Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,758 Article Results

Eagle Strategy based Crow Search Algorithm for solving Unit Commitment Problem

10.11591/ijeecs.v12.i1.pp17-29
Rachid Habachi , Achraf Touil , Abdelkabir Charkaoui , Abdelwahed Echchatbi
Eagle strategy is a two-stage optimization strategy, which is inspired by the observation of the hunting behavior of eagles in nature. In this two-stage strategy, the first stage explores the search space globally by using a Levy flight; if it finds a promising solution, then an intensive local search is employed using a more efficient local optimizer, such as hillclimbing and the downhill simplex method. Then, the two-stage process starts again with new global exploration, followed by a local search in a new region. One of the remarkable advantages of such a combina-tion is to use a balanced tradeoff between global search (which is generally slow) and a rapid local search. The crow search algorithm (CSA) is a recently developed metaheuristic search algorithm inspired by the intelligent behavior of crows.This research article integrates the crow search algorithm as a local optimizer of Eagle strategy to solve unit commitment (UC) problem. The Unit commitment problem (UCP) is mainly finding the minimum cost schedule to a set of generators by turning each one either on or off over a given time horizon to meet the demand load and satisfy different operational constraints. There are many constraints in unit commitment problem such as spinning reserve, minimum up/down, crew, must run and fuel constraints. The proposed strategy ES-CSA is tested on 10 to 100 unit systems with a 24-h scheduling horizon. The effectiveness of the proposed strategy is compared with other well-known evolutionary, heuristics and meta-heuristics search algorithms, and by reported numerical results, it has been found that proposed strategy yields global results for the solution of the unit commitment problem. 
Volume: 12
Issue: 1
Page: 17-29
Publish at: 2018-10-01

Assessment-driven Learning through Serious Games: Guidance and Effective Outcomes

10.11591/ijece.v8i5.pp3304-3316
Othman Bakkali Yedri , Lotfi El Aachak , Mohamed Bouhorma
Evaluation in serious games is an important aspect; it aims to evaluate the good transmission of pedagogical objectives, the performance of student in relation to these objectives defined in the pedagogical scenario, the content of the course and the predefined criteria. However, the effectiveness of learning is under-studied due to the complexity involved to gamify the assessment concept, particularly when it comes to intangible measures related to the progression of learning outcomes, which is among the most important aspects of evaluation in serious games. This paper reviews the literature regarding assessment due to their importance in the learning process with a detailed assessment plan applied on serious game. Then, it presents a framework used to facilitate the assessment design integrated in serious games. Finally, a significant example of how the proposed framework proved successful with corresponding results will conclude the paper.
Volume: 8
Issue: 5
Page: 3304-3316
Publish at: 2018-10-01

Improving E-Learning by Integrating a Metacognitive Agent

10.11591/ijece.v8i5.pp3359-3367
Hanane Elbasri , Adil Haddi , Hakim Allali
The major disadvantage of the current Learning Management Systems is the lack of learner assistance in their learning processes and, therefore, they can not replace the presence of the teacher who ensures the progress of learning. In fact, we proposed to integrate, for each learner, a metacognitive agent that supported the metacognitive assistance and extracts the defectsin the learning process and strategies. The goal is to invite the learner to correct himself and improve his learning method. Metacognitive questionnaires were distributed to a group of 100 students before, during and after a computer course. The goal is to evaluatethe metacognitive attributes and to determine their influence on the success of learning. Decision trees were used as data analysis tools to extract a set of rules and to discover the influence of these metacognitive attributes on the result obtained by the learners. The results indicate that there are relationships between the different metacognitive attributes and the learners’ success. We note there is the influence of metacognitive incitement on learner outcomes, which reflects the degree of understanding of a learning pedagogical unit by the learner.
Volume: 8
Issue: 5
Page: 3359-3367
Publish at: 2018-10-01

Performance Analysis of Adaptive Filter Channel Estimated MIMO OFDM Communication System

10.11591/ijece.v8i5.pp3829-3838
Srinu Pyla , K Padma Raju , N Bala Subrahmanyam
Advanced Communication Systems are wideband systems to support multiple applications such as audio, video and data so and so forth. These systems require high spectral efficiency and data rates. In addition, they should provide multipath fading and inter-symbol interference (ISI) free transmission. Multiple input multiple output orthogonal frequency division multiplexing (MIMO OFDM) meets these requirements Hence, MIMO-OFDM is the most preferable technique for long term evaluation advanced (LTE-A). The primary objective of this paper is to control bit error rate (BER) by proper channel coding, pilot carriers, adaptive filter channel estimation schemes and space time coding (STC). A combination of any of these schemes results in better BER performance over individual schemes. System performance is analyzed for various digital modulation schemes. In this paper,adaptive filter channel estimated MIMO OFDM system is proposed by integrating channel coding, adaptivefilter channel estimation, digital modulation and space time coding. From the simulation results, channel estimated 2×2 MIMO OFDM system shows superior performance over individual schemes.
Volume: 8
Issue: 5
Page: 3829-3838
Publish at: 2018-10-01

A Miniature Microstrip Antenna Array using Circular Shaped Dumbbell for ISM Band Applications

10.11591/ijece.v8i5.pp3793-3800
Ahmed Ghaloua , Jamal Zbitou , Larbi El Abdellaoui , Mohamed Latrach , Ahmed Errkik , Abdelali Tajmouati
The aim of this work is the achievement, and the validation of a small microstrip patch antenna array using a circular shaped dumbbell defected ground structure. This work has been dividing into two stages: The first step is to miniaturize a microstrip patch antenna resonating at 5.8GHz, which operate in the Industrial Scientific Medical band (ISM) and the second is to use a circular defected ground structure to shift the resonance frequency of the antenna array from 5.8GHz to 2.45GHz. At last, a miniaturization up to 74.47%, relative to the original microstrip antenna array has accomplished. The antenna structure has designed, optimized and miniaturized using CST MW Studio. The obtained results have compared with Ansoft’s HFSS electromagnetic solver. The antenna array has fabricated on FR-4 substrate, and its reflection coefficient is measured.
Volume: 8
Issue: 5
Page: 3793-3800
Publish at: 2018-10-01

A Statistical Approach to Adaptive Playout Scheduling in Voice Over Internet Protocol Communication

10.11591/ijece.v8i5.pp2926-2933
Priya Chandran , Chelpa Lingam
Factors like network delay, latency and bandwidth significantly affect the quality of communication using Voice over Internet Protocol. The use of jitter buffer at the receiving end compensates the effect of varying network delay up to some extent. But the extra buffer delay given for each packet plays a major role in playing late packets and thereby improving voice quality. As the buffer delay increases packet loss rate decreases, which in general is a very good sign. However, an increase of buffer delay beyond a certain limit affects the interactive quality of voice communication. In this paper, we propose a statistical framework for adaptive playout scheduling of voice packets based on network statistics, packet loss rate and availability of packets in the buffer. Experimental results show that the proposed model allocates optimal buffer delay with the lowest packet loss rate when compared with other algorithms.
Volume: 8
Issue: 5
Page: 2926-2933
Publish at: 2018-10-01

An Effective PSO-inspired Algorithm for Workflow Scheduling

10.11591/ijece.v8i5.pp3852-3859
Toan Phan Thanh , Loc Nguyen The , Said Elnaffar , Cuong Nguyen Doan , Huu Dang Quoc
The Cloud is a computing platform that provides on-demand access to a shared pool of configurable resources such as networks, servers and storage that can be rapidly provisioned and released with minimal management effort from clients. At its core, Cloud computing focuses on maximizing the effectiveness of the shared resources. Therefore, workflow scheduling is one of the challenges that the Cloud must tackle especially if a large number of tasks are executed on geographically distributed servers. This entails the need to adopt an effective scheduling algorithm in order to minimize task completion time (makespan). Although workflow scheduling has been the focus of many researchers, a handful efficient solutions have been proposed for Cloud computing. In this paper, we propose the LPSO, a novel algorithm for workflow scheduling problem that is based on the Particle Swarm Optimization method. Our proposed algorithm not only ensures a fast convergence but also prevents getting trapped in local extrema. We ran realistic scenarios using CloudSim and found that LPSO is superior to previously proposed algorithms and noticed that the deviation between the solution found by LPSO and the optimal solution is negligible.
Volume: 8
Issue: 5
Page: 3852-3859
Publish at: 2018-10-01

Tolerance for Emotional Internet Infidelity and Its Correlate with Relationship Flourishing

10.11591/ijece.v8i5.pp3158-3168
Bernadette Nathania Octaviana , Juneman Abraham
Until today, there is still controversy whether emotional Internet infidelity or cheating is something that can be tolerated. Existing views are diverse, influenced by geographical factors, cultural and ideological backgrounds, as well as biological theory. This present study initially suggested that the higher the relationship flourishing, the higher the tolerance for the infidelity. In an era where monogamous relationships are dynamized by the multiplication of relationship modes through online social networks, this study becomes increasingly urgent, i.e. to recommend a variable capable of providing a buffering effect to the deleterious effect of the infidelity. The study used correlational design. As much as 210 participants (55 males, 155 females, Mage=37.89 years old, SDage=10.870 years) were recruited in the Greater Area of Jakarta, Indonesia to fill out the Relationship Flourishing Scale and Internet Infidelity Tolerance-Emotional Infidelity Subscale. This study found that relationship flourishing and emotional Internet infidelity are negatively correlated (Spearman’s Rho=-0.172, p<0.05) and there is a moderating role of sex (coeff.=0.3481, p<0.05). That is, those with higher relationship flourishing would have a higher intolerance, especially among men. Such intolerance could lead to marital dissatisfaction and, at worst, divorce. The results of this study have implications for (1) an evaluation of psychometric dimensions of the Relationship Flourishing Scale, (2) the need of proposing moderating variables to be integrated into the correlational model between relationship flourishing and the infidelity, as well as (3) online applications development in detecting and managing the Internet infidelity.
Volume: 8
Issue: 5
Page: 3158-3168
Publish at: 2018-10-01

Forensic Tools Performance Analysis on Android-based Blackberry Messenger using NIST Measurements

10.11591/ijece.v8i5.pp3991-4003
Imam Riadi , Rusydi Umar , Arizona Firdonsyah
Blackberry Messenger is one of the popularly used instant messaging applications on Android with user’s amount that increase significantly each year. The increase off Blackberry Messenger users might lead to application misuse, such as for commiting digital crimes. To conduct investigation involving smartphone devices, the investigators need to use forensic tools. Therefore, a research on current forensic tool’s performance in order to handle digital crime cases involving Android smartphones and Blackberry Messenger in particular need to be done. This research focuses on evaluating and comparing three forensic tools to obtain digital evidence from Blackberry Messenger on Android smartphones using parameter from National Institute of Standard Technology and Blackberry Messenger’s acquired digital evidences. The result shows that from comparative analysis conducted, Andriller gives 25% performance value, Oxygen Forensic Suite gives 100% performance value, and Autopsy 4.1.1 gives 0% performance value. Related to National Institute of Standard Technology parameter criterias, Andriller has performance value of 47.61%. Oxygen Forensic Suite has performance value of 61.90%. Autopsy 4.1.1 has performance value of 9.52%.
Volume: 8
Issue: 5
Page: 3991-4003
Publish at: 2018-10-01

Modified Ultra Wideband (UWB) Antipodal Vivaldi Antenna for 5

10.11591/ijece.v8i5.pp3067-3075
Subuh Pramono , Budi Basuki S. , Tommi Hariyadi
This paper presents a half triangular Comb-shaped slits edge Antipodal Vivaldi Antenna (Comb-AVA) as compared to the conventional Antipodal Vivaldi Antenna (AVA) design. This proposed antenna covers 20-40 GHz spectrum. This Comb-AVA antenna is designed for the 5G application which is addressed to cover a dualband 28/38 GHz frequencies. A half triangular comb-shaped slits edge structure is employed to investigate its effects on antenna parameters. This proposed Comb-AVA occupies a 25x8 mm2 of FR 4 substrate (𝜀𝛾 = 4.4, tan δ=0.02, thinkness 1.6 mm). It has impedance bandwidth (S11≤-10 dB) along 20-40 GHz spectrum and fractional bandwidth (FBW) ≥0.5. It means that the bandwidth is categorized as ultra wideband (UWB). In addition, there is 11 dB refinement of return loss in the CombAVA design at 38 GHz frequency. VSWR value is in range of 1.054 to 1.396. This proposed antena also has a wider angular width (3 dB) than the AVA. Higher directivity and gain is generated by Comb-AVA at 28 GHz. This proposed antenna has good performances and suitable for 5G application. 
Volume: 8
Issue: 5
Page: 3067-3075
Publish at: 2018-10-01

FIToplankton: Wireless Controlled Remotely-operated Underwater Vehicle (ROV) for Shallow Water Exploratio

10.11591/ijece.v8i5.pp3325-3332
Muhammad Ikhsan Sani , Simon Siregar , Aris Pujud Kurniawan , M. Abid Irwan
Remotely Operated Vehicle (ROV) for underwater exploration is typically controlled using umbilical cable connected to ground control station. Unfortunately, while it’s used for power distribution and data transmission, it also obstruct the movement of ROV especially for shallow water (<50 cm). This paper proposed an alternative method for controlling ROV using wireless remote control system. This work also aims to explore the possibility of using RF wireless technology between 420-450 MHz as underwater communication system. Furthermore, the control system was used to manage actuators i.e. DC motor and bilge pump for maneuvring and picking small size cargo. To help the ROV to hold on a desired, Inertial Measurement Unit (IMU) is installed on board ROV within maximum deviation 0.2 m/s2. The prototype of the system has been successfully implemented and evaluated to confirm the  functionality and the feasibility of the proposed approach.
Volume: 8
Issue: 5
Page: 3325-3332
Publish at: 2018-10-01

Balancing Compression and Encryption of Satellite Imagery

10.11591/ijece.v8i5.pp3568-3586
Ali J. Abboud , Ali N. Albu-Rghaif , Abbood Kirebut Jassim
With the rapid developments in the remote sensing technologies and services, there is a necessity for combined compression and encryption of satellite imagery. The onboard satellite compression is used to minimize storage and communication bandwidth requirements of high data rate satellite applications. While encryption is employed to secure these resources and prevent illegal use of image sensitive information. In this paper, we propose an approach to address these challenges which raised in the highly dynamic satellite based networked environment. This approach combined compression algorithms (Huffman and SPIHT) and encryptions algorithms (RC4, blowfish and AES) into three complementary modes: (1) secure lossless compression, (2) secure lossy compression and (3) secure hybrid compression. The extensive experiments on the 126 satellite images dataset showed that our approach outperforms traditional and state of art approaches by saving approximately (53%) of computational resources. In addition, the interesting feature of this approach is these three options that mimic reality by imposing every time a different approach to deal with the problem of limited computing and communication resources.
Volume: 8
Issue: 5
Page: 3568-3586
Publish at: 2018-10-01

The Impact of Social Media Technologies on Adult Learning

10.11591/ijece.v8i5.pp3747-3755
Khalil Alsaadat
Technology and social media have presented significant tools for adult learners to learn and advance continually. Fast technological advancements have enabled development of technologies used for learning. Expansion of various tools has given professors, educaters, trainers, instructers, many alternatives towards the implementation of the technology supported learning. The use of social media can improve adult learning outcomes and academic accomplishment. Social media is increasingly proven to be beneficial in adult learning and has a huge potential for adult education. This paper sheds some lights on benefits of social media for adult learners, this is incorporated through the review of previous work and some barriers that encounters social media for learning purposes. Also some social media models are reviewed to show the growth and effect of social media in adult learning context, and suggestions and recommendations are provided.
Volume: 8
Issue: 5
Page: 3747-3755
Publish at: 2018-10-01

Detection of Real Time QRS Complex Using Wavelet Transform

10.11591/ijece.v8i5.pp2857-2863
Fatima Yasmeen , Mohammad Arifuddin Mallick , Yusuf Uzzaman Khan
This paper presents a novel method for QRS detection. To accomplish this task ECG signal was first filtered by using a third order Savitzky Golay filter. The filtered ECG signal was then preprocessed by a Wavelet based denoising in a real-time fashion to minimize the undefined noise level. R-peak was then detected from denoised signal after wavelet denoising. Windowing mechanism was also applied for finding any missing R-peaks. All the 48 records have been used to test the proposed method. During this testing, 99.97% sensitivity and 99.99% positive predictivity is obtained for QRS complex detection.
Volume: 8
Issue: 5
Page: 2857-2863
Publish at: 2018-10-01

Performance Evaluation of Adaptive Continuous Wavelet Transform based Rake Receiver for UWB Systems

10.11591/ijece.v8i5.pp3444-3452
Ch. Navitha , K. Sivani , K. Ashoka Reddy
This paper proposes an adaptive continuous wavelet transform (ACWT) based Rake receiver to mitigate interference for high speed ultra wideband (UWB) transmission. The major parts of the receiver are least mean square (LMS) adaptive equalizer and N-selective maximum ratio combiner (MRC). The main advantage of using continuous wavelet rake receiver is that it utilizes the maximum bandwidth (7.5GHz) of the UWB transmitted signal, as announced by the Federal Communication Commission (FCC). In the proposed ACWT Rake receiver, the weights and the finger positions are updated depending upon the convergence error over a period in which training data is transmitted. Line of sight (LOS) channel model (CM1 from 0 to 4 meters) and the Non line of sight (NLOS) channel models (CM, CM3 and CM4) are the indoor channel models selected for investigating in this research . The performance of the proposed adaptive system   is evaluated by comparing with conventional rake and continuous wavelet transform (CWT) based rake. It showed an improved performance in all the different UWB channels (CM1 to CM4) for rake fingers of 2, 4 and 8. Simulations showed that for 8 rake fingers, the proposed adaptive CWT rake receiver has shown an SNR improvement of 2dB, 3dB, 10dB and 2dB respectively over CWT rake receiver in different UWB channels CM1, CM2, CM3 and CM4.
Volume: 8
Issue: 5
Page: 3444-3452
Publish at: 2018-10-01
Show 1381 of 1984

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration