Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

28,428 Article Results

Hybridation of Labeling Schemes for Efficient Dynamic Updates

10.11591/ijeecs.v4.i1.pp184-194
Su Cheng Haw , Samini Subramaniam , Wei Siang Lim , Fang Fang Chua
With XML as the leading standard for data representation over the Web, it is crucial to store and query XML data. However, relational databases are the dominant database technology in most organizations. Thus, replacing relational database with a pure XML database is not a wise choice. One most prominent solution is to map XML into relational database. This paper introduces a robust labeling scheme which is a hybrid labeling scheme combining the beauty features of extended range and ORDPATH schemes to supports dynamic updates. In addition, we also proposed a mapping scheme based on the hybrid labeling scheme. Our proposed approach is evaluated in terms of (i) loading time, (ii) storage size, (iii) query retrieval time, and (iv) dynamic updates time, as compared to ORDPATH and ME schemes. The experimental evaluation results shows that our proposed approach is scalable to support huge datasets and dynamic updates.
Volume: 4
Issue: 1
Page: 184-194
Publish at: 2016-10-01

SIP Authentication Protocols Based On Elliptic Curve Cryptography: Survey and comparison

10.11591/ijeecs.v4.i1.pp231-239
Mourade Azrour , Mohammed Ouanan , Yousef Farhaoui
Session Initiation Protocol (SIP) is the most popular signaling protocol using in order to establish, modify and terminate the session multimedia between different participants. It was selected by the Third Generation Project Partnership (3GPP) as a multimedia application protocol in 3G mobile networks. SIP is the protocol currently used for signaling ToIP calls.  The security of SIP is becoming more and more important. Authentication is the most important security service required by SIP. To ensure a secured communication, many SIP authentication protocols have been proposed. This work provides an overview of the proposed schemes based on elliptic curve cryptography. Those proposed schemes are analyzed in security consideration and the computational cost.
Volume: 4
Issue: 1
Page: 231-239
Publish at: 2016-10-01

Efficiency of JSON approach for Data Extraction and Query Retrieval

10.11591/ijeecs.v4.i1.pp203-214
Mohd Kamir Yusof , Mustafa Man
Students’ Information System (SIS) in Universiti Sultan Zainal Abidin (UniSZA) handles thousands of records on the information of students, subject registration, etc. Efficiency of storage and query retrieval of these records is the matter of database management especially involving with huge data. However, the execution time for storing and retrieving these data are still considerably inefficient due to several factors. In this contribution, two database approaches namely Extensible Markup Language (XML) and JavaScript Object Notation (JSON) were investigated to evaluate their suitability for handling thousands records in SIS. The results showed JSON is the best choice for storage and query speed. These are essential to cope with the characteristics of students’ data. Whilst, XML and JSON technologies are relatively new to date in comparison to the relational database. Indeed, JSON technology demonstrates greater potential to become a key database technology for handling huge data due to an increase of data annually.
Volume: 4
Issue: 1
Page: 203-214
Publish at: 2016-10-01

A Study on MapReduce: Challenges and Trends

10.11591/ijeecs.v4.i1.pp176-183
Sachin Arun Thanekar , K. Subrahmanyam , A. B. Bagwan
Nowadays we all are surrounded by Big data. The term ‘Big Data’ itself indicates huge volume, high velocity, variety and veracity i.e. uncertainty of data which gave rise to new difficulties and challenges. Big data generated may be structured data, Semi Structured data or unstructured data. For existing database and systems lot of difficulties are there to process, analyze, store and manage such a Big Data. The Big Data challenges are Protection, Curation, Capture, Analysis, Searching, Visualization, Storage, Transfer and sharing. Map Reduce is a framework using which we can write applications to process huge amount of data, in parallel, on large clusters of commodity hardware in a reliable manner. Lot of efforts have been put by different researchers to make it simple, easy, effective and efficient. In our survey paper we emphasized on the working of Map Reduce, challenges, opportunities and recent trends so that researchers can think on further improvement. 
Volume: 4
Issue: 1
Page: 176-183
Publish at: 2016-10-01

Private Cloud Storage Using OpenStack with Simple Network Architecture

10.11591/ijeecs.v4.i1.pp155-164
Albert Sagala , Ruth Marlina Hutabarat
The development of cloud computing was highly developed and increasingly in demand by many parties. Cloud computing was very helpful to user to perform data storage without preparing own physical device. Cloud storage is a part of cloud computing where it can facilitate user to upload and download files, view file status. The main barrier to implement the private cloud was the difficulty in configuration of many components involved. These conditions minimize the implementation of the private cloud in many parties. In this research, we demonstrate cloud storage architecture simply by using only three nodes with OpenStack. The first node is the controller, the second node is object storage and the third is object storage. Elaborating the component that should be activated to implement the private cloud. The result of this research will help parties who want to build private cloud storage with simple network architecture using OpenStack Object Storage.
Volume: 4
Issue: 1
Page: 155-164
Publish at: 2016-10-01

FPGA Implementation of a Nakagami-m fading channel Simulator using Random Number Generator

10.11591/ijeecs.v4.i1.pp133-140
Santhosh Kumar B , K. Ayyappa Swamy
By realizing the concept of implementation of the radio propagation channels on simulators is the eminent intention of this work. Even though prototyping software simulators are effortless to design we prefer hardware simulators as they endeavors distinguishable quickness, compared to earlier. Prior to this work fading channels like Gaussian, Rayleigh and Rician fading channel simulators were executed on hard ware.(i.e. FPGA) The significant target  of this attempt is to implement Nakagami-m  fading channel on hardware as they preserved for  unsubstantial consideration. While differentiating with other fading channels  Nakagami-m fading channel acquires wide spread applications, as its capability of providing  appropriate fit for practical fading data, as this is flexible through its size parameter ‘m’, over which representation of signal fading conditions that vary  from serious to modest, to normal  fading or no fading is accomplished . The proposed hardware simulator can hatches complex Nakagami variates after it was implemented on XilinxSpartan-xc3s500e-4fg320 FPGA. This is operated at 50MHz.
Volume: 4
Issue: 1
Page: 133-140
Publish at: 2016-10-01

Internal On-line Partial Discharge Analysis of 68.75 MVA Generator Stator Winding Insulation

10.11591/ijece.v6i5.pp2088-2095
Waluyo Waluyo , Siti Saodah , Eltha Hidayatullah
Partial discharge is a phenomenon of electron ionization occurs due to concentrated electric field in a different edge plane. This phenomenon will be investigated by an electric field measurement in a measuring point. The internal partial discharge will give the insulation damage effect on a generator stator winding due to void existence. This manuscript presents the measurement results of the on-line internal partial discharge on the stator winding insulation of 68.75 MVA generator. It used the resistant temperature detector method and CM2000TM. The results were classified into three conditions based on the voids in the generator stator insulation, the internal delamination and the surface discharge.
Volume: 6
Issue: 5
Page: 2088-2095
Publish at: 2016-10-01

Image Segmentation Based on Doubly Truncated Generalized Laplace Mixture Model and K Means Clustering

10.11591/ijece.v6i5.pp2188-2196
T Jyothirmayi , K Srinivasa Rao , P Srinivasa Rao , Ch Satyanarayana
The present paper aims at performance evaluation of Doubly Truncated Generalized Laplace Mixture Model and K-Means clustering (DTGLMM-K) for image analysis concerned to various practical applications like security, surveillance, medical diagnostics and other areas. Among the many algorithms designed and developed for image segmentation the dominance of Gaussian Mixture Model (GMM) has been predominant which has the major drawback of suiting to a particular kind of data. Therefore the present work aims at development of DTGLMM-K algorithm which can be suitable for wide variety of applications and data. Performance evaluation of the developed algorithm has been donethrough various measures like Probabilistic Rand index (PRI), Global Consistency Error (GCE) and Variation of Information (VOI). During the current work case studies forvarious different images having pixel intensities has been carried out and the obtained results indicate the superiority of the developed algorithm for improved image segmentation.
Volume: 6
Issue: 5
Page: 2188-2196
Publish at: 2016-10-01

A Secured Cloud Data Storage with Access Privileges

10.11591/ijece.v6i5.pp2338-2344
Naresh Vurukonda , B. Thirumala Rao , B. Tirapathi Reddy
In proposed framework client source information reinforcements off-site to outsider distributed storage benefits to decrease information administration costs. In any case, client must get protection ensure for the outsourced information, which is currently safeguarded by outsiders. To accomplish such security objectives, FADE is based upon an arrangement of cryptographic key operations that are self-kept up by a majority of key supervisors that are free of outsider mists. In unmistakable, FADE goes about as an overlay framework that works flawlessly on today's distributed storage administrations. Actualize a proof-of-idea model of FADE on Amazon S3, one of today's distributed storage administrations. My work oversee, esteem included security highlights acclimatize were today's distributed storage administration. our research work proceeds in ensuring the file access control and assured deletion in multi cloud environment and reducing the meta data management, there by the cloud storage become more attractive and many users will adopt the cloud space in order to diminish the data storage cost.
Volume: 6
Issue: 5
Page: 2338-2344
Publish at: 2016-10-01

Optimal Placement of TCSC Based on Sensitivity Analysis for Congestion Management

10.11591/ijece.v6i5.pp2041-2047
Naga Raja Kumari.CH , K. Chendra Sekhar
In a deregulated electricity market whenever congestion management problem occurs, the network collapse because of voltage instability. In this paper total real and reactive power loss deviation based sensitivity indexes (PLDS and QLDS) with rank co-relation concept, has been proposed for the optimal location and operating range of TCSC device. With this placement  the power flow in over loaded overhead lines has been reduced and that results in an increased loadability of the power system and also improves the voltage stability and security and also solves the congestion management problem. So ultimately, a more energy efficient transmission system is possible. The case studies were conducted on IEEE 14 bus test system. The ensue corroborate the intended approach for social welfare maximization inreal time.
Volume: 6
Issue: 5
Page: 2041-2047
Publish at: 2016-10-01

A Modulation Scheme for Floating Source Multilevel Inverter Topology with Increased Number of Output Levels

10.11591/ijece.v6i5.pp1985-1993
Hussain M. Bassi
This paper presented and studied a new switching scheme for floating source multilevel inverters to produce more levels with the same number of switching devices. In the proposed scheme, the function of the dc sources, except the inner one, is to build up square wave or blocks that is close in the shape to the desired sinusoidal wave. The job of the inner switching devices is to increase the number of the levels to produce smother sinusoidal wave in the inverter output. This job can be done by adding or subtracting the value of the inner dc source to/from the blocks. The topology used in this paper is based on the conventional floating source multi-level inverter using two legs. This topology and modulation technique show substantial reduction in the total harmonics distortion when the modulation technique is the hybrid method. The performance of the proposed switching scheme in generating more levels has been evaluated by PSCAD/EMTDC simulation.
Volume: 6
Issue: 5
Page: 1985-1993
Publish at: 2016-10-01

A Novel Approach to PID Controller Design for Improvement of Transient Stability and Voltage Regulation of Nonlinear Power System

10.11591/ijece.v6i5.pp2225-2238
Rekha Chaudhary , Arun Kumar Singh , Saligram Agrawal
In this paper, a novel design method for determining the optimal PID controller parameters for non-linear power system using the particle swarm optimization (PSO) algorithm is presented. The direct feedback linearization (DFL) technique is used to linearize the nonlinear system for computing the PID (DFL-PID) controller parameters. By taking an example of single machine infinite bus (SMIB) power system it has been shown that PSO based PID controller stabilizes the system and restores the pre-fault system performance after fault is cleared and line is restored. The performance of this controlled system is compared with the performance of DFL-state feedback controlled power system. It has been shown that the performance of DFL-PID controlled system is superior compared to DFL-state feedback controlled system. For simulation MATLAB 7 software is used. 
Volume: 6
Issue: 5
Page: 2225-2238
Publish at: 2016-10-01

Stochastic Approach to a Rain Attenuation Time Series Synthesizer for Heavy Rain Regions

10.11591/ijece.v6i5.pp2379-2386
Masoud Mohebbi Nia , Jafri Din , Hong Yin Lam , Athanasios D. Panagopoulos
In this work, a new rain attenuation time series synthesizer based on the stochastic approach is presented. The model combines a well-known interest-rate prediction model in finance namely the Cox-Ingersoll-Ross (CIR) model, and a stochastic differential equation approach to generate a long-term gamma distributed rain attenuation time series, particularly appropriate for heavy rain regions. The model parameters were derived from maximum-likelihood estimation (MLE) and Ordinary Least Square (OLS) methods. The predicted statistics from the CIR model with the OLS method are in good agreement with the measurement data collected in equatorial Malaysia while the MLE method overestimated the result. The proposed stochastic model could provide radio engineers an alternative solution for the design of propagation impairment mitigation techniques (PIMTs) to improve the Quality of Service (QoS) of wireless communication systems such as 5G propagation channel, in particular in heavy rain regions.
Volume: 6
Issue: 5
Page: 2379-2386
Publish at: 2016-10-01

Spatio-Temporal Typology of Land and Forest Fire in Sumatra

10.11591/ijeecs.v4.i1.pp83-90
Israr Albar , I. Nengah Surati Jaya , Bambang Hero Saharjo , Budi Kuncahyo
The characteristic of land and forest fires occurred in Indonesia are varied widely, following the variation of time within a year and geographic location. This paper describes how the spatio-temporal of forest and land fire typology was developed. The main objective of this study was to develop a spatio-temporal typology of forest and land fire by considering several key indicators that directly related to the density of active fire occurrence, such as percentage of forest area (x1), population density (x2), ratio of forest area to population (x3), ratio of plantation area to population (x4), ratio of agriculture area to population (x5), GRDP (x6), population growth (x7), deforestation growth (x8), plantation growth (x9) and dry agriculture growth (x10) as well as  MODIS-based fire hotspot. The typology analysis was performed using clustering techniques with Euclidean distance dissimilarity measure, where the grouping process was drawn with single linkage method. The temporal analysis showed that the highest occurrence of the fire hotspot was mainly found in the third quarter. It was found that the forest and land fire typology could be developed into three classes using variables x6 and x7 with overall accuracy of 78.15% or x1-x6-x7 with overall accuracy of 78.8%.  No accuracy improvement was obtained when the typology was developed using five variables x1-x3-x4-x6-x7.
Volume: 4
Issue: 1
Page: 83-90
Publish at: 2016-10-01

A Normative Process Model for ICT Business Continuity Plan for Disaster Event in Small, Medium and Large Enterprises

10.11591/ijece.v6i5.pp2425-2431
Fadeel Sambo , Felix Olu Bankole
Small, Medium and Large Enterprises (SMLs) are exposed to the risks of business interruption as they expand and become more dependent on Information Communication Technology (ICT) infrastructure. The current study seeks to determine why organization that have Business Continuity Plan (BCP) in place and implement regular testing of their plan still experience prolong downtime during a disaster event resulting in Service Level Agreement (SLA) not being met or major financial loss. By employing a descriptive analytics approach through a qualitative case study, the research propose a normative process model for comprehensive procedures of BCP for business leaders, ICT service managers, IS executives, data science researchers, risk managers, entrepreneur and policy makers on how to adopt strategies on effective disaster risk reduction and management in organizations. The current study offer both theoretical and practical implications for BCP in small, medium and large enterprises.
Volume: 6
Issue: 5
Page: 2425-2431
Publish at: 2016-10-01
Show 1521 of 1896

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration