Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,734 Article Results

Activities Written by Prospective Primary Teachers on Realistic Mathematics Education

10.11591/ijere.v7i3.14267
Hatice Kübra Güler
It is important for students to connect with real life in mathematics courses. The aim of this study is to investigate the activities which are written by prospective primary school teachers in the context of Realistic Mathematics Education. This research is a case study of which data were collected by qualitative methods. The participants of the research included 81 prospective primary teachers who are junior students attended primary teacher department. It was asked them to write an activity suitable for primary mathematics curriculum by considering Realistic Mathematics Education principles. They were given one month to write the activities. The activities written by prospective teachers analyzed by descriptive methods in terms of learning domains, types of context and principles of Realistic Mathematics Education. Totally 36 activities were written by prospective teachers. Based on the analysis, it was observed that not all the contexts were exactly real life contexts. It was determined that prospective teacher could not distinguish routine word problems from real life problems. It can be said that theoretical knowledge of Realistic Mathematics Education is inadequate for writing activities and prospective primary teachers need to practice on writing activities regarding the mentioned theory.
Volume: 7
Issue: 3
Page: 229-235
Publish at: 2018-09-01

Cascaded Neural Network Based Data Mining Strategy for Cloud Intrusion Detection

10.11591/ijeecs.v11.i3.pp1094-1101
P Purniemaa , R Jagadeesh Kannan
In recent years data mining has acquired huge popularity in the field of knowledge discovery. Thus, this approach has inspired several researches for anomaly detection, fraud detection and intrusion detection with higher accuracy, all round generalization of the problem and its sub cases; all giving higher performance in conditions subjected to continuous alteration. Though there remain quite a few challenging problems in design and implementation of a data mining based cloud intrusion detection system, as deception tactics and modeling of behavior remains a daunting problem to compute for anomaly owing to massive size of data to process in reasonable time. In this study we present a cascaded neural network based data mining strategy for cloud intrusion detection systems (IDSs) and presents the comparison and performance results tested on DARPA Intrusion Detection (ID) Data Sets, Knowledge Discovery and Data Mining Cup, NSL-KDD dataset. The study exhibits numerous advantages offered by the presented method and give reliable results of anomaly detection in real time scenario.
Volume: 11
Issue: 3
Page: 1094-1101
Publish at: 2018-09-01

Design and Analysis of a Smart Blind Stick for Visual Impairment

10.11591/ijeecs.v11.i3.pp848-856
Zulkhairi Mohd Yusof , Md Masum Billah , Kushsairy Kadir , Muhamad Amirul Sunni Bin Rohim Rohim , Haidawati Nasir , M. Izani , A. Razak
For a long time, visually impaired person uses a white cane to guide their way when travel outside. The white cane has been useful for the blinds in improving their mobility but unfortunately the white cane has its limitation. One of the shortcomings of the white cane is that, it could only detect the obstacles that are within the contact ranges of the white cane. This problem sometimes could cause the blind person to be in trouble because of insufficient time to detect and warn new obstacles in front of the blind person. This research proposes a walking stick system that has two functions; to classify an obstacles height whether it is low or high and to detect a front hole. The ability to detect the height of an obstacle will help the visually impaired to either step over or avoid the obstacle. The ability to detect a hole should help the visually impaired to avoid it in time. The walking stick will use two ultrasonic sensors for the detection of obstacle height, and a laser sensor for the detection of hole. A controller will be used to monitor and analyze the data from the sensors and feedback to the user through a vibration sensor and buzzer. The algorithm to differentiate the height of obstacles is working well and it is able to differentiate high or low obstacles. The laser ranging sensor has successfully been tested for hole detection. Therefore, the walking stick with ultrasonic and laser sensors will help more visually impaired to move around much faster and feeling more safer due to improved warning system for their movement.
Volume: 11
Issue: 3
Page: 848-856
Publish at: 2018-09-01

Discrete Chicken Swarm Optimization for the Quadratic Assignment Problem

10.11591/ijeecs.v11.i3.pp925-935
Soukaina Cherif Bourki Semlali , Mohammed Essaid Riffi , Fayçal Chebihi
The main objective of our research is to improve an adaptation of the chicken swarm optimization algorithm (CSO) to solve the quadratic assignment problem, which is a well-known combinatorial optimization problem. The new approach is based on the CSO without using a local search, the CSO-QAP is a stochastic method inspired from the behavior of chickens in swarm while searching for food. The experiments are performed on a set of 56 benchmark QAPLIB instances. To prove the robustness of our algorithm a comparative analysis is done with the known metaheuristic of Genetic algorithm based on SCX. The average percentage of error to get the best Known solution in our proposed work with the results obtained by applying a simple genetic algorithm using sequential constructive crossover for the quadratic assignment problem. The results show the effectiveness of the proposed CSO-QAP to solve the Quadratic assignment problem in term of time and quality of solutions. The proposed adaptation can be further applied by using a local search strategy to solve the same problem or another combinatorial problem.
Volume: 11
Issue: 3
Page: 925-935
Publish at: 2018-09-01

Performance Enhancement of Bidirectional NOC Router With and Without Contention for Reconfigurable Coarse Grained Architecture

10.11591/ijeecs.v11.i3.pp1068-1074
Yazhinian Sougoumar , Tamilselvan Sadasivam
Network on Chip (NoC) router plays a vital role in System on Chip (SoC) applications. Routing operation is difficult to perform inside the SoC chip. Because it contains millions of chips in one single Integrated Circuit (IC), in which every chip consists of millions of transistors. Hence NoC router is designed to enable efficient routing operation in the SoC board.  NoC router consists of Network Interconnects (NI), Crossbar Switches, arbiters, a routing logic and buffers. Conventional unidirectional router is designed by priority based Round Robin Arbiter (RRA). It produces more delay to find the priority, which comes from various input channels and more area is consumed in unidirectional router. Also if any path failure occurs, it cannot route the data through other output channel. To overcome this problem, a novel bidirectional NoC router with and without contention is proposed, which offers less area and high speed than the existing unidirectional router. A novel bidirectional NoC router consists of round robin arbiter, Static RAM, switch allocator, virtual channel allocator and crossbar switch. The proposed bidirectional router can route the data from any input channel to each and every output channel. So it avoids conflict situation and path failure problems. If any path fails, immediately it will take the alternative path through the switch allocator. The proposed routing scheme is applied into the coarse grained architecture for improving the speed of the interconnection link between two processing elements. Simulation is performed by ModelSim6.3c and synthesis is carried out by Xilinx10.1.
Volume: 11
Issue: 3
Page: 1068-1074
Publish at: 2018-09-01

FPGA Implementation of a Novel Gaussian Filter Using Power Optimized Approximate Adders

10.11591/ijeecs.v11.i3.pp1048-1059
Jamshid M Basheer , Murugesh V
Smoothing filters are essential for noise removal and image restoration. Gaussian filters are used in many digital image and video processing systems. Hence the hardware implementation of the Gaussian filter becomes a reliable solution for real time image processing applications. This paper discusses the implementation of a novel Gaussian smoothing filter with low power approximate adders in Field Programmable Gate Array (FPGA). The proposed Gaussian filter is applied to restore the noisy images in the proposed system. Original test images with 512x512 pixels were taken and divided in to 4x4 blocks with 256x256 pixels. The proposed technique has been applied and the performance metrics were measured for various simulation criteria. The proposed algorithm is also implemented using approximate adders, since approximate adders had been recognized as a reliable alternate for error tolerant applications in circuit based metrics such as power, area and delay where the accuracy may be considered for trade off.
Volume: 11
Issue: 3
Page: 1048-1059
Publish at: 2018-09-01

Cat Swarm Optimization to Shunt Capacitor Allocation in Algerian Radial Distribution Power System

10.11591/ijai.v7.i3.pp143-152
Amar Hamzi , Rachide Meziane
This paper presents a Cat Swarm Optimization (CSO) Algorithm optimization method to shunt capacitor placement on distribution systems under capacitor switching constraints. The optimum capacitor allocation solution is found for the system of feeders fed through their transformer and not for any individual feeder. The main advantages due to capacitor installation, such as capacity release and reduction of overall power and energy losses are considered. The capacitor allocation constraints due to capacitor-switching transients are taken into account. These constraints are extremely important if pole-mounted capacitors are used together with station capacitor bank. Cat Swarm search algorithm is used as an optimization tool. An illustrative example for Algerian example is presented.
Volume: 7
Issue: 3
Page: 143-152
Publish at: 2018-09-01

A Study of Some Iterative Methods for Solving Fuzzy Volterra-Fredholm Integral Equations

10.11591/ijeecs.v11.i3.pp1228-1235
Ahmed A. Hamoud , Ali Dhurgham Azeez , Kirtiwant P. Ghadle
This paper mainly focuses on the recent advances in the some approximated methods for solving fuzzy Volterra-Fredholm integral equations, namely, Adomian decomposition method, variational iteration method and homotopy analysis method. We converted fuzzy Volterra-Fredholm integral equation to a system of Volterra-Fredholm integral equation in crisp case. The approximated methods using to find the approximate solutions of this system and hence obtain an approximation for the fuzzy solution of the fuzzy Volterra-Fredholm integral equation. To assess the accuracy of each method, algorithms with Mathematica 6 according is used. Also, some numerical examples are included to demonstrate the validity and applicabilityof the proposed techniques.This paper mainly focuses on the recent advances in the some approximated methods for solvingfuzzy Volterra-Fredholm integral equations, namely, Adomian decomposition method, variational iterationmethod and homotopy analysis method. We converted fuzzy Volterra-Fredholm integral equation to asystem of Volterra-Fredholm integral equation in crisp case. The approximated methods using to find theapproximate solutions of this system and hence obtain an approximation for the fuzzy solution of the fuzzyVolterra-Fredholm integral equation. To assess the accuracy of each method, algorithms with Mathematica 6according is used. Also, some numerical examples are included to demonstrate the validity and applicabilityof the proposed techniques.
Volume: 11
Issue: 3
Page: 1228-1235
Publish at: 2018-09-01

Simulation Model on Movement of Goods in Sea Freight for Small and Medium Enterprise

10.11591/ijeecs.v11.i3.pp1214-1222
Zirawani Baharum , Muhammad Hanif , Muhammad Imran Qureshi , Syazwa Nabila Mohd Raidzuan , Hairulnizam Mahdin
Sea transportation is one of the major transportation in the scope of transport industry and plays important role towards the growth of performance in the industry that involves the movement of good (MOG). With the crucial operations, it is also essential to concern about the employee’s welfare, such as long working hours that occurred due to non-systematic procedure for the MOG. The long working hours been potentitially impact to the psychological factors of works stress and physical and health effects. Therefore, this research is important to be studied in order to develop the simulation model on MOG in sea freight for small and medium-sized enterprises (SMEs), effectively and efficiency. Initially, this research is startup by defining all existed activities with the duration as required. Subsequently, the business model of MOG in sea freight is developed according to the case study in order to develop the simulation model. This research is give a guide for future research towards providing a well-computer-based by applying the decision support system, especially to manage and control the movement of goods in sea freight.
Volume: 11
Issue: 3
Page: 1214-1222
Publish at: 2018-09-01

A Comparative Study and Analysis on Conventional Solar PV Based DC-DC Converters and MPPT Techniques

10.11591/ijeecs.v11.i3.pp831-838
Premkumar Manoharan , Karthick K , Sowmya R
As electricity demand escalated with supply, though there are lot of thermal power station, nuclear energy and other conventional power sources. Yet, there is exhaustion in the above assets and adding dangerous impacts to the atmospheric conditions.  The world searches for sustainable power source that it is normally accessible such as sun and wind. Apart from all the renewable energy resources, solar energy is readily harnessed for domestic application to meet demand. To increase the power conversion efficiency from the solar PV system it is better have a perfect DC to DC converters. The proposed outcome of this paper is to outline the DC to DC converter with MPPT algorithms to concentrate on extreme productivity at roof-top for solar PV application which decreases the cost of energy. In addition to that it also prevents panel miss matching at all environmental conditions for safer DC Voltage with flexible site design especially for domestic applications from the solar photovoltaic module. It is necessary to analyze the converters and MPPT algorithms under closed loop condition for the design and installation of solar PV system to the load or to the grid. This review summarizes few DC to DC converter topologies, maximum power point tracking algorithm and also paid attention on the advantages and disadvantages of these algorithms and topologies.
Volume: 11
Issue: 3
Page: 831-838
Publish at: 2018-09-01

An Efficient Approach to Detecting Missing Tags in RFID Data Stream

10.11591/ijeecs.v11.i3.pp1204-1213
Nur’Aifaa Zainudin , Hairulnizam Mahdin , Deden Witarsyah , Mokhairi Makhtar , Mohd Izuan Hafez Ninggal , Zirawani Baharum
RFID technology is a Radio frequency identification system that provides a reader reading the data item from its tag. Nowadays, RFID system has rapidly become more common in our life because of its autonomous advantages compared to the traditional barcode. It can detect hundreds of tagged items automatically at a time. However, in RFID, missing tag detection can occur due to signal collisions and interferences. It will cause the system to report incorrect tag’s count due to an incorrect number of tags being detected. The consequences of this problem can be enormous to business, as it will cause incorrect business decisions to be made. Thus, a Missing Tag Detection Algorithm (MTDA) is proposed to solve the missing tag detection problem. There are many other existing approaches has been proposed including Window Sub-range Transition Detection (WSTD), Efficient Missing-Tag Detection Protocol (EMD) and Multi-hashing based Missing Tag Identification (MMTI) protocol. The result from experiments shows that our proposed approach performs better than the other in terms of execution time and reliability.
Volume: 11
Issue: 3
Page: 1204-1213
Publish at: 2018-09-01

Contact Lens Classification by Using Segmented Lens Boundary Features

10.11591/ijeecs.v11.i3.pp1129-1135
Nur Ariffin Mohd Zin , Hishammuddin Asmuni , Haza Nuzly Abdul Hamed , Razib M. Othman , Shahreen Kasim , Rohayanti Hassan , Zalmiyah Zakaria , Rosfuzah Roslan
Recent studies have shown that the wearing of soft lens may lead to performance degradation with the increase of false reject rate. However, detecting the presence of soft lens is a non-trivial task as its texture that almost indiscernible. In this work, we proposed a classification method to identify the existence of soft lens in iris image. Our proposed method starts with segmenting the lens boundary on top of the sclera region. Then, the segmented boundary is used as features and extracted by local descriptors. These features are then trained and classified using Support Vector Machines. This method was tested on Notre Dame Cosmetic Contact Lens 2013 database. Experiment showed that the proposed method performed better than state of the art methods.
Volume: 11
Issue: 3
Page: 1129-1135
Publish at: 2018-09-01

Long Reach and High Capacity Hybrid Passive Optical Network

10.11591/ijeecs.v11.i3.pp891-897
Subhashini N , Brintha Therese A
A number of applications are growing day by day and so the traffic. The need for bandwidth is also increasing at a rapid rate. The bandwidth and speed with which data can be transferred was very less when compared to core networks. The access network which was once a bottleneck is no longer so because of use of optic fiber (FTTH networks). A number of variants of Passive Optical Network (PON) have been proposed like the WDM PON and the Hybrid PON. Hybrid PON is a combination of TDM PON and WDM PON and is advantageous over WDMPON. This paper focuses on high capacity networks that can provide high data rate and long reach in the access part of the network. NRZ modulation format is normally used for transmission.  We consider the advantages provided by the advanced modulation formats like DPSK. This modulation format is used to here and its benefits are evaluated in Hybrid PON network to increase the capacity and the reach of the network. Parameters like the BER and the Q factors are analysed using Optisystem Software. Distortion and the phenomena of dispersion can limit the performance of such a system. Hence Dispersion compensation mechanisms like the Dispersion Compensation Fiber (DCF) are used in the system to transmit data over large distance.
Volume: 11
Issue: 3
Page: 891-897
Publish at: 2018-09-01

Knowledge-Attitudes-Practices about Malaria among Communities in Southern Benin

10.11591/ijphs.v7i3.14395
Germain Gil Padonou , Judith G. Gbenoudon , Razaki Osse , Albert Salako , Casimir Kpanou , Herman Sagbohan , Virgile Gnanguenon , Frederick Oke Agbo , Olivier Oussou , Martin Codjo Akogbeto
Malaria still remains the main public health problem in Benin. We explored the determinants that influenced malaria treatment as well as protective behaviors, to generate a framework of useful ideas as alternative strategies against malaria. A cross-sectional survey of the knowledge, attitudes and practices (KAP) was conducted at Hozin, Vakon and Agblangandan districts in southern region of Benin. Descriptive statistics were computed and mixed logistic regression helped evaluating the relationship between frequency of each category of severity of malaria and sex group, educational level, treatment, means of self-protection against mosquitoes and identification of the cause of malaria. A significant proportion 750 (81.3%) (p<0.001) of participants stated that malaria was caused by mosquitoes. The respondents who mentioned sun as the cause of malaria, have trivialized more malaria in a proportion of about 59.30% (OR=2.67 [95% CI 1.61-4.44]) followed by those who have reported the cause of body weakness (43.68%) (OR=2.97 [95% CI 1.68-5.28]). Poor knowledge justifies the trivialization of the disease and poor management of malaria control means. National Malaria Control Programs should improve access to education, especially for women and could help improving prevention and control behaviours against malaria in communities.
Volume: 7
Issue: 3
Page: 186-193
Publish at: 2018-09-01

Forecasting Drought Using Modified Empirical Wavelet Transform-ARIMA with Fuzzy C-Means Clustering

10.11591/ijeecs.v11.i3.pp1152-1161
Muhammad Akram Shaari , Ruhaidah Samsudin , Ani Shabri Ilman
Drought forecasting is important in preparing for drought and its mitigation plan. This study focuses on the investigating the performance of Auto Regressive Integrated Moving Average (ARIMA) and Empirical Wavelet Transform (EWT)-ARIMA based on clustering analysis in forecasting drought using Standard Precipitation Index (SPI). Daily rainfall data from Arau, Perlis from 1956 to 2008 was used in this study. SPI data of 3, 6, 9, 12 and 24 months were then calculated using the rainfall data. EWT is employed to decompose the time series into several finite modes. The EWT is used to create Intrinsic Mode Functions (IMF) which are used to create ARIMA models. Fuzzy c-means clustering is used on the instantaneous frequency given by Hilbert Transform of the IMF to create several clusters. The objective of this study is to compare the effectiveness of the methods in accurately forecasting drought in Arau, Malaysia. It was found that the proposed model performed better compared to ARIMA and EWT-ARIMA.
Volume: 11
Issue: 3
Page: 1152-1161
Publish at: 2018-09-01
Show 1401 of 1983

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration