Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,758 Article Results

Performance Evaluation of Adaptive Continuous Wavelet Transform based Rake Receiver for UWB Systems

10.11591/ijece.v8i5.pp3444-3452
Ch. Navitha , K. Sivani , K. Ashoka Reddy
This paper proposes an adaptive continuous wavelet transform (ACWT) based Rake receiver to mitigate interference for high speed ultra wideband (UWB) transmission. The major parts of the receiver are least mean square (LMS) adaptive equalizer and N-selective maximum ratio combiner (MRC). The main advantage of using continuous wavelet rake receiver is that it utilizes the maximum bandwidth (7.5GHz) of the UWB transmitted signal, as announced by the Federal Communication Commission (FCC). In the proposed ACWT Rake receiver, the weights and the finger positions are updated depending upon the convergence error over a period in which training data is transmitted. Line of sight (LOS) channel model (CM1 from 0 to 4 meters) and the Non line of sight (NLOS) channel models (CM, CM3 and CM4) are the indoor channel models selected for investigating in this research . The performance of the proposed adaptive system   is evaluated by comparing with conventional rake and continuous wavelet transform (CWT) based rake. It showed an improved performance in all the different UWB channels (CM1 to CM4) for rake fingers of 2, 4 and 8. Simulations showed that for 8 rake fingers, the proposed adaptive CWT rake receiver has shown an SNR improvement of 2dB, 3dB, 10dB and 2dB respectively over CWT rake receiver in different UWB channels CM1, CM2, CM3 and CM4.
Volume: 8
Issue: 5
Page: 3444-3452
Publish at: 2018-10-01

Steganographic Scheme based on Message-Cover matching

10.11591/ijece.v8i5.pp3594-3603
Youssef Taouil , El Bachir Ameur
Steganography is one of the techniques that enter into the field of information   security, it is the art of dissimulating data into digital files in an imperceptible way that does not arise the suspicion. In this paper, a steganographic method based on the Faber-Schauder discrete wavelet transform is proposed. The embedding of the secret data is performed in Least Significant Bit (LSB) of the integer part of the wavelet coefficients. The secret message is decomposed into pairs of bits, then each pair is transformed into another pair based on a permutation that allows to obtain the most matches possible between the message and the LSB of the coefficients. To assess the performance of the proposed method, experiments were carried out on a large set of images, and a comparison to prior works is accomplished. Results show a good level of imperceptibility and a good trade-off imperceptibility-capacity compared to literature.
Volume: 8
Issue: 5
Page: 3594-3603
Publish at: 2018-10-01

Framework to Avoid Similarity Attack in Big Streaming Dat

10.11591/ijece.v8i5.pp2920-2925
Ganesh Dagadu Puri , D. Haritha
The existing methods for privacy preservation are available in variety of fields like social media, stock market, sentiment analysis, electronic health applications. The electronic health dynamic stream data is available in large quantity. Such large volume stream data is processed using delay free anonymization framework. Scalable privacy preserving techniques are required to satisfy the needs of processing large dynamic stream data. In this paper privacy preserving technique which can avoid similarity attack in big streaming data is proposed in distributed environment. It can process the data in parallel to reduce the anonymization delay.  In this paper the replacement technique is used for avoiding similarity attack. Late validation technique is used to reduce information loss. The application of this method is in medical diagnosis, e-health applications, health data processing at third party.
Volume: 8
Issue: 5
Page: 2920-2925
Publish at: 2018-10-01

The Proposed Development of Prototype with Secret Messages Model in Whatsapp Chat

10.11591/ijece.v8i5.pp3843-3851
Hamdani Hamdani , Heru Ismanto , Agus Qomaruddin Munir , Budi Rahmani , Andri Syafrianto , Didit Suprihanto , Anindita Septiarini
Development of prototype at data security through secret messages is needed for disguising the messages sent in smartphone chatting application, WhatsApp (WA) Chat. We propose a model to disguise a plaintext message which is first encrypted by cryptosystem to change the plaintext message to ciphertext. Plaintext or plainimage entering the smartphone system is changed into encrypted text; receiver then can read the message by using similar key with the sender. The weakness of this proposal is the message random system is not planted directly in the chatting application; therefore message removing process from cryptosystem to WA application is still needed. The strength of using this model is the messages sent will not be easily re-encrypted by hacker and can be used at client computing section.
Volume: 8
Issue: 5
Page: 3843-3851
Publish at: 2018-10-01

Automation of Air Traffic Management Using Fuzzy Logic Algorithm to Integrate Unmanned Aerial Systems into the National Airspace

10.11591/ijece.v8i5.pp3169-3178
Kouroush Jenab , Joseph Pineau
Unmaned Aircraft Systems (UAS) have been increasing in popularity in personal, commercial, and military applications. The increase of the use of UAS poses a significant risk to general air travel, and will burden an already overburdened Air Traffic Control (ATC) network if the Air Traffic Management (ATM) system does not undergo a revolutionary change. Already there have been many near misses reported in the news with personal hobbyist UAS flying in controlled airspace near airports almost colliding with manned aircraft. The expected increase in the use of UAS over the upcoming years will exacerbate this problem, leading to a catastrophic incident involving substantial damage to property or loss of life. ATC professionals are already overwhelmed with the air traffic that exists today with only manned aircraft. With UAS expected to perform many tasks in the near future, the number of UAS will greatly outnumber the manned aircraft and overwhelm the ATC network in short order to the point where the current system will be rendered extremely dangerous, if not useless. This paper seeks to explore the possibility of using the artificial intelligence concept of fuzzy logic to automate the ATC system in order to handle the increased traffic due to UAS safely and efficiently. Automation would involve an algorithm to perform arbitration between aircraft based on signal input to ATC ground stations from aircraft, as well as signal output from the ATC ground stations to the aircraft. Fuzzy logic would be used to assign weights to the many different variables involved in ATM to find the best solution, which keeps aircraft on schedule while avoiding other aircraft, whether they are manned or unmanned. The fuzzy logic approach would find the weighted values for the available variables by running a simulation of air traffic patterns assigning different weights per simulation run, over many different runs of the simulation, until the best values are found that keep aircraft on schedule and maintain the required separation of aircraft
Volume: 8
Issue: 5
Page: 3169-3178
Publish at: 2018-10-01

Computer Simulation of PMSM Motor with Five Phase Inverter Control using Signal Processing Techniques

10.11591/ijece.v8i5.pp3697-3710
Khalaf S. Gaeid , Mshari Aead Asker , Nada N. Tawfeeq , Salam Razooky Mahdi
The signal processing techniques and computer simulation play an important role in the fault diagnosis and tolerance of all types of machines in the first step of design. Permanent magnet synchronous motor (PMSM) and five phase inverter with sine wave pulse width modulation (SPWM) strategy is developed. The PMSM speed is controlled by vector control. In this work, a fault tolerant control (FTC) system in the PMSM using wavelet switching is introduced. The feature extraction property of wavelet analysis used the error as obtained by the wavelet de-noised signal as input to the mechanism unit to decide the healthy system. The diagnosis algorithm, which depends on both wavelet and vector control to generate PWM as current based manage any parameter variation. An open-end phase PMSM has a larger range of speed regulation than normal PMSM. Simulation results confirm the validity and effectiveness of the switching strategy.
Volume: 8
Issue: 5
Page: 3697-3710
Publish at: 2018-10-01

WiRoTip: an IoT-based Wireless Sensor Network for Water Pipeline Monitoring

10.11591/ijece.v8i5.pp3250-3258
Fatma Karray , Mariem Triki , Mohamed Wassim Jmal , Mohamed Abid , Abdulfattah M. Obeid
One of the key components of the Internet of Things (IoT) is the Wireless Sensor Network (WSN). WSN is an effective and efficient technology. It consists of senor nodes; smart devices that allows data collection and pre-processing wirelessly from real world. However, issues related to power consumption and computational performance still persist in classicalwireless nodes since power is not always available in application like pipeline monitoring. Moreover, they could not be usually suitable and adequate for this kind of application due to memory shortage and performance constraints. Designing new IoT WSN system that matches the application specific requirements is extremely important. In this paper, wepresent WiRoTip, a WSN node prototype for water pipeline application. An experimental and a comparative studies have been performed for the different node’s components to achieve a final adequate design.
Volume: 8
Issue: 5
Page: 3250-3258
Publish at: 2018-10-01

Low Speed Estimation of Sensorless DTC Induction Motor Drive Using MRAS with Neuro Fuzzy Adaptive Controller

10.11591/ijece.v8i5.pp2691-2702
Mini R , Shabana Backer P. , B. Hariram Satheesh , Dinesh M. N
This paper presents a closed loop Model Reference Adaptive system (MRAS) observer with artificial intelligent Nuero fuzzy controller (NFC) as the adaptation technique to mitigate the low speed estimation issues and to improvise the performance of the Sensorless Direct Torque Controlled (DTC) Induction Motor Drives (IMD). Rotor flux MRAS and reactive power MRAS with NFC is explored and detailed analysis is carried out for low speed estimation. Comparative analysis between rotor flux MRAS and reactive power MRAS with PI as well as NFC as adaptive controller is performed and results are presented in this paper. The comparative analysis among these four speed estimation methods shows that reactive power MRAS with NFC as adaptation mechanism shows reduced speed estimation error and actual speed error at steady state operating conditions when the drive is subjected to low speed operation. Simulation carried out using MATLAB-Simulink software to validate the performance of the drive especially at low speeds with rated and variable load conditions.
Volume: 8
Issue: 5
Page: 2691-2702
Publish at: 2018-10-01

Performance Analysis of Data Mining Methods for Sexually Transmitted Disease Classification

10.11591/ijece.v8i5.pp3933-3939
Gusti E. Yuliastuti , Adyan N. Alfiyatin , Agung M. Rizki , A. Hamdianah , H. Taufiq , W. F. Mahmudy
According to health reports of Malang city, many people are exposed to sexually transmitted diseases and most sufferers are not aware of the symptoms. Malang city being known as a city of education so that every year the population number increases, it is at risk of increasing the spread of sexually transmitted diseases virus. This problem is important to be solved to treat earlier sufferers sexually transmitted diseases virus in order to reduce the burden of patient spending. In this research, authors conduct data mining methods to classifying sexually transmitted diseases. From the experiment result shows that K-NN is the best method for solve this problem with 90% accuracy.
Volume: 8
Issue: 5
Page: 3933-3939
Publish at: 2018-10-01

802.11p Optimization for Delay Sensitive in Non-Safety Messages in VANETs

10.11591/ijeecs.v12.i1.pp201-207
Shamsul J Elias , M.N.M Warip , M. Elshaikh , M. Yusof Darus , R Badlishah Ahmad
Vehicle density and high vehicle mobility are variables that measured the performance of Vehicular Ad Hoc Network (VANET) in unpredictable traffic data transmission environment. This paper is focused on non-safety messages transmission mainly for delay in time in test-bed simulation environment. Network optimization is an approach to evaluate the existing congestion control protocols and other network parameters for outlining a newly enhanced congestion control protocols. This paper presents a city and highway traffic data transmission scenarios for optimizing delay sensitivity utilizing the Taguchi method.  The avareage data transmission on delay is performance indicator applying OMNeT++ simulation tools. The optimization process could be achieved once the best fit performance parameters are being identified. The best fit performance values could conclude the optimal and efficient congestion control networks. The packet sizes are the main control factors for this test-bed experiment focusing on non-safety messages which are delay sensitive.
Volume: 12
Issue: 1
Page: 201-207
Publish at: 2018-10-01

CSPCR: Cloud Security, Privacy and Compliance Readiness - A Trustworthy Framework

10.11591/ijece.v8i5.pp3756-3766
Sugandh Bhatia , Jyoteesh Malhotra
The privacy, handling, management and security of information in a cloud environment are complex and tedious tasks to achieve. With minimum investment and reduced cost of operations an organization can avail and apply the benefits of cloud computing into its business. This computing paradigm is based upon a pay as per your usage model. Moreover, security, privacy, compliance, risk management and service level agreement are critical issues in cloud computing environment. In fact, there is dire need of a model which can tackle and handle all the security and privacy issues. Therefore, we suggest a CSPCR model for evaluating the preparation of an organization to handle or to counter the threats, hazards in cloud computing environment. CSPCR discusses rules and regulations which are considered as pre-requisites in migrating or shifting to cloud computing services.
Volume: 8
Issue: 5
Page: 3756-3766
Publish at: 2018-10-01

Assessing the User Satisfaction Perspectives of Information System: A Library Case Study in Indonesia

10.11591/ijeecs.v12.i1.pp95-101
Syopiansyah Jaya Putra , A’ang Subiyakto , Irma Yunita , Muhamad Nur Gunawan , Yusuf Durachman
User satisfaction is one of the system use variables which is affected by the system creation variables in the information system (IS) success measurements, especially in the mandatory use of IS. This paper reports the relational variable assessments between three variables of the system creation dimension towards the user satisfaction variable in the library information system (LIS) implementation of a sampled university in Indonesia. Practically, the measurement has never been done since the early system implementation in the institution. The study focused on the status of the user satisfaction construct and what are the factors which influenced the construct. The used measurement model was adopted and adapted from the DeLone and McLean’s IS success model. A total of 185 respondents were selected in this study using multi-stage purposeful random sampling. The researchers used the partial least squares structural equation modeling (PLS-SEM) with the SmartPLS version 2.0 for analyzing the collected data. Findings of the study showed that users of the LIS were sufficiently satisfied and the proposed hypotheses were accepted. In terms of the adopted model, besides the findings theoretically proved that the user satisfaction construct has affected by the system creation constructs; the findings may also have proposed the practical recommendations to the sampled institution for the next LIS improvements in particular. 
Volume: 12
Issue: 1
Page: 95-101
Publish at: 2018-10-01

Modelling and Passivity-based Control of a Non-isolated DC-DC Converter in a Fuel Cell System

10.11591/ijece.v8i5.pp3436-3443
Moutabir Ahmed , Abdelmounim Elhassane , Aboulfatah Mohamed
This paper presents the model of a fuel cell and the design and simulation of a cascade of two DC-DC converters. First, a detailed mathematical model of fuel cell is presented and simulated. Then, a nonlinear model of the whole controlled system is developed and a robust nonlinear controller of currents is synthesized using a passivity-based control. A formal analysis based on Lyapunov stability and average theory is developed to describe the control currents loops performances. A classical PI controller is used for the voltages loops. The simulation models have been developed and tested in the MATLAB/SIMULINK. Simulated results are displayed to validate the feasibility and the effectiveness of the proposed strategy.
Volume: 8
Issue: 5
Page: 3436-3443
Publish at: 2018-10-01

Pilot Decontamination over Time Frequency and Space Domains in Multi-Cell Massive MIMO System

10.11591/ijece.v8i5.pp3609-3619
Lamiae Hachad , Fatiha Mrabti , Hicham Ghennioui , Mohcine Zouak
In this article, we show that Pilot contamination problem can be seen as a source separation problem using time, frequency, and space domains. Our method capitalizes on a nonunitary joint diagonalization of spatial quadratic time-frequency (STFD) signal representation to identify the desired and interfering users. We first compute the noise subspace from the STFD matrices selected appropriately. Secondly, we use the noise subspace obtained to estimate the Elevation (El) and the Azimuth (Az) angles for which the MUSIC cost function is maximized. Numerical simulations are provided to illustrate the effectiveness and the behavior of the proposed approach.
Volume: 8
Issue: 5
Page: 3609-3619
Publish at: 2018-10-01

Energy Aware Routing Protocol for Energy Constrained Mobile Ad-hoc Networks

10.11591/ijece.v8i5.pp2979-2987
Nadeem Iqbal , Mohammad Shafie Bin Abd Latiff , Shafi’i Muhammad Abdulhamid
Dynamic topology change and decentralized makes routing a challenging task in mobile ad hoc network. Energy efficient routing is the most challenging task in MANET due to limited energy of mobile nodes. Limited power of batteries typically use in MANET, and this is not easy to change or replace while running communication. Network disorder can occur for many factors but in middle of these factors deficiency of energy is the most significant one for causing broken links and early partition of the network. Evenly distribution of power between nodes could enhance the lifetime of the network, which leads to improving overall network transmission and minimizes the connection request. To discourse this issue, we propose an Energy Aware Routing Protocol (EARP) which considers node energy in route searching process and chooses nodes with higher energy levels. The EARP aim is to establish the shortest route from source to destination that contains energy efficient nodes. The performance of EARP is evaluated in terms of packet delivery ratio, network lifetime, end-to-end delay and throughput. Results of simulation done by using NS2 network simulator shows that EARP can achieve both high throughput and delivery ratio, whereas increase network lifetime and decreases end-to-end delay.
Volume: 8
Issue: 5
Page: 2979-2987
Publish at: 2018-10-01
Show 1382 of 1984

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration