Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

28,719 Article Results

Classification with Single Constraint Progressive Mining of Sequential Patterns

10.11591/ijece.v7i4.pp2142-2151
Regina Yulia Yasmin , Putri Saptawati , Benhard Sitohang
Classification based on sequential pattern data has become an important topic to explore. One of research has been carried was the Classify-By-Sequence, CBS. CBS classified data based on sequential patterns obtained from AprioriLike sequential pattern mining. Sequential patterns obtained were called CSP, Classifiable Sequential Patterns. CSP was used as classifier rules or features for the classification task. CBS used AprioriLike algorithm to search for sequential patterns. However, AprioriLike algorithm took a long time to search for them. Moreover, not all sequential patterns were important for the user. In order to get the right and meaningful features for classification, user uses a constraint in sequential pattern mining. Constraint is also expected to reduce the number of sequential patterns that are short and less meaningful to the user. Therefore, we developed CBS_CLASS* with Single Constraint Progressive Mining of Sequential Patterns or Single Constraint PISA or PISA*. CBS_Class* with PISA* was proven to classify data in faster time since it only processed lesser number of sequential patterns but still conform to user’s need. The experiment result showed that compared to CBS_CLASS, CBS_Class* reduced the classification execution time by 89.8%. Moreover, the accuracy of the classification process can still be maintained. 
Volume: 7
Issue: 4
Page: 2142-2151
Publish at: 2017-08-01

Single Channel Speech Enhancement using Wiener Filter and Compressive Sensing

10.11591/ijece.v7i4.pp1941-1951
Amart Sulong , Teddy Surya Gunawan , Othman O Khalifa , Mira Kartiwi , Hassan Dao
The speech enhancement algorithms are utilized to overcome multiple limitation factors in recent applications such as mobile phone and communication channel. The challenges focus on corrupted speech solution between noise reduction and signal distortion. We used a modified Wiener filter and compressive sensing (CS) to investigate and evaluate the improvement of speech quality. This new method adapted noise estimation and Wiener filter gain function in which to increase weight amplitude spectrum and improve mitigation of interested signals. The CS is then applied using the gradient projection for sparse reconstruction (GPSR) technique as a study system to empirically investigate the interactive effects of the corrupted noise and obtain better perceptual improvement aspects to listener fatigue with noiseless reduction conditions. The proposed algorithm shows an enhancement in testing performance evaluation of objective assessment tests outperform compared to other conventional algorithms at various noise type conditions of 0, 5, 10, 15 dB SNRs. Therefore, the proposed algorithm significantly achieved the speech quality improvement and efficiently obtained higher performance resulting in better noise reduction compare to other conventional algorithms. 
Volume: 7
Issue: 4
Page: 1941-1951
Publish at: 2017-08-01

Design and Simulation of Automatic Temperature Control and Alert System Based PIC16F887

10.11591/ijict.v6i2.pp95-104
Jabbar Shaati Jahlool
In this research, the design and simulation of an automatic system for temperature control using embedded system in order to automatically control of multi appliances depend on the temperature value. The appliances will be controlled are ventilation, cooling, heating and alert. this is an order to avoid or reduce to human intervention and increase system reliability. An important feature of this automation process is to reduce or eliminate the possibility of relying on the human factor operator for industries, warehouses and laboratories, and to improve working and performance environments. The system in this paper used the microcontroller PIC16F887 as the central control unit, LM35 temperature sensor as a temperature source,16x2 liquid crystal display (LCD) as indicator to display the different system working status an addition to some of drivers, relay and light emitting diodes (LED) as indicators to display the corresponding working appliance driver. The implementation and simulation of the system work has been achieved by using proteus professional software v8.0 and mikroc pro for pic v .6.6.1 software to write the equivalent program and generate .hex file for system working. The result shows in figures 5, 6, 7, and 8 that explain the system working cases
Volume: 6
Issue: 2
Page: 95-104
Publish at: 2017-08-01

A Big Data Security using Data Masking Methods

10.11591/ijeecs.v7.i2.pp449-456
Archana R A , Ravindra S Hegadi , Manjunath T N
Due to Internet of things and social media platforms, raw data is getting generated from systems around us in three sixty degree with respect to time, volume and type. Social networking is increasing rapidly to exploit business advertisements as business demands. In this regard there are many challenges for data management service providers, security is one among them. Data management service providers need to ensure security for their privileged customers in providing accurate and valid data. Since underlying transactional data have varying data characteristics such huge volume, variety and complexity, there is an essence of deploying such data sets on to the big data platforms which can handle structured, semi-structured and un-structured data sets. In this regard we propose a data masking technique for big data security. Data masking ensures proxy of original dataset with a different dataset which is not real but looks realistic. The given data set is masked using modulus operator and the concept of keys. Our experiment advocates enhanced modulus based data masking is better with respect to execution time and space utilization for larger data sets when compared to modulus based data masking. This work will help big data developers, quality analysts in the business domains and provides confidence for end-users in providing data security.
Volume: 7
Issue: 2
Page: 449-456
Publish at: 2017-08-01

A Review on Constant Switching Frequency Techniques for Direct Torque Control of Induction Motor

10.11591/ijeecs.v7.i2.pp364-372
Auzani Jidin , Kasrul Abdul Karim , Khairi Rahim , Logan Raj Lourdes Victor Raj , Sundram Ramahlingam , Tole Sutikno
The Direct Torque Control (DTC) of induction machine has received wide acceptance in many Variable Speed Drive (VSD) applications due to its simple control structure and excellent torque dynamic control performances. However, the conventional DTC which employs a two-level inverter and hysteresis controllers produces two major drawbacks, namely, larger torque ripple and variable switching frequency, which might produce a very high switching frequency (or power loss), particularly at a very low speed operation. This paper highlight the common methods used to provide the constant switching frequency for DTC drives for Induction Motor that able to minimize the power losses and reduced the torque ripple.
Volume: 7
Issue: 2
Page: 364-372
Publish at: 2017-08-01

Tiarrah Computing: The Next Generation of Computing

10.11591/ijict.v6i2.pp129-138
Yanish Pradhananga , Pothuraju Rajarajeswari
The evolution of Internet of Things (IoT) brought about several challenges for the existing Hardware, Network and Application development. Some of these are handling real-time streaming and batch bigdata, real- time event handling, dynamic cluster resource allocation for computation, Wired and Wireless Network of Things etc. In order to combat these technicalities, many new technologies and strategies are being developed. Tiarrah Computing comes up with integration the concept of Cloud Computing, Fog Computing and Edge Computing. The main objectives of Tiarrah Computing are to decouple application deployment and achieve High Performance, Flexible Application Development, High Availability, Ease of Development, Ease of Maintenances etc. Tiarrah Computing focus on using the existing opensource technologies to overcome the challenges that evolve along with IoT. This paper gives you overview of the technologies and design your application as well as elaborate how to overcome most of existing challenge.
Volume: 6
Issue: 2
Page: 129-138
Publish at: 2017-08-01

Efficient Proximity Coupled Feed Rectangular Microstrip Patch Antenna with Reduced Harmonic Radiation

10.11591/ijeecs.v7.i2.pp500-506
Dawit Fistum
This paper presents an efficient proximity coupled feed rectangular microstrip patch antenna with reduced harmonic radiation. The proposed antenna resonates in S-band at frequency of 2.45 GHz with bandwidth of 88.5 MHz. A very good return loss of -47.0546 dB is obtained for the Microstrip patch antenna. The antenna matching can be achieved with an appropriate line-patch overlap, but with a careful design consideration. Not only the good matching of the fundamental mode, but also the effect on the harmonic radiation from the other patch modes has been considered. Varying the length & location of the microstrip feed line and introducing a defect in the ground plane- the harmonic radiation from the other patch mode is reduced to minimum.
Volume: 7
Issue: 2
Page: 500-506
Publish at: 2017-08-01

Stator Inter-turn Fault Detection in Inverter Fed Induction Motor Drives

10.11591/ijape.v6.i2.pp89-102
Khadim Moin Siddiqui , Kuldeep Sahay , V. K. Giri
The Squirrel Cage Induction Motor (SCIM) with advanced power electronic inverters presents the greater advantages on cost and energy efficiency as compared with other industrial solutions for varying speed applications. In recent, the inverter fed induction motors are being popular in the industries. These inverter fed-motors are recently gathering great recognition for multimegawatt industrial drive applications. In this present paper, a dynamic simulation model of PWM inverter fed SCIM with direct torque control jointly has been presented and analyzed in the recent MATLAB/Simulink environment. From the proposed simulation model, the transient behavior of SCIM has been analysed for healthy as well as for stator inter-turn fault condition. The dynamic simulation of induction motor is one of the key steps in the validation of design process of the electric motor and drive system. It is extremely needed for eliminating probable faults beforehand due to inadvertent design mistakes and changes during operation. The simulated model gives encouraging results with reduced harmonics [1]. By using the model, the successful detection of stator inter-turn fault of the SCIM is carried out in the transient condition. Therefore, early stator fault detection is possible and may avoid the motor to reach in the catastrophic conditions. Therefore, may save millions of dollars for industries.
Volume: 6
Issue: 2
Page: 89-102
Publish at: 2017-08-01

A Fast Strategy to determine the Physical and Electrical Parameters of Photovoltaic Silicon Cell

10.11591/ijape.v6.i2.pp103-112
El Hadi Chahid , Mohammed Idali Oumhand , Abdessamad Malaoui
This paper proposes a fast strategy to extract and exploit the electrical parameters of photovoltaic cell using the double-diode model. The polycrystalline silicon (poly-Si) junction is chosen in this work due to the importance of its proprieties in industrial and economic fields. The proposed method to extract the solar cell electrical parameters contains two steps. The first is based on the graphical adjustments to choose the initial values of these parameters, and the second is numerical, using Modified Newton-Raphson’s algorithm. The obtained parameters extractions values are compared to the others methods and give a considerable agreement. Furthermore, we have developed a complementary analytical method to deduce both the minority’s carrier’s lifetime and the diffusion lengths through the diffusion and recombination current densities. The found values of these parameters are precisely comparable with theoretical models, and give very useful informations on the intrinsic quality of the studied cell.
Volume: 6
Issue: 2
Page: 103-112
Publish at: 2017-08-01

Survey of Detection SIP Malformed Messages

10.11591/ijeecs.v7.i2.pp457-465
Mourade Azrour , Mohammed Ouanan , Yousef Farhaoui
Session Initiation Protocol (SIP) is an application layer protocol designed to control and establish multimedia sessions over internet. SIP gaining more and more popularity as it is used by numerous applications such as telephony over IP(ToIP). SIP is a text based protocol built on the base of the HTTP and SMTP protocols. SIP suffers from certain security threats which need to be resolved in order to make it a more efficient signaling protocol. In this work, we review the proposed works aimed to detect SIP malformed messages that can cause security problem. Then, we classify the type of malformed SIP message and compare between the mechanisms used to reinforce the detection of malformed SIP message attack.
Volume: 7
Issue: 2
Page: 457-465
Publish at: 2017-08-01

dSPACE Implementation for a Fuzzy Logic Voltage Control using a Self-Excited Induction Generator and a Voltage Source Inverter

10.11591/ijece.v7i4.pp1749-1759
Rachid El Akhrif , Ahmed Abbou , Mohamed Barara , Mohamed Akherraz , Youssef Majdoub
The present work describes the analysis  of a control scheme for keeping  the  RMS voltage output  constant, the system is  supplying  by a self-excited induction generator with variable speed and load. A comparison is examined between simulation and experimental results using dSPACE board. the results are provided to verify the effectiveness of this approach and gives very high performance.
Volume: 7
Issue: 4
Page: 1749-1759
Publish at: 2017-08-01

FPGA-based Design System for a Two-Segment Fibonacci LFSR Random Number Generator

10.11591/ijece.v7i4.pp1882-1891
Zulfikar Zulfikar , Yuwaldi Away , Rafiqa Shahnaz Noor
For a long time, random numbers have been used in many fields of application. Much work has been conducted to generate truly random numbers and is still in progress. A popular method for generating random numbers is a linear-feedback shift register (LFSR). Even though a lot of work has been done using this method to search for truly random numbers, it is an area that continues to attract interest. Therefore, this paper proposes a circuit for generating random numbers. The proposed circuit is designed to produce different sequences of numbers. Two segments of Fibonacci LFSR are used to form a generator that can produce more varied random numbers. The proposed design consists of blocks: segment 1, segment 2, and a clock controller. The system produces random numbers based on an external clock. The clock signal for the first segment is that of the external clock, whereas that for the second segment is modified by the clock controller. The second stage (segment 2) is executed only after every 2n1−1 clock cycles. The proposed design can generate different sequences of random numbers compare to those of the conventional methods. The period of the proposed system is less than that of the original Fibonacci LFSR. However, the period is almost equal to the original one when the system is realized in 32-bit or 64-bit form. Finally, the proposed design is implemented on a field-programmable gate array (FPGA). It occupies more area and runs at a lower frequency compared with the original Fibonacci LFSR. However, the proposed design is more efficient than the segmented leap-ahead method concerning space occupancy.
Volume: 7
Issue: 4
Page: 1882-1891
Publish at: 2017-08-01

Formal Specification of QoS Negotiation in ODP System

10.11591/ijece.v7i4.pp2045-2053
Abdessamad Jarrar , Youssef Balouki , Taoufiq Gadi
The future of Open Distributed Processing systems (ODP) will see an increasing of components number, these components are sharing resources. In general, these resources are offering some kind of services. Due to the huge number of components, it is very difficult to offer the optimum Quality of service (QoS). This encourages us to develop a model for QoS negotiation process to optimize the QoS in an ODP system. In such system, there is a High risk of software or hardware failure. To ensure good performance of a system based on our model, we develop it using a formal method. In our case, we will use Event-B to get in the end of our development a system correct by construction.
Volume: 7
Issue: 4
Page: 2045-2053
Publish at: 2017-08-01

Techno-economic Evaluation of Stand-alone Hybrid Renewable Energy System for Remote Village Using HOMER-pro Software

10.11591/ijape.v6.i2.pp73-88
Ajoya Kumar Pradhan , Mahendra Kumar Mohanty , Sanjeeb Kumar Kar
The off-grid hybrid renewable energy generation system has lesser cost of energy with higher reliability when compared with solar Photovoltaic (PV) or wind energy system individually. The optimization design is worked out by reducing the Unit Cost Of Energy (UCOE) for different case studies and comparing the outcomes obtained by the use of HOMER-Pro (hybrid optimization model of electric renewable) software. The optimal cash flow analysis of hybrid energy system is based on the load patterns is discussed, solar irradiance (kW/m2) of site at proper latitude and longitude, wind speed and price of diesel, which is collected from a remote village in Khurda District, Odisha in India. Moreover, the optimization and sensitivity results of the system are find out by varying the input parameters like solar radiation, wind speed etc.
Volume: 6
Issue: 2
Page: 73-88
Publish at: 2017-08-01

The Analysis of Performace Model Tiered Artificial Neural Network for Assessment of Coronary Heart Disease

10.11591/ijece.v7i4.pp2183-2191
Wiharto Wiharto , Harianto Herianto , Hari Kusnanto
The assessment model of coronary heart disease is so much developed in line with the development of information technology, particularly the field of artificial intelligence. Unfortunately, the assessment models developed mostly do not use such an approach made by the clinician, the tiered approach. This study aims to analyze the performance of a tiered model assessment. The method used for each level is, preprocessing, building architecture artificial neural network (ANN), conduct training using the Levenberg-Marquardt algorithm and one step secant, as well as testing the system. The study is divided into the terms of the stages in the examination procedure. The test results showed the influence of each level, both when the output level of the previous positive or negative, were tested back at the next level. The performance evaluation may indicate that the top level provides performance improvement and or reinforce the previous level. 
Volume: 7
Issue: 4
Page: 2183-2191
Publish at: 2017-08-01
Show 1461 of 1915

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration