Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,734 Article Results

Conceptual Sentiment Analysis Model

10.11591/ijece.v8i4.pp2358-2366
Kranti Vithal Ghag , Ketan Shah
Bag-of-words approach is popularly used for Sentiment analysis. It maps the terms in the reviews to term-document vectors and thus disrupts the syntactic structure of sentences in the reviews. Association among the terms or the semantic structure of sentences is also not preserved. This research work focuses on classifying the sentiments by considering the syntactic and semantic structure of the sentences in the review. To improve accuracy, sentiment classifiers based on relative frequency, average frequency and term frequency inverse document frequency were proposed. To handle terms with apostrophe, preprocessing techniques were extended. To focus on opinionated contents, subjectivity extraction was performed at phrase level. Experiments were performed on Pang & Lees, Kaggle’s and UCI’s dataset. Classifiers were also evaluated on the UCI’s Product and Restaurant dataset. Sentiment Classification accuracy improved from 67.9% for a comparable term weighing technique, DeltaTFIDF, up to 77.2% for proposed classifiers. Inception of the proposed concept based approach, subjectivity extraction and extensions to preprocessing techniques, improved the accuracy to 93.9%.
Volume: 8
Issue: 4
Page: 2358-2366
Publish at: 2018-08-01

Reliability Constrained Unit Commitment Considering the Effect of DG and DR Program

10.11591/ijece.v8i4.pp1985-1996
Masoud Aliakbari , Pouria Maghouli , Habib Allah Aalami
Due to increase in energy prices at peak periods and increase in fuel cost, involving Distributed Generation (DG) and consumption management by Demand Response (DR) will be unavoidable options for optimal system operations. Also, with high penetration of DGs and DR programs into power system operation, the reliability criterion is taken into account as one of the most important concerns of system operators in management of power system. In this paper, a Reliability Constrained Unit Commitment (RCUC) at presence of time-based DR program and DGs integrated with conventional units is proposed and executed to reach a reliable and economic operation. Designated cost function has been minimized considering reliability constraint in prevailing UC formulation. The UC scheduling is accomplished in short-term so that the reliability is maintained in acceptable level. Because of complex nature of RCUC problem and full AC load flow constraints, the hybrid algorithm included Simulated Annealing (SA) and Binary Particle Swarm Optimization (BPSO) has been proposed to optimize the problem. Numerical results demonstrate the effectiveness of the proposed method and considerable efficacy of the time-based DR program in reducing operational costs by implementing it on IEEE-RTS79.
Volume: 8
Issue: 4
Page: 1985-1996
Publish at: 2018-08-01

Initial Development of an Electrical Power Generator by using Thermoelectric Generator, Focal Lens and Underground Heat Dissipation System

10.11591/ijece.v8i4.pp2549-2556
Syed Zainal Abidin Syed Kamarul Bahrin , Sabarina Jaafar
Electrical energy is important in various developments to ensure global stability. However, most electrical energy sources are non-renewable and these sources are expected to be depleted in the near future. In order to solve this problem, research on renewable energy sources are intensified and thermoelectric generator (TEG) is one of the potential solutions. TEG can generate electricity if the there is a temperature difference between the hot end and cold end of its plate and it is widely used in various applications, ranging from high temperature of a steam generator until to the lowest temperature of a human body. The initial development of this work focuses on the electrical power generator design by using focal lens to focus sunlight, a form of renewable energy, on the TEG hot end and also underground heat dissipation system on the cold end to create temperature difference. The initial results showed that the amount of power produced by the system is quite small but reasonable due to the type of TEGs used. However, the heat dissipation system showed a promising development due to its non-dependency on external energy to expel heat from the cold side.
Volume: 8
Issue: 4
Page: 2549-2556
Publish at: 2018-08-01

GENCO Optimal Bidding Strategy and Profit based Unit Commitment using Evolutionary Particle Swarm Optimization Illustrating the Effect of GENCO Market Power

10.11591/ijece.v8i4.pp1997-2013
Adline Bikeri , Christopher Muriithi , Peter Kihato
In deregulated electricity markets, generation companies (GENCOs) make unit commitment (UC) decisions based on a profit maximization objective in what is termed profit based unit commitment (PBUC). PBUC is done for the GENCOs demand which is a summation of its bilateral demand and allocations from the spot energy market. While the bilateral demand is known, allocations from the spot energy market depend on the GENCOs bidding strategy. A GENCO thus requires an optimal bidding strategy (OBS) which when combined with a PBUC approach would maximize operating profits. In this paper, a solution of the combined OBS-PBUC problem is presented. An evolutionary particle swarm optimization (EPSO) algorithm is implemented for solving the optimization problem. Simulation results carried out for a test power system with GENCOs of differing market strengths show that the optimal bidding strategy depends on the GENCOs market power. Larger GENCOs with significant market power would typically bid higher to raise market clearing prices while smaller GENCOs would typically bid lower to capture a larger portion of the spot market demand. It is also illustrated that the proposed EPSO algorithm has a better performance in terms of solution quality than the classical PSO algorithm.
Volume: 8
Issue: 4
Page: 1997-2013
Publish at: 2018-08-01

A Comprehensive Survey on Exiting Solution Approaches towards Security and Privacy Requirements of IoT

10.11591/ijece.v8i4.pp2319-2326
Rajani Chetan , Ramesh Shahabadkar
‘Internet of Things (IoT)’emerged as an intelligent collaborative computation and communication between a set of objects capable of providing on-demand services to other objects anytime anywhere. A large-scale deployment of data-driven cloud applications as well as automated physical things such as embed electronics, software, sensors and network connectivity enables a joint ubiquitous and pervasive internet-based computing systems well capable of interacting with each other in an IoT. IoT, a well-known term and a growing trend in IT arena certainly bring a highly connected global network structure providing a lot of beneficial aspects to a user regarding business productivity, lifestyle improvement, government efficiency, etc. It also generates enormous heterogeneous and homogeneous data needed to be analyzed properly to get insight into valuable information. However, adoption of this new reality (i.e., IoT) by integrating it with the internet invites a certain challenges from security and privacy perspective. At present, a much effort has been put towards strengthening the security system in IoT still not yet found optimal solutions towards current security flaws. Therefore, the prime aim of this study is to investigate the qualitative aspects of the conventional security solution approaches in IoT. It also extracts some open research problems that could affect the future research track of IoT arena.
Volume: 8
Issue: 4
Page: 2319-2326
Publish at: 2018-08-01

A Passive Islanding Detection Method for Neutral point clamped Multilevel Inverter based Distributed Generation using Rate of Change of Frequency Analysis

10.11591/ijece.v8i4.pp1967-1976
Ch. Rami Reddy , K. Harinadha Reddy
Presently renewable energies have taken a special place in the world and most of the Distributed Generations (DGs) used in the interconnected power system are utilized, renewable energy resources. Due to the DG’s advantages, including use of renewable energy such as, clean nature, does not pollute environment and having endless nature the use of these renewable resources to produce electrical energy in the world are increasing in day to day life. One problem with such Distributed generators is an unintentional islanding phenomenon. Islanding occurs when a Distributed Generation continues to energize an isolated part of a power system even after it was disconnected from the main grid, which is surrounded by unpowered lines. Since islanding can cause hazardous conditions for people and equipment which is connected to it. As per IEEE 1547 DG Interconnection standards, islanding should be quickly detected within 2 seconds, by protective relays and inverters that are part of the DG system. In this paper, a new passive method to identify islanding states has been proposed, based on the rate of change of frequency analysis (ROCOF) for a multilevel inverter based solar distributed generation systems. This method is efficient for both connecting DGs to the network with or without the Inverter. This method is more efficient than the existing methods and reducing the Non Detection Zone (NDZ), which is the disadvantage of existing passive methods and also clearly differentiating between the Islanding and Non-islanding events. The simulation results, which are carried on the MATLAB/Simulink environment shows the performance of the proposed method.
Volume: 8
Issue: 4
Page: 1967-1976
Publish at: 2018-08-01

Services Modeling based on SOA and BPM for Information System Flexibility Improvement

10.11591/ijece.v8i4.pp2451-2455
Ahmad Nurul Fajar , Nilo Legowo
The lack of  identify services mechanism which is related to the development of information systems could be impact in wasting time, over budget and can not adapt to the changing environment. This phenomenon is happened by the belief that lack of capturing user requirement. This is due to consider the business environment is always running normally. In fact, the development of the system needs a way to anticipate the business environment that unpredictable changes.Therefore, the phenomenon on the need for modeling services can able to respond to the changing needs of users still have a chancein this study. It explores modeling services to synergize SOA and BPM.Several previous studies generally use a business driven approach, technical partially driven to develop the service modeling. This leads to the question of how a service should be modeled so that it can be applied in different contexts and business processes also. It is support user needs in diversity and heterogeneous system environments. This Conditions occurs in corporate university. The case studies in this research is a Learning Management System (LMS) in Academic Enterprise System (EAS). The research stages are: (1) Analysis of Synergy in SOA and BPM, (2) Analysis of User Experience in LMS Academic Enterprise System (L-EAS), (3) Analysis of Modeling Framework, (4) Proposed Framework that aligning SOA and BPM. The result of this study is proposed system framework based on services to increase the flexibility of information systems at LMS Academic Enterprise System (L-EAS).
Volume: 8
Issue: 4
Page: 2451-2455
Publish at: 2018-08-01

Technical and Economic Analysis of Net Energy Metering for Residential House

10.11591/ijeecs.v11.i2.pp585-592
T. M. N. T. Mansur , N. H. Baharudin , R. Ali
Renewable Energy Act (RE Act) has been gazetted by the Malaysian Government in 2011 to encourage energy generation from renewable resources. Under Feed-in Tariff (FiT) scheme, solar PV has gained popularity due to its high FiT rates. However, the FiT scheme for solar PV has expired in 2016 and been replaced by the Net Energy Metering (NEM) scheme. The objective of this research work is to technically and economically analyze the solar PV system for a residential house under NEM scheme. The methodology involves gathering solar energy resource information and daily residential load profile, sizing PV array together with grid-connected inverter and then lastly simulation of the design system by using PVsyst software. Based on the results obtained, the amount of energy generated is higher when the capacity of solar PV system is increased. While most of the energy generated is exported to the grid, only up to 25% of load demand is supplied by the solar PV system. From economic aspect, the residential house does not need to pay the electricity bill due to the self-consumed of energy generated and profit gained from excess energy exported to the grid. From the environmental aspect, 2,434 kWh energy generated from renewable resource annually and consumed by the residential load has replaced the fossil fuel based power from grid. This value is equivalent to almost 1.7 tons of CO2 avoidance to the environment.
Volume: 11
Issue: 2
Page: 585-592
Publish at: 2018-08-01

Fairness Comparison of TCP Variants over Proactive and Reactive Routing Protocol in MANET

10.11591/ijece.v8i4.pp2199-2206
Nahida Nigar , Muhammad Anwarul Azim
Mobile ad hoc networks (MANETs) are applicable in an infrastructureless environment where the mobile devices act as routers and intermediate nodes are used to transfer segments to their final destination. As Transmission control protocol (TCP) was originated for Internet with fundamentally different properties, faces serious challenges when used in mobile ad hoc networks. TCP functionality degrades, due to special properties of MANET such as route failure because of significant change of network topology and link errors. TCP uses Congestion Control Algorithms; TCP Vegas is one of them which claim to have better throughput comparing with other TCP variants in a wired network. Fairness issues of TCP Variants in MANET including existing routing protocol are still unsolved. To determine the best TCP Variants in MANET environment over renowned routing protocol is the main objective of this paper. A Study on the throughput fairness of TCP Variants namely, Vegas, Reno, New Reno, SACK, FACK, and Cubic are performed via simulation experiment using network simulator (ns-2) over existing routing protocol, named, AODV, AOMDV, DSDV, and DSR. This fairness evaluation of TCP flows arranged a contrast medium for the TCP Variants using stated routing protocol in MANET. However, TCP Vegas obtain unfair throughput in MANET. The simulation results show that TCP Reno outperforms other TCP variants under DSDV routing protocol.
Volume: 8
Issue: 4
Page: 2199-2206
Publish at: 2018-08-01

Clustering Prediction Techniques in Defining and Predicting Customers Defection: The Case of E-Commerce Context

10.11591/ijece.v8i4.pp2367-2383
Ait Daoud Rachid , Amine Abdellah , Bouikhalene Belaid , Lbibb Rachid
With the growth of the e-commerce sector, customers have more choices, a fact which encourages them to divide their purchases amongst several e-commerce sites and compare their competitors’ products, yet this increases high risks of churning. A review of the literature on customer churning models reveals that no prior research had considered both partial and total defection in non-contractual online environments. Instead, they focused either on a total or partial defect. This study proposes a customer churn prediction model in an e-commerce context, wherein a clustering phase is based on the integration of the k-means method and the Length-Recency-Frequency-Monetary (LRFM) model. This phase is employed to define churn followed by a multi-class prediction phase based on three classification techniques: Simple decision tree, Artificial neural networks and Decision tree ensemble, in which the dependent variable classifies a particular customer into a customer continuing loyal buying patterns (Non-churned), a partial defector (Partially-churned), and a total defector (Totally-churned). Macro-averaging measures including average accuracy, macro-average of Precision, Recall, and F-1 are used to evaluate classifiers’ performance on 10-fold cross validation. Using real data from an online store, the results show the efficiency of decision tree ensemble model over the other models in identifying both future partial and total defection.
Volume: 8
Issue: 4
Page: 2367-2383
Publish at: 2018-08-01

Relay Based Performance Metrics of Bluetooth Scatternet Scheduling

10.11591/ijeecs.v11.i2.pp469-474
Ramachandran Kanagavalli , B. Sankaragomathi
Bluetooth is an emerging mobile ad-hoc network that accredits wireless communication to connect various short range devices.  A single hop network called piconet is the basic communication topology of bluetooth which allows only eight active devices for communication among them seven are active slaves controlled by one master. Multiple piconets are interconnected through a common node, known as Relay, to form a massive network called as Scatternet. It is obvious that the performance of Scatternet scheduling is highly dependent and directly proportionate with the performance of the Relay node.  In contrary, by reducing the number of Relays, it may lead to poor performance, since every Relay has to perform and support several piconet connections.  The primary focus of this study is to observe the performance metrics that affects the inter-piconet scheduling since the Relay node’s role is like switch between multiple piconets. In this paper, we address and analyze the performance issues to be taken into consideration for efficient data flow in Scatternet based on Relay node.
Volume: 11
Issue: 2
Page: 469-474
Publish at: 2018-08-01

A Miniature RFID Antenna at UHF Band using Meander-Line Technique

10.11591/ijece.v8i4.pp2280-2289
Y. Gmih , Y. El Hachimi , M. Makroum , A. Fachi
This paper displays a new design of a small antenna proposed for radio-frequency identification (RFID) applications in the UHF band (ultra-high frequency). Our antenna is constituted of two rectangular patches linked together with a meander line. Using this technique reduction in antenna size of equal to 62% with respect to the conventional antenna was achieved. The antenna has a simple structure and small antenna size of 60 x 74mm2 or 0.184 λ0 x 0.226 λ0. It has been fabricated on a low-cost FR4 substrate and measured to validate the simulation performances.The measured bandwidth is around 54.4 MHz (889.3 - 943.7 MHz) with reflection coefficient less than 10 dB, which covers all of the American RFID band (902 - 928 MHz), Chinese RFID band (920.5 - 924.5 MHz), Korea Republic and Japan RFID band ( 917 - 923.5 MHz).The design and simulations have been effected by electromagnetic simulators HFSS and CST microwave studio. A good accord is getting between the simulated and measured results. This antenna is intended for the reader of RFID applications.
Volume: 8
Issue: 4
Page: 2280-2289
Publish at: 2018-08-01

A Blind Multiple Watermarks based on Human Visual Characteristics

10.11591/ijece.v8i4.pp2578-2587
Ferda Ernawan , Siau-Chuin Liew , Zuriani Mustaffa , Kohbalan Moorthy
Digital watermarking is an alternative solution to prevent unauthorized duplication, distribution and breach of ownership right. This paper proposes a watermarking scheme for multiple watermarks embedding. The embedding of multiple watermarks use a block-based scheme based on human visual characteristics. A threshold is used to determine the watermark values by modifying first column of the orthogonal U matrix obtained from Singular Value Decomposition (SVD). The tradeoff between normalize cross-correlation and imperceptibility of watermarked image from quantization steps was used to achieve an optimal threshold value. The results show that our proposed multiple watermarks scheme exhibit robustness against signal processing attacks. The proposed scheme demonstrates that the watermark recovery from chrominance blue was resistant against different types of attacks.
Volume: 8
Issue: 4
Page: 2578-2587
Publish at: 2018-08-01

Propagation Path Loss Modeling and Outdoor Coverage Measurements Review in Millimeter Wave Bands for 5G Cellular Communications

10.11591/ijece.v8i4.pp2254-2260
Mohammed B. Majed , Tharek A. Rahman , Omar Abdul Aziz
The global bandwidth inadequacy facing wireless carriers has motivated the exploration of the underutilized millimeter wave (mm-wave) frequency spectrum for future broadband cellular communication networks, and mmWave band is one of the promising candidates due to wide spectrum. This paper presents propagation path loss and outdoor coverage and link budget measurements for frequencies above 6 GHz (mm-wave bands) using directional horn antennas at the transmitter and omnidirectional antennas at the receiver. This work presents measurements showing the propagation time delay spread and path loss as a function of separation distance for different frequencies and antenna pointing angles for many types of real-world environments. The data presented here show that at 28 GHz, 38 GHz and 60 GHz, unobstructed Line of Site (LOS) channels obey free space propagation path loss while non-LOS (NLOS) channels have large multipath delay spreads and can utilize many different pointing angles to provide propagation links. At 60 GHz, there is more path loss and smaller delay spreads. Power delay profiles PDPs were measured at every individual pointing angle for each TX and RX location, and integrating each of the PDPs to obtain received power as a function of pointing angle. The result shows that the mean RMS delay spread varies between 7.2 ns and 74.4 ns for 60 GHz and 28 GHz respectively in NLOS scenario.
Volume: 8
Issue: 4
Page: 2254-2260
Publish at: 2018-08-01

K-NN Classification of Brain Dominance

10.11591/ijece.v8i4.pp2494-2502
Khairul Amrizal Abu Nawas , Mahfuzah Mustafa , Rosdiyana Samad , Dwi Pebrianti , Nor Rul Hasma Abdullah
The brain dominance is referred to right brain and left brain. The brain dominance can be observed with an Electroencephalogram (EEG) signal to identify different types of electrical pattern in the brain and will form the foundation of one’s personality. The objective of this project is to analyze brain dominance by using Wavelet analysis. The Wavelet analysis is done in 2-D Gabor Wavelet and the result of 2-D Gabor Wavelet is validated with an establish brain dominance questionnaire. Twenty-one samples from University Malaysia Pahang (UMP) student are required to answer the establish brain dominance questionnaire has been collected in this experiment. Then, brainwave signal will record using Emotiv device. The threshold value is used to remove the artifact and noise from data collected to acquire a smoother signal. Next, the Band-pass filter is applied to the signal to extract the sub-band frequency components from Delta, Theta, Alpha, and Beta. After that, it will extract the energy of the signal from image feature extraction process. Next the features were classified by using K-Nearest Neighbor (K-NN) in two ratios which 70:30 and 80:20 that are training set and testing set (training: testing). The ratio of 70:30 gave the highest percentage of 83% accuracy while a ratio of 80:20 gave 100% accuracy. The result shows that 2-D Gabor Wavelet was able to classify brain dominance with accuracy 83% to 100%.
Volume: 8
Issue: 4
Page: 2494-2502
Publish at: 2018-08-01
Show 1405 of 1983

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration