Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,325 Article Results

Development of Quranic Reciter Identification System using MFCC and GMM Classifier

10.11591/ijece.v8i1.pp372-378
Teddy Surya Gunawan , Nur Atikah Muhamat Saleh , Mira Kartiwi
Nowadays, there are many beautiful recitation of Al-Quran available. Quranic recitation has its own characteristics, and the problem to identify the reciter is similar to the speaker recognition/identification problem. The objective of this paper is to develop Quran reciter identification system using Mel-frequency Cepstral Coefficient (MFCC) and Gaussian Mixture Model (GMM). In this paper, a database of five Quranic reciters is developed and used in training and testing phases. We carefully randomized the database from various surah in the Quran so that the proposed system will not prone to the recited verses but only to the reciter. Around 15 Quranic audio samples from 5 reciters were collected and randomized, in which 10 samples were used for training the GMM and 5 samples were used for testing. Results showed that our proposed system has 100% recognition rate for the five reciters tested. Even when tested with unknown samples, the proposed system is able to reject it.
Volume: 8
Issue: 1
Page: 372-378
Publish at: 2018-02-01

Hybrid Microstrip Diplexer Design for Multi-band WiMAX Application in 2.3 and 3.5 GHz Bands

10.11591/ijece.v8i1.pp576-584
M. A. Sazali , N. A. Shairi , Z. Zakaria
In this paper, a design of hybrid microstrip diplexer is proposed for multi-band Worldwide Interoperability for Microwave Access (WiMAX) application in 2.3 and 3.5 GHz bands. The diplexer consists of a combination of two different filter designs. These filters were designed based on microstripline coupling techniques in order to obtain minimum insertion losses and achieve the desired frequency bandwidth. Therefore, a coupled open loop ring resonator was chosen for the filter design in 2.3 GHz band and a folded coupled line resonator was chosen for the filter design in 3.5 GHz band. Then, these filters were combined with a ring manifold matching network to be a hybrid microstrip diplexer. Based on the results, good agreements were achieved between the simulation and measurement results in terms of insertion loss, return loss and bandwidth in the 2.3 and 3.5 GHz bands.
Volume: 8
Issue: 1
Page: 576-584
Publish at: 2018-02-01

Solar Photovoltaic Power Forecasting in Jordan using Artificial Neural Networks

10.11591/ijece.v8i1.pp497-504
Mohammad H. Alomari , Jehad Adeeb , Ola Younis
In this paper, Artificial Neural Networks (ANNs) are used to study the correlations between solar irradiance and solar photovoltaic (PV) output power which can be used for the development of a real-time prediction model to predict the next day produced power. Solar irradiance records were measured by ASU weather station located on the campus of Applied Science Private University (ASU), Amman, Jordan and the solar PV power outputs were extracted from the installed 264KWp power plant at the university. Intensive training experiments were carried out on 19249 records of data to find the optimum NN configurations and the testing results show excellent overall performance in the prediction of next 24 hours output power in KW reaching a Root Mean Square Error (RMSE) value of 0.0721. This research shows that machine learning algorithms hold some promise for the prediction of power production based on various weather conditions and measures which help in the management of energy flows and the optimisation of integrating PV plants into power systems.
Volume: 8
Issue: 1
Page: 497-504
Publish at: 2018-02-01

Efficient and Secure Resource Allocation and Data Forwarding in Cellular Network

10.11591/ijeecs.v9.i2.pp267-268
Sudha Mishra , A Arivazhagan
Data sharing in networks are now days a challenging one where the source is sending a file to destination, major problem is interference. Once the router is set to search for a path takes too time for identifying a better path to transmit data. The performance is affected due to the time delay of searching path and the interference cause data loss or interruption of transmission. We proposed an overlay router which search better path in short period of time with the help of BJP router. When a sender sends the data, the overlay router contact with BJP router to analyze existing path used to transmit. To ensure a better path and low travelling time will be an efficient way to share the data between source and destination without any interference, low performance and time delay. BJP searches the existing routes that will be low processing time to forward the data sent by the source and received on time by the destination. Whenever a data is been shared between these two: source and destination, overlaying protocol is user to find the shortest path among the existing path search. By using overlay router and BJP router the performance is increased, avoid interference, path identification is solved within short time and provide a better solution for the current environment.
Volume: 9
Issue: 2
Page: 267-268
Publish at: 2018-02-01

Extremely Vibrant Routing Scheme for Mobile Adhoc Network

10.11591/ijeecs.v9.i2.pp306-310
Syes Abdul Syed S , T Senthil Kumaran
This paper aims to improve the performance of the traditional routing protocol for MANET such as DSR and AODV in terms of delay and overhead. The proposed routing scheme is called as Extremely Vibrant Routing (EVR) which adopts with the highly dynamic environment of MANET. The link residual life is estimated to reduce the link failure before forwarding data through a node. The velocity of the moving mode is considered while choosing the next forwarder node. This enables the EVR to decrease the delay in the network. The proposed routing scheme reduces routing overhead and reduces the delay. This scheme reduces the link failure too. The performance is evaluated by using the simulation results obtained by using NS2 simulator.
Volume: 9
Issue: 2
Page: 306-310
Publish at: 2018-02-01

Ant Colony Optimization (ACO) based Data Hiding in Image Complex Region

10.11591/ijece.v8i1.pp379-389
Sahib Khan
This paper presents data an Ant colony optimization (ACO) based data hiding technique. ACO is used to detect complex region of cover image and afterward, least significant bits (LSB) substitution is used to hide secret information in the detected complex regions’ pixels. ACO is an algorithm developed inspired by the inborn manners of ant species. The ant leaves pheromone on the ground for searching food and provisions. The proposed ACO-based data hiding in complex region establishes an array of pheromone, also called pheromone matrix, which represents the complex region in sequence at each pixel position of the cover image. The pheromone matrix is developed according to the movements of ants, determined by local differences of the image element’s intensity. The least significant bits of complex region pixels are substituted with message bits, to hide secret information. The experimental results, provided, show the significance of the performance of the proposed method.
Volume: 8
Issue: 1
Page: 379-389
Publish at: 2018-02-01

Development of Mobile Cloud Applications using UML

10.11591/ijece.v8i1.pp596-604
Dong Kwan Kim
With the proliferation of cloud computing technologies, smartphone users are able to use a variety of cloud computing-based mobile services such as games, education, entertainment, and social networking. Despite the popularity of such a mobile cloud computing, the complicated multi-tier system configuration of the mobile application must be one of the major impediments to develop mobile cloud applications. This paper presents development processes and procedures for developing mobile cloud applications by effectively applying Unified Modeling Language (UML), a representative object-oriented modeling language. The paper is intended to enhance the development productivity of the mobile cloud application and to improve the effectiveness of communication between software developers. In addition, we used the Android mobile platform and Amazon Web Service for cloud computing in order to demonstrate the applicability of the proposed approach to systematically apply the UML profiles and diagrams for cloud-based mobile applications.
Volume: 8
Issue: 1
Page: 596-604
Publish at: 2018-02-01

E-Carnet Resumption and Repository System for Bus Line Commuters

10.11591/ijeecs.v9.i2.pp262-264
Sujatha V , E.A. Mary Anitha
E-Carnet Resumption and Repository System for Bus Line Commuters is an ongoing venture which is very useful for the passengers. Resumption can be done using any two id proof and using credit card for paying money. This online bus pass Resumption application will help people to save their time and repository the bus passes without standing in a line for hours near counters. At first individuals need to enlist with the application by submitting points of interest of photograph, address proof, any two id verification and required subtle elements and submit through on the web. The application will verify the details and if all proves are verified then followed by transaction will be held. After that the pass will automatically generating and send it through mail. You can even repository using credit card or wire transfer methods.  This system can be used in bus transport undertaking services. Using the system in government and private sectors can exclude the use of human efforts and saves lot of money and time. This system also used to finding the route for Different places. The route information updates admin control so user trusts the valid paths. User locations are tracking using GPS tracker.
Volume: 9
Issue: 2
Page: 262-264
Publish at: 2018-02-01

Cryptanalysis on Privacy-Aware Two-factor Authentication Protocol for Wireless Sensor Networks

10.11591/ijece.v8i1.pp605-610
Younsung Choi
Das first proposed two-factor authentication combining the smart card and password to resolve the security problems of wireless sensor networks (WSNs). After that, various researchers studied two-factor authentication suitable for WSNs. In user authentication protocols based on the symmetric key approach, a number of elliptic curve cryptography (ECC)-based authentication protocols have been proposed. To resolve the security and efficiency problems of ECC-based two-factor authentication protocols, Jiang et al. proposed a privacy-aware two-factor authentication protocol based on ECC for WSNs. However, this paper performs a vulnerability analysis on Jiang et al.’s authentication protocol and shows that it has security problems, such as a lack of mutual authentication, a risk of SID modification and DoS attacks, a lack of sensor anonymity, and weak ID anonymity.
Volume: 8
Issue: 1
Page: 605-610
Publish at: 2018-02-01

Gauss-Seidel Method based Voltage Security Analysis of Distribution System

10.11591/ijece.v8i1.pp43-51
Gagari Deb , Kabir Chakraborty
Complexity of modern power network and Large disturbance results voltage collapse. So, voltage security analysis is important in power system. Indicators are helpful in voltage stability analysis, as they give information about the state of the system. In this paper a new indicator namely Distribution System Stability Indicator (DSSI) has been formulated using the information of Phasor Measurement Unit (PMU).The proposed indicator (DSSI) is tested on standard IEEE 33 bus radial distribution system. The suggested indicator is also applicable to the equivalent two bus system of a multi-bus power system. The proposed indicator is calculated for different contingent conditions at different system load configurations. The result of DSSI is verified with the standard indicator (VSI) which proves applicability of the proposed indicator. The bus voltages of all the buses at base loading and at maximum loading are evaluated for base data and for tripping of most critical line.
Volume: 8
Issue: 1
Page: 43-51
Publish at: 2018-02-01

Microstrip-Fed Circular Disc Monopole Antenna with Defected Waveguide Structure

10.11591/ijece.v8i1.pp189-197
S. J. Chin , M. Z. A. Abd. Aziz , M. R. Ahmad
This paper presented the microstrip-fed circular disc monopole antenna with defected waveguide structure. First, the microstrip-fed circular disc monopole antenna was designed. Next, the monopole antenna was designed with waveguide and lastly followed by the defected waveguide structure where the uniplanar compact (UC) structure was used. CST Microwave studio software was used for simulation and parametric studies process. Initially, the microstrip-fed circular disc monopole antenna was designed to achieve return loss less than -10dB for wideband frequencies. Then, the gain and directivity was improved with the integration of waveguide. The highest directivity of 11.38dBi found at 13.5GHz. However, low efficiency and narrower bandwidth were obtained. Next, uniplanar compact defected waveguide structure (UC DWS) was designed at inner surface of waveguide. The bandwidth achieved 3.09GHz where it covered from 10.91GHz to 14GHz. Meanwhile, the directivity maintained higher than the monopole antenna with highest directivity of 8.84dBi at 10GHz. The gain was also improved from 11GHz to 14GHz with highest gain of 6.38dB occurred at 13.5GHz.
Volume: 8
Issue: 1
Page: 189-197
Publish at: 2018-02-01

A Comparative Study of Phase Offset Disposition Sinusoidal Pulse Width Modulation (POD-SPWM) and Symmetrical Pulse Width Modulation Switching Techiques for Generalized Current Source Multilevel Inverter(MCSI)

10.11591/ijeecs.v9.i2.pp395-402
Nik Fasdi Nik Ismail , Nasrudin Abdul Rahim , Siti Rohani Sheikh Raihan , Yusuf Al-Turki
This paper presents a comparison between two switching techniques namely Phase Offset Disposition Sinusoidal PWM (POD-SPWM) and Symmetrical PWM switching for a generalized current source multilevel inverter (MCSI) topology. One of the advantages of MCSI is it can reduce the total harmonic distortion (THD) at the output load current with a sinusoidal current waveform. In this paper, the generalized MCSI with the different levels has been developed with Matlab@simulation software in order to study the performance of the two switching schemes for the operation of the MCSI. From the simulation results, POD-SPWM switching technique can give better THD results compare to symmetrical switching technique.
Volume: 9
Issue: 2
Page: 395-402
Publish at: 2018-02-01

Schedulability of Rate Monotonic Algorithm using Improved Time Demand Analysis for Multiprocessor Environment

10.11591/ijece.v8i1.pp429-440
Leena Das , Sourav Mohapatra , Durga Prasad Mohapatra
Real-Time Monotonic algorithm (RMA) is a widely used static priority scheduling algorithm. For application of RMA at various systems, it is essential to determine the system’s feasibility first. The various existing algorithms perform the analysis by reducing the scheduling points in a given task set. In this paper we propose a schedubility test algorithm, which reduces the number of tasks to be analyzed instead of reducing the scheduling points of a given task. This significantly reduces the number of iterations taken to compute feasibility. This algorithm can be used along with the existing algorithms to effectively reduce the high complexities encountered in processing large task sets. We also extend our algorithm to multiprocessor environment and compare number of iterations with different number of processors. This paper then compares the proposed algorithm with existing algorithm. The expected results show that the proposed algorithm performs better than the existing algorithms.
Volume: 8
Issue: 1
Page: 429-440
Publish at: 2018-02-01

Audio Denoising Based on Short Time Fourier Transform

10.11591/ijeecs.v9.i1.pp89-92
J. S. Ashwin , N. Manoharan
This paper presents a novel audio de-noising scheme in a given speech signal. The recovery of original from the communication channel without any noise is a difficult task. Many de-noising techniques have been proposed for the removal of noises from a digital signal. In this paper, an audio de-noising technique based on Short Time Fourier Transform (STFT) is implemented. The proposed architecture uses a novel approach to estimate environmental noise from speech adaptively. Here original speech signals are given as input signal. Using AWGN, noises are added to the signal. Then noised signals are de-noised using STFT techniques. Finally Signal to Noise Ratio (SNR), Peak Signal to Noise Ratio (PSNR) values for noised and de-noised signals are obtained.
Volume: 9
Issue: 1
Page: 89-92
Publish at: 2018-01-01

Development of Learning Tools using Maples for Engineering Mathematics Subject

10.11591/ijeecs.v9.i1.pp131-138
Norlenda Mohd Noor , Hanifah Sulaiman , Zuraida Alwadood , Suhaila Abd Halim , Nurul Filzah Syamimi Wahid , Nor Adilah Ab Halim
Mathematics is one of the basic and core subject for engineering students. Learning mathematics helps in developing problem solving skills as the subject requires critical thinking. However, many students perceive mathematics as a difficult subject and eventually get poor result for the subject. In the institution under study, there were increases in failure rate for the subject for the past few semesters. Based on a preliminary study, it was found that 55 percent of engineering student claimed that they encountered difficulties in visualizing functions in 3-dimensional space, which is the main content for engineering calculus subject. This fact is very unsatisfactory as engineering students are expected to possess strong mathematical problem solving skills. In light of this, the objective of this research is to develop an interactive teaching and learning tools, so as to assist students in visualizing 3-dimensional space functions. The tool is intended to be used in teaching and learning process in classrooms and it is expected that the students’ understanding in the subject could be improved.
Volume: 9
Issue: 1
Page: 131-138
Publish at: 2018-01-01
Show 1451 of 1955

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration