Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,061 Article Results

Disparities in the Induced Rain Attenuation between Beacon (Narrowband) and Broadband Satellite Links in Tropical Zones

10.11591/ijeecs.v10.i2.pp687-695
Idrissa Abubakar , Jafri Din , Hong Yin Lam
The utilisation of higher frequency bands above 10 GHz by the satellite industries to provide the bandwidth (BW) required for broadband multimedia services, video conferencing, direct-to-home TV programmes and IP data requires the understanding of atmospheric losses and good link planning for satellite-to-earth links. The trade-off between the service availability, data rate and BW determine the type of modulation scheme and error corrections to be employed. These services also depend on the link performance under adverse atmospheric conditions, especially rain-induced attenuation. In this research, study measurements were conducted on space-to-earth satellite links using the beacon narrowband and broadband IP carrier signals of a Nigcomsat-1R satellite operating at 42.5°E. A VSAT receiving terminal at a latitude of 7.4°N, longitude of 9.04°E and altitude of 334 m above sea level was utilised to quantify the rain-induced attenuation of both the beacon and broadband signals during rain events. The measurements were then compared with the link performance under clear sky conditions. The performance revealed that, when compared with the broadband signal, the induced rain attenuation on beacon signal presented a disparity in the responses, resulting in significant variations of 10.14 dB in the carrier-to-noise ratio (C/N) and 17.42 dB in the received signal level at a Ku-band frequency of 12.518 GHz. These observations were also compared with the Crane global rain map and ITU-R P.618-12. Both models disagreed with the measurement values for Abuja, Nigeria.
Volume: 10
Issue: 2
Page: 687-695
Publish at: 2018-05-01

Q-switched Erbium Doped Fiber Laser Incorporating Antimony (III) Telluride in Polyvinyl Alcohol as Saturable Absorber

10.11591/ijeecs.v10.i2.pp409-415
Ezzatul Irradah Ismail , S Muhammad Ashraf Zolkopli , Muhammad Quisar Lokman , Hafizal Yahaya , Sulaiman Wadi Harun , Fauzan Ahmad
In this paper, we demonstrated a Q-switched erbium doped fiber laser (EDFL) incorporating Antimony (III) Telluride (Sb2Te3) in polyvinyl alchohol (PVA) as passive saturable absorber.  The saturable absorber were fabricated by dissolving Antimony (III) Telluride powder into PVA solution and dry in the ambient temperature for 48 hours. Then, 1 mm2 x 1 mm2 Sb2Te3-PVA film based saturable absorber were sandwiched in between FC/PC ferrule for Q-switched laser generation. The stable and self-started Q-switched laser operates at center wavelength 1560 nm with 3 dB bandwidth of 0.23 nm. The laser operates at pump power of 29.3 mW until 84.9 mW with repetition rate of 20.99 kHz to 89.29 kHz and pulse width of 13.95 µs to 5.10 µs. At maximum pump power, the laser able to achieve pulse energy of 62.72 nJ and high signal to noise ratio of 71.4
Volume: 10
Issue: 2
Page: 409-415
Publish at: 2018-05-01

Preliminary Study of a New Topology Permanent Magnet Flux Switching Motor for Electric Buses

10.11591/ijeecs.v10.i2.pp446-455
M. F. Omar , E. Sulaiman , M. Z. Ahmad , J. A. Rani , Aravind CV
Electric buses (EBs) as public transit that have been introduced in modern countries recently are an alternative effort to reduce climate change and environmental impacts of fossil fuels. One example of the successfully developed motor for EBs is interior permanent magnet synchronous motor (IPMSM) with merits of heat dissipating, high torque per frame size and reliability influence by absence of brushes. However, the three-phase armature windings are wounded in the form of distributed windings, results in much copper loss, high coil end length and reduced the efficiency. The embedded rectangular magnets inside the rotor make rotor less robust, increased rotor weight and reduced the torque and power density. The present IPMSM has a complex structure which is relatively difficult to manufacture and tough in optimization process. The 7.0 kg volume of PM used in IPMSM is very high, which increases the cost of the machine. Therefore, a new topology of permanent magnet flux switching motor using wedge-shaped PM and single stator structure with the advantages of simple stator design, robust rotor structure, high of torque and power, and high efficiency is proposed. The design, flux linkage, back-emf, cogging torque, average torque, speed, and power of this new topology are investigated by JMAG-Designer version 14.1 via a 2D-FEA. The initial design of proposed motor produces torque and power of 905.9 Nm and 57.75 kW, respectively.
Volume: 10
Issue: 2
Page: 446-455
Publish at: 2018-05-01

Palm Vein Pattern Visual Interpretation Using Laplacian and Frangi-Based Filter

10.11591/ijeecs.v10.i2.pp578-586
Zarina Mohd Noh , Abdul Rahman Ramli , Marsyita Hanafi , M Iqbal Saripan , Ridza Azri Ramlee
Detection of palm vein pattern through image processing techniques is an open problem as performance of each technique is closely related to the sample image gathered for the processing. The detected palm vein pattern is useful for further analysis in biometrics application and medical purpose. This paper aims to investigate the application of Laplacian filter and Frangi-based filter in detecting vein pattern contained in a near infrared illuminated palm image. Both filtering techniques are applied independently to two palm image databases to compare their performance in translating vein pattern in the image visually. Through empirical study, it is observed that Laplacian filter can translate the vein pattern in the image effectively. But pre-processings involved before the application of Laplacian filter need to be performed to accurately translate the vein pattern. The implementation of Frangi-based filter, while simplifying the detection process without the need of extra pre-processing, resulted in only certain vein pattern detected. Using pixel-by-pixel objective assessment, the rate for Laplacian filter in detecting vein pattern are generally more than 85% compared to Frangi-based filter; where it ranges from 60% to 100%.
Volume: 10
Issue: 2
Page: 578-586
Publish at: 2018-05-01

Selective Colligation and Selective Scrambling for Privacy Preservation in Data Mining

10.11591/ijeecs.v10.i2.pp778-785
Ishwarya M. V. , K. Ramesh Kumar
The work is to enhance the time efficiency in retrieving the data from enormous bank database. The major drawback in retrieving data from large databases is time delay. This time   hindrance is owed as the already existing method (SVM), Abstract Data Type (ADT) tree pursues some elongated Sequential steps. These techniques takes additional size and with a reduction of speed in training and testing.  Another major negative aspect of these techniques is its Algorithmic complexity. The classification algorithms have five categories. They are ID3, k-nearest neighbour, Decision tree, ANN, and Naïve Bayes algorithm. To triumph over the drawbacks in SVM techniques, we worn a technique called Naïve Bayes Classification (NBC) Algorithm that works in parallel manner rather than sequential manner. For further enhancement we commenced a Naïve Bayes updatable algorithm which is the advanced version of Naïve Bayes classification algorithm. Thus the proposed technique Naïve bayes algorithm ensures that miner can mine more efficiently from the enormous database.
Volume: 10
Issue: 2
Page: 778-785
Publish at: 2018-05-01

An Efficient & Secure Content Contribution and Retrieval content in Online Social Networks using Level-level Security Optimization & Content Visualization Algorithm

10.11591/ijeecs.v10.i2.pp807-816
Kumaran Umapathy , Neelu Khare
Online Social Networks (OSNs) is currently popular interactive media to establish the communication, share and disseminate a considerable amount of human life data. Daily and continuous communications imply the exchange of several types of content, including free text, image, audio, and video data. Security is one of the friction points that emerge when communications get mediated in Online Social Networks (OSNs). However, there are no content-based preferences supported, and therefore it is not possible to prevent undesired messages. Providing the service is not only a matter of using previously defined web content mining and security techniques. To overcome the issues, Level-level Security Optimization & Content Visualization Algorithm is proposed to avoid the privacy issues during content sharing and data visualization. It adopts level by level privacy based on user requirement in the social network. It evaluates the privacy compatibility in the online social network environment to avoid security complexities. The mechanism divided into three parts namely like online social network platform creation, social network privacy, social network within organizational privacy and network controlling and authentication. Based on the experimental evaluation, a proposed method improves the privacy retrieval accuracy (PRA) 9.13% and reduces content retrieval time (CRT) 7 milliseconds and information loss (IL) 5.33%.
Volume: 10
Issue: 2
Page: 807-816
Publish at: 2018-05-01

Finite Element Analysis of Maximum Electric Field for Air Breakdown under Various Electrode Configurations

10.11591/ijeecs.v10.i2.pp416-425
Nur Farhani Ambo , Hidayat Zainuddin , Muhammad Saufi Kamarudin , Jamaludin Mohd Wari , Ayuamira Zahari
This paper describes the electric field behavior of air breakdown under various electrode configurations and gap length. By using COMSOL Multiphysics, a Finite Element Method (FEM) software, the values of maximum electric field can be determined based on the air breakdown voltage data obtained from the experiment under AC stress. The results show that R0.5-plane configuration provides a very high electric field upon breakdown, compared to R6-plane, R48-plane and plane-plane configurations. In addition, the comparison between the analytical and simulation results of maximum electrical field gives almost identical results for each electrode configuration except for R6-plane.
Volume: 10
Issue: 2
Page: 416-425
Publish at: 2018-05-01

Technical Approach in Text Mining for Stock Market Prediction: A Systematic Review

10.11591/ijeecs.v10.i2.pp770-777
Mohammad Rabiul Islam , Imad Fakhri Al-Shaikhli , Rizal Bin Mohd Nor , Vijayakumar Varadarajan
Text mining methods and techniques have disclosed the mining task throughout information retrieval discipline in the field of soft computing techniques. To find the meaningful information from the vast amount of electronic textual data become a humongous task for trading decision. This empirical research of text mining role on financial text analysing in where stock predictive model need to improve based on rank search method. The review of this paper basically focused on text mining techniques, methods and principle component analysis that help reduce the dimensionality within the characteristics and optimal features. Moreover, most sophisticated soft-computing methods and techniques are reviewed in terms of analysis, comparison and evaluation for its performance based on electronic textual data. Due to research significance, this empirical research also highlights the limitation of different strategies and methods on exact aspects of theoretical framework for enhancing of performance.
Volume: 10
Issue: 2
Page: 770-777
Publish at: 2018-05-01

Novel Metamaterial Structures with Low Loss at Millimeter Wave Frequency Range

10.11591/ijeecs.v10.i2.pp641-647
B. A. F. Esmail , H. A. Majid , S. H. Dahlan , Z. Z. Abidin , M. K. A. Rahim , R. Dewan
Two novel millimeter-wave (MMW) metamaterials (MTMs) unit cells operate at 28 GHz for a future fifth generation (5G) mobile network applications had been designed, presented and numerically investigated. Two MTM structures are proposed; namely the double E-shaped resonator (DER) and T-U shaped resonator (TUSR). The DER and TUSR are consists of a double E and combined T-U shaped, each printed on front side of the substrate layer respectively. DER achieves a bandwidth of 0.5 GHz and a return loss of -34 dB, whereas TUSR features a bandwidth of  0.3 GHz and a return loss of -18 dB. The conventional split range resonator (SRR) was optimized to operate at similar frequency for comparison purpose. The simulation results revealed that the proposed DER and TUSR unit cells achieves the lowest loss as opposed to literature with -0.09 dB (0.99 in linear scale) and -0.23 dB (0.97 in linear scale) respectively. Moreover, a well-known algorithm was used to extract the constitutive parameters and the double negative nature of the two novel MTM structures is proven.
Volume: 10
Issue: 2
Page: 641-647
Publish at: 2018-05-01

SEC-TAED based Error Detection and Correction Technique for Data Transmission Systems

10.11591/ijeecs.v10.i2.pp696-703
Mr. G. Manikandan , Dr. M. Anand
In the OFDM communication system channel encoder and decoder is the part of the architecture. OFDM channel is mostly affected by Additive White Gaussian Noise (AWGN) in which bit flipping of original information leads to fault transmission in the channel. To overcome this problem by using hamming code for error detection and correction. Hamming codes are more attractive and it easy to process the encoding and decoding with low latency. In general the hamming is perfectly detected and corrects the single bit error. In this paper, design of single Error Correction-Triple Adjacent Error Detection (SEC-TAED) codes with bit placement algorithm is presented with less number of parity bits. In the conventional Double Adjacent Error Detection (DAED) and Hamming (13, 8) SEC-TAED are process the codes and detects the error, but it require more parity bits for performing the operation. The higher number of parity bits causes processing delay. To avoid this problem by proposed the Hamming (12, 8) SEC-TAED code, it require only four parity bits to perform the detection process. Bit-reordered format used in the method increases the probability detection of triple adjacent error. It is more suitable for efficient and high speed communication.
Volume: 10
Issue: 2
Page: 696-703
Publish at: 2018-05-01

An Improved Image Steganography Algorithm Based on PVD

10.11591/ijeecs.v10.i2.pp569-577
Sharif Shah Newaj Bhuiyan , Norun Abdul Malek , Othman Omran Khalifa , Farah Diyana Abdul Rahman
In this paper, a modification of PVD (Pixel value differencing) algorithm is used for Image Steganography in spatial domain. It is normalizing secret data value by encoding method to make the new pixel edge difference less among three neighbors (horizontal, vertical and diagonal) and embedding data only to less intensity pixel difference areas or regions. The proposed algorithm shows a good improvemernt for both color and gray-scale images compared to other algorithms. Color images performance are better than gray images. However, in this work the focus is mainly on gray images. The strenght of this scheme is that any random hidden/secret data do not make any shuttle differences to Steg-image compared to original image. The bit plane slicing is used to analyze the maximum payload that has been embeded into the cover image securely. The simulation results show that the proposed algorithm is performing better and showing great consistent results for PSNR, MSE values of any images, also against Steganalysis attack.
Volume: 10
Issue: 2
Page: 569-577
Publish at: 2018-05-01

RF Energy Harvesting with Multiple Sources in Wireless Mesh Network

10.11591/ijeecs.v10.i2.pp606-616
K.N Puniran , Ahmad Robiah , Rudzidatul Akmam Dziyauddin
Energy harvesting (EH) module for wireless sensor network has become a promising feature to prolong the conventional battery inside the devices. This emerging technology is gaining interest from sensor manufacturers as well as academicians across the globe. The concept of employing EH module must be cost effective and practical. In such, the use of EH module type besides RF is more realistic due to the size of the scavenger module, the availability of the resources and conversion efficiency. Most of the oil and gas plants have some drawbacks in scavenging RF from surrounding (i.e. router, Wi-Fi, base station, cell phone) due to its placement in remote area and thus limited energy sources could be a threat in this application. Multiple sources, including co-channel interference (CCI) in any constraint nodes is a feasible way of scavenging several wastes from ambient RF energy via wireless mesh topology. In this paper, a 3-node decode-and-forward (DF) model is proposed where the relay node is subject to an energy constraint. Multiple primary sources and CCI are added in the system model known as Multiple-Source and Single-Relay (MSSR). A mathematical model is derived in Time Switching Relaying (TSR) and Power Splitting Relaying (PSR) schemes to obtain an average system throughput at a destination. Numerical simulation with respect to the average throughput and EH ratio was performed and compared with the Single-Source and Single-Relay (SSSR) and ideal receiver. By applying multiple sources and CCI as an energy enhancement at the constraint node, the optimal value of EH ratio for TSR can be reduced significantly by 10% as compared to the ideal receiver whereas the optimal value of EH ratio for PSR is outweigh TSR in terms of overall system throughput.
Volume: 10
Issue: 2
Page: 606-616
Publish at: 2018-05-01

Multiple Human Body Postures Detection using Kinect

10.11591/ijeecs.v10.i2.pp528-536
Rosdiyana Samad , Law Wen Yan , Mahfuzah Mustafa , Nor Rul Hasma Abdullah , Dwi Pebrianti
This paper presents a method to detect multiple human body postures using Kinect sensor. In this study, a combination of shape features and body joint points are used as input features. The Kinect sensor which used infrared camera to produce a depth image is suitable to be used in an environment that has varying lighting conditions. The method for human detection is done by processing the depth image and joint data (skeleton) which able to overcome several problems such as cluttered background, various articulated poses, and change in color and illumination. Then, the body joint coordinates found on the object are used to calculate the body proportion ratio. In the experiment, the average body proportions from three body parts are obtained to verify the suitableness of golden ratio usage in this work. Finally, the measured body proportion is compared with Golden Ratio to determine whether the found object is a real human body or not. This method is tested for various scenarios, where true positive human detection is high for various postures. This method able to detect a human body in low lighting and dark room. The average body proportions obtained from the experiment show that the value is close to the golden ratio value.
Volume: 10
Issue: 2
Page: 528-536
Publish at: 2018-05-01

A Flexible Optical Sensor for Microalbuminuria Spectroscopy

10.11591/ijeecs.v10.i2.pp521-527
Suhaila Isaak , Yusmeeraz Yusof , Khairunnisa Mohd Yusof , Khoo Ming Kwan
A flexible optical sensor unit was developed for the detection of albumin level in human urine. It consists of polydimethylsiloxane thinfilm with the microscopic glass as the substrate. A gradual increase of albumin level may indicate signs of health problem such as diabetes, hypertension, and endothelial dysfunction. The experimental results showed there are a spectral shift and an increase in absorbed light increase in intensity of light with sodium urate at different concentration as a substitute of urine sample. The transmittance and reflection of PDMS was determined in the 400–1400 nm wavelength range using halogen-detrium as the excitation light source to predict the sensor sensitivity based on the Beer–Lambert law. The results exhibited that the light intensity increases as the concentration of the sodium urate increases. This performance of prototype sensor ignites an alternative for albumin detection using flexible structure.
Volume: 10
Issue: 2
Page: 521-527
Publish at: 2018-05-01

Data Exfiltration of Ultrasonic Signal in Computer Security System: A Review

10.11591/ijeecs.v10.i2.pp490-497
Farah H. A. Jabar , Janatul Islah Mohammad , Ahmad Faizal Mohd Zain , Abu Bakar Hasan
It is crucial for public users and service providers to stay abreast of the progress and trends on data exfiltration in computer security system. In cryptosystem, it is unnoticeable for computer and mobile users to realize that inaudible sound used to transmit signals carrying pervasive sensitive data was in the low frequency ultrasonic range. Acoustic attacks on ultrasonic signal emanated by electronic devices have long been investigated among researchers. This paper is an exploration on the practicality of ultrasonic data exfiltration between computers in term of computer security system. It will discuss some work done by previous researchers in general, based on scientific, technological, and security perspectives. There will be inclusions of practical applications already in existence as well as future studies in related fields.
Volume: 10
Issue: 2
Page: 490-497
Publish at: 2018-05-01
Show 1398 of 1938

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration