Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,065 Article Results

Classification with Single Constraint Progressive Mining of Sequential Patterns

10.11591/ijece.v7i4.pp2142-2151
Regina Yulia Yasmin , Putri Saptawati , Benhard Sitohang
Classification based on sequential pattern data has become an important topic to explore. One of research has been carried was the Classify-By-Sequence, CBS. CBS classified data based on sequential patterns obtained from AprioriLike sequential pattern mining. Sequential patterns obtained were called CSP, Classifiable Sequential Patterns. CSP was used as classifier rules or features for the classification task. CBS used AprioriLike algorithm to search for sequential patterns. However, AprioriLike algorithm took a long time to search for them. Moreover, not all sequential patterns were important for the user. In order to get the right and meaningful features for classification, user uses a constraint in sequential pattern mining. Constraint is also expected to reduce the number of sequential patterns that are short and less meaningful to the user. Therefore, we developed CBS_CLASS* with Single Constraint Progressive Mining of Sequential Patterns or Single Constraint PISA or PISA*. CBS_Class* with PISA* was proven to classify data in faster time since it only processed lesser number of sequential patterns but still conform to user’s need. The experiment result showed that compared to CBS_CLASS, CBS_Class* reduced the classification execution time by 89.8%. Moreover, the accuracy of the classification process can still be maintained. 
Volume: 7
Issue: 4
Page: 2142-2151
Publish at: 2017-08-01

A Big Data Security using Data Masking Methods

10.11591/ijeecs.v7.i2.pp449-456
Archana R A , Ravindra S Hegadi , Manjunath T N
Due to Internet of things and social media platforms, raw data is getting generated from systems around us in three sixty degree with respect to time, volume and type. Social networking is increasing rapidly to exploit business advertisements as business demands. In this regard there are many challenges for data management service providers, security is one among them. Data management service providers need to ensure security for their privileged customers in providing accurate and valid data. Since underlying transactional data have varying data characteristics such huge volume, variety and complexity, there is an essence of deploying such data sets on to the big data platforms which can handle structured, semi-structured and un-structured data sets. In this regard we propose a data masking technique for big data security. Data masking ensures proxy of original dataset with a different dataset which is not real but looks realistic. The given data set is masked using modulus operator and the concept of keys. Our experiment advocates enhanced modulus based data masking is better with respect to execution time and space utilization for larger data sets when compared to modulus based data masking. This work will help big data developers, quality analysts in the business domains and provides confidence for end-users in providing data security.
Volume: 7
Issue: 2
Page: 449-456
Publish at: 2017-08-01

A Review on Constant Switching Frequency Techniques for Direct Torque Control of Induction Motor

10.11591/ijeecs.v7.i2.pp364-372
Auzani Jidin , Kasrul Abdul Karim , Khairi Rahim , Logan Raj Lourdes Victor Raj , Sundram Ramahlingam , Tole Sutikno
The Direct Torque Control (DTC) of induction machine has received wide acceptance in many Variable Speed Drive (VSD) applications due to its simple control structure and excellent torque dynamic control performances. However, the conventional DTC which employs a two-level inverter and hysteresis controllers produces two major drawbacks, namely, larger torque ripple and variable switching frequency, which might produce a very high switching frequency (or power loss), particularly at a very low speed operation. This paper highlight the common methods used to provide the constant switching frequency for DTC drives for Induction Motor that able to minimize the power losses and reduced the torque ripple.
Volume: 7
Issue: 2
Page: 364-372
Publish at: 2017-08-01

Efficient Proximity Coupled Feed Rectangular Microstrip Patch Antenna with Reduced Harmonic Radiation

10.11591/ijeecs.v7.i2.pp500-506
Dawit Fistum
This paper presents an efficient proximity coupled feed rectangular microstrip patch antenna with reduced harmonic radiation. The proposed antenna resonates in S-band at frequency of 2.45 GHz with bandwidth of 88.5 MHz. A very good return loss of -47.0546 dB is obtained for the Microstrip patch antenna. The antenna matching can be achieved with an appropriate line-patch overlap, but with a careful design consideration. Not only the good matching of the fundamental mode, but also the effect on the harmonic radiation from the other patch modes has been considered. Varying the length & location of the microstrip feed line and introducing a defect in the ground plane- the harmonic radiation from the other patch mode is reduced to minimum.
Volume: 7
Issue: 2
Page: 500-506
Publish at: 2017-08-01

Analysis of Competition Fronting the Popularity of Content in Social Networks

10.11591/ijict.v6i2.pp86-94
Siham Hafidi , Mohamed Baslam , Rachid El Ayachi
In recent years, on the Internet, there is a real phenomenon: the development of social networks that are becoming more popular and more used. Social networks have millions of users worldwide. This provides an opportunity for companies to reach out a large and diverse audience for their advertising campaigns. They do this by creating and spreading content across the social network, which will increase the chance of visibility for their contents, which for them is the assurance of being popular. Every content requires time to reach a specific destination on the networks. In this article, we study competition between several contents that look for attracting more consultations, each characterized by some given popularity. There is competition between the contents of a limited set of destinations. We first model our system, we then study the competition between contents by using the game theory to analyze this behavior. We finally provide numerical results, which provide insights into the effect of various parameters of the system.
Volume: 6
Issue: 2
Page: 86-94
Publish at: 2017-08-01

Stator Inter-turn Fault Detection in Inverter Fed Induction Motor Drives

10.11591/ijape.v6.i2.pp89-102
Khadim Moin Siddiqui , Kuldeep Sahay , V. K. Giri
The Squirrel Cage Induction Motor (SCIM) with advanced power electronic inverters presents the greater advantages on cost and energy efficiency as compared with other industrial solutions for varying speed applications. In recent, the inverter fed induction motors are being popular in the industries. These inverter fed-motors are recently gathering great recognition for multimegawatt industrial drive applications. In this present paper, a dynamic simulation model of PWM inverter fed SCIM with direct torque control jointly has been presented and analyzed in the recent MATLAB/Simulink environment. From the proposed simulation model, the transient behavior of SCIM has been analysed for healthy as well as for stator inter-turn fault condition. The dynamic simulation of induction motor is one of the key steps in the validation of design process of the electric motor and drive system. It is extremely needed for eliminating probable faults beforehand due to inadvertent design mistakes and changes during operation. The simulated model gives encouraging results with reduced harmonics [1]. By using the model, the successful detection of stator inter-turn fault of the SCIM is carried out in the transient condition. Therefore, early stator fault detection is possible and may avoid the motor to reach in the catastrophic conditions. Therefore, may save millions of dollars for industries.
Volume: 6
Issue: 2
Page: 89-102
Publish at: 2017-08-01

Energy Optimization of Routing Protocols in Wireless Sensor Networks

10.11591/ijict.v6i2.pp76-85
Fatima Es-sabery , Hicham Ouchitachen , Abdellatif Hair
The hierarchical routing of data in WSNs is a specific class of routing protocols it encompasses solutions that take a restructuring of the physical network in a logical hierarchy system for the optimization of the consum-ption of energy. Several hierarchical routing solutions proposed, namely: the protocol LEACH (Low Energy Adaptive Clustering Hierarchy) consist of dividing the network in distributed clusters at one pop in order of faster data delivery and PEGASIS protocol (Power-Efficient Gathering in Sensor Information Systems) which uses the principle of constructing a chain’s sensor node. Our contribution consists of a hierarchical routing protocol, which is the minimization of the energy consumption by reducing the transmission distance of data and reducing the data delivery time. Our solution combines the two hierarchical routing approaches: chain based approach and the cluster based approach. Our approach allows for multi-hop communications, intra- and intercluster, and a collaborative aggregation of data in each Cluster, and a collaborative aggregation of data at each sensor node.
Volume: 6
Issue: 2
Page: 76-85
Publish at: 2017-08-01

A Fast Strategy to determine the Physical and Electrical Parameters of Photovoltaic Silicon Cell

10.11591/ijape.v6.i2.pp103-112
El Hadi Chahid , Mohammed Idali Oumhand , Abdessamad Malaoui
This paper proposes a fast strategy to extract and exploit the electrical parameters of photovoltaic cell using the double-diode model. The polycrystalline silicon (poly-Si) junction is chosen in this work due to the importance of its proprieties in industrial and economic fields. The proposed method to extract the solar cell electrical parameters contains two steps. The first is based on the graphical adjustments to choose the initial values of these parameters, and the second is numerical, using Modified Newton-Raphson’s algorithm. The obtained parameters extractions values are compared to the others methods and give a considerable agreement. Furthermore, we have developed a complementary analytical method to deduce both the minority’s carrier’s lifetime and the diffusion lengths through the diffusion and recombination current densities. The found values of these parameters are precisely comparable with theoretical models, and give very useful informations on the intrinsic quality of the studied cell.
Volume: 6
Issue: 2
Page: 103-112
Publish at: 2017-08-01

Survey of Detection SIP Malformed Messages

10.11591/ijeecs.v7.i2.pp457-465
Mourade Azrour , Mohammed Ouanan , Yousef Farhaoui
Session Initiation Protocol (SIP) is an application layer protocol designed to control and establish multimedia sessions over internet. SIP gaining more and more popularity as it is used by numerous applications such as telephony over IP(ToIP). SIP is a text based protocol built on the base of the HTTP and SMTP protocols. SIP suffers from certain security threats which need to be resolved in order to make it a more efficient signaling protocol. In this work, we review the proposed works aimed to detect SIP malformed messages that can cause security problem. Then, we classify the type of malformed SIP message and compare between the mechanisms used to reinforce the detection of malformed SIP message attack.
Volume: 7
Issue: 2
Page: 457-465
Publish at: 2017-08-01

dSPACE Implementation for a Fuzzy Logic Voltage Control using a Self-Excited Induction Generator and a Voltage Source Inverter

10.11591/ijece.v7i4.pp1749-1759
Rachid El Akhrif , Ahmed Abbou , Mohamed Barara , Mohamed Akherraz , Youssef Majdoub
The present work describes the analysis  of a control scheme for keeping  the  RMS voltage output  constant, the system is  supplying  by a self-excited induction generator with variable speed and load. A comparison is examined between simulation and experimental results using dSPACE board. the results are provided to verify the effectiveness of this approach and gives very high performance.
Volume: 7
Issue: 4
Page: 1749-1759
Publish at: 2017-08-01

FPGA-based Design System for a Two-Segment Fibonacci LFSR Random Number Generator

10.11591/ijece.v7i4.pp1882-1891
Zulfikar Zulfikar , Yuwaldi Away , Rafiqa Shahnaz Noor
For a long time, random numbers have been used in many fields of application. Much work has been conducted to generate truly random numbers and is still in progress. A popular method for generating random numbers is a linear-feedback shift register (LFSR). Even though a lot of work has been done using this method to search for truly random numbers, it is an area that continues to attract interest. Therefore, this paper proposes a circuit for generating random numbers. The proposed circuit is designed to produce different sequences of numbers. Two segments of Fibonacci LFSR are used to form a generator that can produce more varied random numbers. The proposed design consists of blocks: segment 1, segment 2, and a clock controller. The system produces random numbers based on an external clock. The clock signal for the first segment is that of the external clock, whereas that for the second segment is modified by the clock controller. The second stage (segment 2) is executed only after every 2n1−1 clock cycles. The proposed design can generate different sequences of random numbers compare to those of the conventional methods. The period of the proposed system is less than that of the original Fibonacci LFSR. However, the period is almost equal to the original one when the system is realized in 32-bit or 64-bit form. Finally, the proposed design is implemented on a field-programmable gate array (FPGA). It occupies more area and runs at a lower frequency compared with the original Fibonacci LFSR. However, the proposed design is more efficient than the segmented leap-ahead method concerning space occupancy.
Volume: 7
Issue: 4
Page: 1882-1891
Publish at: 2017-08-01

Formal Specification of QoS Negotiation in ODP System

10.11591/ijece.v7i4.pp2045-2053
Abdessamad Jarrar , Youssef Balouki , Taoufiq Gadi
The future of Open Distributed Processing systems (ODP) will see an increasing of components number, these components are sharing resources. In general, these resources are offering some kind of services. Due to the huge number of components, it is very difficult to offer the optimum Quality of service (QoS). This encourages us to develop a model for QoS negotiation process to optimize the QoS in an ODP system. In such system, there is a High risk of software or hardware failure. To ensure good performance of a system based on our model, we develop it using a formal method. In our case, we will use Event-B to get in the end of our development a system correct by construction.
Volume: 7
Issue: 4
Page: 2045-2053
Publish at: 2017-08-01

Techno-economic Evaluation of Stand-alone Hybrid Renewable Energy System for Remote Village Using HOMER-pro Software

10.11591/ijape.v6.i2.pp73-88
Ajoya Kumar Pradhan , Mahendra Kumar Mohanty , Sanjeeb Kumar Kar
The off-grid hybrid renewable energy generation system has lesser cost of energy with higher reliability when compared with solar Photovoltaic (PV) or wind energy system individually. The optimization design is worked out by reducing the Unit Cost Of Energy (UCOE) for different case studies and comparing the outcomes obtained by the use of HOMER-Pro (hybrid optimization model of electric renewable) software. The optimal cash flow analysis of hybrid energy system is based on the load patterns is discussed, solar irradiance (kW/m2) of site at proper latitude and longitude, wind speed and price of diesel, which is collected from a remote village in Khurda District, Odisha in India. Moreover, the optimization and sensitivity results of the system are find out by varying the input parameters like solar radiation, wind speed etc.
Volume: 6
Issue: 2
Page: 73-88
Publish at: 2017-08-01

The Analysis of Performace Model Tiered Artificial Neural Network for Assessment of Coronary Heart Disease

10.11591/ijece.v7i4.pp2183-2191
Wiharto Wiharto , Harianto Herianto , Hari Kusnanto
The assessment model of coronary heart disease is so much developed in line with the development of information technology, particularly the field of artificial intelligence. Unfortunately, the assessment models developed mostly do not use such an approach made by the clinician, the tiered approach. This study aims to analyze the performance of a tiered model assessment. The method used for each level is, preprocessing, building architecture artificial neural network (ANN), conduct training using the Levenberg-Marquardt algorithm and one step secant, as well as testing the system. The study is divided into the terms of the stages in the examination procedure. The test results showed the influence of each level, both when the output level of the previous positive or negative, were tested back at the next level. The performance evaluation may indicate that the top level provides performance improvement and or reinforce the previous level. 
Volume: 7
Issue: 4
Page: 2183-2191
Publish at: 2017-08-01

A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters in WSN

10.11591/ijece.v7i4.pp2232-2240
Pooja Singh , R.K. Chauhan
The Wireless Sensor Networks (WSNs) have spread its roots in almost every application. Owing to their scattered nature of sensor nodes, they are more prone to attacks. There are certain applications e.g. military, where sensor data’s confidentiality requirement during transmission is essential. Cryptography has a vital role for achieving security in WSNs.WSN has resource constraints like memory size, processing speed and energy consumption which bounds the applicability of existing cryptographic algorithms for WSN. Any good security algorithms has higher energy consumption by the nodes, so it’s a need to choose most energy-efficient cryptographic encryption algorithms for WSNs. This paper surveys different asymmetric algorithms such as RSA, Diffie-Hellman, DSA, ECC, hybrid and DNA cryptography. These algorithms are compared based on their key size, strength, weakness, attacks and possible countermeasures in the form of table.
Volume: 7
Issue: 4
Page: 2232-2240
Publish at: 2017-08-01
Show 1484 of 1938

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration