Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,734 Article Results

Modelling decision support system for selection maahad tafiz center using analytical hierarchal analysis

10.11591/ijeecs.v13.i1.pp35-40
Abd R Mama Mama , Mohamad A Mohamed , Amirul F Azhar , Syarilla I A Saany , Norkhairani A Rawi , Maizan M Amin , Mohd F A Kadir , M A M Nor
Today, the interest of the community to send their children to religious-based schools that is Maahad Tahfiz Center (MTC)) whether managed by Government (State or Federal), private individuals, nonprofit organization (NGO) or certain organizations is very high. The demand that exceeds this offer has seen the growth of MTC rapidly. This situation provides many choices and advantages to parents. However, there is anxiety among parents to choose the MTC that fulfills the features that they want.  Hence modeling decision support system (DSS) in a MTC selection has been modeled using Analytical Hierarchy Process (AHP) provides the effective way for parents to select appropriate MTC. AHP is an effective tool for dealing with the complex decision making and aid the parents to set priorities and provide the best decision in selection MTC. Hopefully by using this model and future development of this model will help the parents make the best choices of MTC based on their preferences. 
Volume: 13
Issue: 1
Page: 35-40
Publish at: 2019-01-01

Enhancing the performance of distance protection relays using interactive control system

10.11591/ijeecs.v13.i1.pp411-419
Hassan S. Mohamed , M. Mehanna , El-Saied Osman
Recently improvement of automation systems for electrical power system network became essential for increasing the realiability of power transmission during any disturbance. In a substations the setting of Distance Relays (DRs) are set manually which depends on human experience which may be led to undesirable operation. Any power transmission system may subjected to shortens and loss of adjusting its protection setting, DRs in protection systems are responsible for protected a High voltage transmission lines from short circuit, power swing, and load encroachment, A proposes automation system architecture is introduced to cover the setting and coordination of protection scheme based on DIgSILENT power factory, SIMATIC manger, and WinCC programs.
Volume: 13
Issue: 1
Page: 411-419
Publish at: 2019-01-01

Airline ticket reservation using NFC-based single identity

10.11591/ijeecs.v13.i1.pp384-391
Mikhael Bagus Renardi , Noor Cholis Basjaruddin , Supriyadi Supriyadi , Kuspriyanto Kuspriyanto
Airline ticket reservations can be completed via ticket counters or online. To reduce passenger data redundancy, Single Identity (SI) may be required to input passenger data. In Indonesia, SI is utilised in identity cards using Near Field Communication (NFC), called electronic Kartu Tanda Penduduk (e-KTP). However, the use of e-KTP is not optimal yet because it is still used in the same way as the conventional one. Data input using SI can be done by tapping the e-KTP on a NFC-enabled machine, and the user is required to select the passengers’ names. The process of data input may be simplified, resulting in a higher transaction speed. This research result demonstrated that there was a slight difference of the time required between the two methods for ticket reservations. The time efficiency using SI through ticket counters was 48%, while the online reservation using SI was 45%. Further research may implement the validation methods, such as using PIN or fingerprint.
Volume: 13
Issue: 1
Page: 384-391
Publish at: 2019-01-01

Speed and direction of an obstacle using virtual window

10.11591/ijeecs.v13.i1.pp109-115
Mohd Asri Mansor
A virtual window is used to determine the direction and speed of a uniformly moving obstacle. Two intersections with the virtual window at different location are used to calculate the relative path and speed of the obstacle. Two simulations were performed using Excel 2010. The first simulation simulates a practical running of a uniformly moving obstacle, while the second has the obstacle moving at a very high speed. The result shows that the system was able to determine the relative speed and path of the uniformly moving obstacle accurately.
Volume: 13
Issue: 1
Page: 109-115
Publish at: 2019-01-01

Improved model for investigating transient stability in multimachine power systems

10.11591/ijeecs.v13.i1.pp368-376
Ali Hamzeh , Zakaria Al-Omari
The determinant factor in transient stability study of electric power systems is the behavior of synchronous generators when subjected to sudden and large disturbances. The objective of this paper is to develop a mathematical model, general algorithm, and a computer program to investigate the transient stability of multi-machine power systems. The developed mathematical model is established as a first step. The new developments lie in modeling the fault occurrence and fault clearance as well as the procedure of computing the system matrices during and after the fault through only modification of the matrix before the fault. Based on the developed mathematical model, a general algorithm was built and translated into a computer program using an object-oriented and visual language called Delphi. The algorithm adopted the Runge-Kutta method for numerical solution of differential swing equations and was programmed within the program. The developed program was validated by applying it to small sample electrical networks. The program was used to analyze the transient stability of a relatively large test network and accurate results were obtained that could be relied upon for protective relays settings and optimization of control system parameters. It was found that the developed program is an effective and rapid tool for estimating transitory stability for real power systems.
Volume: 13
Issue: 1
Page: 368-376
Publish at: 2019-01-01

Real-virtual Monte Carlo simulation on impulse-momentum and collisions

10.11591/ijeecs.v13.i1.pp7-14
Wartono Wartono , Dwi Hartoyo , Nilasari Nilasari , John Rafafy Batlolona
This study aims to determine the differences in scientific literacy of students who were given inquiry learning through a real-virtual Monte Carlo experiment with students who were given conventional learning. This study used quasi experimental design with pretest-posttest control group. The results showed that the ability of students who were taught by inquiry learning models through real-virtual Monte Carlo experiments had higher scientific literacy than those taught with conventional models, it also applied well to students with high and low initial abilities. The results of the average gain in scientific literacy scores also showed a higher value between students who studied with the inquiry model through a real-virtual Monte Carlo experiment with students who studied with conventional models. The novelty of this research is combining real and virtual activities become real-virtual Monte Carlo by using the inquiry learning model to improve students' scientific literacy.
Volume: 13
Issue: 1
Page: 7-14
Publish at: 2019-01-01

FPGA implementation of color image encryption using a new chaotic map

10.11591/ijeecs.v13.i1.pp129-137
Hamsa A Abdullah , Hikmat N Abdullah
In this paper, an FPGA implementation of efficient image encryption algorithm using a chaotic map has been proposed. The proposed system consists of two phases image encryption technique. First phase consists of scrambling of pixel position and second phase consist of diffusion of bit value. In the first phase, original pixel values remain unchanged. In second phase, pixel values are modified. These modifications are done by using chaotic behavior of a recently developed chaotic map called Nahrain.  A color image encryption using Nahrain chaotic map is simulated in software via Matlab, Altera Quartus Prime 17.0 Lite EditionI and ModelSim software tools then implemented in hardware via Cyclone V GX Starter Kit FPGA platform. The results show the feasibility and effectiveness of the cryptosystem. As a typical application, the image encryption/decryption is used to demonstrate and verify the operation of the cryptosystem hardware. Complete analysis on robustness of the method is investigated. Correlation, Encryption time, Decryption time and key sensitivity show that the proposed crypto processor offers high security and reliable encryption speed for real-time image encryption and transmission.  To evaluate the performance, histogram, correlation, information entropy, number of pixel change rate (NPCR), and unified average changing intensity (UACI) measures are used for security analysis. The simulation results and security analysis have demonstrated that the proposed encryption system is robust and flexible. For example the amount of entropy obtained by the proposed algorithm is 7.9964, which is very close to its ideal amount: 8, and NPCR is 99.76 %, which is the excellent value to obtain. The hardware simulation results show that the number of pins that used of the proposed system reaches to 6% of total pins and Logic utilization (in ALMs) is 1%.
Volume: 13
Issue: 1
Page: 129-137
Publish at: 2019-01-01

Electrical characteristic of photovoltaic thermal collector with water-multiwalled carbon nanotube nanofluid flow

10.11591/ijeecs.v13.i1.pp324-330
Nur Farhana Mohd Razali , Ahmad Fudholi , Mohd Hafidz Ruslan , Kamaruzzaman Sopian
Photovoltaic thermal (PVT) studies show promising results from utilizing waste heat under the PV module. Heat removal is essentially the base of a PVT collector. The heat absorption from the back of the PV module used for different purposes. Solar energy being collected are mostly turned into heat and needs to be extracted to maintain PV’s efficiency. The PVT collector works similar to a flat plate solar collector, except that the short wavelengths are converted into electricity and the remaining wavelengths into useful heat. The heat collected is also at a lower magnitude than collected by solar thermal collectors. This study present the experimental investigation to improve the efficiency of PVT collector with and without Multiwalled Carbon Nanotube (MWCNT) nanofluid using spiral rectangular tube absorber as cooling. The electrical characteristic of PVT collector are represented by plotting power (P)-voltage (V), current (I)-voltage (V) curves. The results shows the power generated will increase with the increasing of solar radiation, and efficiency is slightly higher than the PVT collector without MWCNT. In addition, the highest maximum power increase is obtained when the 0.1 wt% MWCNT nanofluid is used as a coolant in the PVT collector.
Volume: 13
Issue: 1
Page: 324-330
Publish at: 2019-01-01

A new look at energy harvesting half-duplex DF power splitting protocol relay network over rician channel in case of maximizing capacity

10.11591/ijeecs.v13.i1.pp249-257
Phu Tran Tin , Minh Tran , Tan N. Nguyen , Thanh-Long Nguyen
In this paper, the system performance in term of the ergodic capacity of a half-duplex decode-and-forward relaying network over Rician Fading Channel is investigated. The power splitting protocol is proposed for the system model. For this purpose, the analytical mathematical expressions of the ergodic capacity in cases of maximize and no-maximize ergodic capacity are derived and discussed. Furthermore, the effect of various system parameters on the system performance is rigorously studied. Finally, the analytical results are also demonstrated by Monte-Carlo simulation in comparison with the analytical expressions. The research results show that the analytical mathematical and simulated results match for all possible parameter values for both schemes. 
Volume: 13
Issue: 1
Page: 249-257
Publish at: 2019-01-01

Leaders and followers algorithm for constrained non-linear optimization

10.11591/ijeecs.v13.i1.pp162-169
Helen Yuliana Angmalisang , Syaiful Anam , Sobri Abusini
Leaders and Followers algorithm was a novel metaheuristics proposed by Yasser Gonzalez-Fernandez and Stephen Chen. In solving unconstrained optimization, it performed better exploration than other well-known metaheuristics, e.g. Genetic Algorithm, Particle Swarm Optimization and Differential Evolution. Therefore, it performed well in multi-modal problems. In this paper, Leaders and Followers was modified for constrained non-linear optimization. Several well-known benchmark problems for constrained optimization were used to evaluate the proposed algorithm. The result of the evaluation showed that the proposed algorithm consistently and successfully found the optimal solution of low dimensional constrained optimization problems and high dimensional optimization with high number of linear inequality constraint only. Moreover, the proposed algorithm had difficulty in solving high dimensional optimization problem with non-linear constraints and any problem which has more than one equality constraint. In the comparison with other metaheuristics, Leaders and Followers had better performance in overall benchmark problems.
Volume: 13
Issue: 1
Page: 162-169
Publish at: 2019-01-01

Securing SAAS service under cloud computing based multi-tenancy systems

10.11591/ijeecs.v13.i1.pp65-71
Trinathbasu Miriyala , JKR Sastry
Cloud computing technologies are being used by many who need computing resources such as software, platform and infrastructure as per their business requirements in terms of provisioning and pay for the usage as per actual consumption of the services based on the SLA signed by the user and cloud service provider. Software running on a physical machine is being provided as services to the end users. For the reasons of cost economies access to software that uses a database is being provided to multiple users. The access to the software is provided either directly or through a virtual machine. The software being provided as service uses the same database for many of the users who have requisitioned for the same. As a result, there could be encroachments by the users into the data of others. There is a need to secure the data belonging to several users while all of them access the data using the same application. In this paper an efficient method is presented for securing the data processed by software which is offered as a service to multiple users either directly or through virtual machines.    
Volume: 13
Issue: 1
Page: 65-71
Publish at: 2019-01-01

A proposed forward clause slicing application

10.11591/ijeecs.v13.i1.pp1-6
Khalil Awad , Mohammad Abdallah , Abdelfatah Tamimi , Amir Ngah , Hanadi Tamimi
The Clause slicing technique is static slicing techniques which also have forward and backward slicing methods. The Clause slice criteria are the clause and the clause number. In this paper, we have discussed the Clauser tool the forward clause slicing tool introduce some improvements to it. The Clauser mechanism divides the program code statement into clauses, depending on clause slicing rules, identifies the variables and built-in functions, then slices the clauses regarding the slice criterion that was entered by the user. Comparing to other static slicing techniques the clause slicing is more accurate and precise because it considers all the code in micro-level, where it focuses on every syntax in the code. The Clauser still needs to be enhanced to slice more code features.
Volume: 13
Issue: 1
Page: 1-6
Publish at: 2019-01-01

Optimal placement of grid-connected photovoltaic generators in a power system for voltage stability enhancement

10.11591/ijeecs.v13.i1.pp339-346
Zetty Adibah Kamaruzzaman , Azah Mohamed , ramizi mohamed
The high penetration of photovoltaic (PV) generation can cause many technical issues such as power quality and impact on the power system voltage stability. To improve voltage stability and reducing power loss in a power system with PV generators, appropriate planning of PV generators is considered by optimal placement of PV. Thus, an effective heuristic optimization technique such as the Wind Driven Optimization (WDO) technique is applied for determining optimal location of PV generators in a power system. For determining the optimal location of PV, the objective function considers maximizing the Improved Voltage Stability Index. The proposed method for optimal location of PV generators is implemented on the IEEE 118 and 30 bus transmission systems and the 69-radial distribution system. The optimization results show that integrating PV into the test systems improves voltage stability in the system. Comparing the performance of the WDO with the particle swarm optimization technique, it is shown that the WDO technique gives faster convergence.
Volume: 13
Issue: 1
Page: 339-346
Publish at: 2019-01-01

Classification enhancement of breast cancer histopathological image using penalized logistic regression

10.11591/ijeecs.v13.i1.pp405-410
Mohammed Abdulrazaq Kahya
Classification of breast cancer histopathological images plays a significant role in computer-aided diagnosis system. Features matrix was extracted in order to classify those images and they may contain outlier values adversely that affect the classification performance. Smoothing of features matrix has been proved to be an effective way to improve the classification result via eliminating of outlier values. In this paper, an adaptive penalized logistic regression is proposed, with the aim of smoothing features and provides high classification accuracy of histopathological images, by combining the penalized logistic regression with the smoothed features matrix. Experimental results based on a publicly recent breast cancer histopathological image datasets show that the proposed method significantly outperforms penalized logistic regression in terms of classification accuracy and area under the curve. Thus, the proposed method can be useful for histopathological images classification and other classification of diseases types using DNA gene expression data in the real clinical practice.
Volume: 13
Issue: 1
Page: 405-410
Publish at: 2019-01-01

Establishment of emotional database and extraction of color psychology of children from images

10.11591/ijeecs.v13.i1.pp210-216
Seunh-Yoon Shin
In the modern society, there is a rapid increase in the need for color psychotherapy for psychological stability and environmental adaption of children for whom the interests of the parents are lacking in the midst of their busy daily schedules. Accordingly, we need to assess the emotional state of children through their drawings, etc. In this thesis, identification is made on color harmony by utilizing information of single and mixed colors in the color image space. Moreover, system for extraction of color psychology from the drawings of children is developed. First, emotional database is established on the basis of color image space. Then, enormous color values are group by clustering the images through the use of K-Means clustering. Emotions are extracted through matching with the database and child’s color psychology is examined by using color distribution chart. Empirical researches on sensibilities that are currently in progress are being pursued largely from psychological and engineering perspectives. Sensibility being understood in the area of psychology can be deemed close to being emotions. Meanwhile, sensibility understood from the engineering perspective can be defined as highly advanced psychological experiences induced in the minds of human beings from perception or cognition by external physical stimulation. This thesis demonstrated the overall excellence through experiment.
Volume: 13
Issue: 1
Page: 210-216
Publish at: 2019-01-01
Show 1343 of 1983

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration