Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,758 Article Results

Machine Learning with PySpark - Review

10.11591/ijeecs.v12.i1.pp102-106
Raswitha Bandi , J Amudhavel , R Karthik
A reasonable distributed memory-based Computing system for machine learning is Apache Spark. Spark is being superior in computing when compared with Hadoop. Apache Spark is a quick, simple to use for handling big data that has worked in modules of Machine Learning, streaming SQL, and graph processing. We can apply machine learning algorithms to big data easily, which makes it simple by using Spark and its machine learning library MLlib, even this can be made simpler by using the Python API PySpark. This paper presents the study on how to develop machine learning algorithms in PySpark. 
Volume: 12
Issue: 1
Page: 102-106
Publish at: 2018-10-01

Hexa-band MIMO CPW Bow-tie Aperture Antenna Using Particle Swarm Optimization

10.11591/ijece.v8i5.pp3118-3128
A.K. hamid , W. Obaid
A MIMO hexa-band Bowtie Antenna for Wi-Fi is proposed. The MIMO antenna can operate at six frequency bands: 2.4, 4.4, 6.1, 8.5, 10.25 and 12.8 GHz. The MIMO antenna consists of four loaded bowtie hexa-band antennas having the same structure. Each single antenna element is loaded with six metallic strips as well as interconnected parasitic rectangular components. The presented HFSS simulations will show that the MIMO loaded antenna can operate at six frequency bands including 2.4 GHz by obtaining the return loss results, radiation patterns, and other antenna parameters. It will be shown also that the MIMO bowtie antenna has a very low mutual coupling at all the operating frequencies for the specific loaded metallic strips width which was obtained using Particle Swarm Optimization technique.
Volume: 8
Issue: 5
Page: 3118-3128
Publish at: 2018-10-01

Information System Success Framework based on Interpersonal Conflict Factors

10.11591/ijece.v8i5.pp3740-3746
Mohammed Aboaoga , Mohd Juzaiddin Ab Aziz , Ibrahim Mohamed
Information system success (ISS) has received considerable attention from researchers as it plays an important role in improving the efficiency and productivity of an organization. Several researchers have conducted empirical studies using numerous factors (e.g. organizational, technological, and individual factors) which affect the information system success. However, there are several factors which are related to interpersonal conflict which may affect information system success. The interpersonal conflict is a critical dimension which can greatly influence information system success in a competitive environment such as the financial sector. Therefore, this study introduces a framework to investigate the influence of interpersonal conflict factors on information system success in the Ministry of Finance, Yemen. The study employed a quantitative method which consists of the following steps: survey design, data collection and data analysis. A sample size comprising 130 employees were distributed in the Ministry of Finance, Yemen. Questionnaires were used to collect data from this sample. Data analysis (reliability, validity, correlation and factor analysis) has been carried out using SPSS.  In addition, structural equation modelling (SEM) has been used for evaluation the research model. Based on the experimental results, the findings in this study revealed that the interpersonal factors (interference, disagreement and instability) significantly negatively (at 0.05 level of significance) influence user satisfaction of information system success.
Volume: 8
Issue: 5
Page: 3740-3746
Publish at: 2018-10-01

Design of Digital Parity Generator Layout Using 0.7 micron Technology

10.11591/ijece.v8i5.pp3550-3559
Wahab Musa , Sri Wahyuni Dali , Ade Irawaty Tolago
The proposed digital parity generator circuit is an integrated circuit functions to detect data errors at the transmitter end, and check it at the receiving end. In digital communications, the digital messages are transmitted in the form of 1’s and 0’s between two points. It is an error free if both are the same. The purpose of this research is to implement a design method of digital parity generator layout with 0.7 micron process technology ECPD07 from Tanner Tools. Layout design starts from making schematic circuit, test function and make a layout. Next, check the layout results in terms of design rules and verify the desired functionality gradually. The results show that the circuit has functioned well as an odd parity generator. The simulation results obtained with loads CL = 25 fF, tpLH = 2nS and tpHL = 1.46 nS indicate that tp = 1.73nS or operating frequency of 578 MHz. The integrated digital parity generator circuit using transmission gate has a size of 14758 um2 (78.5 um x188 um), consisting of 74 gates.
Volume: 8
Issue: 5
Page: 3550-3559
Publish at: 2018-10-01

Sensing and Sharing Schemes for Spectral Efficiency of Cognitive Radios

10.11591/ijece.v8i5.pp2934-2941
M. K. Kaushik , Y. Yoganandam , SK Sahoo
Increase in data traffic, number of users and their requirements laid to a necessity of more bandwidth. Cognitive radio is one of the emerging technology which addresses the spectrum scarcity issue. In this work we study the advantage of having collaboration between cognitive enabled small cell network and primary macrocell. Different from the existing works at spectrum sensing stage we are applying enhanced spectrum sensing to avoid probability of false alarms and missed detections which has impact on spectral efficiency. Later power control optimization for secondary users known as Hybrid spectrum sharing is used for further improvement of spectral efficiency. Furthermore, the failed packets of Primary users are taken care by high ranked relays which in turn decreases the average Primary user packet delay by 20% when compared between assisted Secondary user method and non-assisted Secondary user method. 
Volume: 8
Issue: 5
Page: 2934-2941
Publish at: 2018-10-01

Intentional Islanding Methods as Post Fault Remedial Action: A Review

10.11591/ijeecs.v12.i1.pp182-192
N.Z. Saharuddin , Zainal Abidin , H. Mokhlis , K. Naidu
Intentional islanding is the last defense mechanism executed to avoid cascading failures and total blackout in power system network during severe or critical contingency. It is performed when other mitigation techniques are unable to save the network from collapse. Intentional islanding is preferred compared to unintentional islanding, which produces unstable islands. The objective of intentional islanding is to split the network by disconnecting appropriate transmission lines to produce electrically stable and balanced islands. There are many methods suggested by previous researchers on intentional islanding. This paper presents a comprehensive review on various intentional islanding methods proposed based on the common objective function used which are minimal power imbalance and minimal power flow disruption. The paper focuses on five intentional islanding methods which are analytical, numerical, heuristic, meta-heuristic and hybrid approaches. This review paper will serve as guideline and reference for researchers to explore further in this topic of interest.
Volume: 12
Issue: 1
Page: 182-192
Publish at: 2018-10-01

Rolling Element Bearing Condition Monitoring using Filtered Acoustic Emission

10.11591/ijece.v8i5.pp3560-3567
Sudarsan Sahoo , J. K. Das , Bapi Debnath
The defect present in the bearing of a rolling element may affect the performance of the rotating machinery and may reduce its efficiency. For this reason the condition monitoring of a rolling element bearing is very essential. So many measuring parameters are there to diagnose the fault in a rolling element bearing. Acoustic signature monitoring is one of them. Every rolling element bearing has its own acoustic signature when it is in healthy condition and when the bearing get defected then there is a change in its original acoustic signature. This change in acoustic signature can be monitored and analyzed to detect the fault present in the bearing. But the noise present in the acquired acoustic signal may affect the analysis. So the noisy acoustic signal must be filtered before the analysis. In this work the experiment is performed in two stages. In first stage the filtration of the acquired acoustic signal is done by employing the active noise cancellation (ANC) filtering techniques. In second stage the filtered signal is used for the further analysis. For the analysis initially the static analysis is done and then the frequency and the time-frequency analysis is done to diagnose the defect in the bearing. From all the three analysis the information about the defect present in the bearing is well detected.
Volume: 8
Issue: 5
Page: 3560-3567
Publish at: 2018-10-01

User Selective Encryption Method for Securing MANETs

10.11591/ijece.v8i5.pp3103-3111
Amal Ahmad , Shereen Ismail
Security issue is getting important day by day. At present, there are a variety of methodologies to provide protection for data confidentiality. MANETs have lots of security challenges than traditional networks like infrastructureless and self-organizing requirements. As the MANETs are dynamic networks that’s make every transmission in such networks vulnerable to many attacks and improving security level becomes a main issue. This paper introduces a user selective encryption method by operating Data Encryption Standard (DES), Triple DES (3DES), Advanced Encryption Standard (AES) and the Diffie-Hellman Key Exchange (DHKE) protocol for key management in order to improve MANET security. Through the Network Simulator-2 (NS-2), the we investigate the performance of the proposed method in terms of data transfer time and network throughput for different data sizes and different sender-to-receiver number of hops. The results show the superiority of AES over other encryption algorithms. Furthermore, the effectiveness of our proposed method is verified through comparing our results with those obtained from previous studies.
Volume: 8
Issue: 5
Page: 3103-3111
Publish at: 2018-10-01

A Novel Configuration of A Microstrip Power Amplifier based on GaAs-FET for ISM Applications

10.11591/ijece.v8i5.pp3882-3889
Amine Rachakh , Larbi El Abdellaoui , Jamal Zbitou , Ahmed Errkik , Abdelali Tajmouati , Mohamed Latrach
Power Amplifiers (PA) are very indispensable components in the design of numerous types of communication transmitters employed in microwave technology. The methodology is exemplified through the design of a 2.45GHz microwave power Amplifier (PA) for the industrial, scientific and medical (ISM) applications using microstrip technology. The main design target is to get a maximum power gain while simultaneously achieving a maximum output power through presenting the optimum impedance which is characteristically carried out per adding a matching circuit between the source and the input of the power amplifier and between the load and the output of the power amplifier. A "T" matching technique is used at the input and the output sides of transistor for assure in band desired that this circuit without reflections and to obtain a maximum power gain. The proposed power amplifier for microwave ISM applications is designed, simulated and optimized by employing Advanced Design System (ADS) software by Agilent. The PA shows good performances in terms of return loss, output power, power gain and stability; the circuit has an input return loss of -38dB and an output return loss of -33.5dB. The 1-dB compression point is 8.69dBm and power gain of the PA is 19.4dBm. The Rollet's Stability measure B1 and the stability factor K of the amplifier is greater than 0 and 1 respectively, which shows that the circuit is unconditionally stable. The total chip size of the PA is 73.5× 36 mm2.
Volume: 8
Issue: 5
Page: 3882-3889
Publish at: 2018-10-01

Detection of Proximal Caries at The Molar Teeth Using Edge Enhancement Algorithm

10.11591/ijece.v8i5.pp3259-3266
Jufriadif Na'am , Johan Harlan , Sarifuddin Madenda , Julius Santony , Catur Suharinto
Panoramic X-Ray produces produces the most common oral digital radiographic image that it used in dentistry practice. The image can further improve accuracy compared to analog one. This study aims to establish proximal caries edge on enhancement images so they can be easily recognized. The images were obtained from the Department of Radiology, General Hospital of M. Djamil Padang Indonesia. Total file of images to be tested were 101. Firstly, the images are analyzed by dentists who practiced at Segment Padang Hospital Indonesia. They concluded that there is proximal caries in 30 molar teeth. Furthermore, the images were processed using Matlab software with the following steps, i.e. cropping, enhancement, edge detection, and edge enhancement. The accuracy rate of detection of edge enhancement images being compared with that of dentist analysis was 73.3%. In the edge enhancement images proximal caries edge can be found conclusively in 22 teeth and dubiously in eight teeth. The results of this study convinced that edge enhancement images can be recommended to assist dentists in detecting proximal caries. 
Volume: 8
Issue: 5
Page: 3259-3266
Publish at: 2018-10-01

Random Forest Approach for Sentiment Analysis in Indonesian Language

10.11591/ijeecs.v12.i1.pp46-50
M. Ali Fauzi
Sentiment analysis become very useful since the rise of social media and online review website and, thus, the requirement of analyzing their sentiment in an effective and efficient way. We can consider sentiment analysis as text classification problem with sentiment as its categories. In this study, we explore the use of Random Forest for sentiment classification in Indonesian language. We also explore the use of bag of words (BOW) features with some term weighting methods variation such as Binary TF, Raw TF, Logarithmic TF and TF.IDF. The experiment result showed that sentiment analysis system using random forest give good performance with average OOB score 0.829. The result also depicted that all of the four term weighting method has competitive result. Since the score difference is not very significant, we can say that the term weighting method variation in study has no remarkable effect for sentiment analysis using Random Forest.
Volume: 12
Issue: 1
Page: 46-50
Publish at: 2018-10-01

Towards Benchmarking User Stories Estimation with COSMIC Function Points-A Case Example of Participant Observatio

10.11591/ijece.v8i5.pp3076-3083
Jayasri Angara , Srinivas Prasad , Gutta Sridevi
Shorter time-to-market and unstable requirements is leading to introduction of Agile and DevOps practices. Story point estimation is becoming handier in Agile/DevOps setting. However, developing user stories and defining sizing unit in terms of story point is subjective process. It lacks benchmarking/standardization in terms of sizing measure and productivity of historical data. COSMIC has been considered as FSM (Functional Size Method). It has flexibility to receive requirements as User stories (popular Agile/Devops method) and derive COSMIC functional units using parametric approach. COSMIC method reduces the subjectivity and populates the productivity parameter for benchmarking. It standardizes the estimation process and can be easily deployed in Agile or DevOps setting. This paper presents the related work on linkages between User stories, COSMIC methods and traditional function point methods. It also presents the outcome of the industry survey conducted on 49 practitioners working in 10 different domains with respective to parametric estimation process adoption and presents 9 real-time case studies developed to demonstrate the usage of COSMIC method in various domains. This paper also attempts to derive mapping process of COSMIC functional process with User Stories with the help of 2 real-time industry case studies.
Volume: 8
Issue: 5
Page: 3076-3083
Publish at: 2018-10-01

IT Service Management System Measurement using ISO20000-1 and ISO15504-8: Developing a Solution-Mediated Process Assessment Tool to Enable Transparent and SMS Process Assessment

10.11591/ijece.v8i5.pp4023-4032
Imam Asrowardi , Septafiansyah Dwi Putra , Eko Subyantoro , Norzaidi Haji Mohd Daud
Information technology is about not only hardware, software, communication infrastructure and communication infrastructure but also how to manage services. Information technology plays an increasingly important role in developing the structure and functions of public and private sectors. Service measurement plays an important role in IT service management (ITSM) that is one of the subfields of Services Computing science. ITSM is a big part of service science, a science field that combines computer science, operation research engineering, business strategy, management science, and organizational theory. Performance measurement from each of IT services is absolutely needed and is important in the continuous development of ITSM. These research provide good technical knowledge about the measuring ITSM with some requirements. In this paper we suggest the metrics in each service processes enables organizations to predict a direction for active process enhancement and to identify if the goal of process can achieve. This objective process metrics based on ISO/IEC 15504-8 and PRM ISO/IEC 20000-4 refinement. The output of this research, in the form of metrics and tools for any type organizational use.
Volume: 8
Issue: 5
Page: 4023-4032
Publish at: 2018-10-01

An Antonym Substitution-based Model on Linguistic Steganography Method

10.11591/ijeecs.v12.i1.pp225-232
Fawwaz Zamir Mansor , Aida Mustapha , Roshidi Din , Azizi Abas , Sunariya Utama
This paper implement the antonym procedure in substitution-based approach for linguistic steganography that is expected to be an alternative to the existing substitution approach that using synonym. This method is hidden the message as existing approach, however that is changing the semantic of the stego text from cover text as the medium. This paper proposed the development method is named Antonym Substitution-based that applied based on implementation linguistic steganography in covering the secret message. This approach refines the word choices makes antonym substitution-based approach linguistically is comparable with the previous effort of synonym substitution. Furthermore, this paper also used the verification and validation approaches as the procedure to evaluate performance of this method. The evaluation through verification approach used in order to determine the effectiveness and quality performance. This proposed method is expected has become the new technique implementation of linguistic steganography in process securing secret message that hide in the text medium.
Volume: 12
Issue: 1
Page: 225-232
Publish at: 2018-10-01

University Website Quality Ranking using Logarithmic Fuzzy Preference Programming

10.11591/ijece.v8i5.pp3349-3358
Retantyo Wardoyo , Tenia Wahyuningrum
The current tight competition in developing University websites forces developers to create better products that meet users needs and convinient. There are at least two factors representing university websites; accessibility and usability. We test three criteria of accessibility and usability that are called stickiness, backlink, and web page loading time. Usability and accessibility are closely related to subjective user judgments. Human judgment cannot be valid. Thus the use of fuzzy numbers are expected to provide solutions in calculating the results. In this research, the question of usability is a multi criteria decision-making problem that is caused by its complex structure. We use the Logarithmic Fuzzy Preference Programming (LFPP) method, which is a refinement of the Fuzzy Analytical Hierarchy Process method, to solve this problem. This research aims to re- assess the rank of five Indonesian university websites. Based on LFPP method, we obtain that the equation of model gets high consistency of the set priority matching to fuzzy pairwise comparison matrix of three selection criteria. The calculation results show that stickiness is the most significant factor that affects the quality of the websites.
Volume: 8
Issue: 5
Page: 3349-3358
Publish at: 2018-10-01
Show 1392 of 1984

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration