Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

27,404 Article Results

A New P System Based Genetic Algorithm

10.11591/ijeecs.v4.i1.pp165-168
Caiping Hou , Xiyu Liu
For the “early convergence” or the “genetic drift” of the genetic algorithm, this paper proposes a new genetic algorithm based on P system. Based on the parallel mechanism of P system in membrane computing, we put forward the new P system based genetic algorithm (PBGA). So that we can improve the performance of GA.
Volume: 4
Issue: 1
Page: 165-168
Publish at: 2016-10-01

Android Malware Detection Using Backpropagation Neural Network

10.11591/ijeecs.v4.i1.pp240-244
Fais Al Huda , Wayan Firdaus Mahmudy , Herman Tolle
The rapid growing adoption of android operating system around the world affects the growth of malware that attacks this platform. One possible solution to overcome the threat of malware is building a comprehensive system to detect existing malware. This paper proposes multilayer perceptron artificial neural network trained with backpropagation algorithm to determine an application is malware or non-malware application which is often called benign application. The parameters that used in this study based on the list of permissions in the manifest file, the battery rating based on permission, and the size of the application file. Final weights obtained in the training phase will be used in mobile applications for malware detection. The experimental results show that the proposed method for detection of malware on android is effective. The effectiveness is demonstrated by the results of the accuracy of the system developed in this study is relatively high to recognize existing malware samples.
Volume: 4
Issue: 1
Page: 240-244
Publish at: 2016-10-01

Insulating Material Erosion in Atmospheric Non-Thermal Plasma Jet Device

10.11591/ijeecs.v4.i1.pp20-28
K. M. Ahmed , T. M. Allam , M. A. Abouelatta , S. A. Ward , A. A. Lashin , H. M. Soliman
This paper reports on the selection of insulating material types in a developed atmospheric-pressure non-thermal plasma jet (ANPJ-II) device which was operated previously in our laboratory based on the minimum erosion area of the insulator’s nozzle. Three identical insulator groups used in our experiment include; Teflon insulator material with different thicknesses of 1.5 mm and 2 mm respectively, and Ceramic insulating material with thickness of 2 mm. ANPJ-II device is operated with each of the three insulator groups. These insulators are operated and analyzed with different operation times for compressed Air or Nitrogen gas with a flow rate of 12 L/min and input voltage of 6 kV.  The erosion area of these insulator materials is measured as a function of the operation time. The Ceramic insulator was found to have the minimum erosion area. Also, the temperature of both the cathode and the insulating material (Teflon or Ceramic) are measured to study the effect of operation time and the gas type on the device components.
Volume: 4
Issue: 1
Page: 20-28
Publish at: 2016-10-01

The Peak of the PQRST and the Trajectory Path of Each Cycle of the ECG 12-Lead Wave

10.11591/ijeecs.v4.i1.pp169-175
Sabar Setiawidayat , Djanggan Sargowo , Setyawan P. Sakti , Sri Andarini
The objective of this present article is to describe the record of the ECG 12-lead examination in order to obtain the peaks of the P, Q, R, S and T from each cycle and also to present the Peak of the PQRST and the trajectory path of each cycle of the ECG 12- lead wave. The duration of the peak R to another is used as the period  of each cycle, while the Phytagoras theorem is employed to count the trajectory path of the wave in each step. The Peak PQRST is utilized to diagnose the  heart condition, and the trajectory path  is the distance taken up by the impulses in the heart muscles. The discrete data from the MIT-BIH and the results of the measurement itself are employed as the data to obtain the values of the peak PQRST and the trajectory path of the wave of each cycle.
Volume: 4
Issue: 1
Page: 169-175
Publish at: 2016-10-01

Two Dimensional Tunable Optical-CDMA System

10.11591/ijeecs.v4.i1.pp125-132
Rajesh Yadav Yadav , Gurjit Kaur Kaur
In this work an experimental demonstration is proposed to implement the synchronous optical code division multiple access system using two dimensional wavelength hopping and time spreading optical prime code is presented. An optical CDMA system is configured on latest version of optisystem by optiwave for the 20 users (Prime Number = 5) connected in a network operating at a bit rate 10 Gbps each. Tunability is achieved by using a MATLAB based delay selector which serves as the source of control signal for optical delay lines. The encoded optical signal of each user has been assigned a particular mode. The resulting optical signal is then transmitted over parabolic index multimode optical fiber. The received signal can successfully be retrieved at the decoder, when the encoder and decoder are configured for the same user. The performance of Optical CDMA system is evaluated in terms of the autocorrelation and cross correlation function, BER, Q factor, eye diagram and compared with 1D code for a given prime number. 
Volume: 4
Issue: 1
Page: 125-132
Publish at: 2016-10-01

TreeNet Analysis of Human Stress Behavior using Socio-Mobile Data

10.11591/ijeecs.v4.i1.pp148-154
B. Padmaja , V. V. Rama Prasad , K. V. N
Human behavior is essentially social and humans start their daily routines by interacting with others. There are many forms of social interactions and we have used mobile phone based social interaction features and social surveys for finding human stress behavior. For this, we gathered mobile phone call logs data set containing 111444 voice calls of 131 adult members of a living community for a period of more than 5 months. And we identified that top 5 social network measures like hierarchy, density, farness, reachability and eigenvector of individuals have profound influence on individuals stress levels in a social network. If an ego lies in the shortest path of all other alters then the ego receives more information and hence is more stressed. In this paper, we have used TreeNet machine learning algorithm for its speed and immune to outliers. We have tested our results with another Random Forest classifier as well and yet, we found TreeNet to be more efficient. This research can be of vital importance to economists, professionals, analysts, and policy makers.
Volume: 4
Issue: 1
Page: 148-154
Publish at: 2016-10-01

A Novel Generalized Topology for Multi-level Inverter with Switched Series-Parallel DC Sources

10.11591/ijeecs.v4.i1.pp41-51
S. Sridhar , P. Satish Kumar , M. Susham
This paper presents a novel topology of Single-phase multilevel inverter for low and high power applications. It consists of polarity (Level) generation circuit and H Bridge to generate both positive and negative polarities. The proposed topology can produce more output voltage levels by switching dc voltage sources in series and parallel. The proposed topology utilizes minimum number of power electronic devices which leads to the reduction of cost, size, and weight low and consumes low power which improves the efficiency. Switching pulses are generated using Phase disposition (PD) pulse width modulation technique. Finally the effectiveness of the proposed topology is verified using MATLAB/SIMULINK software tool. 7level asymmetrical multilevel inverter prototype hardware is prepared to support the proposed topology to verify the effectiveness and its validity.
Volume: 4
Issue: 1
Page: 41-51
Publish at: 2016-10-01

Quantitative Analysis and Comparison of Symmetric Cryptographic Security Algorithms

10.11591/ijeecs.v4.i1.pp116-124
Mahaba Saad , Khalid Youssef , Hala Abdel-Kader
Nowadays, the rapid evolution of communication systems offers, to a very large percentage of population, access to a huge amount of information and a variety of means to use in order to exchange personal data. Hence the search for the best solution to offer the necessary protection against the data intruders’ attacks along with providing these services in time is one of the most interesting subjects in the security related communities. Cryptography is usually referred to as “the study of secret”. Encryption is the process of converting normal text to unreadable form. There are a variety of encryption algorithms have been developed. This paper provides quantitative analysis and comparison of some symmetric key cryptographic ciphers (DES, 3DES, AES, Blowfish, RC5, and RC6).  The quantitative analysis approach is a step towards optimizing the security operations for an efficient next generation family of network processors with enhanced speed and power performance. A framework will be proposed as a reference model for quantitative analysis of security algorithm mathematical and logical operations. 
Volume: 4
Issue: 1
Page: 116-124
Publish at: 2016-10-01

Website Quality Evaluation Based on Search Engine Queries using Web Rank Position Algorithm (WRPA)

10.11591/ijeecs.v4.i1.pp224-230
Chandran M , Ramani A. V
The research work is about to test the quality of the website and to improve the quality by analyzing the hit counts, impressions, clicks, count through rates and average positions. This is accomplished using WRPA and SEO technique. The quality of the website mainly lies on the keywords which are present in it. The keywords can be of a search query which is typed by the users in the search engines and based on these keywords, the websites are displayed in the search results. This research work concentrates on bringing the particular websites to the first of the search result in the search engine. The website chosen for research is SRKV. The research work is carried out by creating an index array of Meta tags. This array will hold all the Meta tags. All the search keywords for the website from the users are stored in another array. The index array is matched and compared with the search keywords array. From this, hit to count is calculated for the analysis. Now the calculated hit count and the searched keywords will be analyzed to improve the performance of the website. The matched special keywords from the above comparison are included in the Meta tag to improve the performance of the website. Again all the Meta tags and newly specified keywords in the index array are matched with the SEO keywords. If this matches, then the matched keyword will be stored for improving the quality of the website. Metrics such as impressions, clicks, CTR, average positions are also measured along with the hit counts. The research is carried out under different types of browsers and different types of platforms. Queries about the website from different countries are also measured. In conclusion, if the number of the clicks for the website is more than the average number of clicks, then the quality of the website is good. This research helps in improvising the keywords using WRPA and SEO and thereby improves the quality of the website easily.
Volume: 4
Issue: 1
Page: 224-230
Publish at: 2016-10-01

Impact of Distributed Power Flow Controller to Improve Line Flow Based on PWM Control with PI Technique

10.11591/ijeecs.v4.i1.pp57-64
Subramani C , S. S. Dash , Vimala C , Uma Mageshwari
In this paper we presents a new component within the flexible ac-transmission system (FACTS) family, called Distributed Power-Flow Controller (DPFC). The DPFC is derived from the unified power-flow controller (UPFC). The DPFC can be considered as a UPFC with an eliminated common dc link. The active power exchange between the shunt and series converters, which is through the common dc link in the UPFC, is now through the transmission lines at the third-harmonic frequency. The DPFC employs the distributed FACTS (DFACTS) concept, which is to use multiple small-size single-phase converters instead of the one large-size three-phase series converter in the UPFC. The large number of series converters provides redundancy, thereby increasing the system reliability. As the D-FACTS converters are single-phase and floating with respect to the ground, there is no high-voltage isolation required between the phases. Accordingly, the cost of the DPFC system is lower than the UPFC. The DPFC has the same control capability as the UPFC, which comprises the adjustment of the line impedance, the transmission angle, and the bus voltage. The controller is designed to achieve the most appropriate operating point based on the real power priority.
Volume: 4
Issue: 1
Page: 57-64
Publish at: 2016-10-01

Optimal Power and Modulation Adaptation Policies with Receiver Diversity over Rayleigh Fading Channel

10.11591/ijeecs.v4.i1.pp104-115
Muhammad Imran Tariq , Razvan Beuran , Yoichi Shinoda
Efficient bandwidth utilization is paramount in wireless communication systems, particulary in fadingenvironments, since fading is one of the major constraints that impair communication in wireless systems.The bandwidth efficiency of a wireless communication system can be enhanced significantly by employingpower and modulation adaptation policies with diversity combining gain. In this work, first we examine ananalytically-derived solution for Maximum Combining Ratio (MRC) diversity technique for the capacity perunit bandwidth. Then, we design an adaptive transmission system to utilize the diversity combining gain whileretaining the target BER by adapting power and constellation size using continuous power, channel inversionwith fixed rate and continuous power and disrecte-rate. By considering the effect of diversity combininggain, the designed system yields a reasonable spectral efficiency with respect to target BER that grows asthe number of diversity levels increase. Furthermore, the presented results show continuous power anddiscrete-rate adaptation policy reduces probability of outage unlike its achieved spectral efficiency is closeto other selected policies, which ratifies the optimized switching thresholds and makes it best candidate forimperfect channel conditions.
Volume: 4
Issue: 1
Page: 104-115
Publish at: 2016-10-01

A Secured Cloud Data Storage with Access Privileges

10.11591/ijece.v6i5.pp2338-2344
Naresh Vurukonda , B. Thirumala Rao , B. Tirapathi Reddy
In proposed framework client source information reinforcements off-site to outsider distributed storage benefits to decrease information administration costs. In any case, client must get protection ensure for the outsourced information, which is currently safeguarded by outsiders. To accomplish such security objectives, FADE is based upon an arrangement of cryptographic key operations that are self-kept up by a majority of key supervisors that are free of outsider mists. In unmistakable, FADE goes about as an overlay framework that works flawlessly on today's distributed storage administrations. Actualize a proof-of-idea model of FADE on Amazon S3, one of today's distributed storage administrations. My work oversee, esteem included security highlights acclimatize were today's distributed storage administration. our research work proceeds in ensuring the file access control and assured deletion in multi cloud environment and reducing the meta data management, there by the cloud storage become more attractive and many users will adopt the cloud space in order to diminish the data storage cost.
Volume: 6
Issue: 5
Page: 2338-2344
Publish at: 2016-10-01

The Development of Digital Library User Interface by Using Responsive Web Design and User Experience

10.11591/ijeecs.v4.i1.pp195-202
Dimas Sasongko , Ridi Ferdiana , Rudy Hartanto
The digital library has the purpose of providing services to the user, therefore, user experience factor and adjusting the display device diversity becomes the main thing to consider in building a digital library. The digital library is visited by many users because it provides a lot of information so that the existing content should be accessible anywhere, anytime and using a variety of devices. This research focuses on the design of digital library interface that adapts to the user experience and a variety of devices. The method used in this study is testing the user experience for the evaluation of digital library interface and Responsive Web Design for the development of digital library interface. The confidence interval is used as the analysis of the test data. Implementation of the user experience and Responsive Web Design in the digital library interface design proposals can improve the estimated percentage of success and task time users.
Volume: 4
Issue: 1
Page: 195-202
Publish at: 2016-10-01

Analysis and Comparison of SMAC and TMAC Protocol for Energy Efficient Dynamic Topology in Sensor Network

10.11591/ijece.v6i5.pp2331-2337
Tapaswini Samant , Amlan Datta
In the era of wireless communication, wireless sensor is one of the best technologies we are witnessing. In case of environmental monitoring, tactical systems and different tracking applications, wireless sensors are being used. Here, the corresponding nodes operate on incomplete power and thus the energy comes into play to operate these entire networks. Managing the energy and its utilization is vital for TCP/IP protocol suite which is MAC layer’s application. Thus keeping in mind the above challenges, the techniques used are increasing the sleep duration, over hearing and ideal listening, collision of packet and eliminating hidden terminal problem. This paper is oriented towards the comparison of energy consumption by SMAC and TMAC protocol. The characteristics of TMAC and SMAC protocols were explored keeping real transmission conditions intact, like variable transmission bit rate, dynamic topology and mobile sensors in network. TMAC and SMAC protocols are contention based protocols and are designed to keep the energy consumption low using duty cycle.
Volume: 6
Issue: 5
Page: 2331-2337
Publish at: 2016-10-01

Multicriteria Group Decision Making Using Fuzzy Approach for Evaluating Criteria of Electrician

10.11591/ijece.v6i5.pp2462-2469
Wiwien Hadikurniawati , Khabib Mustofa
This paper presents an approach of fuzzy multicriteria group decision making in determining alternatives to solve the selection problem of the electrician  through  a competency test.   Fuzzy approach is used to determine the highest priority of alternative electrician who has knowledge and ability that best fits the given parameters. Linguistic variables are presented by triangular fuzzy numbers. They are used to represent a subjective assessment of the decision-makers so that uncertainty and imprecision in the selection process can be minimized. Fuzzy approach require transforming crisp data to fuzzy numbers. Output of the best alternatives is generated by ranking method. Ranking has been made base on eight criteria which make the evaluation basis of each alternative. Ranking of the results is determined using different value of optimism index (). The fuzzy multi criteria decision making (FMCDM) calculation is using the best alternative using three value of optimism index. The result of calculation shows that the same alternative reached from different index of optimism. This alternative is the highest priority of decision making process.
Volume: 6
Issue: 5
Page: 2462-2469
Publish at: 2016-10-01
Show 1454 of 1827

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration