Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

27,544 Article Results

UDP Pervasive Protocol Implementation for Smart Home Environment on MyRIO using LabVIEW

10.11591/ijece.v8i1.pp113-123
Wijaya Kurniawan , Mochammad Hannats Hanafi Ichsan , Sabriansyah Rizqika Akbar
Smart Home concept is to connect several devices to perform control and the device to be controlled to help any human needs. So it should have one device being Host and several devices being Client. The environment in this case is a home that there is too much technology that planted technologies that has much influence at human activities is called pervasive computing. The device communication should be has a protocol, at the research used UDP protocol because it doesn't need to negotiate before performing communication like a TCP. With UDP behavior did not use to validate at every send or deliver data because at Smart Home environment doesn't need a large or big data being processed. LabView used at this research based on previous research, but MyRIO has used this research to perform Client and Host performed by PC. So it can measure how usable the design that created. This research proves that LabView and MyRIO successfully implemented with the design that created to perform Pervasive Computing for Smart Home environment. Functional testing scenario conducted by every condition that on system environment, based on design all testing scenario successfully and working as well as expected.
Volume: 8
Issue: 1
Page: 113-123
Publish at: 2018-02-01

Presentation of an Algorithm for Secure Data Transmission based on Optimal Route Selection during Electromagnetic Interference Occurrence

10.11591/ijece.v8i1.pp259-270
A. H. Poursoltan Mohammadi , M. Chehel Amirani , F. Faghihi
This paper proposes a comprehensive algorithm for secure data transmission via communication conductors considering route optimization, shielding and data authentication. Using of appropriate coding method causes more efficiency for suggested algorithm during electromagnetic field attack occurrence. In this paper, MOM simulation via FIKO software is done for field distribution. Due to critical situation of malfunctioning of data transferring, appropriate shield is designed and examined by shielding effectiveness (SE) criterion resulted of MOM simulation; finally to achieve reliability of data security, MAC hash function is used for space with field attack probability, turbo code is employed.
Volume: 8
Issue: 1
Page: 259-270
Publish at: 2018-02-01

Preferences based Customized Trust Model for Assessment of Cloud Services

10.11591/ijece.v8i1.pp304-325
Shilpa Deshpande , Rajesh Ingle
In cloud environment, many functionally similar cloud services are available. But, the services differ in Quality of Service (QoS) levels, offered by them. There is a diversity in user requirements about the expected qualities of cloud services. Trust is a measure to understand whether a cloud service can adequately meet the user requirements. Consequently, trust assessment plays a significant role in selecting the suitable cloud service. This paper proposes preferences based customized trust model (PBCTM) for trust assessment of cloud services. PBCTM takes into account user requirements about the expected quality of services in the form of preferences. Accordingly, it performs customized trust assessment based on the evidences of various attributes of cloud service. PBCTM enables elastic trust computation, which is responsive to dynamically changing user preferences with time. The model facilitates dynamic trust based periodic selection of cloud services according to varying user preferences. Experimental results demonstrate that the proposed preferences based customized trust model outperforms the other model in respect of accuracy and degree of satisfaction.
Volume: 8
Issue: 1
Page: 304-325
Publish at: 2018-02-01

A Sense-based Registration Process for TDMA in IEEE 802.11 Network

10.11591/ijece.v8i1.pp355-359
Rizal Fathoni Aji , Heru Suhartanto , Setiadi Yazid
TDMA implementation offer better fairness and throughput in IEEE 802.11. To implement TDMA, new registration process is needed, because current registration mechanism can disrupt TDMA process. This paper proposes a sense-based TDMA registration process using service slot and random timer. Simulation result shows, by using our mechanism, we can reduce the number of unused timeslot, and for 10 new nodes, each node only need 7 ms to complete the registration process.
Volume: 8
Issue: 1
Page: 355-359
Publish at: 2018-02-01

A Minimum Cloud Cover Mosaic Image Model of the Operational Land Imager Landsat-8 Multitemporal Data using Tile based

10.11591/ijece.v8i1.pp360-371
Ratih Dewanti Dimyati , Projo Danoedoro , Hartono Hartono , Kustiyo Kustiyo
The need for remote sensing minimum cloud cover or cloud free mosaic images is now increasing in line with the increased of national development activities based on one map policy. However, the continuity and availability of cloud and haze free remote sensing data for the purpose of monitoring the natural resources are still low. This paper presents a model of medium resolution remote sensing data processing of Landsat-8 uses a new approach called mosaic tile based model (MTB), which is developed from the mosaic pixel based model (MPB) algorithm, to obtain an annual multitemporal mosaic image with minimum cloud cover mosaic imageries. The MTB model is an approach constructed from a set of pixels (called tiles) considering the image quality that is extracted from cloud and haze free areas, vegetation coverage, and open land coverage of multitemporal imageries. The data used in the model are from Landsat-8 Operational Land Imager (OLI) covering 10 scenes area, with 2.5 years recording period from June 2015 to June 2017; covered Riau, West Sumatra and North Sumatra Provinces. The MTB model is examined with tile size of 0.1 degrees (11x11 km2), 0.05 degrees (5.5x5.5 km2), and 0.02 degrees (2.2x2.2 km2). The result of the analysis shows that the smallest tile size 0.02 gives the best result in terms of minimum cloud cover and haze (or named clear area). The comparison of clear area values to cloud cover and haze for three years (2015, 2016 and 2017) for the three mosaic images of MTB are 68.2%, 78.8%, and 86.4%, respectively.
Volume: 8
Issue: 1
Page: 360-371
Publish at: 2018-02-01

Feature Selection Mammogram based on Breast Cancer Mining

10.11591/ijece.v8i1.pp60-69
Shofwatul Uyun , Lina Choridah
The very dense breast of mammogram image makes the Radiologists often have difficulties in interpreting the mammography objectively and accurately. One of the key success factors of computer-aided diagnosis (CADx) system is the use of the right features. Therefore, this research emphasizes on the feature selection process by performing the data mining on the results of mammogram image feature extraction. There are two algorithms used to perform the mining, the decision tree and the rule induction. Furthermore, the selected features produced by the algorithms are tested using classification algorithms: k-nearest neighbors, decision tree, and naive bayesian with the scheme of 10-fold cross validation using stratified sampling way. There are five descriptors that are the best features and have contributed in determining the classification of benign and malignant lesions as follows: slice, integrated density, area fraction, model gray value, and center of mass. The best classification results based on the five features are generated by the decision tree algorithm with accuracy, sensitivity, specificity, FPR, and TPR of 93.18%; 87.5%; 3.89%; 6.33% and 92.11% respectively.
Volume: 8
Issue: 1
Page: 60-69
Publish at: 2018-02-01

Migration of Virtual Machine to improve the Security of Cloud Computing

10.11591/ijece.v8i1.pp210-219
N. Chandrakala , B. Thirumala Rao
Cloud services help individuals and organization to use data that are managed by third parties or another person at remote locations. With the increase in the development of cloud computing environment, the security has become the major concern that has been raised more consistently in order to move data and applications to the cloud as individuals do not trust the third party cloud computing providers with their private and most sensitive data and information. This paper presents, the migration of virtual machine to improve the security in cloud computing. Virtual machine (VM) is an emulation of a particular computer system. In cloud computing, virtual machine migration is a useful tool for migrating operating system instances across multiple physical machines. It is used to load balancing, fault management, low-level system maintenance and reduce energy consumption. Virtual machine (VM) migration is a powerful management technique that gives data center operators the ability to adapt the placement of VMs in order to better satisfy performance objectives, improve resource utilization and communication locality, achieve fault tolerance, reduce energy consumption, and facilitate system maintenance activities. In the migration based security approach, proposed the placement of VMs can make enormous difference in terms of security levels. On the bases of survivability analysis of VMs and Discrete Time Markov Chain (DTMC) analysis, we design an algorithm that generates a secure placement arrangement that the guest VMs can moves before succeeds the attack.
Volume: 8
Issue: 1
Page: 210-219
Publish at: 2018-02-01

Virtual Machine Allocation Policy in Cloud Computing Environment using CloudSim

10.11591/ijece.v8i1.pp344-354
Taskeen Zaidi , Rampratap Rampratap
Cloud computing has been widely accepted by the researchers for the web applications. During the past years, distributed computing replaced the centralized computing and finally turned towards the cloud computing. One can see lots of applications of cloud computing like online sale and purchase, social networking web pages, country wide virtual classes, digital libraries, sharing of pathological research labs, supercomputing and many more. Creating and allocating VMs to applications use virtualization concept. Resource allocates policies and load balancing polices play an important role in managing and allocating resources as per application request in a cloud computing environment. Cloud analyst is a GUI tool that simulates the cloud-computing environment. In the present work, the cloud servers are arranged through step network and a UML model for a minimization of energy consumption by processor, dynamic random access memory, hard disk, electrical components and mother board is developed. A well Unified Modeling Language is used for design of a class diagram. Response time and internet characteristics have been demonstrated and computed results are depicted in the form of tables and graphs using the cloud analyst simulation tool.
Volume: 8
Issue: 1
Page: 344-354
Publish at: 2018-02-01

Attitude Control of Quadrotor Using PD Plus Feedforward controller on SO(3)

10.11591/ijece.v8i1.pp566-575
Almido H Ginting , Oyas Wahyunggoro , Adha Imam Cahyadi
This paper proposes a simple scheme of Proportional-Derivative (PD) plus Feedforward controller on SO(3) to control the attitude of a quadrotor. This controller only needs the measurement of angular velocity to calculate the exponential coordinates of the rotation matrix. With rotation matrix as an error variable of the controller, the simulation shows that the controller is able to drive the attitude of the quadrotor from hovering condition to desired attitude and from an attitude condition goes to the hovering condition, despite the system is disturbed. When the system is convergent, the rotation error matrix will be a 3x3 identity matrix.
Volume: 8
Issue: 1
Page: 566-575
Publish at: 2018-02-01

Passive Damper Network in a Simple DC Distribution Power System

10.11591/ijece.v8i1.pp544-555
Awang Bin Jusoh , Muhammad Firdaus Abd Razak , Mohamad Hamka Bin Saiful , Tole Sutikno
Distributed power system (DPS) distributes power amongst processing units such as power electronics converters with DC system. Due to the increasing usage of power converters in DPS system, the system becomes unstable and the converter tends to draw constant power needed by the load of the system. Constant power load (CPL) characteristic has negative input impedance that could produce instability problems in the DC bus system. Passive damping network which consists of series RC damping circuit was connected in parallel to the DC bus system with the purpose to reduce the instability. The passive damper was designed, simulated with MATLAB/Simulink and verified experimentally with different values of CPL power levels and input voltage changes. The obtained simulation results show that simple DC system with constant power load was successfully stabilized by the installation of the passive damping network. The experimental set up was also conducted to validate of the proposed technique, and the obtained results were in excellent agreement with the theoretical parts of the project.
Volume: 8
Issue: 1
Page: 544-555
Publish at: 2018-02-01

Concept Drift Identification using Classifier Ensemble Approach

10.11591/ijece.v8i1.pp19-25
Leena Deshpande , M. Narsing Rao
Abstract:-In Internetworking system, the huge amount of data is scattered, generated and processed over the network. The data mining techniques are used to discover the unknown pattern from the underlying data. A traditional classification model is used to classify the data based on past labelled data. However in many current applications, data is increasing in size with fluctuating patterns. Due to this new feature may arrive in the data. It is present in many applications like sensornetwork, banking and telecommunication systems, financial domain, Electricity usage and prices based on its demand and supplyetc .Thus change in data distribution reduces the accuracy of classifying the data. It may discover some patterns as frequent while other patterns tend to disappear and wrongly classify. To mine such data distribution, traditionalclassification techniques may not be suitable as the distribution generating the items can change over time so data from the past may become irrelevant or even false for the current prediction. For handlingsuch varying pattern of data, concept drift mining approach is used to improve the accuracy of classification techniques. In this paper we have proposed ensemble approach for improving the accuracy of classifier. The ensemble classifier is applied on 3 different data sets. We investigated different features for the different chunk of data which is further given to ensemble classifier. We observed the proposed approach improves the accuracy of classifier for different chunks of data.
Volume: 8
Issue: 1
Page: 19-25
Publish at: 2018-02-01

Noise Analysis of Trans-impedance Amplifier (TIA) in Variety Op Amp for use in Visible Light Communication (VLC) System

10.11591/ijece.v8i1.pp159-171
Syifaul Fuada , Angga Pratama Putra , Yulian Aska , Trio Adiono
VLC is a complex system with lots of challenges in its implementation. One of its problems is noise that originated from internal and external sources (sunlight, artificial light, etc). Internal noise is originated from active components of analog front-end (AFE) circuit, which will be discussed in this paper, especially on the trans-impedance amplifier (TIA) domain. The noise characteristics of AFE circuit in VLC system has been analyzed using the variety of available commercial Op Amp and different types of the photodiode (Si, Si-PIN, Si APD). The approach of this research is based on analytical calculus and simulation using MATLAB®. The results of this research show that the main factor that affecting the noise is en, the feedback resistor (Rf), and junction capacitor in the photodiode (Cj). Besides that, the design concept of multi channel TIA (8 channel) using IC Op Amp, with consideration of pin number of each Op Amp, supply needs, the initial value of Rf, converter to 8-DIP and feedback capacitor (Cf) channel, also discussed in this paper.
Volume: 8
Issue: 1
Page: 159-171
Publish at: 2018-02-01

Sukuk Rating Prediction using Voting Ensemble Strategy

10.11591/ijece.v8i1.pp299-303
Mira Kartiwi , Teddy Surya Gunawan , Tika Arundina , Mohd Azmi Omar
Islamic finance development has grown into a focal point in many countries accros the globe. Sukuk, in particular, an Islamic investment product that has received growing attention from sovereigns, multinational and national organizations from both developed and emerging economies. Its uses has been aimed to finance investments in a varieties of economic activities and development projects. Despite the promising look of Sukuk, currently there is lack of studies had been to examine and predict the rating of the Sukuk. As a result, many practitioners adopted the conventional bond hence ignore the fact that these two instruments are different in nature. In order to fill the gap in the literature, it is the aim of this research to develop an ensemble model that can be used to predict Sukuk rating. The effectiveness of the proposed models were evaluated using dataset on Sukuk issuance for domestic from 2006 to 2016. The results indicate that the overall performance of the ensemble model is fall short behind the i duction decision tree (IDT) model. However, the class precision of the ensemble model improved, particularly in predicting the lowest rating of Sukuk.
Volume: 8
Issue: 1
Page: 299-303
Publish at: 2018-02-01

Development of Guiding Cane with Voice Notification for Visually Impaired individuals

10.11591/ijece.v8i1.pp104-112
Emeline C. Guevarra , Marck Ivan Reyes Camama , Geonel Villanueva Cruzado
Navigation in the physical environment is a challenge for those people who have very limited sense of sight or no vision at all. Assistive technologies for blind mobilization is not new and always have a room for improvement. Moreover, these assistive devices are limited in terms of its sensing and feedback abilities. This paper presents a microcontroller-based guiding stick capable of detecting several conditions of the environment such as obstacles in front, left and right positions of the user and detects ascending and descending staircases. The feedback is delivered by an audio output which dictates the direction to go or what condition the sensor detects in front of the user. Technical evaluation proves that the device was functional in terms of its accuracy, responsiveness and correctness. On the other hand, in the actual evaluation of the device with the visually impaired individuals, the device did not perform efficiently. It was also found that the device has the potential to be used effectively by the visually impaired who acquired their blindness in later stage of their life provided that they will have a proper training in using the device while navigating in the physical environment.
Volume: 8
Issue: 1
Page: 104-112
Publish at: 2018-02-01

Embedded System Based Power Plant Monitoring and Controlling

10.11591/ijeecs.v9.i2.pp275-278
J S Ashwin , N Manoharan
An embedded based power plant system is used for checking the environmental condition based on different sensor. The microcontroller is fixed inside the boiler which is a turbine, to monitor the status and the information is passed through GSM. In this project we proposed the main water tank supplies number of boilers. The water level is controlled by a water level sensor, each evaporator has two channels, one is delta other one is outlet and the channels' valves are controlled by some temperature sensors composed in each package. From the GSM modem, the user will get the present status of the boiler level by sending a radiator ID number as message. When the temperature inside the boiler exceed the threshold value it will indicate as a warning to the concerned authority person to take the immediate step.
Volume: 9
Issue: 2
Page: 275-278
Publish at: 2018-02-01
Show 1328 of 1837

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration