Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,734 Article Results

Protecting Data by Improving Quality of Stego Image based on Enhanced Reduced difference Expansion

10.11591/ijece.v8i4.pp2468-2476
Maurice Ntahobari , Tohari Ahmad
In this era of internet development, security of information sharing is the main problem faced by human being. Data hiding technique is one of the solutions. However, hiding credential information within a multimedia file such as image reduces its visual quality. Therefore, unauthorized users may suspect the existance of secret data within that image. In the past years, various data hiding algorithms have been developed by researchers to overcome the problem of high distortion of image after data embedding process. Achieving a high quality stego image, however, is still a challenging problem. In this paper, we proposed a new data hiding algorithm based on different expansion. It aims to enhance the quality of stego image for a given payload size. The new algorithm is evaluated on various medical images. Thereafter, the experimental results show that the visual quality is improved; and increasing the embedding capacity leads to more noises. Therefore, a better choice of base point and a reduced difference expansion affect the quality of stego image.
Volume: 8
Issue: 4
Page: 2468-2476
Publish at: 2018-08-01

Wireless Sensor Network Design for Earthquake’s and Landslide’s Early Warnings

10.11591/ijeecs.v11.i2.pp437-445
Haziel Latupapua , Andrias Izaac Latupapua , Abdi Wahab , Mudrik Alaydrus
Indonesia including the earthquake-prone areas because Indonesia is situated between three tectonic plates and in the Maluku island it self has a fault line 10 zones, the impact of frequent tectonic earthquake on the island of Maluku resulted in a domino effect, such as the frequent occurrence of soil landslides at several points in the city of Ambon, and due to faults that occur lead ease rising sea levels to population centers so Ambon was becoming flooded. This research aims to design and analyzing measurements of earthquake monitoring system indication and landslides integrated via Wireless Sensor Network (WSN) by implementing a star topology, technology, ZigBee, WiFi technology Shield and GPRS (General Packet Radio Service). Researchers technology utilizes Wireless Sensor Network (WSN) to acquire and distribute widely the data to be monitored and controlled centrally.By detecting suspicious indicators such as tremor or landslides through nodes or end devices, the system provides information to the number of monitors and warnings. The system can also be accessed in real-time via the website by accessing the IP address of the Wireless-LAN devices Wi-Fi Arduino Shield.
Volume: 11
Issue: 2
Page: 437-445
Publish at: 2018-08-01

Intelligent Agent Simulator in Massive Crowd

10.11591/ijeecs.v11.i2.pp577-584
Mohamad, S , Nasir, F.M , Sunar, M.S. , Isa, K. , Hanifa, R.M. , Shah, S.M. , Ribuan, M.N. , Ahmad, A.
Crowd simulations have many benefits over real-life research such as in computer games, architecture and entertainment. One of the key elements in this study is to include elements of decision-making into the crowd. The aim of this simulator is to simulate the features of an intelligent agent to escape from crowded environments especially in one-way corridor, two-way corridor and four-way intersection. The addition of the graphical user interface enables intuitive and fast handling in all settings and features of the Intelligent Agent Simulator and allows convenient research in the field of intelligent behaviour in massive crowd. This paper describes the development of a simulator by using the Open Graphics Library (OpenGL), starting from the production of training data, the simulation process, until the simulation results. The Social Force Model (SFM) is used to generate the motion of agents and the Support Vector Machine (SVM) is used to predict the next step for intelligent agent.
Volume: 11
Issue: 2
Page: 577-584
Publish at: 2018-08-01

Comparison of Chemical Compounds of Essential Oils from Natural Agarwood and Inoculated Agarwood (Roselle-Based Inoculation)

10.11591/ijeecs.v11.i2.pp677-681
N.R.M. Nasardin , M.A.M. Hanafiah , M. Zainon , M. Ibrahim , A.I.A. Rahman , Z.A. Baharudin , M.H.M. Husin , I. Mahir , A.A. Zulkefle
In this paper, the physical and structural properties of the natural agarwood and inoculated agarwood using Roselle-based inoculation had been discussed. The results showed that a high volume of oil obtained on day 1 by the inoculated agarwood which yielded 3ml of the agarwood oil as compared to the natural agarwood that had yielded only 2.3ml. In the chemical analysis, five major compounds were detected by FTIR which were C-O bond (aromatic alkane), C-C stretching (aromatic alkane), C-O stretching (ether) and C-H bond (aromatic ring) in both oils. Moreover, the inoculated agarwood exhibited better oil production compared to the natural agarwood.
Volume: 11
Issue: 2
Page: 677-681
Publish at: 2018-08-01

An Integrated Cross Layer Design to Enhance the Quality of Service of Video Streaming in Mobile Adhoc Networks

10.11591/ijict.v7i2.pp57-62
N. Gomathi , M. Uvaneshwari
The intent of this paper is to put forth a novel technique for improvising the QoS of multimedia applications in by using Modified dynamic mapping algorithm and Multipath transport(MPT) and Multi Description Coding(MDC). The improvement is attained by applying the MDC at application layer along with UDPLite in transport layer and multipath at network layer and Modified dynamic mapping in MAC Layer.Thismethod attains an increase of 30.84% in Peak Signal to Noise Ratio (PSNR) and 18.57% decrease in delay in contrast to the conventional methods.
Volume: 7
Issue: 2
Page: 57-62
Publish at: 2018-08-01

Performance Investigation of Channel Noise Effect in Data Transmission Medium Using Signal to Noise Ratio (SNR)

10.11591/ijeecs.v11.i2.pp419-423
Gebremedhn wubet wagaye
The noise introduced in the channel obviously affects the bit error rate of the communication system and this has direct impact in the security. Here the main problem is that the receiver terminal decoding techniques can lead to wrong interpretation even if the Bit Error Rate (BER) is acceptable. So the main idea here is to introduce high values of Signal to Noise Ratio (SNR) that can improve the bit error rate which exists due to the noise introduced in the wireless channel.
Volume: 11
Issue: 2
Page: 419-423
Publish at: 2018-08-01

Disruptive Technology: The Future of SMS Technology

10.11591/ijeecs.v11.i2.pp665-671
Cik Ku Haroswati Binti Che Ku Yahaya , Murizah Kassim , Hasnorhafiza Husni
The research illustrates a view on the current trends in the telecommunication industry focusing on the matter of Short Message Service (SMS) technology. It targets and explains disruptive technology and also introduces disruptive technology in Short Message Service (SMS). The methodology of this research is market trend analysis using data on volume of Short Message Service (SMS) sent and received through a mobile network and a survey that was conducted with questionnaires. The findings are Short Message Service (SMS) is predicted to become obsolete and be disrupted by Over the Top (OTT) messaging application by the third quarter of the year 2020. This was implemented with linear regression prediction. By the survey a new trend of using Short Message Service (SMS) has emerged but users have certainly moved away from SMS and now prefer texting Over the Top (OTT) messaging applications.
Volume: 11
Issue: 2
Page: 665-671
Publish at: 2018-08-01

Opinion Mining of Light Rail Transit Development in Indonesia

10.11591/ijeecs.v11.i2.pp791-796
Sarifah Putri Raflesia , Dinda Lestarini , Firdaus Firdaus , Desty Rodiah
Light rail transit (LRT), or fast tram is urban public transport using rolling stock similar to a tramway, but operating at a higher capacity, and often on an exclusive right-of-way. Indonesia as one of developing countries has been developed the LRT in two cities of Indonesia, Palembang and Jakarta. There are opinions toward the development of LRT, negative and positive opinions. To reveal the level of LRT development acceptance, this research uses machine learning approach to analyze the data which is gathered through social media. By conducting this paper, the data is modeled and classified in order to analyze the social sentiment towards the LRT development.
Volume: 11
Issue: 2
Page: 791-796
Publish at: 2018-08-01

Novel UWB Microstrip Antenna Structures with Defected Ground Structure

10.11591/ijeecs.v11.i2.pp429-436
Saida Elajoumi , A. Tajmouati , J. Zbitou , A. Errkik , L. El Abdellaoui , A.M. Sanchez
This paper presents the design of new compact printed antennas for Ultra Wide Band applications, fed with a microstrip-line. The proposed designs consist of a patch antenna with defected ground, which are fed by 50Ω microstrip transmission line. The frequency range is 3.1-10.6 GHz which is the Federal Communication Commission (FCC) band of UWB. The proposed antennas are easy for integration with microwave circuits. They are validated into simulation by using two electromagnetic solvers CST-MW and Ansoft HFSS. The simulated input impedance bandwidth ranging 3GHz to more than 14 GHz is obtained with return loss less -10dB, and exhibits good UWB characteristics. The measured parameters are good agreement with the simulation. Therefore these antennas offer excellent performance for UWB system.
Volume: 11
Issue: 2
Page: 429-436
Publish at: 2018-08-01

Evaluation Review on Effectiveness and Security Performances of Text Steganography Technique

10.11591/ijeecs.v11.i2.pp747-754
Roshidi Din , Sunariya Utama , Aida Mustapha
Steganography is one of the categories in information hiding that is implemented to conceal the hidden message to ensure it cannot be recognized by human vision. This paper focuses on steganography implementation in text domain namely text steganography. Text steganography consists of two groups, which are word-rule based and feature-based techniques. This paper analysed these two categories of text steganography based on effectiveness and security evaluation because the effectiveness is critically important in order to determine that technique has the appropriate quality. Meanwhile, the security is important due to the intensity performance in securing the hidden message. The main goal of this paper is to review the evaluation of text steganography in terms of effectiveness and security that have been developed by previous research efforts. It is anticipated that this paper will identify the performance of text steganography based on effectiveness and security measurement.
Volume: 11
Issue: 2
Page: 747-754
Publish at: 2018-08-01

Resonant Configuration Topology Exploration for Inductive Link Power Transfer

10.11591/ijeecs.v11.i2.pp522-530
S. Hafiz , Zarimin Zaharudin , Sheroz Khan , Nur Shahida Binti Midi , John Tan Teng Hwang , Kushsairy Abdul Kadir , Jawad Ali Shah
This paper investigates the performance of circuit topology used in wireless power applications to optimize the level of maximum efficiency. We analyse the series and the parallel resonant topologies for use in an inductive coupling link to derive power transfer efficiency expressions verified using MATLAB. We look into the two topologies into the link under resonant conditions for selectively supplying the device with power. The results are obtained analytically which are verified subsequently by MATLAB simulation. We then analyse the links to see how maximum power transfer efficiency for a given pair of coils can be achieved. The topology at a given tuning frequency is used for powering a selected resistive load. The method is presented using a given pair of coils simulated and the results agree well with the theoretical explanation and derivations.
Volume: 11
Issue: 2
Page: 522-530
Publish at: 2018-08-01

Mining the Web Data for Classifying and Predicting Users’ Requests

10.11591/ijece.v8i4.pp2390-2398
Girish S , Ramamurthy B , Senthilnathan T
Consumers are the most important asset of any organization. The commercial activity of an organization booms with the presence of a loyal customer who is visibly content with the product and services being offered. In a dynamic market, understanding variations in client’s behavior can help executives establish operative promotional campaigns. A good number of new consumers are frequently picked up by traders during promotions. Though, several of these engrossed consumers are one-time deal seekers, the promotions undeniably leave a positive impact on sales. It is crucial for traders to identify who can be converted to loyal consumer and then have them patronize products and services to reduce the promotion cost and increase the return on investments. This study integrates a classifier that allows prediction of the type of purchase that a customer would make, as well as the number of visits that he/she would make during a year. The proposed model also creates outlines of users and brands or items used by them. These outlines may not be useful only for this particular prediction task, but could also be used for other important tasks in e-commerce, such as client segmentation, product recommendation and client base growth for brands.
Volume: 8
Issue: 4
Page: 2390-2398
Publish at: 2018-08-01

Mixed Linearity Improvement Techniques for Ultra-wideband Low Noise Amplifier

10.11591/ijece.v8i4.pp2038-2045
Mohammed Nadhim Abbas , Farooq Abdulghafoor Khaleel
We present the linearization of an ultra-wideband low noise amplifier (UWB-LNA) operating from 2GHz to 11GHz through combining two linearization methods. The used linearization techniques are the combination of post-distortion cancellation and derivative-superposition linearization methods. The linearized UWB-LNA shows an improved linearity (IIP3) of +12dBm, a minimum noise figure (NFmin.) of 3.6dB, input and output insertion losses (S11 and S22)  below -9dB over the entire working bandwidth, midband gain of 6dB at 5.8GHz, and overall circuit power consumption of 24mW supplied from a 1.5V voltage source. Both UWB-LNA and linearized UWB-LNA designs are verified and simulated with ADS2016.01 software using BSIM3v3 TSMC 180nm CMOS model files. In addition, the linearized UWB-LNA performance is compared with other recent state-of-the-art LNAs.
Volume: 8
Issue: 4
Page: 2038-2045
Publish at: 2018-08-01

Scattering Regimes for Underwater Optical Wireless Communications using Monte Carlo Simulation

10.11591/ijece.v8i4.pp2571-2577
F. Jasman , A. M. Zaiton , Z. Ahmad , Z. Rihawi
Optical wireless communications has shown tremendous potential for underwater applications as it can provide higher bandwidth and better security compared to acoustic technologies. In this paper,  an investigation on scattering regimes for underwater links using Monte Carlo simulation has been presented.While the focus of this paper is on diffuse links, the simulation results of collimated links is also provided for comparison purpose. Three types of water namely clear, coastal and turbid water are being used in the simulation. It is shown that the effect of scattering on the path loss cannot be accurately modeled by the existing channel model; ie. Beers-Lambert (BL) law.  It has been shown that  the distance at which the unscattered light drops to zero can be used to estimate the transition point for the scattering regimes in case of diffuse links. The transition point for diffuse links in coastal water and turbid water can be estimated to be around 22 m and 4 m respectively. Further analysis on the scattering order probability at different scattering regimes illustrates how scattering is affected by beam size, water turbidity and distance. From the frequency response plot, it is estimated that the bandwidth of several order of GHz can be achieved when the links are operating in the minimal scattering region and will reduce to several hundreds of MHz when the link is operating in multiple scattering region.
Volume: 8
Issue: 4
Page: 2571-2577
Publish at: 2018-08-01

Design and Implementation of an Electrical Lift Controlled using PLC

10.11591/ijece.v8i4.pp1947-1953
Mohammed Hasan Ali
This paper represents the possibility of controlling an electrical elevator model using PLC and studying some parameters to ensure its work, this model have been designed and constructed to perform a completed elevator work in an automating technique according to its programming and controlling method that making the connecting much more easier and safer than real relays and complicated wiring method. As well as the small DC motor drive (gear box) electrical motor that used  to drive the elevator cabinet which made the transition from floor to floor much smoother and much efficient than the traditional elevators.
Volume: 8
Issue: 4
Page: 1947-1953
Publish at: 2018-08-01
Show 1415 of 1983

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration