Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

27,404 Article Results

An Embedded Iris Image Acquisition Research

10.11591/ijeecs.v5.i1.pp90-98
Dangui Chen , Guojun Qin
In view of the limitation of traditional identification, it is easy to lose and copy keys, cards or ID cards, and it is easy to forget the password. Here, an embedded application system was designed based on the iris identification technology, the functions of gathering, inputing, and registering the iris information and identification can be realized. The system architecture was designed by using the embedded microprocessor of advanced RISC machines (ARM), which is used as the core. The iris sensor was used to gather the iris information, and the development of software was accomplished with the embedded OS Windows CE. The system can be used on the company entrance guard system, customs security of airport and criminal identification.
Volume: 5
Issue: 1
Page: 90-98
Publish at: 2017-01-01

Virtual Laboratory of Unbalanced Transient Condition in Synchronous Generator

10.11591/ijeecs.v5.i1.pp1-10
Sugiarto Kadiman , Arif Basuki , Diah Suwarti
The electrical engineering department at the Sekolah Tinggi Teknologi Nasional (STTNAS), Yogyakarta has recently reconnoitered virtual laboratories for its undergraduate synchronous generator course to complement existing full-scale laboratory equipment. This study explores virtual laboratory development to be treated as an accessorial tool for enhancing instruction. The focus of this synchronous generator course is the dynamic transient behavior of the system after small disturbances as affected by the unbalanced load. The work is mainly carried out through nonlinear simulations under Matlab-Simulink. Results of the first version of the synchronous generator virtual laboratory and details of its development are provided.
Volume: 5
Issue: 1
Page: 1-10
Publish at: 2017-01-01

Spatial Modeling in Landslide Susceptibility

10.11591/ijeecs.v5.i1.pp139-146
Dwi Shanty Apriliani Gunadi , I Nengah Surati Jaya , Boedi Tjahjono
Landslide Susceptibility Mapping is one of the mitigation effort to detect vulnerable areas for minimizing the risk of landslide disasters. This paper describes spatial model development for assessing landslide susceptibility by considering human and biophysical factors. The main objective of this research is to develop a spatial modeling of landslide susceptibility, particularly in several regencies of West Java Province. The data analysis include data pre-processing, regression analysis, correlation analysis, score development, and weight determination using Principal Component Analysis (PCA).  The study found that  the most important factors that contributed to landslide susceptibility within the research area is the Landuse/Landcover, then  followed by Slope, Distance to River, Soil Type, Annual Rainfall, Population Density, Geology Age, Climate Type, and Geomorphology. The first three highest factors occupied almost 53% of the total weight. The model successfully estimated the spatial distribution and degree of landslide susceptibility into 3 classes having overall accuracy of about 68%.
Volume: 5
Issue: 1
Page: 139-146
Publish at: 2017-01-01

Android-Based 3D Visualization of Indonesia Medicinal Plants

10.11591/ijeecs.v5.i1.pp229-233
Lita Karlitasari , Ismanto Ismanto , Agung Prajuhana Putra
3D visualization of medicinal plants is the result of the transformation that resembles the original image and are dynamic, so it can be viewed in detail from all sides. Image capture is performed with a level of clarity must be at least 70% so it would be easy when designing a 3D visualization. The medicinal plants collected came from Bogor Botanical Gardens of 11 plants, Ciapus - Bogor of 16 plants, and Cibodas Botanical Gardens of 37 plants. The image capture was done by using the comparison scale of human height, stem, flowers, fruits, and leaves both look forward and backward. Application development was done through the objects collection, object segmentation, object texture creation and 3D object creation. The application of 3D visualization medicinal plants can be enlarged and reduced, and rotated well to the right, left, up, and down. The medicinal plants that appears in the application was in Indonesian and Latin names, taxon and the descriptions. Therefore the general public, students, and researchers can utilize the plant objects much better.
Volume: 5
Issue: 1
Page: 229-233
Publish at: 2017-01-01

Early Test Effort Prediction using UML Diagrams

10.11591/ijeecs.v5.i1.pp220-228
Pulak Sahoo , J R Mohanty
Software Testing is essential for delivering quality software products. Accurate test effort estimation is an important part of project planning. Prediction of test effort at early phases of Software Developmen Life Cycle enables managers to plan ahead for the testing phase. This increases the chances of the project meeting its timeline while achieving required quality. Unified Modeling Language is a widely-used standard for representing Object Oriented Systems. Use Case and Class Diagrams are two of the most important models of the system created during early phases of software development. This work proposed that the initial test effort is predicted early using Use Case Diagram during the requirement stage and is refined during design stage when Class Diagrams are available. The predicted test efforts in both stages are functions of parameters derived from Use Case and Class Diagrams. Estimations can be revised when rest of the UML diagrams are created.
Volume: 5
Issue: 1
Page: 220-228
Publish at: 2017-01-01

Attacks and Secure Geographic Routing In Wireless Sensor Networks

10.11591/ijeecs.v5.i1.pp147-158
Sabri Yassine , Najib El Kamoun
Due to open network nature of wireless sensor networks make them highly vulnerable to a variety of security attacks and easy target for adversaries, which may capture these nodes, analyze and easily insert fake route information. Wireless sensor network is an emerging, cost effective and unsupervised solution for collecting this information from the physical world and sending this information back to centralized authority for further processing. GRPW (Geographic Routing in connected wireless sensor networks based on Multiple Sinks) is one of the basic routing protocols used for Supporting Mobile Sinks in Wireless Sensor Networks. GRPW, a geographical routing protocol for wireless sensor networks, is based on an architecture partitioned by logical levels, on the other hand based on a multipoint relaying flooding technique to reduce the number of topology broadcast. GRPW-MuS uses periodic HELLO packets to neighbor detection. The wormhole attack can form a serious threat in wireless sensor networks, especially against many wireless sensor networks routing protocols and location-based wireless security systems. Here, a trust model to handle this attack in GRPW is provided called GRPW-MuS-s. Using OMNET++ simulation and the MiXiM framework, results show that GRPW-MuS-s protocol only has very small false positives for wormhole detection during the neighbor discovery process (less than GRPW). The average energy usage at each node for GRPW-MuS-s protocol during the neighbor discovery and route discovery is very low than GRPW-MuS, which is much lower than the available energy at each node. The cost analysis shows that GRPW-MuS-s protocol only needs small memory usage at each node, which is suitable for the sensor network.
Volume: 5
Issue: 1
Page: 147-158
Publish at: 2017-01-01

New Binary Code Combined with New Chaotic Map and Gold Code to Ameliorate the Quality of the Transmission

10.11591/ijeecs.v5.i1.pp166-180
Mohamed Krim , Adda Ali-Pacha , Naima Hadj-Said
While the private radio communications field has grown in recent years, the communication method known as spread spectrum name has gained much prominence. A spread spectrum method can be combined with multiple access method CDMA for dividing sequences to create multi-user communication systems with very good performance of interference between symbols.The production of the chaotic sequence in scanning system and the information system according to DS-CDMA remains a hot research problem in this study to supervise in the knowledge wireless communication. This fact is still a question in establishing the secret code random spread sequence between the transmitter and the receiver.In DS-SS’s spreading is important to embed security information.It can avoid many problems in the complex calculation of the true circle. Furthermore the pseudo chaotic is reconstructed in the conventional gold to change shape with the logical operator “XOR” the results in simulation result shows in progress.It improves also the computing speed as this can solve the new equation of the problem in the original logistic map.There certainly has a kind in design: spreading chaotic sequence, chaos with gold code; including the number of users.So these are less in number and also limit the security and to can improve the ameliorate the quality of the transmissionand performance in terms of allowable number of users.The Bit error rate (BER) performance of the system is evaluated in multi-user environment under AWGN and reveals that the DS-SS system using new binary code combined with new logistic mapand gold code to ameliorate the quality of the transmission.
Volume: 5
Issue: 1
Page: 166-180
Publish at: 2017-01-01

Design of Automatic Number Plate Recognition on Android Smartphone Platform

10.11591/ijeecs.v5.i1.pp99-108
Teddy Surya Gunawan , Abdul Mutholib , Mira Kartiwi
Automatic Number Plate Recognition (ANPR) is an intelligent system which has the capability to recognize the character on vehicle number plate. It is a combination of hardware and software designed to offer the optimum reliability. Since the past decades, many researchers have been proposed to recognize the vehicle number plate and implemented it in various access control, law enforcement and security, including parking management system, toll gate access, border access, tracking of stolen vehicles and traffic violations (speed trap, illegal parking, etc). However, previous researches implemented ANPR system on personal computer (PC) with high resolution camera and high computational capability. On the other hand, not many researches have been conducted on the design of ANPR in Android smartphone platform which has limited camera resolution and limited computational power. The main challenges of implementation ANPR algorithm on smartphone are higher coding efficiency, lower computational complexity, and higher the scalability. The objectives of this research is to design ANPR on Android smartphone, including graphical user interface (GUI) design, process design, and database design. First, a comprehensive survey on the pre-processing, segmentation, and optical character recognition is conducted. Secondly, proposed system development and algorithm implementation is explained in more details. Results show that our proposed design can be implemented effectively in Android smartphone platform.
Volume: 5
Issue: 1
Page: 99-108
Publish at: 2017-01-01

Optimal Design of PID Controller for Load Frequency Control using Harmony Search Algorithm

10.11591/ijeecs.v5.i1.pp19-32
D. K. Sambariya , Seema Shrangi
This paper deals with soft computing technique, used for tuning PID controller. Controller tuned with a harmony search algorithm is used for controlling the frequency and Tie-line power responses of a non reheat two area power system. Step load perturbation has been given in both areas simultaneously. The dynamic results obtained by the proposed controller are compared with PID controller of recent published paper. The performance of the controllers is simulated using MATLAB/Simulation software. The results of tuned PID are compared with conventional controller on the basis of settling-time, peak over-shoot and peak under-shoot. Proposed PID gives better results than the conventional controller. The comparative resultsalso tabulated as a comparative performance.
Volume: 5
Issue: 1
Page: 19-32
Publish at: 2017-01-01

Data Integrity and Security [DIS] Based Protocol for Cognitive Radio Ad Hoc Networks

10.11591/ijeecs.v5.i1.pp187-195
Azeem Mohammed Abdul , Syed Umar
In the CRN (cognitive Radio Networks) the main issues to be addressed are spectrum scarcity and inadequate usage of spectrum. The CRN can analyse the unused spectrum, so that CRN users can easily occupy the unused spectrum without blocking the existing Primary Users. In a CRN, routing is a complex issue because of channel diversity. The existing system mainly focuses on the performance analysis of Ad hoc On-Demand Distance Vector (AODV) and the Weight Cumulative Expected transmission time (WCETT). The performance of these protocols are measured and compared in various ways such as the throughput of single radio station multi-channels, equal number of radio stations and channels, multi-radio stations multi-channels. The limitation with these protocols is, whenever a route fails, there is issue to get connected with the other nodes, the other being data integrity, which maintains the no loss of data [LOD]. In our proposed DIS – CRAHN system we overcome these limitations by adding data security and integrity. Security is provided using the RSA algorithm while Integrity is ensured using the SHA algorithm. With the data security we can maintain the shortest path from source to destination and if any route failure occurs then immediate route establishment can be done and data encryption and decryption also be implemented using the random key generation. Results show an improved performance in delay with reasonable throughput, making the protocol an ideal choice for CRNs.
Volume: 5
Issue: 1
Page: 187-195
Publish at: 2017-01-01

Text Independent Amharic Language Speaker Identification in Noisy Environments using Speech Processing Techniques

10.11591/ijeecs.v5.i1.pp109-114
Abrham Debasu Mengistu , Dagnachew Melesew Alemayehu
In Ethiopia, the largest ethnic and linguistic groups are the Oromos, Amharas and Tigrayans. This paper presents the performance analysis of text-independent speaker identification system for the Amharic language in noisy environments. VQ (Vector Quantization), GMM (Gaussian Mixture Models), BPNN (Back propagation neural network), MFCC (Mel-frequency cepstrum coefficients), GFCC (Gammatone Frequency Cepstral Coefficients), and a hybrid approach had been use as techniques for identifying speakers of Amharic language in noisy environments. For the identification process, speech signals are collected from different speakers including both sexes; for our data set, a total of 90 speakers’ speech samples were collected, and each speech have 10 seconds duration from each individual. From these speakers, 59.2%, 70.9% and 84.7% accuracy are achieved when VQ, GMM and BPNN are used on the combined feature vector of MFCC and GFCC. 
Volume: 5
Issue: 1
Page: 109-114
Publish at: 2017-01-01

BCG Artifact Removal Using Improved Independent Component Analysis Approach

10.11591/ijeecs.v5.i1.pp130-138
Manjula B.M. , Chirag Sharma
Recent advancement in bio-medical field has attracted researchers toward BCG signal processing for monitoring the health activities. There have been various techniques for monitoring physical activities such as (SCG) Seismocardiography, Electrocardiography (ECG) etc. BCG signal is a measurement of reaction force applied for cardiac ejection of blood. Various measurement schemes and systems have been developed for BCG detection and measurement such as tables, beds, weighing scale and chairs. Weighing scales have been promising method for measurement of BCG signal because of less cost of implementation, smaller size etc. but these devices still suffer from the artifact which are induced due to subject movement or motion during signal acquisition or it can be caused due to floor vibrations. Artifact removal is necessary for efficient analysis and health monitoring. In this work we address the issue of artifact removal in BCG signal by proposing a novel method of signal processing. According to proposed approach raw signal is pre-processed and parsed to independent component analysis which provides the decomposed components and later k-means is applied to detect the components which are responsible for artifact and removed. Proposed approach is compared with existing method and shows better performance in terms of artifact removal.
Volume: 5
Issue: 1
Page: 130-138
Publish at: 2017-01-01

Monthly Precipitation Trend Analysis by Applying Nonparametric Mann- Kendall (MK) and Spearman’s rho (SR) Tests In Dongting Lake, China: 1961-2012

10.11591/ijeecs.v5.i1.pp41-47
Muhammad Tayyab , Jianzhong Zhou , Rana Adnan , Aqeela Zahra
This research highlights the precipitation trends and presents the results of the study in temporal and spatial scales. Precise predictions of precipitation trends can play imperative part in economic growth of a state. This study examined precipitation inconsistency for 23 stations at the Dongting Lake, China, over a 52-years study phase (1961–2012). Statistical, nonparametric Mann- Kendall (MK) and Spearman’s rho (SR) tests were applied to identify trends within monthly, seasonal, and annual precipitation. The trend-free prewhitening method used to exclude sequential correlation in the precipitation time series. The performance of the Mann- Kendall (MK) and Spearman’s rho (SR) tests was steady at the tested significance level. The results showed fusion of increasing (positive) and decreasing (negative) trends at different stations within monthly and seasonal time scale. In case of whole Dongting basin on monthly time scale, significant positive trend is found, while at Yuanjiang River and Xianjiag River both positive and negative significant trends are identified.
Volume: 5
Issue: 1
Page: 41-47
Publish at: 2017-01-01

Face Detection in a Mixed-Subject Document

10.11591/ijece.v6i6.pp2828-2835
Lhoussaine Bouhou , Rachid El Ayachi , Mohamed Baslam , Mohamed Oukessou
Before you recognize anyone, it is essential to identify various characteristics variations from one person to another. among of this characteristics, we have those relating to the face. Nowadays the detection of skin regions in an image has become an important research topic for the location of a face in the image. In this research study, unlike previous research studies  related  to  this  topic  which  have  focused  on  images  inputs  data  faces,  we  are  more interested to the fields face detection in mixed-subject documents (text + images). The face detection system developed is based on the hybrid method to distinguish two categories of objects from the mixed document. The first category is all that is text or images containing figures having no skin color, and the second category is any figure with the same color as the skin. In the second phase the detection system is based on Template Matching method to distinguish among the figures of the second category only those that contain faces to detect them. To validate this study, the system developed is tested on the various documents which including text and image.
Volume: 6
Issue: 6
Page: 2828-2835
Publish at: 2016-12-01

A Hybrid Cryptographic System for Secured Device to Device Communication

10.11591/ijece.v6i6.pp2962-2970
A. Rama Krishna , A. S. N. Chakravarthy , A. S. C. S. Sastry
It is general fact that even after enormous expansion of wireless communication there are still dead regions that hampers the effective communication. With exponential rise in the smart phones, a new layer of communication has evolved that could address the concerns of dead regions and capacity barriers. D2D is the evolving communication technology which focuses on short distance hops between the public devices to reach the destination. The major drawback of this technology is that most of the devices are public hence trustworthiness of the entire channel needs to be addressed in order to make it a viable solution. In this paper, we introduce a novel hybrid cryptographic approach that could address multiple eavesdroppers’ scenario. This approach incorporates both Huffman coding and Binary coding to enhance the crypto benefits for the information transmitted over D2D channel that consists of several public devices. The dual-crypto nature of the proposed algorithm offers higher efficiency, better security and improved key transmission.  Thus, the proposed hybrid cryptographic approach is robust in nature while easy and simple to operate. In addition, the proposed approach could recover the original information without any distortion from the encrypted data making the approach lossless in nature. Further simulation results prove that the proposed offers confidentiality to the transmitted to data while addressing the network capacity crunch.
Volume: 6
Issue: 6
Page: 2962-2970
Publish at: 2016-12-01
Show 1429 of 1827

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration