshold analysis was able to detect the early signal of initial potential landslide occurrences. The aims of this study are to develop a low-cost, sustainable early warning system and web base application to send notification and awareness for residential areas in Ulu Kelang, Selangor.
Volume: 13
Issue: 3
Page: 1259-1266
Publish at: 2019-03-01

Influence of pole number on the characteristics of permanent magnet synchronous motor (PMSM)

10.11591/ijeecs.v13.i3.pp1318-1323
S. Raj , R. Aziz , M.Z. Ahmad
This paper present the influence of pole number on the characteristics of permanent magnet synchronous motor (PMSM). This study is devoted to construct three different motors with varying pole numbers and investigating its effect on the characteristics of permanent magnet synchronous motor (PMSM). It is a study on an influence of pole numbers on electromagnetic and thermal characteristics of the PMSMs all while maintaining the same motor dimensions, parameters and slot number. The study is conducted to analyse the best slot-pole combination for a given dimension to determine if pole numbers have a role in the motor performance. The analysis for these permanent magnet motors is done via finite element analysis (FEA) in which JMAG Designer software is used. The software is used to analyse the motor performance in terms of cogging torque, speed, power, iron loss, copper loss as well as the efficiency of the motor itself. All three motors were simulated in no load and load condition.
Volume: 13
Issue: 3
Page: 1318-1323
Publish at: 2019-03-01

Detection of keratoconus in anterior segment photographed images using corneal curvature features

10.11591/ijeecs.v13.i3.pp1191-1198
Marizuana Mat Daud , Wan Mimi Diyana Wan Zaki , Aini Hussain , Haliza Abdul Mutalib
Keratoconus is a corneal ectatic disorder with complex aetiology and may induce mild to severe visual impairment and consequently decrease the quality of life. This paper presents a new keratoconus detection method using corneal curvature features to differentiate normal and keratoconus cases. In this study, the eye images known as anterior segmented photographed images (ASPIs) are captured from side view using a smartphone’s camera. For the side-view images, the corneal curvature is segmented using spline function to measure the corneal curvature. A template disc method is implemented to quantitatively measure the steepening of the corneal curvature of the captured ASPIs. Parameters obtained from three different template disc methods, namely, nonlinear, , crossover point, , and trigonometric, , are investigated to represent the most suitable curvature feature. SVM is then employed to classify normal and keratoconus eyes. Results reveal that a standalone nonlinear method gives a reliable parameter with 90% accuracy in classifying the data. However, the classification performance has increased to 99.5% accuracy with the use of all combined features known as a feature vector, . Additionally, classification with the proposed  has successfully distinguished normal and keratoconus cases with sensitivity and specificity rates of 99% and 100%, respectively. The results portray the bright potential of this method in assisting experts during ocular screening specifically to detect keratoconus disease.
Volume: 13
Issue: 3
Page: 1191-1198
Publish at: 2019-03-01

Anomaly-based intrusion detector system using restricted growing self organizing map

10.11591/ijeecs.v13.i3.pp919-926
Tomi Yahya Christyawan , Ahmad Afif Supianto , Wayan Firdaus Mahmudy
The rapid development of internet and network technology followed by malicious threats and attacks on networks and computers. Intrusion detection system (IDS) was developed to solve that problems. The development of IDS using machine learning is needed for classifying the attacks. One method of the classification is Self-Organizing Map (SOM). SOM able to perform classification and visualization in learning process to gain new knowledge. However, the SOM has less efficient in learning process when applied in Big Data. This study proposes Restricted Growing SOM method with clustering reference vector (RGSOM-CRV) and Parallel RGSOM-CRV to improve SOM efficiency in classification with accuracy consideration to solve Big Data problem. Growing process in RGSOM is restricted by maximum nodes and growing threshold, the reupdate weight process will update unused reference vector when map size already maximum, these two processes solve the consuming time of regular GSOM. From the results of this research against KDD Cup 1999 dataset, proposed method Parallel RGSOM-CRV able to give 91.86% accuracy, 20.58% false alarm rate, 95.32% recall or detection rate, and precision is 94.35% and time consuming is outperform than regular Growing SOM. This proposed method is very promising to handle big data problems compared with other methods.
Volume: 13
Issue: 3
Page: 919-926
Publish at: 2019-03-01

Fault analysis for renewable energy power system in micro-grid distributed generation

10.11591/ijeecs.v13.i3.pp1117-1123
Ameerul A. J. Jeman , Naeem M. S. Hannoon , Nabil Hidayat , Mohamed.M.H. Adam , Ismail Musirin , Vijayakumar. V
In distribution system, wind power plants are becoming popular renewable energy sources. It employs Doubly Fed Induction Generator (DFIG) to generate power based on wind conversion. Short and long transmission lines, presence of faults and presence of Static Synchronous Compensator (STATCOM) are highlighted issues in this paper. Basically, this research develops investigations on some electrical variables such as voltage and current to control them. Distribution Static Synchronous Compensator (DSTATCOM) is proposed in this paper. Wind farm acts as a source while DSTATCOM is connected to the distribution system with a DFIG based wind farm. The controller proposed is DSTATCOM is modeled and simulated in MATLAB/SIMULINK and the results are given. A microgrid based small signal analysis is performed in the laboratory using MATLAB and different comparisons are made and simulation case studies are presented and validated.
Volume: 13
Issue: 3
Page: 1117-1123
Publish at: 2019-03-01

The development of science process skills in visually impaired students: analysis of the activities

10.11591/ijere.v8i1.17427
Aydın Kızılaslan
Students with visual impairments face tremendous challenges in daily life while learning life skills as they do not have the benefit of visual cues. The skills that visually impaired students are expected to learn include not only everyday life skills, but also scientific process skills too. In this study, case study was used to develop an instructional design to teaching science concepts to visually impaired students. The aim of this study is to analyze the efficacy of science activities of this developed instructional design. The study consists of three basic stages. In the first stage, visually impaired students’ learning needs are identified. In the second stage teaching materials and activities are designed and developed. In the last stage, these activities were analyzed in terms of scientific process skills through observation forms. As a result, most of the developed activities are suited for development of the scientific process skills.
Volume: 8
Issue: 1
Page: 90-96
Publish at: 2019-03-01

Figure of community support in achieving Muhammadiyah school autonomy progress

10.11591/ijere.v8i1.15093
Mohamad Joko Susilo , Badrun Kartowagiran , Dwi Sulisworo
School autonomy can not be separated from support factor. This study aimed to determine source and form of community support and contribution in realizing autonomous in Muhammadiyah schools. This research development is part of dissertation conducted with five stages: define, design, model development, model validation, and model use. The study was conducted at SMP Muhammadiyah, Sleman Regency, with 280 respondents; consist of principals, teachers, staff, students, and ministerial assemblies of Dikdasmen. Data collection technique used: interviews, questionnaires, and documentation. Data analysis techniques use quantitative inferential analysis, EFA and CFA techniques. The results showed that form and source of support for Muhammadiyah schools is internal as well as external. School support also comes from internal and external support, such as: committee, parents, stakeholders, foundation, education official, collages, and related institutions. Directly and indirectly effect, contribution of school supporting component (Bac) to be school autonomous (Kms) up to 0.30.
Volume: 8
Issue: 1
Page: 20-28
Publish at: 2019-03-01
Show 1321 of 1983

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration