Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,734 Article Results

Review of solar photovoltaic/thermal (PV/T) air collector

10.11591/ijece.v9i1.pp126-133
Ahmad Fudholi , Mariyam Fazleena Musthafa , Abrar Ridwan , Rado Yendra , Hartono Hartono , Ari Pani Desvina , Majid Khan Bin Majahar Ali , Kamaruzzaman Sopian
Growing concern with regard to energy sources and their usage has consequently increased significance of photovoltaic thermal (PV/T) collectors. A PV/T air collector is a system which has a conventional PV system combined with a thermal collector system. The system is able to produce electrical energy directly converted from sunlight by using photoelectric effect. Meanwhile, it also extracts heat from the PV and warms the fluid (air flow) inside the collector. In this review, solar PV system and solar thermal collectors are presented. In addition, studies conducted on solar PV/T air collectors are reviewed. The development of PV/T air collectors is a very promising area of research. PV/T air collectors using in solar drying and solar air heater.
Volume: 9
Issue: 1
Page: 126-133
Publish at: 2019-02-01

A hybrid pan-sharpening approach using maximum local extrema

10.11591/ijece.v9i1.pp255-263
Prajakta Patil , C.M. Sheela Rani , Meenakshi Arya
Mixing or combining different elements for getting enhanced version, is practiced across various areas in real life. Pan-sharpening is a similar technique used in the digital world; a process to combine two images into a fused image that comprises more detailed information. Images referred herein are Panchromatic (PAN) and Multispectral (MS) images. This paper presents a pansharpening algorithm which integrates multispectral and panchromatic images to generate an improved multispectral image. This technique merges the Discrete wavelet transform (WT) and Intensity-Hue-Saturation (IHS) through separate fusing criterion for choosing an approximate and detail sub-images. Whereas the maximal local extrema are used for merging detail sub-images and finally merged high-resolution image is reconstructed through inverse transform of wavelet and IHS. The proposed fusion approach enhances the superiority of the resultant fused image is demonstrated by quality measures like CORR, RMSE, PFE, SSIM, SNR and PSNR with the help of satellite Worldview-II images. The proposed algorithm is correlated with the other fusion techniques through empirical outcomes proves the superiority of the final merged image in terms of resolutions than the others.
Volume: 9
Issue: 1
Page: 255-263
Publish at: 2019-02-01

An ultra wideband antenna for Ku band applications

10.11591/ijece.v9i1.pp452-459
Aziz El fatimi , Seddik Bri , Adil Saadi
This paper presents a candidate ultra wideband antenna for Ku-band wireless communi- cations applications, analyzed and optimized by the finite element method (FEM). This three-dimensional modeling was realized and compared with published antennas for val- idate the performances of the proposed antenna. Its design is based on the insertion o fseveral symmetrical slots of different sizes on the ground plane of a mono-layer patch antenna to overcome the main limitation of the narrow bandwidth of patch antennas. The proposed antenna, made on an FR-4 epoxy mono-layer substrate with a defected ground plane (dielectric constant εr = 4,4, loss tangent tan δ = 0,02 and thickness hs = 1.6 mm). The simulated numerical results obtained are very satisfying; Bandwidth = 10.48 GHz from f1 = 9.34 GHz to f2 = 19.82 GHz, S11 = -34.17 dB, Voltage Stationary Wave Ratio VSWR = 1.04 , Gain = 6.27 dB.
Volume: 9
Issue: 1
Page: 452-459
Publish at: 2019-02-01

Strategic human resource management technology effect and implication for distance training and learning

10.11591/ijece.v9i1.pp314-322
khalil alsaadat
Strategic human resource management involves a future-oriented process of developing and implementing HR programs that address and solve business problems and directly contribute to major long-term business objectives. HR management has changed dramatically in recent decades. It was once largely an administrative function focused on day-to-day responsibilities such as employee recruiting and selection and managing employee benefits. Changing labor market conditions and new business thinking call for HR business strategies that include recruiting and retaining the right people, as well as providing ethical and cultural leadership[1].This paper discusses the following issues : The importance of human resource activity , The importance of strategic human resource planning, The changing role of human resource management and nature of work and non government organizations , Technology effect on human resource management and implications for distance training and learning .A field study was conducted to know the attitude of one hundred and five Saudi employees towards the effect of distance learning and training on human resource management and development
Volume: 9
Issue: 1
Page: 314-322
Publish at: 2019-02-01

Enhanced model for ergonomic evaluation of information systems: application to scientific research information system

10.11591/ijece.v9i1.pp683-694
Khaoula Benmoussa , Majida Laaziri , Samira Khoulji , Kerkeb Mohamed Larbi , Abir El Yamami
Considering the importance of the ergonomic aspect for information systems in providing an easy use of the computing systems, this paper focuses on the elaboration of a hybrid model for the ergonomic evaluation of information systems that merges a set of inspection dimensions such as accessibility, practicality, emotionality, and technological persuasion. Details on how the model has been constructed and data have been collected are presented. For the evaluation of our model, a situation of an information system for scientific research (SIMArech) in Moroccan Universities has been studied. This model can be used by ergonomist and human factor professionals. It is found that the proposed heuristics can effectively assess the most important dimensions of scientific research information systems.
Volume: 9
Issue: 1
Page: 683-694
Publish at: 2019-02-01

Evolution of H-shaped dielectric resonator antenna for 5G applications

10.11591/ijeecs.v13.i2.pp562-568
S. Z. N. Zool Ambia , M. H. Jamaluddin , M.R. Kamarudin , J. Nasir , R.R. Selvaraju
In this paper, an H-shaped Dielectric Resonator Antenna (DRA) with a Microstrip Slot Aperture (MSA) is presented and investigated at 26 GHz. In order to widen the bandwidth operation, the slot aperture feeding technique is applied. The designed DRA with relative permittivity, εr of 10 is mounted on a Duroid substrate with a relative permittivity, εr of 2.2, loss tangent of 0.0009 and a thickness of 0.254mm. The proposed antenna with overall size of 20 x 20 x 5.27 mm3 achieves good impedance matching, gain of 7.61 dB and good radiation patterns. An impedance bandwidth of 21.44%, covering the frequency range from 24.72 GHz to 30.62 GHz made the antenna has potential for millimeter wave and 5G applications.
Volume: 13
Issue: 2
Page: 562-568
Publish at: 2019-02-01

Implementation of message authentication code using DNA-LCG key and a novel hash algorithm

10.11591/ijece.v9i1.pp352-358
Gurpreet Kour Sodhi , Gurjot Singh Gaba , Lavish Kansal , Mohamed El Bakkali , Faisel Em Tubbal
With the introduction of electronic form of data, the need for an automatic system of security to protect the integrity of data while being transferred from one place to another is required. This is especially the case for a network in which the systems are accessed over a public network or internet. Security mechanisms involve the use of more than one algorithm. They further require that the participants should possess a secret key, which raises issues about creation, distribution and proper usage of these keys. The most effective technique used in provisioning security is Message Authentication Code (MAC) which helps in preserving integrity. MAC involves the use of secret key along with a hash algorithm. In this paper, we present an implementation of MAC using a secret key created by Deoxyribonucleic Acid (DNA) and random output sequence of Linear Congruential Generator (LCG). The hash algorithm used is made more robust by adding complexity to the traditional SHA-160. The presented scheme RMAC (Robust Message Authentication Code) is tested on National Institute of Science and Technology (NIST) test suite for random numbers, avalanche criteria and resistance towards network attacks. The results reveal that the scheme is efficient and is applicable for a variety of security demanding environments.
Volume: 9
Issue: 1
Page: 352-358
Publish at: 2019-02-01

AI-based targeted advertising system

10.11591/ijeecs.v13.i2.pp787-793
Tew Jia Yu , Chin Poo Lee , Kian Ming Lim , Siti Fatimah Abdul Razak
The most common technology used in targeted advertising is facial recognition and vehicle recognition. Even though there are existing systems serving for the targeting purposes, most propose limited functionalities and the system performance is normally unknown. This paper presents an intelligent targeted advertising system with multiple functionalities, namely facial recognition for gender and age, vehicle recognition, and multiple object detection. The main purpose is to improve the effectiveness of outdoor advertising through biometrics approaches and machine learning technology. Machine learning algorithms are implemented for higher recognition accuracy and hence achieved better targeted advertising effect.
Volume: 13
Issue: 2
Page: 787-793
Publish at: 2019-02-01

Modeling of the magnetizing phenomena of doubly fed induction generator using neuro-fuzzy algorithm considering non-linearity

10.11591/ijece.v9i1.pp23-33
Julia Tholath Jose , Adhir Baran Chattopadhyay
Doubly fed Induction Generators (DFIGs) are quite common in wind energy conversion systems because of their variable speed nature and the lower rating of converters. Magnetic flux saturation in the DFIG significantly affect its behavior during transient conditions such as voltage sag, sudden change in input power and short circuit. The effect of including saturation in the DFIG modeling is significant in determining the transient performance of the generator after a disturbance. To include magnetic saturation in DFIG model, an accurate representation of the magnetization characteristics is inevitable. This paper presents a qualitative modeling for magnetization characteristics of doubly fed induction generator using neuro-fuzzy systems. Neuro-fuzzy systems with one hidden layer of Gaussian nodes are capable of approximating continuous functions with arbitrary precision. The results obtained are compared with magnetization characteristics obtained using discrete fourier transform, polynomial and exponential curve fitting. The error analysis is also done to show the effectiveness of the neuro fuzzy modeling of magnetizing characteristics. By neuro-fuzzy algorithm, fast learning convergence is observed and great performance in accuracy is achieved.
Volume: 9
Issue: 1
Page: 23-33
Publish at: 2019-02-01

The role of speech technology in biometrics, forensics and man-machine interface

10.11591/ijece.v9i1.pp281-288
Satyanand Singh
Day by day Optimism is growing that in the near future our society will witness the Man-Machine Interface (MMI) using voice technology. Computer manufacturers are building voice recognition sub-systems in their new product lines. Although, speech technology based MMI technique is widely used before, needs to gather and apply the deep knowledge of spoken language and performance during the electronic machine-based interaction. Biometric recognition refers to a system that is able to identify individuals based on their own behavior and biological characteristics. Fingerprint success in forensic science and law enforcement applications with growing concerns relating to border control, banking access fraud, machine access control and IT security, there has been great interest in the use of fingerprints and other biological symptoms for the automatic recognition. It is not surprising to see that the application of biometric systems is playing an important role in all areas of our society. Biometric applications include access to smartphone security, mobile payment, the international border, national citizen register and reserve facilities. The use of MMI by speech technology, which includes automated speech/speaker recognition and natural language processing, has the significant impact on all existing businesses based on personal computer applications. With the help of powerful and affordable microprocessors and artificial intelligence algorithms, the human being can talk to the machine to drive and control all computer-based applications. Today's applications show a small preview of a rich future for MMI based on voice technology, which will ultimately replace the keyboard and mouse with the microphone for easy access and make the machine more intelligent.
Volume: 9
Issue: 1
Page: 281-288
Publish at: 2019-02-01

Spatial distribution pattern of Tarsius Lariang in lore lindu national park

10.11591/ijeecs.v13.i2.pp606-614
Abdul Rosyid , Yanto Santosa , I Nengah Surati Jaya , M. Bismark , Agus P. Kartono
Tarsius lariang (T. lariang) is an endemic species in Lore Lindu National Park (LLNP). Available information regarding T. lariang is limited to only morphological, anatomical, cytogenetic, and voices issues. Knowledge for its geospatial characteristics such as spatial preferences and spatial distribution is rare. The main objective of this study is to identify the spatial distribution pattern of T. lariang in LLNP. An additional objective is to identify the environmental factors affecting its spatial distribution patterns. Field observation for distribution pattern was done at the observation plot that were using systematic sampling with random start. Furthermore, the density estimation in each point was calculated using Triangle Count and Concentration Count method, while insect abundance was estimated using light traps sample data. Finally, spatial pattern was estimated using nearest neighbor index, while the environmental affecting factors were identified by using spatial analysis and correlation analyses. From 45 observation points, the T. lariang distribution pattern was clumped. It is also recognized that the significant factors affecting the spatial distribution were insect abundance, proximity from the commercially utilized land, and land surface temperature. 
Volume: 13
Issue: 2
Page: 606-614
Publish at: 2019-02-01

Solar energy based impedance-source inverter for grid system

10.11591/ijece.v9i1.pp102-108
S. Kamalakkannan , D. Kirubakaran
In this work, the fickleness of solar energy can be overcome by using Maximum Power Point Tracking algorithm (MPPT). Perturb and Observation (P&O) MPPT algorithm accomplish fast the maximum power point for rapid change of environmental conditions such as irradiance intensity and temperature. The MPPT algorithm applied to solar PV system keep the boost converter output constant. Output from boost converter is taken to three phase impedance-source inverter with RL load and grid system. Impedance-source inverter performs the transformation of variable DC output of the solar PV system in to near sinusoidal AC output. This near sinusoidal AC output consecutively is served to the RL load first and then to grid system. The simulation is carried out in matlab/simulink platform both for RL load and grid system and the simulation results are experimentally validated for RL load arrangement only.
Volume: 9
Issue: 1
Page: 102-108
Publish at: 2019-02-01

Nolong.in: an android based incident notification application with push notification technology

10.11591/ijece.v9i1.pp485-495
Arthur Bachtiar Gunawan , Seng Hansun , Marcel Bonar Kristanda
In driving, the most important thing to be considered is safety. The incident problem can happen anytime and anywhere without anyone knowing it before, especially in Cikarang where the level of incident is quite high. It is very important for the public community to act and respond quickly at the time on and around the occurring incident. Nolong.in application is an exact solution because it can send real time notifications to its users. This response is meant to assist individuals who have been using Nolong.in to help other users who need urgent help when the time of incident in order to prevent unwanted situations. In this research, push notification method has been implemented by using Firebase Cloud Messaging (FCM). The result of the research is the notification click ratio is 90.91% and the click time is 1 minute and 27 seconds. Based on the questionnaires’ results given to the community conclude that Nolong.in application is very beneficial for Gojek Cikarang community's safety.
Volume: 9
Issue: 1
Page: 485-495
Publish at: 2019-02-01

Energy and Area Effective Hardware Design of Lifting Approach Discrete Wavelet Transform

10.11591/ijres.v7.i3.pp203-214
Khamees Khalaf Hasan , Ibrahim Khalil Salih , Abdumuttalib. A. Hussen
This paper presents low power Discrete Wavelet Transform DWT architecture, comprising of forward and inverse multilevel transform for 5/3 lifting scheme LS based wavelet transform filter. This LS filter consists of integer adder units and binary shifter rather than multiplier and divider units as in the convolution based filters; hence it is more adaptable to energy efficient hardware performance. The proposed architecture is described using the VHDL based methodology. This VHDL code has been simulated and synthesized to achieve the gate level building design which can be organized to be effectively developed in hardware environment. The Quartus II 9.1 software synthesis tools were employed to implement 2D-DWT VHDL codes in Altera Development board DE2, with Cyclone II FPGA device. The proposed LS wavelet architectures can be attained by focusing on the physical FPGA devices to considerably decrease the needed hardware expenditure and power consumption of the design. The utilized logic and register elements of the architecture are 127 slices (only 1%) usage from 33216 and the architecture consumes only 0.033 W. Simulations were performed using different sizes of gray scale images that authenticate the proposed design and attain a speed performance appropriate for numerous real-time applications.
Volume: 7
Issue: 3
Page: 203-214
Publish at: 2019-01-23

Integration of synthetic minority oversampling technique for imbalanced class

10.11591/ijeecs.v13.i1.pp102-108
Noviyanti Santoso , Wahyu Wibowo , Hilda Hikmawati
In the data mining, a class imbalance is a problematic issue to look for the solutions. It probably because machine learning is constructed by using algorithms with assuming the number of instances in each balanced class, so when using a class imbalance, it is possible that the prediction results are not appropriate. They are solutions offered to solve class imbalance issues, including oversampling, undersampling, and synthetic minority oversampling technique (SMOTE). Both oversampling and undersampling have its disadvantages, so SMOTE is an alternative to overcome it. By integrating SMOTE in the data mining classification method such as Naive Bayes, Support Vector Machine (SVM), and Random Forest (RF) is expected to improve the performance of accuracy. In this research, it was found that the data of SMOTE gave better accuracy than the original data. In addition to the three classification methods used, RF gives the highest average AUC, F-measure, and G-means score.
Volume: 13
Issue: 1
Page: 102-108
Publish at: 2019-01-01
Show 1340 of 1983

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration