Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

28,451 Article Results

Investigation on the Services of Private Cloud Computing by Using ADAM Method

10.11591/ijece.v6i5.pp2387-2395
Nur Widiyasono , Imam Riadi , Ahmad Luthfie
Cloud services are offered by many cloud service providers, but in for large companies generally are build  by a private cloud computing. In cloud systems of abuse it can be done by internal users or due to misconfiguration or may also refer to weaknesses in the system. This study evaluated the ADAM method (Advanced Data Acquisition Model) and tested the case schemes which are being carried out in the laboratory simulation of the process in order to obtain forensic evidence of digital data on private cloud computing services. Referring to the results of the investigation process by using ADAM Method, it can be verified that there are several parameters of the success investigation including the structure of files, files, time stamp, mac-address, IP address, username password, and the data from a server both from the desktop PC or smartphone, therefore the investigation by using ADAM can be succesed properly and correctly. Another contribution of this study was to identify the weaknesses of the service system that used owncloud in users list of the the same group can change another’s user’s passwod.
Volume: 6
Issue: 5
Page: 2387-2395
Publish at: 2016-10-01

Decomposition-Coordinating Method for Parallel Solution of a Multi-area Combined Economic Emission Dispatch Problem

10.11591/ijece.v6i5.pp2048-2063
Senthil Krishnamurthy , Raynitchka Tzoneva
Multi-area Combined Economic Emission Dispatch (MACEED) problem is an optimization task in power system operation for allocating the amount of generation to the committed units within the system areas. Its objective is to minimize the fuel cost and the quantity of emissions subject to the power balance, generator limits, transmission line and tie-line constraints. The solutions of the MACEED problem in the conditions of deregulation are difficult, due to the model size, nonlinearities, and the big number of interconnections, and require intensive computations in real-time. High-Performance Computing (HPC) gives possibilities for the reduction of the problem complexity and the time for calculation by the use of parallel processing techniques for running advanced application programs efficiently, reliably and quickly. These applications are considered as very new in the power system control centers because there are not available optimization methods and software based on them that can solve the MACEED problem in parallel, paying attention to the existence of the power system areas and the tie-lines between them. A decomposition-coordinating method based on Lagrange’s function is developed in this paper. Investigations of the performance of the method are done using IEEE benchmark power system models.
Volume: 6
Issue: 5
Page: 2048-2063
Publish at: 2016-10-01

Empirical Mode Decomposition (EMD) Based Denoising Method for Heart Sound Signal and Its Performance Analysis

10.11591/ijece.v6i5.pp2197-2204
Amy Hamidah Salman , Nur Ahmadi , Richard Mengko , Armein Z. R. Langi , Tati L. R. Mengko
In this paper, a denoising method for heart sound signal based on empirical mode decomposition (EMD) is proposed. To evaluate the performance of the proposed method, extensive simulations are performed using synthetic normal and abnormal heart sound data corrupted with white, colored, exponential and alpha-stable noise under different SNR input values. The performance is evaluated in terms of signal-to-noise ratio (SNR), root mean square error (RMSE), and percent root mean square difference (PRD), and compared with wavelet transform (WT) and total variation (TV) denoising methods. The simulation results show that the proposed method outperforms two other methods in removing three types of noises.
Volume: 6
Issue: 5
Page: 2197-2204
Publish at: 2016-10-01

Adaptive Adjustment of PSO Coefficients Taking the Notion from the Bee Behavior in Collecting Nectar

10.11591/ijece.v6i5.pp2470-2477
Abbas Fadavi , Karim Faez , Zeinab Famili
In particle swarm optimization, a set of particles move towards the global optimum point according to their experience and experience of other particles. Parameters such as particle rate, particle best experience, the best experience of all the particles and particle current position are used to determine the next position of each particle. Certain relationships received the input parameters and determined the next position of each particle. In this article, the relationships are accurately assessed and the amount of the effect of input parameters is horizontally set. To set coefficients adaptively, the notion is taken from bee behavior in collecting nectar. This method was implemented on software and examined in the standard search environments. The obtained results indicate the efficiency of this method in increasing the rate of convergence of particles towards the global optimum.
Volume: 6
Issue: 5
Page: 2470-2477
Publish at: 2016-10-01

Five-Phase Permanent Magnetic Synchronous Motor Fed by Fault Tolerant Five Phase Voltage Source Inverter

10.11591/ijece.v6i5.pp1994-2004
Hichem Kesraoui , Hamdi Echeikh , Atif Iqbal , Med Faouzi Mimouni
Multiphase machines have gained attention in numerous fields of pplications such as Aircraft, ship propulsion, petrochemical and automobiles, where high reliability is required. The additional number of phases guarantees that the system continues to operate in faulty conditions compared to the traditional three-phase machine due to the high degree of freedom. Among faults able to affect multiphase system, break between a machine phase and the voltage source inverter (VSI) degrade the performance of the control. In this paper, a five-phase permanent magnet synchronous machine (PMSM) is fed through a fault tolerant voltage source inverter with new structure to ensure drive continuity when open circuit occurs. The five phase PMSM is controlled with fuzzy logic regulator to minimize disturbance impact that can arise fault condition. Paper is accomplished with real time simulations using MATLAB-Simulink in order to validate the new topology and show the effectiveness of the proposed solution.
Volume: 6
Issue: 5
Page: 1994-2004
Publish at: 2016-10-01

An Unsupervised Classification Technique for Detection of Flipped Orientations in Document Images

10.11591/ijece.v6i5.pp2140-2149
Vijayashree CS , Shobha Rani , Vasudev T
Detection of text orientation in document images is of preliminary concern prior to processing of documents by Optical Character Reader. The text direction in document images should exist generally in a specific orientation, i.e.,   text direction for any automated document reading system. The flipped text orientation leads to an unambiguous result in such fully automated systems. In this paper, we focus on development of text orientation direction detection module which can be incorporated as the perquisite process in automatic reading system. Orientation direction detection of text is performed through employing directional gradient features of document image and adapts an unsupervised learning approach for detection of flipped text orientation at which the document has been originally fed into scanning device. The unsupervised learning is built on the directional gradient features of text of document based on four possible different orientations. The algorithm is experimented on document samples of printed plain English text as well as filled in pre-printed forms of Telugu script. The outcome attained by algorithm proves to be consistent and adequate with an average accuracy around 94%.
Volume: 6
Issue: 5
Page: 2140-2149
Publish at: 2016-10-01

ENPP: Extended Non-preemptive PP-aware Scheduling for Real-time Cloud Services

10.11591/ijece.v6i5.pp2291-2299
Fereshteh Hoseini , Mostafa Ghobaei Arani , Alireza Taghizadeh
By increasing the use of cloud services and the number of requests to processing tasks with minimum time and costs, the resource allocation and scheduling, especially in real-time applications become more challenging. The problem of resource scheduling, is one of the most important scheduling problems in the area of NP-hard problems. In this paper, we propose an efficient algorithm is proposed to schedule real-time cloud services by considering the resource constraints. The simulation results show that the proposed algorithm shorten the processing time of tasks and decrease the number of canceled tasks.
Volume: 6
Issue: 5
Page: 2291-2299
Publish at: 2016-10-01

Review of IDS Develepment Methods in Machine Learning

10.11591/ijece.v6i5.pp2432-2436
Abdulla Aburomman , Mamun Bin Ibne Reaz
Due to the rapid advancement of knowledge and technologies, the problem of decision making is getting more sophisticated to address, therefore the inventing of new methods to solve it is very important. One of the promising directions in machine learning and data mining is classifier combination. The popularity of this approach is confirmed by the still growing number of publications. This review paper focuses mainly on classifier combination known also as combined classifier, multiple classifier systems, or classifier ensemble. Eventually, recommendations and suggestions have also included.
Volume: 6
Issue: 5
Page: 2432-2436
Publish at: 2016-10-01

Switching Algorithm for Leakage Current Reduction in a PV- No Transformer Inverter System

10.11591/ijeecs.v4.i1.pp52-56
M. N. H. Khan , M. R. Hasan , M. K. Alam
Electricity generation purposes renewable energy brings a important role especially Photovoltaic (PV) panels that can be covered our basic energy (electricity) needs. This photovoltaic panels cover a domestic level (solar power for home), commercially (solar power for commercial applications) or at the community level.  Here used this photovoltaic panel as an input of PV-transformer-less inverter topology which has been compared with existed H6 transformer-less inverter topology. It’s possible to reduce the leakage current with inclined the output voltage that has been shown here by using proposed topology.  This topology is made by using two extra switches with filter. Moreover, overall system actually verified with Pulse Width Modulation (PWM) switching technique.
Volume: 4
Issue: 1
Page: 52-56
Publish at: 2016-10-01

Hybridation of Labeling Schemes for Efficient Dynamic Updates

10.11591/ijeecs.v4.i1.pp184-194
Su Cheng Haw , Samini Subramaniam , Wei Siang Lim , Fang Fang Chua
With XML as the leading standard for data representation over the Web, it is crucial to store and query XML data. However, relational databases are the dominant database technology in most organizations. Thus, replacing relational database with a pure XML database is not a wise choice. One most prominent solution is to map XML into relational database. This paper introduces a robust labeling scheme which is a hybrid labeling scheme combining the beauty features of extended range and ORDPATH schemes to supports dynamic updates. In addition, we also proposed a mapping scheme based on the hybrid labeling scheme. Our proposed approach is evaluated in terms of (i) loading time, (ii) storage size, (iii) query retrieval time, and (iv) dynamic updates time, as compared to ORDPATH and ME schemes. The experimental evaluation results shows that our proposed approach is scalable to support huge datasets and dynamic updates.
Volume: 4
Issue: 1
Page: 184-194
Publish at: 2016-10-01

SIP Authentication Protocols Based On Elliptic Curve Cryptography: Survey and comparison

10.11591/ijeecs.v4.i1.pp231-239
Mourade Azrour , Mohammed Ouanan , Yousef Farhaoui
Session Initiation Protocol (SIP) is the most popular signaling protocol using in order to establish, modify and terminate the session multimedia between different participants. It was selected by the Third Generation Project Partnership (3GPP) as a multimedia application protocol in 3G mobile networks. SIP is the protocol currently used for signaling ToIP calls.  The security of SIP is becoming more and more important. Authentication is the most important security service required by SIP. To ensure a secured communication, many SIP authentication protocols have been proposed. This work provides an overview of the proposed schemes based on elliptic curve cryptography. Those proposed schemes are analyzed in security consideration and the computational cost.
Volume: 4
Issue: 1
Page: 231-239
Publish at: 2016-10-01

Efficiency of JSON approach for Data Extraction and Query Retrieval

10.11591/ijeecs.v4.i1.pp203-214
Mohd Kamir Yusof , Mustafa Man
Students’ Information System (SIS) in Universiti Sultan Zainal Abidin (UniSZA) handles thousands of records on the information of students, subject registration, etc. Efficiency of storage and query retrieval of these records is the matter of database management especially involving with huge data. However, the execution time for storing and retrieving these data are still considerably inefficient due to several factors. In this contribution, two database approaches namely Extensible Markup Language (XML) and JavaScript Object Notation (JSON) were investigated to evaluate their suitability for handling thousands records in SIS. The results showed JSON is the best choice for storage and query speed. These are essential to cope with the characteristics of students’ data. Whilst, XML and JSON technologies are relatively new to date in comparison to the relational database. Indeed, JSON technology demonstrates greater potential to become a key database technology for handling huge data due to an increase of data annually.
Volume: 4
Issue: 1
Page: 203-214
Publish at: 2016-10-01

A Study on MapReduce: Challenges and Trends

10.11591/ijeecs.v4.i1.pp176-183
Sachin Arun Thanekar , K. Subrahmanyam , A. B. Bagwan
Nowadays we all are surrounded by Big data. The term ‘Big Data’ itself indicates huge volume, high velocity, variety and veracity i.e. uncertainty of data which gave rise to new difficulties and challenges. Big data generated may be structured data, Semi Structured data or unstructured data. For existing database and systems lot of difficulties are there to process, analyze, store and manage such a Big Data. The Big Data challenges are Protection, Curation, Capture, Analysis, Searching, Visualization, Storage, Transfer and sharing. Map Reduce is a framework using which we can write applications to process huge amount of data, in parallel, on large clusters of commodity hardware in a reliable manner. Lot of efforts have been put by different researchers to make it simple, easy, effective and efficient. In our survey paper we emphasized on the working of Map Reduce, challenges, opportunities and recent trends so that researchers can think on further improvement. 
Volume: 4
Issue: 1
Page: 176-183
Publish at: 2016-10-01

Private Cloud Storage Using OpenStack with Simple Network Architecture

10.11591/ijeecs.v4.i1.pp155-164
Albert Sagala , Ruth Marlina Hutabarat
The development of cloud computing was highly developed and increasingly in demand by many parties. Cloud computing was very helpful to user to perform data storage without preparing own physical device. Cloud storage is a part of cloud computing where it can facilitate user to upload and download files, view file status. The main barrier to implement the private cloud was the difficulty in configuration of many components involved. These conditions minimize the implementation of the private cloud in many parties. In this research, we demonstrate cloud storage architecture simply by using only three nodes with OpenStack. The first node is the controller, the second node is object storage and the third is object storage. Elaborating the component that should be activated to implement the private cloud. The result of this research will help parties who want to build private cloud storage with simple network architecture using OpenStack Object Storage.
Volume: 4
Issue: 1
Page: 155-164
Publish at: 2016-10-01

FPGA Implementation of a Nakagami-m fading channel Simulator using Random Number Generator

10.11591/ijeecs.v4.i1.pp133-140
Santhosh Kumar B , K. Ayyappa Swamy
By realizing the concept of implementation of the radio propagation channels on simulators is the eminent intention of this work. Even though prototyping software simulators are effortless to design we prefer hardware simulators as they endeavors distinguishable quickness, compared to earlier. Prior to this work fading channels like Gaussian, Rayleigh and Rician fading channel simulators were executed on hard ware.(i.e. FPGA) The significant target  of this attempt is to implement Nakagami-m  fading channel on hardware as they preserved for  unsubstantial consideration. While differentiating with other fading channels  Nakagami-m fading channel acquires wide spread applications, as its capability of providing  appropriate fit for practical fading data, as this is flexible through its size parameter ‘m’, over which representation of signal fading conditions that vary  from serious to modest, to normal  fading or no fading is accomplished . The proposed hardware simulator can hatches complex Nakagami variates after it was implemented on XilinxSpartan-xc3s500e-4fg320 FPGA. This is operated at 50MHz.
Volume: 4
Issue: 1
Page: 133-140
Publish at: 2016-10-01
Show 1522 of 1897

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration