Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,393 Article Results

Self-Healing Properties of Silicone Rubber Against Relative Humidity and Nanofiller

10.11591/ijeecs.v6.i1.pp166-171
Izzah Hazirah Zakaria , Muhammad Taufik Kamaruddin , Yanuar Z. Arief , Mohd Hafizi Ahmad , Noor Azlinda Ahmad , Nor Asiah Muhamad , Zuraimy Adzis
A well-prepared abstract enables the reader to identify the basic content of a document quickly and accurately, to determine its relevance to their interests, and thus to decide whether to read the document in its entirety. The Abstract should be informative and completely self-explanatory, provide a clear statement of the problem, the proposed approach or solution, and point out major findings and conclusions. The Abstract should be 100 to 150 words in length. The abstract should be written in the past tense. Standard nomenclature should be used and abbreviations should be avoided. No literature should be cited. The keyword list provides the opportunity to add keywords, used by the indexing and abstracting services, in addition to those already present in the title. Judicious use of keywords may increase the ease with which interested parties can locate our article.
Volume: 6
Issue: 1
Page: 166-171
Publish at: 2017-04-01

Performance of Non-Uniform Duty-Cycled ContikiMAC in Wireless Sensor Networks

10.11591/.v7i2.pp942-949
Nur Rabiul Liyana Mohamed , Ansar Jamil , Lukman Hanif Audah Audah , Jiwa Abdullah , Rozlan Alias
Wireless Sensor Network (WSN) is a promising technology in Internet of Things (IoTs) because it can be implemented in many applications. However, a main drawback of WSN is it has limited energy because each sensor node is powered using batteries. Therefore, duty-cycle mechanisms are introduced to reduce power consumption of the sensor nodes by ensuring the sensor nodes in the sleep mode almost of the time in order to prolong the network lifetime. One of the de-facto standard of duty-cycle mechanism in WSN is ContikiMAC, which is the default duty-cycle mechanism in Contiki OS. ContikiMAC ensures nodes can participate in network communication yet keep it in sleep mode for roughly 99\% of the time. However, it is found that the ContikiMAC does not perform well in dynamic network conditions. In a bursty network, ContikiMAC provides a poor performance in term of packet delivery ratio, which is caused by congestion. One possible solution is ContikiMAC should increase its duty-cycle rate in order to support the bursty traffic. This solution creates a non-uniform duty-cycle rates among the sensor nodes in the network. This work aims to investigate the effect of non-uniform duty-cycle rates on the performance on ContikiMAC. Cooja simulator is selected as the simulation tool. Three different simulation scenarios are considered depending on the Clear Channel Assessment Rate (CCR) configurations: a low uniform CCR value (Low-CCR), a high uniform CCR value (High-CCR) and non-uniform CCR values (Non-uniform-CCR). The simulation results show that the Low-CCR scenario provides the worst performance of PDR. On the other hand, the High-CCR scenario provides the best performance of PDR. The Non-uniform-CCR provides PDR in between of Low-CCR and High-CCR.
Volume: 7
Issue: 2
Page: 942-949
Publish at: 2017-04-01

Exploring the Design Space of HEVC Inverse Transforms with Dataflow Programming

10.11591/ijeecs.v6.i1.pp104-109
Khoo Zhi Yion , Ab Al-Hadi Ab Rahman
This paper presents the design space exploration of the hardware-based inverse fixed-point integer transform for High Efficiency Video Coding (HEVC). The designs are specified at high-level using CAL dataflow language and automatically synthesized to HDL for FPGA implementation. Several parallel design alternatives are proposed with trade-off between performance and resource. The HEVC transform consists of several independent components from 4x4 to 32x32 discrete cosine transform and 4x4 discrete sine transform. This work explores the strategies to efficiently compute the transforms by applying data parallelism on the different components. Results show that an intermediate version of parallelism, whereby the 4x4 and 8x8 are merged together, and the 16x16 and 32x32 merged together gives the best trade-off between performance and resource. The results presented in this work also give an insight on how the HEVC transform can be designed efficiently in parallel for hardware implementation.
Volume: 6
Issue: 1
Page: 104-109
Publish at: 2017-04-01

Hybrid Low Complex near Optimal Detector for Spatial Modulation

10.11591/.v7i2.pp818-822
P. Rajani Kumari , K. Chenna Kesava Reddy , K.S. Ramesh
In our previous work maximum throughput in multi stream MIMO is analyzed by overcoming the inter antenna interference. To mitigate the Inter antenna interference spatial modulation can be used. Spatial Modulation(SM) aided MIMO systems are the emerging MIMO systems which are low complex and energy efficient. These systems additionally use spatial dimensions for transmitting information. In this paper a low complex detector based on matched filter is proposed for spatial modulation to achieve near maximum likelihood performance while avoiding exhaustive ML search since MF based detector exhibits a considerable reduced complexity since activated transmitting antenna and modulated amplitude phase modulation constellation are estimated separately. Simulation results show the performance of the proposed method with optimal ML detector, MRC and conventional matched filter methods.
Volume: 7
Issue: 2
Page: 818-822
Publish at: 2017-04-01

Z–Source Multilevel Inverter Based on Embedded Controller

10.11591/ijeecs.v6.i1.pp1-8
K. Vijayalakshmi , Chinnapettai Ramalingam Balamurugan
In this paper Embedded based Z-source multilevel inverter (ZSMLI) is proposed. This work implements a five level cascaded H-bridge Z-source inverter by using embedded control. Switching devices are triggered using embedded controller. In this controller coding is described by using switching table. The presence of Z-source network couples inverter main circuit to the power source that providing special features that can overcome the limitations of VSI (voltage source inverter) and CSI (current source inverter). The Z-source concept can applicable in all dc-ac, dc-dc, ac-dc and ac-ac power conversions. Simulation model of Z-source multilevel inverter based on embedded controller has been built in MATLAB/SIMULINK. The Performance parameters of Z-source MLI such as RMS (root mean square) output voltage, THD (total harmonic distortion) and DC component have been analysed for various inductance (L) and capacitance (C) value.
Volume: 6
Issue: 1
Page: 1-8
Publish at: 2017-04-01

Quality of Service based Task Scheduling Algorithms in Cloud Computing

10.11591/.v7i2.pp1088-1095
Sirisha Potluri , Katta Subba Rao
In cloud computing resources are considered as services hence utilization of the resources in an efficient way is done by using task scheduling and load balancing. Quality of service is an important factor to measure the trustiness of the cloud. Using quality of service in task scheduling will address the problems of security in cloud computing. This paper studied quality of service based task scheduling algorithms and the parameters used for scheduling. By comparing the results the efficiency of the algorithm is measured and limitations are given. We can improve the efficiency of the quality of service based task scheduling algorithms by considering these factors arriving time of the task, time taken by the task to execute on the resource and the cost in use for  the communication.
Volume: 7
Issue: 2
Page: 1088-1095
Publish at: 2017-04-01

Identification of Thalassemia Disorder using Active Contour

10.11591/ijeecs.v6.i1.pp160-165
Nurhanis Izzati Binti Che Marzuki Izzati Binti Che Marzuki , Nasrul Humaimi bin Mahmood Humaimi bin Mahmood , Mohd Azhar bin Abdul Razak
Thalassemia was known as the red blood cell (RBC) morphology disorder. This disease mostly affects the shape of the red blood cells. Thalassemia becomes the major public health problem when one of the people becomes the carrier of the disease. It can occur within a months after birth or even before birth and results in inappropriate growth and development of babies. Sometimes the affected babies will die shortly after birth. In order to screen thalassemia, there are a few tests need to be done. Firstly by performed Complete Blood Count (CBC) and secondly continued with hemoglobin electrophoresis test. This CBC test will identify the morphology of RBC. Hence, this paper will discuss the methods on identifying the morphology of thalassemia blood cells by using active contour technique. From the result of 16 normal and abnormal blood cell images, the active countour methods able to identifyThalassemia blood cells with accuracy of 90% from the abnormal cell images.
Volume: 6
Issue: 1
Page: 160-165
Publish at: 2017-04-01

Utility Function-based Pricing Strategies in Maximizing the Information Service Provider’s Revenue with Marginal and Monitoring Costs

10.11591/.v7i2.pp877-887
Robinson Sitepu , Fitri Maya Puspita , Anggi Nurul Pratiwi , Icha Puspita Novyasti
Previous research only focus on maximizing revenue for pricing strategies for information good with regardless the marginal and monitoring costs. This paper aims to focus on the addition of marginal and monitoring costs into the pricing strategies to maintain the maximal revenue while introduce the costs incurred in adopting the strategies. The well-known utility functions applied to also consider the consumer’s satisfaction towards the service offered. The results show that the addition costs incurred for setting up the strategies can also increase the profit for the providers rather than neglecting the costs. It is also showed that the Cobb-Douglas utility functions used can enhance the notion of provider to optimize the revenue compared to quasi linear and perfect substitutes.
Volume: 7
Issue: 2
Page: 877-887
Publish at: 2017-04-01

Focusing Properties of a Modified Retarding Structure for Linear Electron Accelerators

10.11591/.v7i2.pp741-747
Vladimir Kuz'mich Shilov , Aleksandr Nikolaevich Filatov , Aleksandr Evgen'evich Novozhilov
When using accelerators in industry and medicine, important are the dimensions of the device used, especially the radial ones. In the linear electron accelerators based on a biperiodic retarding structure, which operates in the standing wave mode, there is a possibility to provide focusing of the accelerated particles with the help of high-frequency fields without the use of external focusing elements. In the accelerating cell, due to the presence of the far protruding drift sleeves, the electric field lines become strongly curved, which leads to the appearance in the regions adjacent to these sleeves of a substantial in magnitude radial component of the electric field. The particles entering the accelerating gap experience the action of a force directed toward the axis of the system, and at the exit, of a force directed away from the axis. Under certain conditions, alternation of the focusing and defocusing fields can lead to a general focusing effect. In the paper we study the focusing properties of a modified biperiodic structure with standing wave. The main attention is paid to the possibility of using the focusing properties of the electromagnetic accelerating field for guiding the electron beam through the aperture of the accelerating system, which will lead to a significant reduction in the accelerator sizes. The proposed method can be applied in the calculation and design of linear electron accelerators.
Volume: 7
Issue: 2
Page: 741-747
Publish at: 2017-04-01

Game-Theoretic Channel Allocation in Cognitive Radio Networks

10.11591/.v7i2.pp986-991
Sangsoon Lim
Cognitive radio networks provide dynamic spectrum access techniques to support the increase in spectrum demand. In particular, the spectrum sharing among primary and secondary users can improve spectrum utilization in unused spectrum by primary users. In this paper, we propose a novel game theoretic channel allocation framework to maximize channel utilization in cognitive radio networks. We degisn the utility function based on the co-channel interference among primary and secondary users. In addition, we embed the property of the adjacent channel intererence to consider real wireless environment. The results show that the utility function converges quickly to Nash equilibrium and achieves channel gain by up to 25 dB compared to initial assignment.
Volume: 7
Issue: 2
Page: 986-991
Publish at: 2017-04-01

X-band Operations Metamaterial Absorber with Extended Circular Ring Topology for Size Reduction

10.11591/ijeecs.v6.i1.pp180-184
M. M. Gajibo , M. K. A. Rahim , N. A. Murad , O. Ayop , B. D. Bala , H. A. Majid
A metamaterial electromagnetic wave absorber consisting of a big circular ring patch with four smaller suppression circular rings is presented in this report. The metamaterial electromagnetic wave absorber introduces the concept of size reduction by suppressing the resonance frequency. An FR4 substrate was used and the incidental wave angles were varied from 00 to 600. Simulations results shows peak absorption of 100% was achieved at 10.7 GHz by the absorber for both TE and TM polarization incident waves. Minimum absorption for both TE and TM mode of 90.6% was achieved under TE mode. The metamaterial absorber was being tested with and Ultra-wide band antenna and the results were reported.
Volume: 6
Issue: 1
Page: 180-184
Publish at: 2017-04-01

Parallel Genetic Algorithms for University Scheduling Problem

10.11591/.v7i2.pp1096-1102
Artan Berisha , Eliot Bytyçi , Ardeshir Tershnjaku
University scheduling timetabling problem, falls into NP hard problems. Re-searchers have tried with many techniques to find the most suitable and fastest way for solving the problem. With the emergence of multi-core systems, the parallel implementation was considered for finding the solution. Our approaches attempt to combine several techniques in two algorithms: coarse grained algorithm and multi thread tournament algorithm. The results obtained from two algorithms are compared, using an algorithm evaluation function. Considering execution time, the coarse grained algorithm performed twice better than the multi thread algorithm.
Volume: 7
Issue: 2
Page: 1096-1102
Publish at: 2017-04-01

Hybrid System of Tiered Multivariate Analysis and Artificial Neural Network for Coronary Heart Disease Diagnosis

10.11591/.v7i2.pp1023-1031
Wiharto Wiharto , Hari Kusnanto , Herianto Herianto
Improved system performance diagnosis of coronary heart disease becomes an important topic in research for several decades. One improvement would be done by features selection, so only the attributes that influence is used in the diagnosis system using data mining algorithms. Unfortunately, the most feature selection is done with the assumption has provided all the necessary attributes, regardless of the stage of obtaining the attribute, and cost required. This research proposes a hybrid model system for diagnosis of coronary heart disease. System diagnosis preceded the feature selection process, using tiered multivariate analysis. The analytical method used is logistic regression. The next stage, the classification by using multi-layer perceptron neural network. Based on test results, system performance proposed value for accuracy 86.3%, sensitivity 84.80%, specificity 88.20%, positive prediction value (PPV) 90.03%, negative prediction value (NPV) 81.80%, accuracy 86,30%  and area under the curve (AUC) of 92.1%. The performance of a diagnosis using a combination attributes of risk factors,symptoms and exercise ECG. The conclusion that can be drawn is that the proposed diagnosis system capable of delivering performance in the very good category, with a number of attributes that are not a lot of checks and a relatively low cost.
Volume: 7
Issue: 2
Page: 1023-1031
Publish at: 2017-04-01

DARE Algorithm: A New Security Protocol by Integration of Different Cryptographic Techniques

10.11591/.v7i2.pp1032-1041
John Mark Espalmado , Edwin Arboleda
Exchange of information between computer networks requires a secure communications channel to prevent and monitor unauthorized access, modification and denial of the computer network. To address this growing problem, security experts sought ways to advance the integrity of data transmission. Security Attacks compromises the security and hence hybrid cryptographic algorithms have been proposed to achieve safe service in the proper manner, such as user authentication and data confidentiality. Data security and authenticity are achieved using these algorithms. Moreover, to improve the strength and cover each algorithm’s weaknesses, a new security algorithm can be designed using the combination of different cryptographic techniques. This design uses Digital Signature Algorithm (DSA) for authentic key generation, Data Encryption Standard (DES) for key scheduling, and Advanced Encryption Standard (AES) and Rivest–Schamir–Adleman Algorithm (RSA) in encrypting data. This new security algorithm has been proposed for improved security and integrity by integration of these cryptographic techniques.
Volume: 7
Issue: 2
Page: 1032-1041
Publish at: 2017-04-01

An Improved Integrated Hash and Attributed based Encryption Model on High Dimensional Data in Cloud Environment

10.11591/.v7i2.pp950-960
Satheesh K S V A Kavuri , Gangadhara Rao Kancherla , Basaveswararao Bobba
Cloud computing is a distributed architecture where user can store their private, public or any application software components on it. Many cloud based privacy protection solutions have been implemented, however most of them only focus on limited data resources and storage format. Data confidentiality and inefficient data access methods are the major issues which block the cloud users to store their high dimensional data. With more and more cloud based applications are being available and stored on various cloud servers, a novel multi-user based privacy protection mechanism need to design and develop to improve the privacy protection on high dimensional data. In this paper, a novel integrity algorithm with attribute based encryption model was implemented to ensure confidentiality for high dimensional data security on cloud storage. The main objective of this model is to store, transmit and retrieve the high dimensional cloud data with low computational time and high security. Experimental results show that the proposed model has high data scalability, less computational time and low memory usage compared to traditional cloud based privacy protection models.
Volume: 7
Issue: 2
Page: 950-960
Publish at: 2017-04-01
Show 1535 of 1960

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration