Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,287 Article Results

Analyzing the Sea Weather Effects to the Ship Maneuvering in Vietnam’s Sea from BinhThuan Province to Ca Mau Province Based on Fuzzy Control Method

10.12928/telkomnika.v16i2.7753
Xuan Kien; Ho Chi Minh City University of Transport Dang , Le Anh-Hoang; Ho Chi Minh City University of Transport Ho , Viet-Dung; Ho Chi Minh City University of Transport Do
Vietnam is located in the tropical monsoon climate, so there are many storms affecting the marine environment each year. However, Vietnam’s sea also has distinct characteristics due to the continental shelf factors, salinity, sea currents and viscosity water. In this paper, the sea weather effects to the ship in the sea area from BinhThuan province to Ca Mau province are analyzed. Specifically, wave, wind and current which are the three main factors affecting the safety of ship are thoroughly examined. Importantly, the survey parameters have been built from the actual operating environment. In addition, maintaining the stability of dynamic positioning system in Vietnam weather conditions is the main point of this study.
Volume: 16
Issue: 2
Page: 533-543
Publish at: 2018-04-01

Design Flexural Piezoelectric Acoustic Transducers Array based d33 Mode Polarization

10.11591/ijeecs.v10.i1.pp59-65
K.A. Ahmad , A. Abd Manaf , Z. Hussain Hussain , Z. Janin
Piezoelectric Acoustic Transducer (PAT) is a transducers used in many application such as medical diagnostic, medical ultrasonic imaging and underwater acoustic applications. Latest research, PAT were investigated in marine application and underwater acoustic imaging. Conventional PAT is design based on sensing element, Piezoelectric Material, matching layer and backing layer. But the conventional method still has problem with issues of narrow bandwidth, directivity and low sensitivity. This problem is occurred when the transducer need to increase the image resolution. The size of single element will become smaller to meet the requirement of high resolution. PZT-5H have high piezoelectric constant (d31) and low dielectric loss. It is chosen as sensing element in this design of PAT because it will increase the sensitivity of transducers. The PAT is design based on d33 mode polarization to improve the receiving sensitivity. The fabrication process are included wet etching on Printed Circuit Board (PCB), spin coated Polydimethylsiloxane (PDMS), and baked transducer on hot plate. PAT is characterized using Pulse-Echo method. Pulse-Echo method will determine the sensitivity, directivity and operating bandwidth of acoustic transducers in underwater applications. Open circuit receiving voltage (OCRV) is voltage response to determine the sensitivity of acoustic transducer. The commercial projector and hydrophone will calibrate to obtain the reliability of result. In cross talk test, at some particular frequency, Pin 2 and Pin 3 have low sensitivity value. It is because Pin 2 and Pin 3 received low acoustic wave pressure. The PAT array based d33 mode polarization shows it has more receiving sensitive compared to commercial acoustic transducers. The design transducer has sensitivity at -56 dB re 1V/µPa at resonance frequency, 100kHz and fractional bandwidth at 30%.
Volume: 10
Issue: 1
Page: 59-65
Publish at: 2018-04-01

Anomaly Detection in Log Records

10.11591/ijeecs.v10.i1.pp343-347
Poonam Ghuli
Complex software systems are continuously generating application and server logs for the events which had occurred in the past. These logs generated and can be utilized for anomaly and intrusion detection. These log files can be used for anomaly or outlier detection. Certain types of abnormalities or exceptions such as spikes in HTTP requests, number of exceptions raised in logs, etc. All these events are logged into the log files for further analysis. These types of events are generally used for predicting the anomalies in future. The developed prototype assumes that the user inputs log records in a standard apache log format. At first the user uploads the log file for outlier detection. Next, a prototype is developed to get the number of HTTP requests for outlier detection. Then anomalies in number of HTTP requests are detected using three techniques namely InterQuartileRange method, Moving averages and Median Absolute deviation. Once the outliers are detected, these outliers are removed from the current dataset. This output is given as input to the Multilayer Perceptron model to predict the number of HTTP requests at the next timestamp 
Volume: 10
Issue: 1
Page: 343-347
Publish at: 2018-04-01

Voltage Stability Prediction on Power Networks using Artificial Neural Networks

10.11591/ijeecs.v10.i1.pp1-9
Gitanjali Saha , Kabir Chakraborty , Priyanath Das
 The objective of this paper is to predict the secure or the insecure state of the power system network using a hybrid technique which is a combination of Artificial Neural Network (ANN) and voltage stability indexes. Voltage collapse or an uncontrollable drop in voltage occurs in a system when there is a change in the condition of the system or a system is overloaded. A Transference Index (TI) which acts as a voltage stability indicator has been formulated from the equivalent two-bus network of a multi-bus power system network, which has been tested on a standard IEEE 30-bus system and the result is validated with a standard Fast Voltage Stability Index (FVSI). FACTS devices in the critical bus have been considered for the improvement of the voltage stability of the system. An ANN based supervised learning algorithm has been conferred in this paper alongside Contingency Analysis (CA) for the prediction of voltage security in an  IEEE 30 - bus power system network. 
Volume: 10
Issue: 1
Page: 1-9
Publish at: 2018-04-01

Ant Based Cross Layered Optimization Protocol for WMSN with Fuzzy Clustering

10.11591/ijeecs.v10.i1.pp295-301
DipaliParag Adhyapak , Sridharan Bhavani , Aparna Pradeep Laturkar
Wireless Multimedia Sensor Network (WMSN) is embedded with large number of Audio, Video and scalar sensor nodes which can able to retrieve the multimedia information from the environment. WMSN has several challenges such as life time of the network, Memory requirement, Coverage, Bandwidth and QoS metrics. Hence selection of routing algorithm is crucial in WMSN. Again interdependencies of the protocol layer cannot be neglected to improve the network performance. Clustering in WMSN is challenging task in order to increase network lifetime and to improve the communication. Hence Fuzzy clustered Ant based cross layer protocol (FCAXL) is proposed. In this paper performance analysis of ant based cross layer optimization protocol with fuzzy clustering based on number of nodes and packet size is done. Simulation results shows that Fuzzy clustered ant based cross layer optimization protocol performs best as compared to AntSenseNet routing protocol, Cross layer routing protocol and Ant based cross layer routing protocol in terms of QoS parameters such as Throughput, Packet delivery ratio and delay. Hence the life time of the network increases.
Volume: 10
Issue: 1
Page: 295-301
Publish at: 2018-04-01

Cluttered Traffic Distribution in LoRa LPWAN

10.11591/ijeecs.v10.i1.pp214-223
Nur Aishah Bt. Zainal , Mohamed Hadi Habaebi , Israth Chowdhury , Md Rafiqul Islam
Low Power WAN (LPWAN) is a wireless broad area network technology. It is interconnects using only low bandwidth, less power consumption at long range. This technology is operating in unauthorized spectrum which designed for wireless data communication. To have an insight of such long-range technology, this paper evaluates the performance of LoRa radio links under shadowing effect and realistic smart city utilities clutter grid distribution. Such environment is synonymous to residential, industrial and modern urban centers. The focus is to include the effect of shadowing on the radio links while attempting to study the optimum sink node numbers and their locations for maximum sensor node connectivity. Results indicate that the usual unrealistic random node distribution does not reflect actual real-life scenario where many of these sensing nodes follow the built infrastructure around the city of smart buildings. The system is evaluated in terms of connectivity and packet loss ratio.
Volume: 10
Issue: 1
Page: 214-223
Publish at: 2018-04-01

Grid & Force Based Sensor Deployment Methods in WSN using PSO

10.11591/ijeecs.v10.i1.pp271-279
Aparna Pradeep Laturkar , Sridharan Bhavani , DeepaliParag Adhyapak
Wireless Sensor Network (WSN) is emergingtechnology and has wide range of applications, such as environment monitoring, industrial automation and numerous military applications. Hence, WSN is popular among researchers. WSN has several constraints such as restricted sensing range, communication range and limited battery capacity. These limitations bring issues such as coverage, connectivity, network lifetime and scheduling & data aggregation. There are mainly three strategies for solving coverage problems namely; force, grid and computational geometry based. PSO is a multidimensional optimization method inspired from the social behavior of birds called flocking. Basic version of PSO has the drawback of sometimes getting trapped in local optima as particles learn from each other and past solutions. This issue is solved by discrete version of PSO known as Modified Discrete Binary PSO (MDBPSO) as it uses probabilistic approach. This paper discusses performance analysis of random; grid based MDBPSO (Modified Discrete Binary Particle Swarm Optimization), Force Based VFCPSO and Combination of Grid & Force Based sensor deployment algorithms based on interval and packet size. From the results of Combination of Grid & Force Based sensor deployment algorithm, it can be concluded that its performance is best for all parameters as compared to rest of the three methods when interval and packet size is varied.
Volume: 10
Issue: 1
Page: 271-279
Publish at: 2018-04-01

Multi-objective IT Project Selection Model for Improving SME Strategy Deployment

10.11591/ijece.v8i2.pp1102-1111
Abir El Yamami , Khalifa Mansouri , Mohammed Qbadou , El Hossein Illousamen
Due to the limited financial resources of small and Medium-sized enterprises (SMEs), the proven approaches for selecting IT project portfolio for large enterprises may fail to perform in SMEs; SME top management want to make sure that the corporate strategy is carried out effectively by IT project portfolio before investing in such projects. In order to provide automated support to the selection of IT projects, it seems inevitable that a multi-objective approach is required in order to balance possible competing and conflicting objectives. Under such an approach, individual projects would be evaluated not just on their own performance but on the basis of their contribution to balance the overall portfolio. In this paper, we extend and explore the concept of IT project selection to improve SME strategy deployment. In particular, we present a model that assesses an individual project in terms of its contribution to the overall strategic objectives of the portfolio. A simulation using the model illustrates how SME can rapidly achieve maximal business goals by deploying the multi-objective algorithm when selecting IT projects.
Volume: 8
Issue: 2
Page: 1102-1111
Publish at: 2018-04-01

Efficient Encryption Technique for H.264/AVC Videos Based on CABAC and Logistic Map

10.11591/ijict.v7i1.pp39-48
Fatma K Tabash , M. Izharuddin
Nowadays, the demands of real-time video communication are increased rapidly. Search and rescue(SAR) applications like earthquake rescue, avalanche victims, wildfire monitoring in addition to highway surveillance are considered examples of real-time applications. In which, communication time is considered the most important metric to be optimized to ensure support for victims’ lives. Thus finding a simple and time efficient encryption technique for securing the transmitted data become mandatory. In this paper, we present an efficient encryption technique which has low computation complexity, low processing time and highly chaotic encrypted videos. The proposed technique is based on CABAC where the bin-string of Intra-Prediction Mode is encrypted with chaotic signals and the sign of MVD is toggled randomly. For residue coefficients the sign of the AC coefficients are flipped randomly and the first value of DC coefficients is encrypted by XORing the bin-string with random stream. All random streams are generated with chaotic systems using Logistic map. The experimental results shows that the proposed technique is highly effective for real-time application and robust against different types of attacks.
Volume: 7
Issue: 1
Page: 39-48
Publish at: 2018-04-01

Improve Security of Cloud Storage by Using Third Parity Authentication, One Time Password and Modified AES Encryption Algorithm

10.11591/ijict.v7i1.pp24-30
Firas A. Abdulatif , Maan Zuhiar
Cloud computing is a new term to provide application and hardware as service over the internet. Demand for cloud has increased dramatically in recent years. However, a major drawback for cloud adoption is lack of security so that we will try to solve some security issues related to cloud storage by design and implement a secure system to store privet data in cloud storage. This secure system provide secure login to cloud by using third parity authentication (smart phone) and one time password depend on chaotic system to prevent unauthorized people from get access to cloud and modified AES algorithms to encrypt the data in the cloud storage.
Volume: 7
Issue: 1
Page: 24-30
Publish at: 2018-04-01

Swarm Based Cross Layer Optimization Protocol for WMSN

10.11591/ijeecs.v10.i1.pp302-308
DeepaliParag Adhyapak , Sridharan Bhavani , Aparna Pradeep Laturkar
Wireless Multimedia Sensor Network (WMSN) is comprised of tiny, low cost multimedia devices such as video cameras and microphones. These networks can transfer scalar as well as multimedia data into real time as well as non-real time applications. However addition of such devices exposes additional challenges on both QoS assurance and energy efficiency for efficient use of resources.  This paper presents cross layer based AntSenseNet protocol to meet various QoS requirements such as throughput, jitter, lifetime and packet delivery ratio in order to improve network lifetime. Cross layer routing protocol utilizes scheduling algorithm and AntSenseNet protocol builds hierarchical structure and able to use multipath routing protocol.  Simulation results shows Cross layer based AntSenseNet protocol outperforms Ant Sense routing protocol and cross layer routing protocol in terms of throughput and packet delivery ratio
Volume: 10
Issue: 1
Page: 302-308
Publish at: 2018-04-01

The End User Requirement for Project Management Software Accuracy

10.11591/ijece.v8i2.pp1112-1121
Fachrurrazi Fachrurrazi
This research explains the relationship between the end user requirement and accuracy of PMS (Project Management Software). The research aims are to analyze the PMS accuracy and measuring the probability of PMS accuracy in achieving ±1% of the end user requirement. The bias statistical method will be used to prove the PMS accuracy that based on the hypothesis testing. The result indicates the PMS is still accurate to be implemented in Aceh-Indonesia area projects that using the SNI (National Indonesia Standard as current method) with the accuracy index of ±7.5%. The achievement probability of reaching the end user requirement is still low of ±21.77%. In case of the PMS, the low achievement of the end user requirement is not only caused by the low accuracy of the PMS but also caused by the amount of variability error, which is influenced by the amount of variation of the project activity. In this study, we confirm that it is necessary to reconcile both conditions between the PMS accuracy and the end user requirements.
Volume: 8
Issue: 2
Page: 1112-1121
Publish at: 2018-04-01

A Survey on Graph Database Management Techniques for Huge Unstructured Data

10.11591/ijece.v8i2.pp1140-1149
Patil N. S. , Kiran P , Kiran N. P. , Naresh Patel K. M.
Data analysis, data management, and big data play a major role in both social and business perspective, in the last decade. Nowadays, the graph database is the hottest and trending research topic. A graph database is preferred to deal with the dynamic and complex relationships in connected data and offer better results. Every data element is represented as a node. For example, in social media site, a person is represented as a node, and its properties name, age, likes, and dislikes, etc and the nodes are connected with the relationships via edges. Use of graph database is expected to be beneficial in business, and social networking sites that generate huge unstructured data as that Big Data requires proper and efficient computational techniques to handle with. This paper reviews the existing graph data computational techniques and the research work, to offer the future research line up in graph database management.
Volume: 8
Issue: 2
Page: 1140-1149
Publish at: 2018-04-01

A Status Data Transmitting System for Vessel Monitoring

10.11591/ijece.v8i2.pp917-925
The Anh Nguyen Dinh , Huy Le Xuan , Tuan Anh Vu , Duong Bach Gia
This paper presents a status data transmitting system suitable for vessel monitoring. The system consists of four main parts, which are a status data module, a frequency synthesizer, a power amplifier and a horn antenna. The status data module packs information of the identification, longitude, latitude and state of the vessel into data frames. FSK/MSK/GMSK schemes were used to modulate the data. The frequency synthesizer was designed with very high stability over temperature and very low frequency tolerance. The power amplifier provides 130 W output power at S band. The impedance bandwidth of the horn antenna can be controlled using the beveling technique.
Volume: 8
Issue: 2
Page: 917-925
Publish at: 2018-04-01

Design and Implementation Multimedia Learning Success for Vocational Schools

10.11591/ijece.v8i2.pp1067-1073
Fitro Nur Hakim , Achmad Solechan
This research aims to design a web-based multimedia applications, interactive learning, in order to improve the learning outcomes of students, especially students of Vocational High School. Multimedia Learning has been designed with some additional content in the form of applications: decision support system for multimedia usage based on Model of Multimedia Learning Success. The population obtained from respondents vocational school in Central Java, which is already implementing multimedia learning. The method used is qualitative analysis in the form of: the development of multimedia learning integrated with decision support systems. Design and implementation of multimedia learning success system that is abbreviated "Sikemuning". Sikemuning can be used to measure or provide guidance for teachers in the use of multimedia. Interviews with several respondents teachers from vocational schools in Central Java showed that: the system success multimedia learning developed in this study can be used as feedback to assess the success and effectiveness of the implementation of learning activities, multimedia learning can improve the performance and intelligence of vocational school students.
Volume: 8
Issue: 2
Page: 1067-1073
Publish at: 2018-04-01
Show 1426 of 1953

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration