Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,082 Article Results

Designing Framework for Standardization Case Study: Lithium-Ion Battery Module in Electric Vehicle Application

10.11591/ijece.v8i1.pp220-226
Wahyudi Sutopo , Evizal Abdul Kadir
Standardization is one of the important things before to deploy a product. Regulation such as national standard has important roles in industry. The roles of standard such as ensuring safety for consumer and producer, increasing product competitiveness, and reducing trade berries. Indonesia is currently in the stage of developing industry of electric vehicle, so that standard which is related to electric vehicle, one of it is standard for the electric vehicle battery. Besides that, Indonesia does not have a relevant standard to regulate. This study is intended to make a framework for standardization of lithium-ion battery module product using A Framework for Analysis, Comparison, and Testing of Standard (FACTS) approach. There are three stages in FACTS approach, they are analysis, comparison, and testing. Based on the result of this research, the framework of lithium-ion battery module product standard consists of 8 parameters.
Volume: 8
Issue: 1
Page: 220-226
Publish at: 2018-02-01

A Carrierless Amplitude Phase (CAP) Modulation Format: Perspective and Prospect in Optical Transmission System

10.11591/ijece.v8i1.pp585-595
N. M. Ridzuan , M. F. L. Abdullah , M. B. Othman , M. B. Jaafar
The explosive demand of broadband services nowadays requires data communication systems to have intensive capacity which subsequently increases the need for higher data rate as well. Although implementation of multiple wavelengths channels can be used (e.g. 4 × 25.8 Gb/s for 100 Gb/s connection) for such desired system, it usually leads to cost increment issue which is caused by employment of multiple optical components. Therefore, implementation of advanced modulation format using a single wavelength channel has become a preference to increase spectral efficiency by increasing the data rate for a given transmission system bandwidth. Conventional advanced modulation format however, involves a degree of complexity and costly transmission system. Hence, carrierless amplitude phase (CAP) modulation format has emerged as a promising advanced modulation format candidate due to spectral efficiency improvement ability with reduction of optical transceiver complexity and cost. The intriguing properties of CAP modulation format are reviewed as an attractive prospect in optical transmission system applications.
Volume: 8
Issue: 1
Page: 585-595
Publish at: 2018-02-01

Performances Concatenated LDPC based STBC-OFDM System and MRC Receivers

10.11591/ijece.v8i1.pp622-630
Nejwa El Maammar , Seddik Bri , Jaouad Foshi
This paper presents the bit error rate performance of the low density parity check (LDPC) with the concatenation of convolutional channel coding based orthogonal frequency-division-multiplexing (OFDM) using space time block coded (STBC). The OFDM wireless communication system incorporates 3/4-rated convolutional encoder under various digital modulations (BPSK, QPSK and QAM) over an additative white gaussian noise (AWGN) and fading (Raleigh and Rician) channels. At the receiving section of the simulated system, Maximum Ratio combining (MRC) channel equalization technique has been implemented to extract transmitted symbols without enhancing noise power.
Volume: 8
Issue: 1
Page: 622-630
Publish at: 2018-02-01

Computer Aided Diagnosis for Screening the Shape and Size of Leukocyte Cell Nucleus based on Morphological Image

10.11591/ijece.v8i1.pp150-158
Retno Supriyanti , Alfin Chrisanty , Yogi Ramadhani , Wahyu Siswandari
Hematology tests are examinations that aim to know the state of blood and its components, one of which is leukocytes. Hematologic examinations such as the number and morphology of blood generally still done manually, especially by a specialist pathologist. Despite the fact that today there is equipment that can identify morphological automatically, but for developing countries like Indonesia, it can only be done in the capital city. Low accuracy due to the differences identified either by doctors or laboratory staff, makes a great reason to use computer assistance, especially with the rapid technological developments at this time. In this paper, we will emphasize our experiment to screen leucocyte cell nucleus by identifying the contours of the cell nucleus, diameter, circumference and area of these cells based on digital image processing techniques, especially using the morphological image. The results obtained are promising for further development in the development of computer-aided diagnosis for identification of leukocytes based on a simple and inexpensive equipment.
Volume: 8
Issue: 1
Page: 150-158
Publish at: 2018-02-01

A Coalition-Formation Game Model for Energy-Efficient Routing in Mobile Ad-hoc Network

10.11591/ijece.v8i1.pp26-33
Abdelkabir Sahnoun , Ahmed Habbani , Jamal El Abbadi
One of the most routing problems in Mobile Ad-hoc Network is the node’s selfishness. Nodes are generally selfish and try to maximize their own benefit; hence these nodes refuse to forward packet on behalf of others to preserve their limited energy resources. This selfishness may lead to a low efficiency of routing. Therefore, it is important to study mechanisms which can be used encourage cooperation among nodes, to maintain the network efficiency. In this paper, we propose a cooperative game theoretic model to support more energy-aware and available bandwidth routing in MANET. We introduce a novel framework from coalitional-formation game theory, called hedonic coalition-formation game. We integrate this model to OLSR protocol that is an optimization over the classical link state protocol for the MANETs. Within each coalition, a coalition coordinator acts as a special MPR node to improve the energy efficient and the packet success rate of the transmission. Simulation results show how the proposed algorithm improve the performance in terms of the percentage of selected MPR nodes in the network, the percentage of alive nodes by time, and the Packet Delivery Ratio. Which prove that our proposed model leads, to better results compared to the classical OLSR.
Volume: 8
Issue: 1
Page: 26-33
Publish at: 2018-02-01

Design, Realization and Measurements of Compact Dual-band CPW-fed Patch Antenna for 2.45/5.80 GHz RFID Applications

10.11591/ijece.v8i1.pp172-178
Mohamed Tarbouch , Abdelkebir El Amri , Hanae Terchoune
In this paper, a Coplanar Wave Guide (CPW)-Fed microstrip octagonal patch antenna for RFID Applications is proposed. The studied structure is suitable for 2.45/5.80 GHz applications. The octagonal shape is obtained by making triangular cuts in the four angles of the rectangular microstrip patch antenna; in addition the using of CPW-Fed allows obtaining UWB characteristics in the higher band. The miniaturization in the antenna size for lower band is achieved by introducing an inverted E slot in the radiating element. The proposed antenna is designed on a single and a small substrate board of dimensions 29.5×29.5×1.6 mm3. Moreover the miniaturized antenna has a good impedance matching and an enhanced gain. The simulation analysis was performed using the CADFEKO software, a Method of Moment (MoM) based solver, and a prototype of this antenna was fabricated, good agreement with the simulation providing validation of the design procedure. The measurements are done with ANRITSU MS2026C Vectorial Network Analyzer.
Volume: 8
Issue: 1
Page: 172-178
Publish at: 2018-02-01

Symbolic-Connectionist Representational Model for Optimizing Decision Making Behavior in Intelligent Systems

10.11591/ijece.v8i1.pp326-332
R. John Martin , Sujatha Sujatha
Modeling higher order cognitive processes like human decision making come in three representational approaches namely symbolic, connectionist and symbolic-connectionist. Many connectionist neural network models are evolved over the decades for optimizing decision making behaviors and their agents are also in place. There had been attempts to implement symbolic structures within connectionist architectures with distributed representations. Our work was aimed at proposing an enhanced connectionist approach of optimizing the decisions within the framework of a symbolic cognitive model. The action selection module of this framework is forefront in evolving intelligent agents through a variety of soft computing models. As a continous effort, a Connectionist Cognitive Model (CCN) had been evolved by bringing a traditional symbolic cognitive process model proposed by LIDA as an inspiration to a feed forward neural network model for optimizing decion making behaviours in intelligent agents. Significanct progress was observed while comparing its performance with other varients.
Volume: 8
Issue: 1
Page: 326-332
Publish at: 2018-02-01

Comparative Analysis of Linear Controllers used for Grid Connected PV System

10.11591/ijece.v8i1.pp513-520
Ritesh Dash , Sarat Chandra Swain , Sanhita Mishra
Requirement for electrical energy is increasing in a ramp function manner. To meet the steady increasing in energy demand it is required to find some alternate source of energy. Except the conventional source of energy one type of renewable energy i.e PV may be regarded as a clean source of energy to meet the energy demand. PV modules generating DC power cannot be directly connected to the electrical infrastructure as most of the grid infrastructure uses either 230volt or 120 volt. Therefore power electronic device most be connected (inverter) between PV and grid. In order to make a competitive market between the renewable generated power and conventional way of generating the power it is required to design a cost effective inverter, qualitative output which is pure sinusoidal and harmonics free. In this paper a comparative analysis among the various linear controllers are presented. Proposed Optimised PID Controller is Presented through MATLAB Simulink based environment.
Volume: 8
Issue: 1
Page: 513-520
Publish at: 2018-02-01

Force Multiplier Effect of Futuristic Battlefield Preparedness by Adapting the Internet of Things (IoT) Concept

10.11591/ijeecs.v9.i2.pp316-321
G Kannan , N Manoharan
The present-day Battlefield environment depicts a scenario wherein various heterogeneous warfighting vehicles/equipment are conglomerated, and the high command takes a decision based on the different inputs and data received from the warfighting entities.  This aspect generates voluminous data and communication directives occupying the complete frequency spectrum and moving up and down. This paper proposes a scheme based on the Internet of Things (IoT) philosophy.  The primary focus will be to deploy ubiquitous sensing enabled technologies (IoT) in all the battlefield fighting entities. This medium in effect means the interconnection of uniquely identifiable embedded computing-like devices and formulation of an internet infrastructure. The newly proposed IoT devices in all the battlefield fighting entities will gather, infer and understand in-situ commands and data and in turn pass on to the highest decision-making authority. A simple IoT based model will be deployed in the battlefield scenario enhancing the force multiplier effect.
Volume: 9
Issue: 2
Page: 316-321
Publish at: 2018-02-01

UDP Pervasive Protocol Implementation for Smart Home Environment on MyRIO using LabVIEW

10.11591/ijece.v8i1.pp113-123
Wijaya Kurniawan , Mochammad Hannats Hanafi Ichsan , Sabriansyah Rizqika Akbar
Smart Home concept is to connect several devices to perform control and the device to be controlled to help any human needs. So it should have one device being Host and several devices being Client. The environment in this case is a home that there is too much technology that planted technologies that has much influence at human activities is called pervasive computing. The device communication should be has a protocol, at the research used UDP protocol because it doesn't need to negotiate before performing communication like a TCP. With UDP behavior did not use to validate at every send or deliver data because at Smart Home environment doesn't need a large or big data being processed. LabView used at this research based on previous research, but MyRIO has used this research to perform Client and Host performed by PC. So it can measure how usable the design that created. This research proves that LabView and MyRIO successfully implemented with the design that created to perform Pervasive Computing for Smart Home environment. Functional testing scenario conducted by every condition that on system environment, based on design all testing scenario successfully and working as well as expected.
Volume: 8
Issue: 1
Page: 113-123
Publish at: 2018-02-01

Presentation of an Algorithm for Secure Data Transmission based on Optimal Route Selection during Electromagnetic Interference Occurrence

10.11591/ijece.v8i1.pp259-270
A. H. Poursoltan Mohammadi , M. Chehel Amirani , F. Faghihi
This paper proposes a comprehensive algorithm for secure data transmission via communication conductors considering route optimization, shielding and data authentication. Using of appropriate coding method causes more efficiency for suggested algorithm during electromagnetic field attack occurrence. In this paper, MOM simulation via FIKO software is done for field distribution. Due to critical situation of malfunctioning of data transferring, appropriate shield is designed and examined by shielding effectiveness (SE) criterion resulted of MOM simulation; finally to achieve reliability of data security, MAC hash function is used for space with field attack probability, turbo code is employed.
Volume: 8
Issue: 1
Page: 259-270
Publish at: 2018-02-01

Preferences based Customized Trust Model for Assessment of Cloud Services

10.11591/ijece.v8i1.pp304-325
Shilpa Deshpande , Rajesh Ingle
In cloud environment, many functionally similar cloud services are available. But, the services differ in Quality of Service (QoS) levels, offered by them. There is a diversity in user requirements about the expected qualities of cloud services. Trust is a measure to understand whether a cloud service can adequately meet the user requirements. Consequently, trust assessment plays a significant role in selecting the suitable cloud service. This paper proposes preferences based customized trust model (PBCTM) for trust assessment of cloud services. PBCTM takes into account user requirements about the expected quality of services in the form of preferences. Accordingly, it performs customized trust assessment based on the evidences of various attributes of cloud service. PBCTM enables elastic trust computation, which is responsive to dynamically changing user preferences with time. The model facilitates dynamic trust based periodic selection of cloud services according to varying user preferences. Experimental results demonstrate that the proposed preferences based customized trust model outperforms the other model in respect of accuracy and degree of satisfaction.
Volume: 8
Issue: 1
Page: 304-325
Publish at: 2018-02-01

A Sense-based Registration Process for TDMA in IEEE 802.11 Network

10.11591/ijece.v8i1.pp355-359
Rizal Fathoni Aji , Heru Suhartanto , Setiadi Yazid
TDMA implementation offer better fairness and throughput in IEEE 802.11. To implement TDMA, new registration process is needed, because current registration mechanism can disrupt TDMA process. This paper proposes a sense-based TDMA registration process using service slot and random timer. Simulation result shows, by using our mechanism, we can reduce the number of unused timeslot, and for 10 new nodes, each node only need 7 ms to complete the registration process.
Volume: 8
Issue: 1
Page: 355-359
Publish at: 2018-02-01

A Minimum Cloud Cover Mosaic Image Model of the Operational Land Imager Landsat-8 Multitemporal Data using Tile based

10.11591/ijece.v8i1.pp360-371
Ratih Dewanti Dimyati , Projo Danoedoro , Hartono Hartono , Kustiyo Kustiyo
The need for remote sensing minimum cloud cover or cloud free mosaic images is now increasing in line with the increased of national development activities based on one map policy. However, the continuity and availability of cloud and haze free remote sensing data for the purpose of monitoring the natural resources are still low. This paper presents a model of medium resolution remote sensing data processing of Landsat-8 uses a new approach called mosaic tile based model (MTB), which is developed from the mosaic pixel based model (MPB) algorithm, to obtain an annual multitemporal mosaic image with minimum cloud cover mosaic imageries. The MTB model is an approach constructed from a set of pixels (called tiles) considering the image quality that is extracted from cloud and haze free areas, vegetation coverage, and open land coverage of multitemporal imageries. The data used in the model are from Landsat-8 Operational Land Imager (OLI) covering 10 scenes area, with 2.5 years recording period from June 2015 to June 2017; covered Riau, West Sumatra and North Sumatra Provinces. The MTB model is examined with tile size of 0.1 degrees (11x11 km2), 0.05 degrees (5.5x5.5 km2), and 0.02 degrees (2.2x2.2 km2). The result of the analysis shows that the smallest tile size 0.02 gives the best result in terms of minimum cloud cover and haze (or named clear area). The comparison of clear area values to cloud cover and haze for three years (2015, 2016 and 2017) for the three mosaic images of MTB are 68.2%, 78.8%, and 86.4%, respectively.
Volume: 8
Issue: 1
Page: 360-371
Publish at: 2018-02-01

Feature Selection Mammogram based on Breast Cancer Mining

10.11591/ijece.v8i1.pp60-69
Shofwatul Uyun , Lina Choridah
The very dense breast of mammogram image makes the Radiologists often have difficulties in interpreting the mammography objectively and accurately. One of the key success factors of computer-aided diagnosis (CADx) system is the use of the right features. Therefore, this research emphasizes on the feature selection process by performing the data mining on the results of mammogram image feature extraction. There are two algorithms used to perform the mining, the decision tree and the rule induction. Furthermore, the selected features produced by the algorithms are tested using classification algorithms: k-nearest neighbors, decision tree, and naive bayesian with the scheme of 10-fold cross validation using stratified sampling way. There are five descriptors that are the best features and have contributed in determining the classification of benign and malignant lesions as follows: slice, integrated density, area fraction, model gray value, and center of mass. The best classification results based on the five features are generated by the decision tree algorithm with accuracy, sensitivity, specificity, FPR, and TPR of 93.18%; 87.5%; 3.89%; 6.33% and 92.11% respectively.
Volume: 8
Issue: 1
Page: 60-69
Publish at: 2018-02-01
Show 1426 of 1939

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration