Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

28,910 Article Results

Credal Fusion of Classifications for Noisy and Uncertain Data

10.11591/.v7i2.pp1071-1087
Fatma Karem , Mounir Dhibi , Arnaud Martin , Med Salim Bouhlel
This paper reports on an investigation in classification technique employed to classify noised and uncertain data. However, classification is not an easy task. It is a significant challenge to discover knowledge from uncertain data. In fact, we can find many problems. More time we don't have a good or a big learning database for supervised classification. Also, when training data contains noise or missing values, classification accuracy will be affected dramatically. So to extract groups from  data is not easy to do. They are overlapped and not very separated from each other. Another problem which can be cited here is the uncertainty due to measuring devices. Consequentially classification model is not so robust and strong to classify new objects. In this work, we present a novel classification algorithm to cover these problems. We materialize our main idea by using belief function theory to do combination between classification and clustering. This theory treats very well imprecision and uncertainty linked to classification. Experimental results show that our approach has ability to significantly improve the quality of classification of generic database.
Volume: 7
Issue: 2
Page: 1071-1087
Publish at: 2017-04-01

Video Monitoring Application using Wireless Sensor Node with Various External Antenna

10.11591/ijeecs.v6.i1.pp148-154
Amerrul Zabri , Mohamad Kamal A. Rahim , Farid Zubir , Norsaidah Muhamad Nadzir , Huda A. Majid
Surveillance and monitoring has become very important for security reasons these days. The use of wireless sensor node device offers a variety of platform depends on the attached sensor. When an image sensor is attached, the wireless sensor node is capable of monitoring an area wirelessly. Since wireless environment uses antenna to transmit and receive data, antenna is an important component that affects the video monitoring performance. This paper describes a surveillance system using Raspberry Pi with various external antenna. The Raspberry Pi with Pi Camera module and various types of antennas was used for testing and experimentation in line-of-sight (LOS) and non-line-of-sight (NLOS) condition. The results revealed that the Yagi Uda antenna gives the best output in terms of its signal strength and average Receive (Rx) rate.
Volume: 6
Issue: 1
Page: 148-154
Publish at: 2017-04-01

Optical Humidity Sensor Based on Tapered Fiber with Multi-walled Carbon Nanotubes Slurry

10.11591/ijeecs.v6.i1.pp97-103
Habibah Mohamed , Ninik Irawati , Fauzan Ahmad , Mohd Haniff Ibrahim , Sumiaty Ambran , Mohd Azizi Abdul Rahman , Sulaiman Wadi Harun
We demonstrated performance comparison of optical humidity sensor for bare and Multi-walled carbon nanotubes (MWCNTs) slurry coated tapered optical fiber. The starting material for MWCNTs slurry is MWCNTs- acrylonitrile butadiene styrene (ABS) based fused deposition modeling (FDM) 3D printer filament. The ABS was dissolved using acetone to produce MWCNTs-acetone suspension. The MWCNTs-acetone suspension was drop-casted on the tapered fiber to produce MWCNTs slurry by evaporation process at room temperature, which resulted the MWCNTs slurry attach to the tapered fiber. The MWCNTs slurry acts as the cladding for humidity changes measurement. The experimental works showed improvement of sensitivity from 3.811 μW/% of bare tapered fiber to 5.17 μW/% for the coated tapered fiber with MWCNTs slurry when the humidity varied from 45% to 80%.
Volume: 6
Issue: 1
Page: 97-103
Publish at: 2017-04-01

A Training Monitoring System for Cyclist Based on Wireless Sensor Networks

10.11591/ijeecs.v6.i1.pp80-87
N. M. Abdul Latiff , M. A. Ruslee , S. K. Syed Yusof , M. R. Abdul Rahim , H. Sayuti , K. Mohamad Yusof , M. A. Baharudin
This paper presents a training monitoring system for cyclist that is based on the technology of wireless sensor networks (WSNs). A stable and reliable wireless cyclist monitoring system is vital to establish a smart and efficient sports management program. A training monitoring system has been developed and tested in a real cyclist training environment in a velodrome. The system is designed is such a way that the packet loss rate is minimum. Using TelG mote as the basis, customized sensor nodes that function as a forwarder node and the relay nodes are developed to form the WSN. This WSN is linked to the cloud network on the Internet. The cloud network is then established and end users application for data accessing is designed. Several experiments have been conducted in a real scenario in a velodrome to measure the reliability of the system architecture. It is shown from the experiments that the proposed system is reliable even when the cyclist is moving at a high speed. The packet loss is less than 2% which does not give a huge impact to the data transmission.
Volume: 6
Issue: 1
Page: 80-87
Publish at: 2017-04-01

Maintenance and Safety Requirements of Flameproof and Intrinsically Safe Equipment for Coal Mines

10.11591/ijeecs.v6.i1.pp9-15
B. Ahirwal , Arvind kumar singh , Rajendra kumar vishwakarm
In the generation of the new technology segment, new explosionproof (Ex) equipment are being installed to make systems suitable for use in hazardous areas of mines. Generally, 80-90% equipment having flameproof (Exd) and intrinsic safety (Exi) methodology of protection are used in the mines for safe operation. The maintenance and safety are two vital parameters to improve the system efficiency of installation in the mines. These parameters are also responsible for the productivity of the mines. The minimum breakdown and maximum safety are the prime concerns of the mines to increase the production. Many observations and basic knowledge are necessary of safety parameters of Ex protections while doing maintenance because micro joules energy is sufficient to ignite the hazardous areas of mines. Trained and skilled personals having good knowledge of Ex protections are required to maintain the limitations of ignition energy sources of Ex equipment to prevent explosion in the mines. A regular and organized scheme of inspection and maintenance may ensure continued, satisfactory and safe operation of Ex electrical equipment in mines. The important points for safety and maintenance of Exd and Exi equipment are pondered in this paper.
Volume: 6
Issue: 1
Page: 9-15
Publish at: 2017-04-01

Vertical Information System: A Case Study of Civil Servant Teachers’ Data in Manado City

10.11591/ijeecs.v6.i1.pp42-49
Julyeta P.A. Runtuwene , Irene R.H.T Tangkawarow
Information systems have become important factors in a company, where information systems are useful in providing useful information for the company itself. The information system helps companies implement corporate activities at the beginning of the process until the decision making. In the concept Information system, we know the term of vertical information system, which is another strategy for increasing vertical information capacity. Vertical information system includes the periodic report, written information, and computer-based communications distributed to managers. In this article, discusses the approach in the development of vertical information system which will be preceded by comparison of operational systems, management information systems, and business intelligence systems. We will give explanations about the role in the BI system in an organization, the challenges faced in the implementation of vertical information systems, approaches in vertical information systems, approaches that we choose, and how it implement in  civil servant teachers data in Manado City. 
Volume: 6
Issue: 1
Page: 42-49
Publish at: 2017-04-01

Diagnosis of Faulty Sensors in Antenna Array using Hybrid Differential Evolution based Compressed Sensing Technique

10.11591/.v7i2.pp961-966
Shafqat Ullah Khan , M. K. A. Rahim , I. M. Qureshi , N. A. Murad
In this work, differential evolution based compressive sensing technique for detection of faulty sensors in linear arrays has been presented. This algorithm starts from taking the linear measurements of the power pattern generated by the array under test. The difference between the collected compressive measurements and measured healthy array field pattern is minimized using a hybrid differential evolution (DE). In the proposed method, the slow convergence of DE based compressed sensing technique is accelerated with the help of parallel coordinate decent algorithm (PCD). The combination of DE with PCD makes the  minimization faster and precise. Simulation results validate the performance to detect faulty sensors from a small number of measurements.
Volume: 7
Issue: 2
Page: 961-966
Publish at: 2017-04-01

Low-rank Matrix Optimization for Video Segmentation Research

10.11591/ijeecs.v6.i1.pp36-41
Caiyun Huang , Guojun Qin
This paper investigates how to perform robust and efficient unsupervised video segmentation while suppressing the effects of data noises and/or corruptions. The low-rank representation is pursued for video segmentation. The supervoxels affinity matrix of an observed video sequence is given, low-rank matrix optimization seeks a optimal solution by making the matrix rank explicitly determined. We iteratively optimize them with closed-form solutions. Moreover, we incorporate a discriminative replication prior into our framework based on the obervation that small-size video patterns, and it tends to recur frequently within the same object. The video can be segmented into several spatio-temporal regions by applying the Normalized-Cut algorithm with the solved low-rank representation. To process the streaming videos, we apply our algorithm sequentially over a batch of frames over time, in which we also develop several temporal consistent constraints improving the robustness. Extensive experiments are on the public benchmarks, they demonstrate superior performance of our framework over other approaches.
Volume: 6
Issue: 1
Page: 36-41
Publish at: 2017-04-01

Dielectric Strength Improvement of Natural Ester Insulation Oil via Mixed Antioxidants: Taguchi Approach

10.11591/.v7i2.pp650-658
Sharin Ab Ghani , Zulkarnain Ahmad Noorden , Nor Asiah Muhamad , Hidayat Zainuddin , Muhammad Ilman Hakimi Chua Abdullah , Imran Sutan Chairul
Recently, natural ester insulation (NEI) oils are found to be the best candidates to replace mineral-based insulation oils for oil-immersed transformer applications. However, NEI oils are prone to oxidation due to their poor oxidative stability which can be improved by adding antioxidants into the oils. Latest studies have also shown that the use of selected antioxidants improves the AC breakdown voltage (BdV) of NEI oils. However, the experiments in previous studies were designed using the conventional one-factor-at-a-time (OFAT) method, which requires a large number of samples to be tested in order to determine the optimum response. Thus, a Taguchi-based designed experiment is introduced in this study in replacement of the OFAT method. It is found that this method is capable of determining the optimum concentrations of propyl gallate (PG) and citric acid (CA) which will maximize the AC BdV and improve the oxidative stability of the NEI oil. An AC breakdown voltage test is conducted in accordance with the ASTM D1816 standard using Megger OTS60PB portable oil tester, in which the electrode gap distance is kept fixed at 1 mm. The results indicate that the addition of PG and CA antioxidants increases the AC BdV of the rapeseed-based NEI oil. It is found that the optimum concentrations of PG and CA antioxidant is 0.05 and 0.25 wt.%, respectively. Lastly, the model developed in this study is analysed using analysis of variance (ANOVA). Validation test is also conducted on the optimized NEI oil to determine its dielectric strength and oxidative stability.
Volume: 7
Issue: 2
Page: 650-658
Publish at: 2017-04-01

A Compact CPW-Fed Curved Meander Line Monopole Antenna (MLMA) for GSM Application

10.11591/ijeecs.v6.i1.pp207-211
Nor Afifah Borhan , Noor Asniza Murad
Monopole antenna is widely used in many communication systems especially in broadcasting where omnidirectional pattern allow the 360-degree coverage. However, at low frequency the conventional design may require miniaturization to fit in versatile spaces. Thus, this paper discusses a low cost, compact CPW-fed curved meander line monopole antenna (MLMA) designed to operate at 0.9 GHz GSM band. The overall dimension is 25mm x 80mm. The antenna is well matched at required GSM band with the bandwidth from 0.88 GHz to 0.93 GHz. Comparison between the conventional MLMA and curved (MLMA) is made in term of return loss and gain. It was found that the curved MLMA has a better gain compared to the conventional MLMA which is 1.472 dB.
Volume: 6
Issue: 1
Page: 207-211
Publish at: 2017-04-01

Recursive Subspace Identification Algorithm using the Propagator Based Method

10.11591/ijeecs.v6.i1.pp172-179
Irma Wani Jamaludin Wani Jamaludin , Norhaliza Abdul Wahab
Subspace model identification (SMI) method is the effective method in identifying dynamic state space linear multivariable systems and it can be obtained directly from the input and output data. Basically, subspace identifications are based on algorithms from numerical algebras which are the QR decomposition and Singular Value Decomposition (SVD). In industrial applications, it is essential to have online recursive subspace algorithms for model identification where the parameters can vary in time. However, because of the SVD computational complexity that involved in the algorithm, the classical SMI algorithms are not suitable for online application. Hence, it is essential to discover the alternative algorithms in order to apply the concept of subspace identification recursively. In this paper, the recursive subspace identification algorithm based on the propagator method which avoids the SVD computation is proposed. The output from Numerical Subspace State Space System Identification (N4SID) and Multivariable Output Error State Space (MOESP) methods are also included in this paper.
Volume: 6
Issue: 1
Page: 172-179
Publish at: 2017-04-01

Integrated Coordination of Electric Vehicle Operations and Renewable Energy Generation in a Microgrid

10.11591/.v7i2.pp706-712
Junghoon Lee , Gyung-Leen Park
This paper designs a microgrid energy controller capable of creating a charging or discharging schedule for electric vehicles (EVs), aiming at leveraging the integration of renewable energy and shaving the peak load in the microgrid. Dynamically activated on each time slot to cope with the prediction error for the power consumption and the renewable energy generation, the controller calculates the number of EVs to charge or make discharge first. Then, a greedy algorithm-based scheduler selects EVs according to the expected energy potential during their stays. The potential is the integral of a supply-demand margin function from the current time to the expected departure time. A simulator is implemented for performance evaluation, comparing with uncoordinated scheduling, according to the number of EVs as well as the behavior of energy load and production. The experiment result shows that the proposed scheme can reduce the energy waste by 16.9 %, cut down the microgrid-level energy insufficiency by 12.2 %, and enhance the amount of electricity supplied to EVs by 37.3 %, respectively, for given parameter setting.
Volume: 7
Issue: 2
Page: 706-712
Publish at: 2017-04-01

Video Inter-frame Forgery Detection Approach for Surveillance and Mobile Recorded Videos

10.11591/.v7i2.pp831-841
Staffy Kingra , Naveen Aggarwal , Raahat Devender Singh
We are living in an age where use of multimedia technologies like digital recorders and mobile phones is increasing rapidly. On the other hand, digital content manipulating softwares are also increasing making it easy for an individual to doctor the recorded content with trivial consumption of time and wealth. Digital multimedia forensics is gaining utmost importance to restrict unethical use of such easily available tampering techniques. These days, it is common for people to record videos using their smart phones. We have also witnessed a sudden growth in the use of surveillance cameras, which we see inhabiting almost every public location. Videos recorded using these devices usually contains crucial evidence of some event occurence and thereby most susceptible to inter-frame forgery which can be easily performed by insertion/removal/replication of frame(s). The proposed forensic technique enabled detection of inter-frame forgery in H.264 and MPEG-2 encoded videos especially mobile recorded and surveillance videos. This novel method introduced objectivity for automatic detection and localization of tampering by utilizing prediction residual gradient and optical flow gradient. Experimental results showed that this technique can detect tampering with 90% true positive rate, regardless of the video codec and recording device utilized and number of frames tampered.
Volume: 7
Issue: 2
Page: 831-841
Publish at: 2017-04-01

Self-Healing Properties of Silicone Rubber Against Relative Humidity and Nanofiller

10.11591/ijeecs.v6.i1.pp166-171
Izzah Hazirah Zakaria , Muhammad Taufik Kamaruddin , Yanuar Z. Arief , Mohd Hafizi Ahmad , Noor Azlinda Ahmad , Nor Asiah Muhamad , Zuraimy Adzis
A well-prepared abstract enables the reader to identify the basic content of a document quickly and accurately, to determine its relevance to their interests, and thus to decide whether to read the document in its entirety. The Abstract should be informative and completely self-explanatory, provide a clear statement of the problem, the proposed approach or solution, and point out major findings and conclusions. The Abstract should be 100 to 150 words in length. The abstract should be written in the past tense. Standard nomenclature should be used and abbreviations should be avoided. No literature should be cited. The keyword list provides the opportunity to add keywords, used by the indexing and abstracting services, in addition to those already present in the title. Judicious use of keywords may increase the ease with which interested parties can locate our article.
Volume: 6
Issue: 1
Page: 166-171
Publish at: 2017-04-01

Exploring the Design Space of HEVC Inverse Transforms with Dataflow Programming

10.11591/ijeecs.v6.i1.pp104-109
Khoo Zhi Yion , Ab Al-Hadi Ab Rahman
This paper presents the design space exploration of the hardware-based inverse fixed-point integer transform for High Efficiency Video Coding (HEVC). The designs are specified at high-level using CAL dataflow language and automatically synthesized to HDL for FPGA implementation. Several parallel design alternatives are proposed with trade-off between performance and resource. The HEVC transform consists of several independent components from 4x4 to 32x32 discrete cosine transform and 4x4 discrete sine transform. This work explores the strategies to efficiently compute the transforms by applying data parallelism on the different components. Results show that an intermediate version of parallelism, whereby the 4x4 and 8x8 are merged together, and the 16x16 and 32x32 merged together gives the best trade-off between performance and resource. The results presented in this work also give an insight on how the HEVC transform can be designed efficiently in parallel for hardware implementation.
Volume: 6
Issue: 1
Page: 104-109
Publish at: 2017-04-01
Show 1503 of 1928

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration