Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

27,438 Article Results

Using Attribute Oriented Induction High Level Emerging Pattern (AOI-HEP) to Mine Frequent Patterns

10.11591/ijece.v6i6.pp3037-3046
Harco Leslie Hendric Spits Warnars
Frequent patterns in Attribute Oriented Induction High level Emerging Pattern (AOI-HEP), are recognized when have maximum subsumption target (superset) into contrasting (subset) datasets (contrasting ⊂ target) and having large High Emerging Pattern (HEP) growth rate and support in target dataset. HEP Frequent patterns had been successful mined with AOI-HEP upon 4 UCI machine learning datasets such as adult, breast cancer, census and IPUMS with the number of instances of 48842, 569, 2458285 and 256932 respectively and each dataset has concept hierarchies built from its five chosen attributes. There are 2 and 1 finding frequent patterns from adult and breast cancer datasets, while there is no frequent pattern from census and IPUMS datasets. The finding HEP frequent patterns from adult dataset are adult which have government workclass with an intermediate education (80.53%) and America as native country(33%). Meanwhile, the only 1 HEP frequent pattern from breast cancer dataset is breast cancer which have clump thickness type of AboutAverClump with cell size of VeryLargeSize(3.56%). Finding HEP frequent patterns with AOI-HEP are influenced by learning on high level concept in one of chosen attribute and extended experiment upon adult dataset where learn on marital-status attribute showed that there is no finding frequent pattern.
Volume: 6
Issue: 6
Page: 3037-3046
Publish at: 2016-12-01

Model-based Automatic Segmentation of Ascending Aorta from Multimodality Medical Data

10.11591/ijece.v6i6.pp3161-3173
Noha Seada , Safwat Hamad , Mostafa G. M. Mostafa
Automatic Ascending Aorta Segmentation is one of the important steps towards automatic segmentation of the whole cardiac tree. This paper presents a novel approach for the automatic segmentation of the ascending aorta from two imaging modalities: CTA (Computed Tomography Angiography) and PC-MRI (Phase-Contrast Magnetic Resonance Images). The novel approach is an algorithm that works without the need for setting manual seed points or applying preprocessing steps or setting a region of interest. Instead, the proposed algorithm automatically detects and segments the ascending aorta using an ascending aorta model built from its anatomical features. The proposed segmentation algorithm begins with aorta detection through features model fitting augmented with Hough transform, where the ascending aorta is identified from the descending aorta and any other circular structures based on the proposed model. After detection, the whole ascending aorta is segmented up from the aortic arch down to the ostia points using a novel automatic seeded region growing algorithm. The proposed algorithm is fully automatic, works in real-time and robust as parameters used are the same for all the tested datasets. The detection and segmentation of the ascending aorta succeeded in all test cases acquired from the two imaging modalities; proving the robustness of the proposed ascending aorta model and algorithm for the automatic segmentation process even on data from different modalities and different scanner types. The accuracy of the segmentation has a mean Dice Similarity Coefficient (DSC) of 94.72% for CTA datasets and 97.13% for PC-MRI datasets.
Volume: 6
Issue: 6
Page: 3161-3173
Publish at: 2016-12-01

A Modified ABC Algorithm for Solving Non-Convex Dynamic Economic Dispatch Problems

10.11591/ijece.v6i6.pp2621-2628
Hardiansyah Hardiansyah
In this paper, a modified artificial bee colony (MABC) algorithm is presented to solve non-convex dynamic economic dispatch (DED) problems considering valve-point effects, the ramp rate limits and transmission losses. Artificial bee colony algorithm is a recent population-based optimization method which has been successfully used in many complex problems. A new mutation strategy inspired from the differential evolution (DE) is introduced in order to improve the exploitation process. The feasibility of the proposed method is validated on 5 and 10 units test system for a 24 h time interval. The results are compared with the results reported in the literature. It is shown that the optimum results can be obtained more economically and quickly using the proposed method in comparison with the earlier methods.
Volume: 6
Issue: 6
Page: 2621-2628
Publish at: 2016-12-01

The Impact of Tunneling on the Subthreshold Swing in Sub-20 nm Asymmetric Double Gate MOSFETs

10.11591/ijece.v6i6.pp2730-2734
Hak Kee Jung , Sima Dimitrijev
This paper analyzes the subthreshold swing in asymmetric double gate MOSFETs with sub-20 nm channel lengths. The analysis of the carrier transport in the subthreshold region of these nano scaled MOSFET includes tunneling as an important additional mechanism to the thermionic emission. It is found that the subthreshold swing is increasing due to tunneling current and that the performance of nano scaled MOSFETs is degraded. The degradation of the subthreshold swing due to tunneling is quantified using analytical potential distribution and Wentzel–Kramers–Brillouin (WKB) approximation in this paper. This analytical approach is verified by two dimensional simulation. It is shown that the degradation of subthreshold swing increases with both reduction of channel length and increase of channel thickness. We also show that the subthreshold swing is increasing in case of different top and bottom gate oxide thicknesses.
Volume: 6
Issue: 6
Page: 2730-2734
Publish at: 2016-12-01

Pursuit Algorithm for Robot Trash Can Based on Fuzzy-Cell Decomposition

10.11591/ijece.v6i6.pp2863-2869
Tatiya Padang Tunggal , Andi Supriyanto , Nur Mukhammad Zaidatur Rochman , Ibnu Faishal , Imam Pambudi , Iswanto Iswanto
Scooby Smart Trash can is a trash can equipped with artificial intelligence algorithms that is able to capture and clean up garbages thrown by people who do not care about the environment. The can is called smart because it acts like scoobydoo in a children's cartoon in that the can will react if there is garbage thrown and it catches and cleans them up. This paper presents pursuit algorithm that uses cell decomposition algorithm in which algorithms are used to create a map of the robot's path and fuzzy algorithm as one of the artificial intelligence algorithm for robot path planning. By using the combined algorithms, the robot is able to pursuit and chases the trash carelessly discarded, but it has not been able to find the shortest distance. Therefore, this paper considers a second modification of the algorithm by adding a potential field algorithm used to add weight values on the map, so that the robot can pursue trash by finding the shortest path. The proposed algorithm shows that the robot can avoid obstacles and find the shortest path so that the time required to get to the destination point is fast.
Volume: 6
Issue: 6
Page: 2863-2869
Publish at: 2016-12-01

A Cloud Based Secure Voting System using Homomorphic Encryption for Android Platform

10.11591/ijece.v6i6.pp2994-3000
Manish Ranjan , Ayub Hussain Mondal , Monjul Saikia
Cloud based service provider are at its top of its services for various applications, as their services are very much reachable from anywhere anytime in current days. It is responsibility of the company that the Cloud storage is owned and maintained by themselves keeping the data available and accessible, and the physical environment protected and running. Could storage provider seem to be uncertain of confidentiality in many cases, as we need to limit ourselves on trust to a third party. Keeping our sensitive data ready to access any time anywhere with preventing any information leakage is a challenging task. Cryptography in this scenario plays an important role, providing security for information to protect valuable information resources on intranets, Internet and the cloud. In addition, Homomorphic cryptosystem is a form of Cryptography where some specific computation can be performed over the cipher text producing a resultant cipher text which, when decrypted, equals the result of operations carry out on the plaintext. With help of this unique property of homomorphism cryptography we proposed a system to keep sensitive information in encrypted form in the cloud storage/service provider and used those data as whenever we require. The scheme proposed here is designed for a secure online voting system on Android platform and voted information is encrypted and stored those in the cloud.
Volume: 6
Issue: 6
Page: 2994-3000
Publish at: 2016-12-01

A Comparative Study of Power Semiconductor Devices for Industrial PWM Inverters

10.11591/ijpeds.v7.i4.pp1420-1428
Gianluca Sena , Roberto Marani , Gennaro Gelao , Anna Gina Perri
The growing demand of energy translates into efficiency requirements of energy conversion systems and electric drives. Both these systems are based on Pulse Width Modulation (PWM) Inverter. In this paper we firstly present the state of art of the main types of semiconductors devices for Industrial PWM Inverter. In particular we examine the last generations of Silicon Carbide (SiC) MOSFETs and Insulated Gate Bipolar Transistors (IGBTs) and we present a comparison between these devices, obtained by SPICE simulations, both for static characteristics at different temperatures and for dynamic ones at different gate resistance, in order to identify the one which makes the PWM inverter more efficient.
Volume: 7
Issue: 4
Page: 1420-1428
Publish at: 2016-12-01

Reducing Routing Overhead in Random Walk Protocol under MP2P Network

10.11591/ijece.v6i6.pp3121-3130
Ajay Arunachalam , Ohm Sornil
Due to network dynamics in self-organizing networks the resource discovery effort increases. To discover objects in unstructured peer-to-peer network, peers rely on traditional methods like flooding, random walk and probabilistic forwarding methods. With inadequate knowledge of paths, the peers have to flood the query message which creates incredible network traffic and overhead. Many of the previous works based on random walk were done in wired network. In this context random walk was better than flooding. But under MANETs random walk approach behaved differently increasing the overhead, due to frequent link failures incurred by mobility. Decentralized applications based on peer-to-peer computing are best candidates to run over such dynamic network. Issues of P2P service discovery in wired networks have been well addressed in several earlier works. This article evaluates the performance of random walk based resource discovery protocol over P2P Mobile Adhoc Network (MP2P) and suggests an improved scheme to suit MANET. Our version reduces the network overhead, lowers the battery power consumption, minimizes the query delay while providing equally good success rate. The protocol is validated through extensive NS-2 simulations. It is clear from the results that our proposed scheme is an alternative to the existing ones for such highly dynamic mobile network scenario.
Volume: 6
Issue: 6
Page: 3121-3130
Publish at: 2016-12-01

Battery-equivalent DC Supply from Leakage Current: PV to Transformer-less Inverter Topology

10.11591/ijpeds.v7.i4.pp1193-1199
M. N. H. Khan , K. J. Ahmad , M. S. Zahan , M. N. Hasan
Solar panels are highly used for electricity generation, which can be gotten through switching-based transformer-less inverters. Hence, grid system with no galvanic-isolation, is taking the peak level in the world, which is effective and delivers power with enhanced efficiency. The PV generation presented here is for stand-alone system installed in remote areas on when and as the resulting power gets connected to electronic load installation instead of being tied to the grid. In this paper will be discussed the use of leakage current. Transformer-less inverter topology for exploring the issue of common mode (CMV) voltage development, which can be utilized as a Battery-Equivalent DC Supply after adding on places as when found suitable for such installations.
Volume: 7
Issue: 4
Page: 1193-1199
Publish at: 2016-12-01

Modelling and Predicting of the Characteristics of a Photovoltaic Generator on a Horizontal and Tilted Surface

10.11591/ijece.v6i6.pp2557-2576
Mustapha Elyaqouti , Lahoussine Bouhouch , Ahmed Ihlal
In the present paper, we will attempt to predict the Ipv-Vpv output characteristic of a photovoltaic generator (PVG) and consequently the generated electric power. This will be possible through modeling, extracting the electrical parameters of the PVG under study and also, by estimating the global incident solar radiation, on a surface, first horizontally, and then tilted to a given angle. Mathematical models developed in Matlab, to characterize the studied PVG are validated by experimental data of the PVG manufacture. While models associated with global radiation are validated by measurements taken by the meteorological station installed on the laboratory site ERTAIER (Team for Research in Technology and Advanced Engineering of Renewable Energies) of Higher School of Technology Agadir (ESTA). 
Volume: 6
Issue: 6
Page: 2557-2576
Publish at: 2016-12-01

Minimization of Starting Energy Loss of Three Phase Induction Motors based on Particle Swarm Optimization and Neuro Fuzzy Network

10.11591/ijpeds.v7.i4.pp1038-1048
Mahmoud M. Elkholy , Mohamed A. Elhameed
The purpose of this paper is to minimize energy losses consumed by the induction motor during starting with wide range of load torque from no load to full load. This will limit the temperature rise and allows for more numbers of starting during a definite time. Starting energy losses minimization is achieved by controlling the rate of increasing voltage and frequency to start induction motor under certain load torque within a definite starting time. Optimal voltage and frequency are obtained by particle swarm optimization (PSO) tool according to load torque. Then, outputs of the PSO are used to design a neuro-fuzzy controller to control the output voltage and frequency of the inverter during starting for each load torque. The starting characteristics using proposed method are compared to starting characteristics using direct on line method and V/F method. A complete model of the system is developed using SIMULINK/MATLAB.
Volume: 7
Issue: 4
Page: 1038-1048
Publish at: 2016-12-01

Effective Computer-Assisted Automatic Cervical Vertebrae Extraction with Rehabilitative Ultrasound Imaging by using K-means Clustering

10.11591/ijece.v6i6.pp2810-2817
Hae-Jung Lee , Doo Heon Song , Kwang Baek Kim
Neck pain is one of most common musculoskeletal condition resulting in significant clinical, social and economic costs. Muscles around cervical spine including deep neck flexors play a key role to support and control its stability, thus monitoring such muscles near cervical vertebrae is important. In this paper, we propose a fully automated computer assisted method to detect cervical vertebrae with K-means pixel clustering from ultrasonography. The method also applies a series of image processing algorithms to remove unnecessary organs and noises in the process. The experiment verifies that our approach is consistent with human medical experts’ decision to locate key measuring point for muscle analysis and successful in detecting cervical vertebrae accurately – successful in 48 out of 50 test cases (96%).
Volume: 6
Issue: 6
Page: 2810-2817
Publish at: 2016-12-01

Collaboration Management System between the Device based on Machine Socialization

10.11591/ijece.v6i6.pp3148-3153
Han Kyung Kim , In Shik Kang , Wung Jun Kim , Hoe Kyung Jung
The basis of IoT is in the interconnection and communication between different devices to achieve common goals through internet. These devices are interconnected through a network which enables communication within these devices without any direct human intervention. But with such great potential, this technology reached a road-block due to incompatibility within various manufacturers of the same type of device and proprietary standards. I started this project with this problem in mind and I have created a brand and platform independent machine socialization device manager system. In this paper, to overcome the above mentioned problem, I have utilized micro controllers to connect to various existing device to solve the problem and propose a device to device communication with collaboration management. This technology is not restricted to usage in only the new network module enabled smart devices but also this can be used to operate the existing old (not smart) home appliances. Machine socialization was made possible with the use of XML, (an internet standard schema language) which we have used to gather device, task and relationship information of all the devices to show schema information.
Volume: 6
Issue: 6
Page: 3148-3153
Publish at: 2016-12-01

An Approach to Voltage Quality Enhancement by Introduction of CWVM for Distribution System

10.11591/ijpeds.v7.i4.pp1276-1282
Alok Kumar Shrivastav , Pradip Kumar Sadhu , Ankur Ganguly , Saumen Dhara
This paper presented with problems related with voltage flicker in power system networks. Several international standard issued to control the voltage flicker are briefly described and some important methods to analyse electrical circuits with sinusoidal and non-sinusoidal waveforms are introduced and evaluated. One of these methods – Cockcroft Walton Voltage Multiplier (CWVM) has been used to increase the voltage of a filter, which is also described in this paper as a practical application. The filter can compensate for harmonic currents, power factor, and unbalance voltage. The simulation results using Multisim are presented, showing that good dynamic and steady-state response can be achieved with this approach.
Volume: 7
Issue: 4
Page: 1276-1282
Publish at: 2016-12-01

Performance Enhancement of TCP Friendly Rate Control Protocol over Wired networks

10.11591/ijece.v6i6.pp2949-2954
N. Ramanjaneya Reddy , Chenna Reddy Pakanati , M. Padmavathamma
One of the main aims of transport layer protocol is achieving best throughput without any congestion or reduced congestion.  With rapid growing application needs and with increasing number of networks in Internet, there is a primary need to design new protocols to transport layer.  To transmit multimedia applications, one of the suitable congestion control mechanisms in transport layer is TCP Friendly Rate Control Protocol (TFRC).  It controls congestion based on its equation. However, every packet requires an acknowledgement in TFRC. It creates congestion in the network when the transmitted data is very large, which results in reduced throughput. This paper aims to increase the throughput when the transmitted data is large with minimal congestion by reducing the number of acknowledgements in the network.  We modified some fixed parameters in the TFRC equation. The results show the increased throughput with minimal congestion.
Volume: 6
Issue: 6
Page: 2949-2954
Publish at: 2016-12-01
Show 1435 of 1830

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration