Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

28,188 Article Results

Ontology Matching using BabelNet Dictionary and Word Sense Disambiguation Algorithms

10.11591/ijeecs.v5.i1.pp196-205
Mohamed Biniz , Rachid el Ayachi , Mohamed Fakir
Ontology matching is a discipline that means two things: first, the process of discovering correspondences between two different ontologies, and second is the result of this process, that is to say the expression of correspondences. This discipline is a crucial task to solve problems merging and evolving of heterogeneous ontologies in applications of the Semantic Web. This domain imposes several challenges, among them, the selection of appropriate similarity measures to discover the correspondences. In this article, we are interested to study algorithms that calculate the semantic similarity by using Adapted Lesk algorithm, Wu & Palmer Algorithm, Resnik Algorithm, Leacock and Chodorow Algorithm, and similarity flooding between two ontologies and BabelNet as reference ontology, we implement them, and compared experimentally. Overall, the most effective methods are Wu & Palmer and Adapted Lesk, which is widely used for Word Sense Disambiguation (WSD) in the field of Automatic Natural Language Processing (NLP).
Volume: 5
Issue: 1
Page: 196-205
Publish at: 2017-01-01

Efficient Phase Recovery System

10.11591/ijeecs.v5.i1.pp123-129
Mohamed Saber
An efficient, stable and reliable system to detect the unknown phase of the input sinusoidal signal is presented. The proposed design is a feedback loop consists of subtractor, peak detector and direct digital synthesizer (DDS). DDS generates a sinusoidal signal with the same frequency of input signal and with initial zero phase. An error signal is the output of subtracor after subtracting DDS signal from input signal. The peak of amplitude of error signal has a mathematical relation to the phase difference between the two input signals. Peak detector is used to extract the phase difference from error signal and passes the result to DDS to control the generated phase. The loop continues until the generated phase of DDS is the same as the input unknown phase. The proposed phase estimator has been implemented using a field programmable gate array (FPGA), consumed less power about 330 mW, and worked at 200 MHz clock.
Volume: 5
Issue: 1
Page: 123-129
Publish at: 2017-01-01

Electrical Conductivity of Polyaniline Fiber Synthesized by Interfacial Polymerization and Electrospinning

10.11591/ijeecs.v5.i1.pp85-89
Ngurah Ayu Ketut Umiati , Kamsul Abraha , Kuwat Triyana
Polyaniline fiber is a promising biosensor material due to the capability of this material as an effective mediator for electron transfer. The polyaniline in fibre has wider surface to increase the electron transfer. In this work, polyaniline structure synthesized by interfacial polymerization was compared to polyaniline structure obtained from electrospinning to get a better fibre structure. Interfacial polymerization was carried out to form a polymerization between the water phase and the organic phase. The water phase was prepared from dopants, initiator and aquadestilata and the organic phase was was made from toluene as an organic solvent and aniline monomer. Electrospinning was conducted by using a dc high voltage 15 kV and 0.5 mm syringe needle to produce fibers from a melt polymer solution taken from interfacial polymerization. The scanning electro microscope results confimed the formation of polyaniline in structure of fiber. Resistance measurement by using LCR meter showed that polyaniline fiber resulted from electrospinning is more conductive than polyaniline fiber formed by interfacial polymerization method.  
Volume: 5
Issue: 1
Page: 85-89
Publish at: 2017-01-01

Speech Processing for Text Independent Amharic Language Dialect Recognition

10.11591/ijeecs.v5.i1.pp115-122
Abrham Debasu Mengistu , Dagnachew Melesew Alemayehu
Dialect is a difference of verbal communication spoken by people from a particular society or geographic area so the paper focuses on Amharic language dialect recognition. In this paper,  the authors have used backpropagation artificial neural network, VQ(vector quantization), (Gaussian Mixture Models) and a combination of GMM and backpropagation artificial neural network for classifying dialects of Amharic language speakers. In this research, a total of 100 speakers for each group of dialects are considered each having about 10 seconds duration is collected. The feature vectors of Mel frequency cepstral coefficients (MFCC) had been used to recognize the dialects of speakers. In this research paper the recognition model that uses a tanh activation function have a better result instead of using the Logistic Sigmoid activation function in backpropagation artificial neural network. After conducting the above experiments 95.7% accuracy achieved when GMM and backpropagation artificial neural network with tanh activation function are combined.
Volume: 5
Issue: 1
Page: 115-122
Publish at: 2017-01-01

Review of Dynamic Voltage Restorer Application for Compensation of Voltage Harmonics in Power Systems

10.11591/ijeecs.v5.i1.pp58-71
Mahmoud Zadehbagheri , Rahim Ildarabadi , Majid Baghaei Nejad , Tole Sutikno
Power distribution networks are considered the main link between power industry and consumers and they are exposed to public judgment and evaluation more than any other section. Thus, it is essential to study power quality in distribution section. On the other hand, power distribution networks have always been exposed to traditional factors such as  voltage sag, voltage swell, harmonics and capacitor switching which destruct sinusoidal waveforms and decrease power quality as well as network reliability. One of the methods by which power quality problems might be addressed is to apply power electronic devices in the form of custom power devices. One of such devices is Dynamic Voltage Restorer (DVR) which is connected in series to distribution networks. At the same time, through injection of voltage to the network it is able to control voltage amplitude and phase. It is  adopted lend to compensate for voltage sags through injecting series and synchronous three phase voltage. This paper reviews on the application of DVR for Voltage Compensation in recent years and gives sets of information for each control of the DVR in distribution networks.
Volume: 5
Issue: 1
Page: 58-71
Publish at: 2017-01-01

Virtual Laboratory of Unbalanced Transient Condition in Synchronous Generator

10.11591/ijeecs.v5.i1.pp1-10
Sugiarto Kadiman , Arif Basuki , Diah Suwarti
The electrical engineering department at the Sekolah Tinggi Teknologi Nasional (STTNAS), Yogyakarta has recently reconnoitered virtual laboratories for its undergraduate synchronous generator course to complement existing full-scale laboratory equipment. This study explores virtual laboratory development to be treated as an accessorial tool for enhancing instruction. The focus of this synchronous generator course is the dynamic transient behavior of the system after small disturbances as affected by the unbalanced load. The work is mainly carried out through nonlinear simulations under Matlab-Simulink. Results of the first version of the synchronous generator virtual laboratory and details of its development are provided.
Volume: 5
Issue: 1
Page: 1-10
Publish at: 2017-01-01

Spatial Modeling in Landslide Susceptibility

10.11591/ijeecs.v5.i1.pp139-146
Dwi Shanty Apriliani Gunadi , I Nengah Surati Jaya , Boedi Tjahjono
Landslide Susceptibility Mapping is one of the mitigation effort to detect vulnerable areas for minimizing the risk of landslide disasters. This paper describes spatial model development for assessing landslide susceptibility by considering human and biophysical factors. The main objective of this research is to develop a spatial modeling of landslide susceptibility, particularly in several regencies of West Java Province. The data analysis include data pre-processing, regression analysis, correlation analysis, score development, and weight determination using Principal Component Analysis (PCA).  The study found that  the most important factors that contributed to landslide susceptibility within the research area is the Landuse/Landcover, then  followed by Slope, Distance to River, Soil Type, Annual Rainfall, Population Density, Geology Age, Climate Type, and Geomorphology. The first three highest factors occupied almost 53% of the total weight. The model successfully estimated the spatial distribution and degree of landslide susceptibility into 3 classes having overall accuracy of about 68%.
Volume: 5
Issue: 1
Page: 139-146
Publish at: 2017-01-01

Android-Based 3D Visualization of Indonesia Medicinal Plants

10.11591/ijeecs.v5.i1.pp229-233
Lita Karlitasari , Ismanto Ismanto , Agung Prajuhana Putra
3D visualization of medicinal plants is the result of the transformation that resembles the original image and are dynamic, so it can be viewed in detail from all sides. Image capture is performed with a level of clarity must be at least 70% so it would be easy when designing a 3D visualization. The medicinal plants collected came from Bogor Botanical Gardens of 11 plants, Ciapus - Bogor of 16 plants, and Cibodas Botanical Gardens of 37 plants. The image capture was done by using the comparison scale of human height, stem, flowers, fruits, and leaves both look forward and backward. Application development was done through the objects collection, object segmentation, object texture creation and 3D object creation. The application of 3D visualization medicinal plants can be enlarged and reduced, and rotated well to the right, left, up, and down. The medicinal plants that appears in the application was in Indonesian and Latin names, taxon and the descriptions. Therefore the general public, students, and researchers can utilize the plant objects much better.
Volume: 5
Issue: 1
Page: 229-233
Publish at: 2017-01-01

Early Test Effort Prediction using UML Diagrams

10.11591/ijeecs.v5.i1.pp220-228
Pulak Sahoo , J R Mohanty
Software Testing is essential for delivering quality software products. Accurate test effort estimation is an important part of project planning. Prediction of test effort at early phases of Software Developmen Life Cycle enables managers to plan ahead for the testing phase. This increases the chances of the project meeting its timeline while achieving required quality. Unified Modeling Language is a widely-used standard for representing Object Oriented Systems. Use Case and Class Diagrams are two of the most important models of the system created during early phases of software development. This work proposed that the initial test effort is predicted early using Use Case Diagram during the requirement stage and is refined during design stage when Class Diagrams are available. The predicted test efforts in both stages are functions of parameters derived from Use Case and Class Diagrams. Estimations can be revised when rest of the UML diagrams are created.
Volume: 5
Issue: 1
Page: 220-228
Publish at: 2017-01-01

Attacks and Secure Geographic Routing In Wireless Sensor Networks

10.11591/ijeecs.v5.i1.pp147-158
Sabri Yassine , Najib El Kamoun
Due to open network nature of wireless sensor networks make them highly vulnerable to a variety of security attacks and easy target for adversaries, which may capture these nodes, analyze and easily insert fake route information. Wireless sensor network is an emerging, cost effective and unsupervised solution for collecting this information from the physical world and sending this information back to centralized authority for further processing. GRPW (Geographic Routing in connected wireless sensor networks based on Multiple Sinks) is one of the basic routing protocols used for Supporting Mobile Sinks in Wireless Sensor Networks. GRPW, a geographical routing protocol for wireless sensor networks, is based on an architecture partitioned by logical levels, on the other hand based on a multipoint relaying flooding technique to reduce the number of topology broadcast. GRPW-MuS uses periodic HELLO packets to neighbor detection. The wormhole attack can form a serious threat in wireless sensor networks, especially against many wireless sensor networks routing protocols and location-based wireless security systems. Here, a trust model to handle this attack in GRPW is provided called GRPW-MuS-s. Using OMNET++ simulation and the MiXiM framework, results show that GRPW-MuS-s protocol only has very small false positives for wormhole detection during the neighbor discovery process (less than GRPW). The average energy usage at each node for GRPW-MuS-s protocol during the neighbor discovery and route discovery is very low than GRPW-MuS, which is much lower than the available energy at each node. The cost analysis shows that GRPW-MuS-s protocol only needs small memory usage at each node, which is suitable for the sensor network.
Volume: 5
Issue: 1
Page: 147-158
Publish at: 2017-01-01

New Binary Code Combined with New Chaotic Map and Gold Code to Ameliorate the Quality of the Transmission

10.11591/ijeecs.v5.i1.pp166-180
Mohamed Krim , Adda Ali-Pacha , Naima Hadj-Said
While the private radio communications field has grown in recent years, the communication method known as spread spectrum name has gained much prominence. A spread spectrum method can be combined with multiple access method CDMA for dividing sequences to create multi-user communication systems with very good performance of interference between symbols.The production of the chaotic sequence in scanning system and the information system according to DS-CDMA remains a hot research problem in this study to supervise in the knowledge wireless communication. This fact is still a question in establishing the secret code random spread sequence between the transmitter and the receiver.In DS-SS’s spreading is important to embed security information.It can avoid many problems in the complex calculation of the true circle. Furthermore the pseudo chaotic is reconstructed in the conventional gold to change shape with the logical operator “XOR” the results in simulation result shows in progress.It improves also the computing speed as this can solve the new equation of the problem in the original logistic map.There certainly has a kind in design: spreading chaotic sequence, chaos with gold code; including the number of users.So these are less in number and also limit the security and to can improve the ameliorate the quality of the transmissionand performance in terms of allowable number of users.The Bit error rate (BER) performance of the system is evaluated in multi-user environment under AWGN and reveals that the DS-SS system using new binary code combined with new logistic mapand gold code to ameliorate the quality of the transmission.
Volume: 5
Issue: 1
Page: 166-180
Publish at: 2017-01-01

Design of Automatic Number Plate Recognition on Android Smartphone Platform

10.11591/ijeecs.v5.i1.pp99-108
Teddy Surya Gunawan , Abdul Mutholib , Mira Kartiwi
Automatic Number Plate Recognition (ANPR) is an intelligent system which has the capability to recognize the character on vehicle number plate. It is a combination of hardware and software designed to offer the optimum reliability. Since the past decades, many researchers have been proposed to recognize the vehicle number plate and implemented it in various access control, law enforcement and security, including parking management system, toll gate access, border access, tracking of stolen vehicles and traffic violations (speed trap, illegal parking, etc). However, previous researches implemented ANPR system on personal computer (PC) with high resolution camera and high computational capability. On the other hand, not many researches have been conducted on the design of ANPR in Android smartphone platform which has limited camera resolution and limited computational power. The main challenges of implementation ANPR algorithm on smartphone are higher coding efficiency, lower computational complexity, and higher the scalability. The objectives of this research is to design ANPR on Android smartphone, including graphical user interface (GUI) design, process design, and database design. First, a comprehensive survey on the pre-processing, segmentation, and optical character recognition is conducted. Secondly, proposed system development and algorithm implementation is explained in more details. Results show that our proposed design can be implemented effectively in Android smartphone platform.
Volume: 5
Issue: 1
Page: 99-108
Publish at: 2017-01-01

Data Integrity and Security [DIS] Based Protocol for Cognitive Radio Ad Hoc Networks

10.11591/ijeecs.v5.i1.pp187-195
Azeem Mohammed Abdul , Syed Umar
In the CRN (cognitive Radio Networks) the main issues to be addressed are spectrum scarcity and inadequate usage of spectrum. The CRN can analyse the unused spectrum, so that CRN users can easily occupy the unused spectrum without blocking the existing Primary Users. In a CRN, routing is a complex issue because of channel diversity. The existing system mainly focuses on the performance analysis of Ad hoc On-Demand Distance Vector (AODV) and the Weight Cumulative Expected transmission time (WCETT). The performance of these protocols are measured and compared in various ways such as the throughput of single radio station multi-channels, equal number of radio stations and channels, multi-radio stations multi-channels. The limitation with these protocols is, whenever a route fails, there is issue to get connected with the other nodes, the other being data integrity, which maintains the no loss of data [LOD]. In our proposed DIS – CRAHN system we overcome these limitations by adding data security and integrity. Security is provided using the RSA algorithm while Integrity is ensured using the SHA algorithm. With the data security we can maintain the shortest path from source to destination and if any route failure occurs then immediate route establishment can be done and data encryption and decryption also be implemented using the random key generation. Results show an improved performance in delay with reasonable throughput, making the protocol an ideal choice for CRNs.
Volume: 5
Issue: 1
Page: 187-195
Publish at: 2017-01-01

Optimal Design of PID Controller for Load Frequency Control using Harmony Search Algorithm

10.11591/ijeecs.v5.i1.pp19-32
D. K. Sambariya , Seema Shrangi
This paper deals with soft computing technique, used for tuning PID controller. Controller tuned with a harmony search algorithm is used for controlling the frequency and Tie-line power responses of a non reheat two area power system. Step load perturbation has been given in both areas simultaneously. The dynamic results obtained by the proposed controller are compared with PID controller of recent published paper. The performance of the controllers is simulated using MATLAB/Simulation software. The results of tuned PID are compared with conventional controller on the basis of settling-time, peak over-shoot and peak under-shoot. Proposed PID gives better results than the conventional controller. The comparative resultsalso tabulated as a comparative performance.
Volume: 5
Issue: 1
Page: 19-32
Publish at: 2017-01-01

Text Independent Amharic Language Speaker Identification in Noisy Environments using Speech Processing Techniques

10.11591/ijeecs.v5.i1.pp109-114
Abrham Debasu Mengistu , Dagnachew Melesew Alemayehu
In Ethiopia, the largest ethnic and linguistic groups are the Oromos, Amharas and Tigrayans. This paper presents the performance analysis of text-independent speaker identification system for the Amharic language in noisy environments. VQ (Vector Quantization), GMM (Gaussian Mixture Models), BPNN (Back propagation neural network), MFCC (Mel-frequency cepstrum coefficients), GFCC (Gammatone Frequency Cepstral Coefficients), and a hybrid approach had been use as techniques for identifying speakers of Amharic language in noisy environments. For the identification process, speech signals are collected from different speakers including both sexes; for our data set, a total of 90 speakers’ speech samples were collected, and each speech have 10 seconds duration from each individual. From these speakers, 59.2%, 70.9% and 84.7% accuracy are achieved when VQ, GMM and BPNN are used on the combined feature vector of MFCC and GFCC. 
Volume: 5
Issue: 1
Page: 109-114
Publish at: 2017-01-01
Show 1481 of 1880

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration