Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

28,296 Article Results

Sign Detection Vision Based Mobile Robot Platform

10.11591/ijeecs.v7.i2.pp524-532
Hairol Nizam Mohd Shah , Mohd Zamzuri Ab Rashid , Zalina Kamis , Mohd Shahrieel Mohd Aras , Nursabillilah Mohd Ali , Faizil Wasbari , Tengku Muhammad Mahfuz Tengku Anuar
Vision system applied in electrical power generated mobile robot to provide a comfortable ride while providing comfort to tourist to interact with visitors. The camera is placed in front of the mobile robot to snap the images along in pathways. The system can recognized the sign which are right, left and up by using Harris corner algorithms and will be display in Graphical User Interface (GUI). A sign can be determined from the vertex coordinates according to the degree to distinguish the direction of the sign. The system will be tested in term of percentage of success in Harris point detection and availability to detect sign with different range. The result show the even though not all Harris point in an image can be detected but most of the images possible to recognise it sign direction.
Volume: 7
Issue: 2
Page: 524-532
Publish at: 2017-08-01

Design and Simulation of Automatic Temperature Control and Alert System Based PIC16F887

10.11591/ijict.v6i2.pp95-104
Jabbar Shaati Jahlool
In this research, the design and simulation of an automatic system for temperature control using embedded system in order to automatically control of multi appliances depend on the temperature value. The appliances will be controlled are ventilation, cooling, heating and alert. this is an order to avoid or reduce to human intervention and increase system reliability. An important feature of this automation process is to reduce or eliminate the possibility of relying on the human factor operator for industries, warehouses and laboratories, and to improve working and performance environments. The system in this paper used the microcontroller PIC16F887 as the central control unit, LM35 temperature sensor as a temperature source,16x2 liquid crystal display (LCD) as indicator to display the different system working status an addition to some of drivers, relay and light emitting diodes (LED) as indicators to display the corresponding working appliance driver. The implementation and simulation of the system work has been achieved by using proteus professional software v8.0 and mikroc pro for pic v .6.6.1 software to write the equivalent program and generate .hex file for system working. The result shows in figures 5, 6, 7, and 8 that explain the system working cases
Volume: 6
Issue: 2
Page: 95-104
Publish at: 2017-08-01

Qualitative Analysis of Recognition-based Graphical Password Authentication Schemes for Accessing the Cloud

10.11591/ijeecs.v7.i2.pp507-513
K Gangadhara Rao , Vijayakumari Rodda , B Basaveswara Rao
Cloud computing is increasingly becoming popular as many enterprise applications and data are moving into cloud platforms. However, a major barrier for cloud application is real and perceived lack of security. There are many security mechanisms exercised to utilize cloud services. Amongst them the prominent and primitive security mechanism is the Authentication System. Traditional text based passwords are susceptible to threats. Tough passwords are hard to recall and easily recalled passwords are simple and predictable. Graphical passwords are introduced as the better alternative. Two types of graphical passwords are there – recall based and recognition based. This research reviews several Recognition-Based Graphical Password methods and analyses their security based on the estimation criteria. Moreover, the research defines a metric called a 14-point scale that would make it possible for the qualitative analysis of the graphical passwords schemes. 
Volume: 7
Issue: 2
Page: 507-513
Publish at: 2017-08-01

Analysis of Competition Fronting the Popularity of Content in Social Networks

10.11591/ijict.v6i2.pp86-94
Siham Hafidi , Mohamed Baslam , Rachid El Ayachi
In recent years, on the Internet, there is a real phenomenon: the development of social networks that are becoming more popular and more used. Social networks have millions of users worldwide. This provides an opportunity for companies to reach out a large and diverse audience for their advertising campaigns. They do this by creating and spreading content across the social network, which will increase the chance of visibility for their contents, which for them is the assurance of being popular. Every content requires time to reach a specific destination on the networks. In this article, we study competition between several contents that look for attracting more consultations, each characterized by some given popularity. There is competition between the contents of a limited set of destinations. We first model our system, we then study the competition between contents by using the game theory to analyze this behavior. We finally provide numerical results, which provide insights into the effect of various parameters of the system.
Volume: 6
Issue: 2
Page: 86-94
Publish at: 2017-08-01

Formal Specification of QoS Negotiation in ODP System

10.11591/ijece.v7i4.pp2045-2053
Abdessamad Jarrar , Youssef Balouki , Taoufiq Gadi
The future of Open Distributed Processing systems (ODP) will see an increasing of components number, these components are sharing resources. In general, these resources are offering some kind of services. Due to the huge number of components, it is very difficult to offer the optimum Quality of service (QoS). This encourages us to develop a model for QoS negotiation process to optimize the QoS in an ODP system. In such system, there is a High risk of software or hardware failure. To ensure good performance of a system based on our model, we develop it using a formal method. In our case, we will use Event-B to get in the end of our development a system correct by construction.
Volume: 7
Issue: 4
Page: 2045-2053
Publish at: 2017-08-01

An Efficient Environmental Channel Modelling in 802.11p MAC Protocol for V2I

10.11591/ijeecs.v7.i2.pp404-414
Neelambike S , Chandrika J
Recent development in communication of wireless communication for automobile industry have aided the growth of SITS (Smart Intelligent Transport System) which solves numerous vehicular based communication service concerns like traffic congestion, accidental mishap etc. VANET (Vehicular Ad-hoc Network) a characteristic class of MANET (Mobile ad-hoc Network) which is a fundamental element of SITS in which the moving vehicles inter connected and communicates with each other remotely. Wireless technologies play an important part in assisting both Vehicle to Infrastructure (V2I) and Vehicle to Vehicle (V2V) correspondence in VANET. The existing scheduling technique does not consider the environmental factor which affects the throughput performance and increases packet drop rate which result in degradation of service quality. Here in this work the author propose a RHU (Rural, Highway and Urban) environment model considering the environmental factor. The efficient environmental model algorithm is incorporated into slotted aloha in IEEE 802.11p MAC protocols which aided as a spine for assisting both safety application and non-Safety applications. Experiments are conducted for collision and throughput efficiency for varied traffic load and speed of vehicle. The experimental result shows the proposed environmental model impact on collision and throughput efficiency for varied environment and thus helps improving QoS for VANET application.
Volume: 7
Issue: 2
Page: 404-414
Publish at: 2017-08-01

Learning from a Class Imbalanced Public Health Dataset: a Cost-based Comparison of Classifier Performance

10.11591/ijece.v7i4.pp2215-2222
Rohini R Rao , Krishnamoorthi Makkithaya
Public health care systems routinely collect health-related data from the population. This data can be analyzed using data mining techniques to find novel, interesting patterns, which could help formulate effective public health policies and interventions. The occurrence of chronic illness is rare in the population and the effect of this class imbalance, on the performance of various classifiers was studied. The objective of this work is to identify the best classifiers for class imbalanced health datasets through a cost-based comparison of classifier performance. The popular, open-source data mining tool WEKA, was used to build a variety of core classifiers as well as classifier ensembles, to evaluate the classifiers’ performance. The unequal misclassification costs were represented in a cost matrix, and cost-benefit analysis was also performed.  In another experiment, various sampling methods such as under-sampling, over-sampling, and SMOTE was performed to balance the class distribution in the dataset, and the costs were compared. The Bayesian classifiers performed well with a high recall, low number of false negatives and were not affected by the class imbalance. Results confirm that total cost of Bayesian classifiers can be further reduced using cost-sensitive learning methods. Classifiers built using the random under-sampled dataset showed a dramatic drop in costs and high classification accuracy.
Volume: 7
Issue: 4
Page: 2215-2222
Publish at: 2017-08-01

Mobile Ad Hoc Networks in Presence of Black Hole Attack

10.11591/ijeecs.v7.i2.pp577-582
Anshu Prakash Murdan , Anshuman Bhowon
This paper analyses three performance metrics namely average throughput, average network load and average video conferencing packet end-to-end delays under the influence of black hole attack in a Mobile Ad Hoc Network, using the ad hoc on-demand distance vector routing protocol. The simulation was carried out on Riverbed Modeler Academic Edition software. Simulation results show that the average throughput, average network load and average video conferencing packet end-to-end delay decreases as the number of black hole attack nodes is increased. Also, the effects of the influence of black hole attack nodes tend to decrease due to mobility of the nodes. It was observed that when the destination nodes move closer to the source nodes and get in to the latter’s transmission range, the effects of the black hole attack is greatly minimized.
Volume: 7
Issue: 2
Page: 577-582
Publish at: 2017-08-01

The Study of User Acceptance Toward E-Learning System in Higher Education

10.11591/ijeecs.v7.i2.pp466-473
Dana Indra Sensuse , Darmawan Baginda Napitupulu
E-learning is a model of delivering learning content electronically with the help of computers and multimedia. ABC University has implemented the e-learning system for two (2) years in order to improve the quality of teaching and learning process. This study aims to determine the level of user acceptance, especially from the perspective of students. In other words, this study also wants to evaluate the implementation of e-learning systems in higher education as well as identifying any factors that encourage students to use e-learning system especially in ABC University. The research method used was survey with the approach of TAM (Technology Acceptance Model) as the technology acceptance evaluation model consisting of two main factors: perceived ease of use and perceived usefulness. The results showed perceived usefulness significantly positive influence on user acceptance, while perceived ease of use did not significantly influence on user acceptance. The perceived ease of use also significantly positive influence perceived usefulness. The variance of user acceptance could be explained by two factors about 50.5%. 
Volume: 7
Issue: 2
Page: 466-473
Publish at: 2017-08-01

Modeling of 6 to 4 Switched Reluctance Motor using Coefficient Method and Analytical Method

10.11591/ijeecs.v7.i2.pp373-380
Kasrul Abd Karim , N. Abdullah , M. Nazri Othman , Auzani Jidin , RN Firdaus
Electric kick scooter field has become famous this lately, and become another solution for electric vehicle. Switched Reluctance Motor has been choosen as the propulsion system in this application due to the advantages of this motor. Meanwhile, the issue of lack experience in electrical motor design is one of the hollow subjects in machine design field. Through design aspects, the Switched Reluctance motor is developed using a simple technique which is coefficients method. This method is to provide the easiest ways for other non-academic designer for those who has lack experience in motor design. A set of a coefficient to determine motor dimension is being set. Then, this technique will be refered to the existing analytical method to provide a design guideline and to validate this coefficient as the quick references to design the SRM. The aim is not to make a comparison between the methods but intend to provide another easiest solution to design the SRM motor. The modelling has been test using RMxprt tools The expectation from this method is the outcomes will be compatible with existing design.
Volume: 7
Issue: 2
Page: 373-380
Publish at: 2017-08-01

A Range Based Localization Error Minimization Technique for Wireless Sensor Network

10.11591/ijeecs.v7.i2.pp395-403
Sudha H. Thimmaiah , Mahadevan G
Wireless sensor network (WSN) is composed of low cost, tiny sensor that communicates with each other and transmit sensory data to its base station/sink. The sensor network has been adopted by various industries and organization for their ease of use and is considered to be the most sorted future paradigm. The sensor devices are remotely deployed and powered by batteries. Preserving the energy of sensor devices is most desired. To preserve the battery efficient routing technique is needed. Most routing technique required prior knowledge of sensor nodes location in order to provide energy efficiency. Many existing technique have been proposed in recent time to determine the position of sensor nodes. The existing technique proposed so for suffers in estimating the likelihood of localization error. Reducing the error in localization is most desired. This work present a (Time-of-Arrival) based localization technique and also present adaptive information estimation model to reduce/approximate the localization error in wireless sensor network. The author compares our proposed localization model with existing protocol and analyses its efficiency.
Volume: 7
Issue: 2
Page: 395-403
Publish at: 2017-08-01

A New Design of a Wideband Miniature Antenna Array

10.11591/ijece.v7i4.pp1850-1857
Oulhaj Otman , Naima A. Touhami , Mohamed Aghoutane , Abdelmounaim Belbachir Kchairi
In this work, we present a new configuration of a new miniature microstrip antenna array having a wide frequency band and with a circular polarization. The bandwidth is about 2GHz for a reflection coefficient under -10dB and centered on the ISM ‘Industrial Scientific Medical’ band at 5.8 GHz. To design such array, we have started the design by validating one antenna element at 10 GHz and after that by using the technique of defected ground, we have validated the antenna array in the frequency band [4 GHz -6 GHz] which will permit to miniature the dimensions. The final fabricated antenna array is mounted on an FR4 substrate, the whole area is 102.48 X 31.39 mm2  with a gain of 5dBi at 4GHz.
Volume: 7
Issue: 4
Page: 1850-1857
Publish at: 2017-08-01

Asymptotic Stability of Quaternion-based Attitude Control System with Saturation Function

10.11591/ijece.v7i4.pp1994-2001
Harry Septanto , Djoko Suprijanto
In the design of attitude control, rotational motion of the spacecraft is usually considered as a rotation of rigid body. Rotation matrix parameterization using quaternion can represent globally attitude of a rigid body rotational motions. However, the representation is not unique hence implies difficulties on the stability guarantee. This paper presents asymptotically stable analysis of a continuous scheme of quaternion-based control system that has saturation function. Simulations run show that the designed system applicable for a zero initial angular velocity case and a non-zero initial angular velocity case due to utilization of deadzone function as an element of the defined constraint in the stability analysis.
Volume: 7
Issue: 4
Page: 1994-2001
Publish at: 2017-08-01

A Review on Web Application Testing and its Current Research Directions

10.11591/ijece.v7i4.pp2132-2141
D. Rajya Lakshmi , S. Suguna Mallika
Testing is an important part of every software development process on which companies devote considerable time and effort. The burgeoning web applications and their proliferating economic significance in the society made the area of web application testing an area of acute importance. The web applications generally tend to take faster and quicker release cycles making their testing very challenging. The main issues in testing are cost efficiency and bug detection efficiency. Coverage-based   testing is the process of ensuring exercise of specific program elements. Coverage measurement helps determine the “thoroughness” of testing achieved. An avalanche of tools, techniques, frameworks came into existence to ascertain the quality of web applications.  A comparative study of some of the prominent tools, techniques and models for web application testing is presented. This work highlights the current research directions of some of the web application testing techniques.
Volume: 7
Issue: 4
Page: 2132-2141
Publish at: 2017-08-01

Active Distribution Grid Power Flow Analysis using Asymmetrical Hybrid Technique

10.11591/ijece.v7i4.pp1738-1748
Paramet Wirasanti , Egon Ortjohann
A conventional distribution power flow analysis has to be improved regards the changes in distribution network. One of the changes is a grid operation because a new grid concept, e.g. micro-grid and aggregation, is aimed to be operated based on area itself. Consequently, each area can be actively operated in either grid connected mode or islanding mode. Hence, this paper proposes an asymmetrical power flow analysis using hybrid technique to support this flexible mode change. The hybrid technique offers an opportunity to analyze power flow in a decoupling way. This means that the power flow analysis can be performed separately in each grid area. Regards the distributed generation, this paper also introduces a model based on inverter-based operation, i.e. grid forming, grid supporting and grid parallel. The proposed asymmetrical hybrid load flow method is examined in three case studies, i.e. a verification study with the DIgSILENT PowerFactory, a demonstration of decoupling analysis approach and a performance study with the Newton-Raphson method.
Volume: 7
Issue: 4
Page: 1738-1748
Publish at: 2017-08-01
Show 1435 of 1887

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration