Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,325 Article Results

Reversed-Trellis Tail-Biting Convolutional Code (RT-TBCC) Decoder Architecture Design for LTE

10.11591/ijece.v8i1.pp198-209
Trio Adiono , Ahmad Zaky Ramdani , Rachmad Vidya Wicaksana Putra
Tail-biting convolutional codes (TBCC) have been extensively applied in communication systems. This method is implemented by replacing the fixed-tail with tail-biting data. This concept is needed to achieve an effective decoding computation. Unfortunately, it makes the decoding computation becomes more complex. Hence, several algorithms have been developed to overcome this issue in which most of them are implemented iteratively with uncertain number of iteration. In this paper, we propose a VLSI architecture to implement our proposed reversed-trellis TBCC (RT-TBCC) algorithm. This algorithm is designed by modifying direct-terminating maximum-likelihood (ML) decoding process to achieve better correction rate. The purpose is to offer an alternative solution for tail-biting convolutional code decoding process with less number of computation compared to the existing solution. The proposed architecture has been evaluated for LTE standard and it significantly reduces the computational time and resources compared to the existing direct-terminating ML decoder. For evaluations on functionality and Bit Error Rate (BER) analysis, several simulations, System-on-Chip (SoC) implementation and synthesis in FPGA are performed.
Volume: 8
Issue: 1
Page: 198-209
Publish at: 2018-02-01

Feature Selection Mammogram based on Breast Cancer Mining

10.11591/ijece.v8i1.pp60-69
Shofwatul Uyun , Lina Choridah
The very dense breast of mammogram image makes the Radiologists often have difficulties in interpreting the mammography objectively and accurately. One of the key success factors of computer-aided diagnosis (CADx) system is the use of the right features. Therefore, this research emphasizes on the feature selection process by performing the data mining on the results of mammogram image feature extraction. There are two algorithms used to perform the mining, the decision tree and the rule induction. Furthermore, the selected features produced by the algorithms are tested using classification algorithms: k-nearest neighbors, decision tree, and naive bayesian with the scheme of 10-fold cross validation using stratified sampling way. There are five descriptors that are the best features and have contributed in determining the classification of benign and malignant lesions as follows: slice, integrated density, area fraction, model gray value, and center of mass. The best classification results based on the five features are generated by the decision tree algorithm with accuracy, sensitivity, specificity, FPR, and TPR of 93.18%; 87.5%; 3.89%; 6.33% and 92.11% respectively.
Volume: 8
Issue: 1
Page: 60-69
Publish at: 2018-02-01

Migration of Virtual Machine to improve the Security of Cloud Computing

10.11591/ijece.v8i1.pp210-219
N. Chandrakala , B. Thirumala Rao
Cloud services help individuals and organization to use data that are managed by third parties or another person at remote locations. With the increase in the development of cloud computing environment, the security has become the major concern that has been raised more consistently in order to move data and applications to the cloud as individuals do not trust the third party cloud computing providers with their private and most sensitive data and information. This paper presents, the migration of virtual machine to improve the security in cloud computing. Virtual machine (VM) is an emulation of a particular computer system. In cloud computing, virtual machine migration is a useful tool for migrating operating system instances across multiple physical machines. It is used to load balancing, fault management, low-level system maintenance and reduce energy consumption. Virtual machine (VM) migration is a powerful management technique that gives data center operators the ability to adapt the placement of VMs in order to better satisfy performance objectives, improve resource utilization and communication locality, achieve fault tolerance, reduce energy consumption, and facilitate system maintenance activities. In the migration based security approach, proposed the placement of VMs can make enormous difference in terms of security levels. On the bases of survivability analysis of VMs and Discrete Time Markov Chain (DTMC) analysis, we design an algorithm that generates a secure placement arrangement that the guest VMs can moves before succeeds the attack.
Volume: 8
Issue: 1
Page: 210-219
Publish at: 2018-02-01

Virtual Machine Allocation Policy in Cloud Computing Environment using CloudSim

10.11591/ijece.v8i1.pp344-354
Taskeen Zaidi , Rampratap Rampratap
Cloud computing has been widely accepted by the researchers for the web applications. During the past years, distributed computing replaced the centralized computing and finally turned towards the cloud computing. One can see lots of applications of cloud computing like online sale and purchase, social networking web pages, country wide virtual classes, digital libraries, sharing of pathological research labs, supercomputing and many more. Creating and allocating VMs to applications use virtualization concept. Resource allocates policies and load balancing polices play an important role in managing and allocating resources as per application request in a cloud computing environment. Cloud analyst is a GUI tool that simulates the cloud-computing environment. In the present work, the cloud servers are arranged through step network and a UML model for a minimization of energy consumption by processor, dynamic random access memory, hard disk, electrical components and mother board is developed. A well Unified Modeling Language is used for design of a class diagram. Response time and internet characteristics have been demonstrated and computed results are depicted in the form of tables and graphs using the cloud analyst simulation tool.
Volume: 8
Issue: 1
Page: 344-354
Publish at: 2018-02-01

Attitude Control of Quadrotor Using PD Plus Feedforward controller on SO(3)

10.11591/ijece.v8i1.pp566-575
Almido H Ginting , Oyas Wahyunggoro , Adha Imam Cahyadi
This paper proposes a simple scheme of Proportional-Derivative (PD) plus Feedforward controller on SO(3) to control the attitude of a quadrotor. This controller only needs the measurement of angular velocity to calculate the exponential coordinates of the rotation matrix. With rotation matrix as an error variable of the controller, the simulation shows that the controller is able to drive the attitude of the quadrotor from hovering condition to desired attitude and from an attitude condition goes to the hovering condition, despite the system is disturbed. When the system is convergent, the rotation error matrix will be a 3x3 identity matrix.
Volume: 8
Issue: 1
Page: 566-575
Publish at: 2018-02-01

Passive Damper Network in a Simple DC Distribution Power System

10.11591/ijece.v8i1.pp544-555
Awang Bin Jusoh , Muhammad Firdaus Abd Razak , Mohamad Hamka Bin Saiful , Tole Sutikno
Distributed power system (DPS) distributes power amongst processing units such as power electronics converters with DC system. Due to the increasing usage of power converters in DPS system, the system becomes unstable and the converter tends to draw constant power needed by the load of the system. Constant power load (CPL) characteristic has negative input impedance that could produce instability problems in the DC bus system. Passive damping network which consists of series RC damping circuit was connected in parallel to the DC bus system with the purpose to reduce the instability. The passive damper was designed, simulated with MATLAB/Simulink and verified experimentally with different values of CPL power levels and input voltage changes. The obtained simulation results show that simple DC system with constant power load was successfully stabilized by the installation of the passive damping network. The experimental set up was also conducted to validate of the proposed technique, and the obtained results were in excellent agreement with the theoretical parts of the project.
Volume: 8
Issue: 1
Page: 544-555
Publish at: 2018-02-01

Concept Drift Identification using Classifier Ensemble Approach

10.11591/ijece.v8i1.pp19-25
Leena Deshpande , M. Narsing Rao
Abstract:-In Internetworking system, the huge amount of data is scattered, generated and processed over the network. The data mining techniques are used to discover the unknown pattern from the underlying data. A traditional classification model is used to classify the data based on past labelled data. However in many current applications, data is increasing in size with fluctuating patterns. Due to this new feature may arrive in the data. It is present in many applications like sensornetwork, banking and telecommunication systems, financial domain, Electricity usage and prices based on its demand and supplyetc .Thus change in data distribution reduces the accuracy of classifying the data. It may discover some patterns as frequent while other patterns tend to disappear and wrongly classify. To mine such data distribution, traditionalclassification techniques may not be suitable as the distribution generating the items can change over time so data from the past may become irrelevant or even false for the current prediction. For handlingsuch varying pattern of data, concept drift mining approach is used to improve the accuracy of classification techniques. In this paper we have proposed ensemble approach for improving the accuracy of classifier. The ensemble classifier is applied on 3 different data sets. We investigated different features for the different chunk of data which is further given to ensemble classifier. We observed the proposed approach improves the accuracy of classifier for different chunks of data.
Volume: 8
Issue: 1
Page: 19-25
Publish at: 2018-02-01

Noise Analysis of Trans-impedance Amplifier (TIA) in Variety Op Amp for use in Visible Light Communication (VLC) System

10.11591/ijece.v8i1.pp159-171
Syifaul Fuada , Angga Pratama Putra , Yulian Aska , Trio Adiono
VLC is a complex system with lots of challenges in its implementation. One of its problems is noise that originated from internal and external sources (sunlight, artificial light, etc). Internal noise is originated from active components of analog front-end (AFE) circuit, which will be discussed in this paper, especially on the trans-impedance amplifier (TIA) domain. The noise characteristics of AFE circuit in VLC system has been analyzed using the variety of available commercial Op Amp and different types of the photodiode (Si, Si-PIN, Si APD). The approach of this research is based on analytical calculus and simulation using MATLAB®. The results of this research show that the main factor that affecting the noise is en, the feedback resistor (Rf), and junction capacitor in the photodiode (Cj). Besides that, the design concept of multi channel TIA (8 channel) using IC Op Amp, with consideration of pin number of each Op Amp, supply needs, the initial value of Rf, converter to 8-DIP and feedback capacitor (Cf) channel, also discussed in this paper.
Volume: 8
Issue: 1
Page: 159-171
Publish at: 2018-02-01

Sukuk Rating Prediction using Voting Ensemble Strategy

10.11591/ijece.v8i1.pp299-303
Mira Kartiwi , Teddy Surya Gunawan , Tika Arundina , Mohd Azmi Omar
Islamic finance development has grown into a focal point in many countries accros the globe. Sukuk, in particular, an Islamic investment product that has received growing attention from sovereigns, multinational and national organizations from both developed and emerging economies. Its uses has been aimed to finance investments in a varieties of economic activities and development projects. Despite the promising look of Sukuk, currently there is lack of studies had been to examine and predict the rating of the Sukuk. As a result, many practitioners adopted the conventional bond hence ignore the fact that these two instruments are different in nature. In order to fill the gap in the literature, it is the aim of this research to develop an ensemble model that can be used to predict Sukuk rating. The effectiveness of the proposed models were evaluated using dataset on Sukuk issuance for domestic from 2006 to 2016. The results indicate that the overall performance of the ensemble model is fall short behind the i duction decision tree (IDT) model. However, the class precision of the ensemble model improved, particularly in predicting the lowest rating of Sukuk.
Volume: 8
Issue: 1
Page: 299-303
Publish at: 2018-02-01

Development of Guiding Cane with Voice Notification for Visually Impaired individuals

10.11591/ijece.v8i1.pp104-112
Emeline C. Guevarra , Marck Ivan Reyes Camama , Geonel Villanueva Cruzado
Navigation in the physical environment is a challenge for those people who have very limited sense of sight or no vision at all. Assistive technologies for blind mobilization is not new and always have a room for improvement. Moreover, these assistive devices are limited in terms of its sensing and feedback abilities. This paper presents a microcontroller-based guiding stick capable of detecting several conditions of the environment such as obstacles in front, left and right positions of the user and detects ascending and descending staircases. The feedback is delivered by an audio output which dictates the direction to go or what condition the sensor detects in front of the user. Technical evaluation proves that the device was functional in terms of its accuracy, responsiveness and correctness. On the other hand, in the actual evaluation of the device with the visually impaired individuals, the device did not perform efficiently. It was also found that the device has the potential to be used effectively by the visually impaired who acquired their blindness in later stage of their life provided that they will have a proper training in using the device while navigating in the physical environment.
Volume: 8
Issue: 1
Page: 104-112
Publish at: 2018-02-01

Embedded System Based Power Plant Monitoring and Controlling

10.11591/ijeecs.v9.i2.pp275-278
J S Ashwin , N Manoharan
An embedded based power plant system is used for checking the environmental condition based on different sensor. The microcontroller is fixed inside the boiler which is a turbine, to monitor the status and the information is passed through GSM. In this project we proposed the main water tank supplies number of boilers. The water level is controlled by a water level sensor, each evaporator has two channels, one is delta other one is outlet and the channels' valves are controlled by some temperature sensors composed in each package. From the GSM modem, the user will get the present status of the boiler level by sending a radiator ID number as message. When the temperature inside the boiler exceed the threshold value it will indicate as a warning to the concerned authority person to take the immediate step.
Volume: 9
Issue: 2
Page: 275-278
Publish at: 2018-02-01

Evaluation of Energy in Wind Turbine System Using Probability Distribution

10.11591/ijeecs.v9.i2.pp294-298
Kalyan Sagar Kadali , L Rajaji
In this work, annual energy output of a variable speed wind turbine is analyzed using annual Weibull wind speed probability distribution function. The power coefficient variety with tip speed proportion in torque control district and pitch point variety for most extreme power yield from wind turbine are examined for distinguishing control framework parameters. The wind turbine power output and variation of power coefficient with tip speed ratio as well as pitch angle are examined / reported using annual Wei bull distribution function. Finally the variation of the estimated annual energy output of the given wind turbine with the mean wind speed is presented.
Volume: 9
Issue: 2
Page: 294-298
Publish at: 2018-02-01

Data Transmission Analysis using MW-5000 at 5.8 GHz Frequency

10.11591/ijece.v8i1.pp254-258
Abu Bakar Ibrahim , Ashardi Abas
In the recent years, the data communication system become the main type of communication in the world. The FSK modulator or demodulator is one of the part that becomes the most important part and extremely advanced with the involvement of microwave active and passive circuits. This paper presents the data transmission analysis using MW-5000 at 5.8 GHz frequency. This experiment use the microwave communication module MW-5000 that is available in electronic laboratory. From this experiment the duration taken for the transmission of data is depend on the length of sentence and the value of baud rate.
Volume: 8
Issue: 1
Page: 254-258
Publish at: 2018-02-01

Moth Flame Optimization Method for Unified Power Quality Conditioner Allocation

10.11591/ijece.v8i1.pp530-537
M. Laxmidevi Ramanaiah , M. Damodar Reddy
This paper introduces a new optimization method to determine the optimal allocation of Unified Power Quality Conditioner (UPQC) in the distribution systems. UPQC is a versatile Custom Power Device (CPD) to solve problems related to voltage and current by the series and shunt compensator in the distribution systems. The task of UPQC highlighted in this paper is the required load reactive power is provided by both the series and shunt compensators. The UPQC’s steady state compensation capability has given a solution for providing reactive power compensation in large distribution systems. The optimization method adopted is Moth Flame Optimization (MFO). The best location and series compensator voltage are determined using MFO. The voltage injected by the series compensator and reactive power injected by the shunt compensator is incorporated in the load flow method. The effectiveness of the proposed method is validated with standard distribution systems.
Volume: 8
Issue: 1
Page: 530-537
Publish at: 2018-02-01

Design and Implement a Hybrid WebRTC Signalling Mechanism for Unidirectional & Bi-directional Video Conferencing

10.11591/ijece.v8i1.pp390-399
Naktal Edan , Ali Al-Sherbaz , Scott Turner
WebRTC (Web Real-Time Communication) is a technology that enables browser-to-browser communication. Therefore, a signalling mechanism must be negotiated to create a connection between peers. The main aim of this paper is to create and implement a WebRTC hybrid signalling mechanism named (WebNSM) for video conferencing based on the Socket.io (API) mechanism and Firefox. WebNSM was designed over a combination of different topologies, such as simplex, star and mesh. Therefore it offers several communications at the same time as one-to-one (unidirectional/bidirectional), one-to-many (unidirectional) and many-to-many (bi-directional) without any downloading or installation. In this paper, WebRTC video conferencing was accomplished via LAN and WAN networks, including the evaluation of resources in WebRTC like bandwidth consumption, CPU performance, memory usage, Quality of Experience (QoE) and maximum links and RTPs calculation. This paper presents a novel signalling mechanism among different users, devices and networks to offer multi-party video conferencing using various topologies at the same time, as well as other typical features such as using the same server, determining room initiator, keeping the communication active even if the initiator or another peer leaves, etc. This scenario highlights the limitations of resources and the use of different topologies for WebRTC video conferencing.
Volume: 8
Issue: 1
Page: 390-399
Publish at: 2018-02-01
Show 1443 of 1955

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration