Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,758 Article Results

Pattern Approximation Based Generalized Image Noise Reduction Using Adaptive Feedforward Neural Network

10.11591/ijece.v8i6.pp5021-5031
Nagaraj Bhat , U. Eranna , Manoj Kumar Singh
The problem of noise interference with the image always occurs irrespective of whatever precaution is taken. Challenging issues with noise reduction are diversity of characteristics involved with source of noise and in result; it is difficult to develop a universal solution. This paper has proposed neural network based generalize solution of noise reduction by mapping the problem as pattern approximation. Considering the statistical relationship among local region pixels in the noise free image as normal patterns, feedforward neural network is applied to acquire the knowledge available within such patterns. Adaptiveness is applied in the slope of transfer function to improve the learning process. Acquired normal patterns knowledge is utilized to reduce the level of different type of noise available within an image by recorrection of noisy patterns through pattern approximation. The proposed restoration method does not need any estimation of noise model characteristics available in the image not only that it can reduce the mixer of different types of noise efficiently. The proposed method has high processing speed along with simplicity in design. Restoration of gray scale image as well as color image has done, which has suffered from different types of noise like, Gaussian noise, salt &peper, speckle noise and mixer of it.
Volume: 8
Issue: 6
Page: 5021-5031
Publish at: 2018-12-01

Overview of Model Free Adaptive (MFA) Control Technology

10.11591/ijai.v7.i4.pp165-169
Al Smadi Takialddin , Osman Ibrahim Al-Agha , Khalid Adnan Alsmadi
Model-Free Adaptive (MFA) control is a technology that has made a major impact on the automatic control industry. MFA control users have successfully solved many industry-wide control problems in various applications and achieved significant economic benefits. Now, the challenge is extending the many advantages of MFA control technology to diverse and fragmented markets, which could benefit from its unique capabilities. Since single-loop MFA controllers can directly replace legacy PID controllers without the need for "system" redesign (plugand play), they are readily embeddable in various instruments, equipment, and smart control valves. This alleviates concerns relative to cost of change and also makes MFA an appealing tool for OEM applications on a large scale.
Volume: 7
Issue: 4
Page: 165-169
Publish at: 2018-12-01

Validation of Curriculum Design Information System Model

10.11591/ijeecs.v12.i3.pp1305-1311
Thong Chee Ling , Yusmadi Yah Jusoh , Rusli Abdullah , Nor Hayati Alwi
Information system (IS) is important to institution of higher learning (IHL) especially in the domain of curriculum design. Without the support of IS, curriculum design in IHL is time-consuming, error-prone and much effort need to put in by curriculum designers. Although there are numerous IS developed in curriculum design domain for the past few years, there is still lack of specific IS curriculum design model found in IHL.  This study aims to propose an IS model which provide guidance during curriculum design process. Model validation phase begin with development of prototype which explains the process of creating a prototype according to the proposed model. The study collected 80 responses from the survey and the study resulted that the IS model is useful and able to reduce time, error and effort during curriculum design process.
Volume: 12
Issue: 3
Page: 1305-1311
Publish at: 2018-12-01

Advanced SOM & K Mean Method for Load Curve Clustering

10.11591/ijece.v8i6.pp4829-4835
Phan Thi Thanh Binh , Trong Nghia Le , Nui Pham Xuan
From the load curve classification for one customer, the main features such as the seasonal factors, the weekday factors influencing on the electricity consumption may be extracted. By this way some utilities can make decision on the tariff by seasons or by day in week. The popular clustering techniques are the SOM & K-mean or Fuzzy K-mean. SOM &Kmean is a prominent approach for clustering with a two-level approach: first, the data set will be clustered using the SOM and in the second level, the SOM will be clustered by K-mean. In the first level, two training algorithms were examined: sequential and batch training. For the second level, the K-mean has the results that are strongly depended on the initial values of the centers. To overcome this, this paper used the subtractive clustering approach proposed by Chiu in 1994 to determine the centers. Because the effective radius in Chiu’s method has some influence on the number of centers, the paper applied the PSO technique to find the optimum radius. To valid the proposed approach, the test on well-known data samples is carried out. The applications for daily load curves of one Southern utility are presented.
Volume: 8
Issue: 6
Page: 4829-4835
Publish at: 2018-12-01

A Compact Planar Low-Pass Filter Based on SRR-Metamateria

10.11591/ijece.v8i6.pp4972-4980
Badr Nasiri , Ahmed Errkik , Jamal Zbitou , Abdelali Tajmouati , Larbi El Abdellaoui , Mohamed Latrach
In this work, a novel design of a Microstrip Low-pass filter based on metamaterial square split ring resonators (SRRs) is proposed. The SRRs has been added to obtain a reduced size and high performances. The filter is designed on an FR-4 substrate having a thickness of 1.6mm, a dielectric constant of 4.4 and loss tangent of 0.025. The proposed low-pass filter is characterized by a cutoff frequency of 2.4 GHz and an attenuation level below than -20dB in the stopband. The LPF is designed, simulated and optimized by using two electromagnetic solvers CST microwave studio and ADS. The computed results obtained by both solvers are in good agreement. The total surface area of the proposed circuit is 18x18mm2 excluding the feed line, its size is miniaturized by 40% compared to the conventional filter. The experimental results illustrate that the filter achieves very good electrical performances in the passband with a low insertion loss of 0.2 dB. Moreover, a suppression level can reach more than 35 dB in the rejected band.
Volume: 8
Issue: 6
Page: 4972-4980
Publish at: 2018-12-01

Misusability Measure Based Sanitization of Big Data for Privacy Preserving MapReduce Programming

10.11591/ijece.v8i6.pp4524-4532
D. Radhika , D. Aruna Kumari
Leakage and misuse of sensitive data is a challenging problem to enterprises. It has become more serious problem with the advent of cloud and big data. The rationale behind this is the increase in outsourcing of data to public cloud and publishing data for wider visibility. Therefore Privacy Preserving Data Publishing (PPDP), Privacy Preserving Data Mining (PPDM) and Privacy Preserving Distributed Data Mining (PPDM) are crucial in the contemporary era. PPDP and PPDM can protect privacy at data and process levels respectively. Therefore, with big data privacy to data became indispensable due to the fact that data is stored and processed in semi-trusted environment. In this paper we proposed a comprehensive methodology for effective sanitization of data based on misusability measure for preserving privacy to get rid of data leakage and misuse. We followed a hybrid approach that caters to the needs of privacy preserving MapReduce programming. We proposed an algorithm known as Misusability Measure-Based Privacy serving Algorithm (MMPP) which considers level of misusability prior to choosing and application of appropriate sanitization on big data. Our empirical study with Amazon EC2 and EMR revealed that the proposed methodology is useful in realizing privacy preserving Map Reduce programming.
Volume: 8
Issue: 6
Page: 4524-4532
Publish at: 2018-12-01

Secure Privacy Implications for Clients and End-users through Key Assortment Crypto Techniques Implicated Algorithm

10.11591/ijece.v8i6.pp5443-5448
Ramesh D , Rama B
The main role of key assortment crypto techniques will helpful to provide the security to the sensitive data and play the key role for business developments. Some of the problems are rising when the scheme will sustain the possession control to present the latest set of technical and business concerns. Some of the complex challenges are waiting for the optimistic solutions. The challenges are: In the planned storage confidentiality implicated outline, the stipulation of encryption framework for the data which is conserve the self tunning to execute major key constratints by concerining their files which is imposed plaintext belonging, the owners of the privacy-data preserve the seclusion power over their own information to formulate assured wide-ranging service operations and the owners of data are facing the complexity to organize their possess data which is accessible-mode in cloud servers, concerned inner services: topology architecture type of implicated data with their operations, associated secrecy-privacy-secrecy dynamic replicas for make use of the databased security within their range of format and secretarial services with their encrypted data execution control. To overcome theses in convinces this paper is proposing the technical ideals through the algorithmic methodology along the graphical flow based architecture. This paper is proposing the key assortment crypto techniques implicated algorithm for clients and end-users to reduce the above mention complex difficulties; it describes the primary encryption implicated techniques and various levels of cryptographic algorithms with their implications along with extensions of cloud implicated data security and digital forensics implicated appliances which is implicated with enhanced various hash functions.
Volume: 8
Issue: 6
Page: 5443-5448
Publish at: 2018-12-01

Domain Examination of Chaos Logistics Function As A Key Generator in Cryptography

10.11591/ijece.v8i6.pp4577-4583
Alz Danny Wowor , Vania Beatrice Liwandouw
The use of logistics functions as a random number generator in a cryptography algorithm is capable of accommodating the diffusion properties of the Shannon principle. The problem that occurs is initialization x was static and was not affected by changes in the key, so that the algorithm will generate a random number that is always the same. This study design three schemes that can providing the flexibility of the input keys in conducting the examination of the value of the domain logistics function. The results of each schemes do not show a pattern that is directly proportional or inverse with the value of x0 and relative error x and successfully fulfill the properties of the butterfly effect. Thus, the existence of logistics functions in generating chaos numbers can be accommodated based on key inputs. In addition, the resulting random numbers are distributed evenly over the chaos range, thus reinforcing the algorithm when used as a key in cryptography.
Volume: 8
Issue: 6
Page: 4577-4583
Publish at: 2018-12-01

Optimization Based Liver Contour Extraction of Abdominal CT Images

10.11591/ijece.v8i6.pp5061-5070
Jayanthi Muthuswamy , B Kanmani
This paper introduces computer aided analysis system for diagnosis of liver abnormality in abdominal CT images. Segmenting the liver and visualizing the region of interest is a most challenging task in the field of cancer imaging, due to small observable changes between healthy and unhealthy liver. In this paper, hybrid approach for automatic extraction of liver contour is proposed. To obtain optimal threshold, the proposed work integrates segmentation method with optimization technique in order to provide better accuracy. This method uses bilateral filter for preprocessing and Fuzzy C means clustering (FCM) for segmentation. Mean Grey Wolf Optimization technique (mGWO) has been used to get the optimal threshold. This threshold is used for segmenting the region of interest. From the segmented output, largest connected region are identified using Label Connected Component (LCC) algorithm. The effectiveness of proposed method is quantitatively evaluated by comparing with ground truth obtained from radiologists. The performance criteria like dice coefficient, true positive error and misclassification rate are taken for evaluation.
Volume: 8
Issue: 6
Page: 5061-5070
Publish at: 2018-12-01

Using Data Mining to Identify COSMIC Function Point Measurement Competence

10.11591/ijece.v8i6.pp5253-5259
Selami Bagriyanik , Adem Karahoca
Cosmic Function Point (CFP) measurement errors leads budget, schedule and quality problems in software projects. Therefore, it’s important to identify and plan requirements engineers’ CFP training need quickly and correctly. The purpose of this paper is to identify software requirements engineers’ COSMIC Function Point measurement competence development need by using machine learning algorithms and requirements artifacts created by engineers. Used artifacts have been provided by a large service and technology company ecosystem in Telco. First, feature set has been extracted from the requirements model at hand. To do the data preparation for educational data mining, requirements and COSMIC Function Point (CFP) audit documents have been converted into CFP data set based on the designed feature set. This data set has been used to train and test the machine learning models by designing two different experiment settings to reach statistically significant results. Ten different machine learning algorithms have been used. Finally, algorithm performances have been compared with a baseline and each other to find the best performing models on this data set. In conclusion, REPTree, OneR, and Support Vector Machines (SVM) with Sequential Minimal Optimization (SMO) algorithms achieved top performance in forecasting requirements engineers’ CFP training need.
Volume: 8
Issue: 6
Page: 5253-5259
Publish at: 2018-12-01

Voice Assessments for Detecting Patients with Parkinson’s Diseases in Different Stages

10.11591/ijece.v8i6.pp4265-4271
Elmehdi Benmalek , Jamal Elmhamdi , Abdelilah Jilbab
Recently, a wide range of speech signal processing algorithms (dysphonia measures) aiming to detect patients with Parkinson’s disease (PD). So we have computed 19 dysphonia measures from sustained vowels collected from 375 voice samples from healthy and people suffer from PD. All the features are analysed and the more relevant ones are selected by the Principal component analysis (PCA) to classify the subjects in 4 classes according to the UPDRS (unified Parkinson’s disease Rating Scale) score. We used k-folds cross validation method with (k=4) validation scheme; 75% for training and 25% for testing, along with the Support Vector Machines (SVM) with its different types of kernels. The best result obtained was 92.5% using the PCA and the linear SVM.
Volume: 8
Issue: 6
Page: 4265-4271
Publish at: 2018-12-01

Dental and Oral Health Education for Elemetary School Students through Patient Hygiene Performance Index Indicator

10.11591/ijere.v7i4.14856
Septian Emma Dwi Jatmika , Muchsin Maulana
Caries is a problem that often occurs in school-age children. Special Region of Yogyakarta is a province that has a high DMF-T index by 5.9 and exceeds the national DMF-T index. One of the efforts to improve dental and oral health of school-age children is the health education method using simulation methods, as well as simple techniques that may attract children's attention and be understood. The aim of the current study is to knowing the influence of oral and dental hygiene education intervention on dental and oral hygiene level at SD Negeri 3 Sleman students. This research used a kind of quasi experimental research with one group pretest posttest design. The research was done in SD Negeri 3 Sleman, the sample used was the 3rd graders from 57 students in 2017. The intervention was done by dental and oral hygiene education. Respondents were examined related to their dental and oral hygiene levels. It was measured by the PHP Index (Patient Hygiene Perfomance) before and after the intervention. According to results, The average score of respondents’dental and oral hygine pre test was 0.0823 and the average post test score of respondents’dental and oral hygiene was 1.4830. There is the difference of 1.4007. This shows an increament in oral hygiene of the respondent before and after the education. The results of statistical analysis show that there is an influence of oral and dental hygiene which pvalue 0,000 <0.05. Thus, there is a need for dental and mouth hygiene education to be conducted regularly and delivered with an interesting method.
Volume: 7
Issue: 4
Page: 259-263
Publish at: 2018-12-01

Simple Three-Input Single-Output Current-Mode Universal Filter Using Single VDCC

10.11591/ijece.v8i6.pp4932-4940
Prungsak Uttaphut
This paper presents a second-order current-mode filter with three-inputs and single-output current using single voltage differencing current conveyors (VDCC) along with one resistor and two grounded capacitors. The design of presented filter emphasizes on the use of a single active element without the multiple terminals VDCC which is convenient to implement the VDCC using commercially available IC for the practical test. Also, it can reduce the current tracking error at current output port and can reduce the number of transistor in the VDCC. The proposed filter can realize all the five generic filter responses, namely, band-pass (BP), band-reject (BR), low-pass (LP), high-pass (HP), and all-pass (AP) functions from the same configuration under various conditions in terms of three input current signals. Furthermore, the natural frequency and quality factor are electronically controlled. The output current node exhibits high impedance. Besides, the non-ideal case is also investigated. The simulation and experimental results using VDCC constructed from commercially available IC can validate the theoretical analyses.
Volume: 8
Issue: 6
Page: 4932-4940
Publish at: 2018-12-01

HOPX Crossover Operator for the Fixed Charge Logistic Model with Priority Based Encoding

10.11591/ijece.v8i6.pp5351-5358
Ahmed Lahjouji El Idrissi , Chakir Tajani , Mohamed Sabbane
In this paper, we are interested to an important Logistic problem modelised us optimization problem. It is the fixed charge transportation problem (FCTP) where the aim is to find the optimal solution which minimizes the objective function containig two costs, variable costs proportional to the amount shipped and fixed cost regardless of the quantity transported. To solve this kind of problem, metaheuristics and evolutionary methods should be applied. Genetic algorithms (GAs) seem to be one of such hopeful approaches which is based both on probability operators (Crossover and mutation) responsible for widen the solution space. The different characteristics of those operators influence on the performance and the quality of the genetic algorithm. In order to improve the performance of the GA to solve the FCTP, we propose a new adapted crossover operator called HOPX with the priority-based encoding by hybridizing the characteristics of the two most performent operators, the Order Crossover (OX) and Position-based crossover (PX). Numerical results are presented and discussed for several instances showing the performance of the developed approach to obtain optimal solution in reduced time in comparison to GAs with other crossover operators.
Volume: 8
Issue: 6
Page: 5351-5358
Publish at: 2018-12-01

Performance Analysis of IEEE 802.15.4 Transceiver System under Adaptive White Gaussian Channel

10.11591/ijece.v8i6.pp4184-4196
Ekhlas Kadhum , Russul Haitham
Zigbee technology has been developed for short range wireless sensor networks and it follows IEEE 802.15.4 standard. For such sensors, several considerations should be taken including; low data rate and less design complexity in order to achieve efficient performance considering to the transceiver systems. This research focuses on implementing a digital transceiver system for Zigbee sensor based on IEEE 802.15.4. The system is implemented using offset quadrature phase shift keying (OQPSK) modulation technique with half sine pulse-shaping method. Direct conversion scheme has been used in the design of Zigbee receiver in order to fulfill the requirements mentioned above. System performance is analyzed considering to BER when it encountered adaptive white Gaussian noise (AWGN), besides showing the effect of using direct sequence spread spectrum (DSSS) technique.
Volume: 8
Issue: 6
Page: 4184-4196
Publish at: 2018-12-01
Show 1371 of 1984

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration