Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

28,188 Article Results

A Comparison of the Query Execution Algorithms in Secure Database System

10.11591/ijece.v6i1.pp337-343
Young-Dal Jang , Ji-Hong Kim
In accordance with the database management, DAS(Database as Service) model is one solution for outsourcing. However, we need some data protection mechanisms in order to maintain the database security The most effective algorithm to secure databases from the security threat of third party attackers is to encrypt the sensitive data within the database. However, once we encrypt the sensitive data, we have difficulties in queries execution on the encrypted database. In this paper, we focus on the search process on the encrypted database. We proposed the selective tuple encryption method using Bloom Filter which could tell us the existence of the data. Finally, we compare the search performance between the proposed method and the other encryption methods we know.
Volume: 6
Issue: 1
Page: 337-343
Publish at: 2016-02-01

A New Validation Approach of a New Three-Phase High Voltage Power Supply for Microwaves Generators with one Magnetron by Phase

10.11591/ijece.v6i1.pp1-11
M. Bassoui , M. Ferfra , M. Chraygane
In order to validating the new three-phase High voltage power supply for microwave generators with one magnetron by phase, this paper presents a new validation approach to evaluate the proposed model with several evaluations. This approach is based on the calculation and measurement of the performance and the power factor of this new three-phase power supply, also the study of the operation of this new system in case of failure. The design of this power supply is composed of new three-phase transformer with magnetic shunt, supplying by phase a voltage doubler cell composed of a capacitor and a diode. Each cell in turn, supplies a single magnetron. In this paper we have presented the new three-phase transformer by its equivalent model; it’s a π  quadruple  model composed  of  storable  inductances  able  to translating the nonlinear saturation phenomena for stabilization of  the  magnetron  current. The voltage and current curves obtained by simulation with MATLAB SIMULINK are in good conformity with those obtained by experimental of conventional power supply using a single phase transformer for one magnetron. The same curves will allow us to plot the instantaneous power absorbed by each magnetron. This leads to determine the average power emitted by each magnetron, and establish the balance of the power microwave generator by computing its performance which is compared to that obtained from experimental. After that we will compute the power factor of this power supply and we will study its operation in case of failure of one or two magnetrons.
Volume: 6
Issue: 1
Page: 1-11
Publish at: 2016-02-01

Incremental Tag Suggestion for Landmark Image Collections

10.11591/ijece.v6i1.pp139-150
Sutasinee Chimlek , Punpiti Piamsa-nga
In recent social media applications, descriptive information is collected through user tagging, such as face recognition, and automatic environment sensing, such as GPS. There are many applications that recognize landmarks using information gathered from GPS data. However, GPS is dependent on the location of the camera, not the landmark. In this research, we propose an automatic landmark tagging scheme using secondary regions to distinguish between similar landmarks. We propose two algorithms: 1) landmark tagging by secondary objects and 2) automatic new landmark recognition. Images of 30 famous landmarks from various public databases were used in our experiment. Results show increments of tagged areas and the improvement of landmark tagging accuracy.
Volume: 6
Issue: 1
Page: 139-150
Publish at: 2016-02-01

New Algorithm for Fast Processing RFID System in Container Terminal

10.11591/ijece.v6i1.pp283-291
Evizal Abdul Kadir , Siti Mariyam Shamsuddin , Detri Karya , Sri Listia Rosa
The growth of world economic and increasing of trading in most of countries has impact to the number of containers export and import between countries. Some of container terminal is very busy to handle high volume of container movement. Conventional operational procedures have difficulties to handle containers movement then make slow and some issues in terminal operation for container clearance. This paper discus on proposing new algorithm to the current container terminal management system used RFID technology for fast processing and clearance. Container Terminal Management System (CTMS) is a system for port management and interface to the RFID system that used to identify container e-seal, truck and driver identity. Lack of communication and interfacing protocol made slow response during request or reply of message to the gate operator. Proposed algorithm with new procedure of request to CTMS made faster response and avoid inaccuracy of detecting container e-seal. Results of implementation new algorithm have improved to the productivity and efficiency of container terminal. Testing and implementation of this proposed system conducted in a private container terminal in Malaysia.
Volume: 6
Issue: 1
Page: 283-291
Publish at: 2016-02-01

Issues in Routing Mechanism for Packets Forwarding: A Survey

10.11591/ijece.v6i1.pp421-430
Rohit Nilkanth Devikar , Dipak V. Patil , V. Chandraprakash
Nowadays internet has become more popular to each and every one. It is very sensitive to nodes or links failure due to many known or unknown issues in the network connectivity. Routing is the important concept in wired and wireless network for packet transmission. During the packet transmission many times some of the problems occur, due to this packets are being lost or nodes not able to transmit the packets to the specific destination. This paper discusses various issues and approaches related to the routing mechanism. In this paper, we present a review and comparison of different routing algorithms and protocols proposed recently in order to address various issues. The main purpose of this study is to address issues for packet forwarding like network control management, load balancing, congestion control, convergence time and instability. We also focus on the impact of these issues on packet forwarding.
Volume: 6
Issue: 1
Page: 421-430
Publish at: 2016-02-01

QoS Design Consideration for Enterprise and Provider’s Network at Ingress and Egress Router for VoIP protocols

10.11591/ijece.v6i1.pp235-241
Manjur Kolhar , Mosleh M Abualhaj , Faiza Rizwan
Compliance with the Service Level Agreement (SLA) metric is a major challenge in a Multiprotocol Label Switching Virtual Private Network (MPLS VPN) because mandatory models must be maintained on both sides of the MPLS VPN in order to achieve end-to-end service levels. The end-to-end service of an MPLS VPN can be degraded owing to various issues such as distributed denial of service (DDoS), and Random Early Detection (RED) that prevents congestion and differentiates between legitimate and illegitimate user traffic. In this study, we propose a centralized solution that uses a SLA Violation Detector (SLAVD) and intrusion detection to prevent SLA violation.
Volume: 6
Issue: 1
Page: 235-241
Publish at: 2016-02-01

Modelling of E-Governance Framework for Mining Knowledge from Massive Grievance Redressal Data

10.11591/ijece.v6i1.pp367-374
Sangeetha G , L. Manjunatha Rao
With the massive proliferation of online applications for the citizens with abundant resources, there is a tremendous hike in usage of e-governance platforms. Right from entrepreneur, players, politicians, students, or anyone who are highly depending on web-based grievance redressal networking sites, which generates loads of massive grievance data that are not only challenging but also highly impossible to understand. The prime reason behind this is grievance data is massive in size and they are highly unstructured. Because of this fact, the proposed system attempts to understand the possibility of performing knowledge discovery process from grievance Data using conventional data mining algorithms. Designed in Java considering massive number of online e-governance framework from civilian’s grievance discussion forums, the proposed system evaluates the effectiveness of performing datamining for Big data.
Volume: 6
Issue: 1
Page: 367-374
Publish at: 2016-02-01

Multi-input DC-AC Inverter for Hybrid Renewable Energy Power System

10.11591/ijece.v6i1.pp40-52
Mohd Azman Rosli , Nor Zaihar Yahaya , Zuhairi Baharudin
The objective of this paper is to design a multi-input dc-ac inverter integrated photovoltaic array, wind turbine and fuel cell in order to simplify the hybrid power system and reduce the cost.  The output power characteristics of the photovoltaic array, wind turbine and fuel cell are introduced. The operational principle and technical details of the proposed multi-input dc-ac inverter is then explained. The proposed inverter consists of a three input flyback dc-dc converter and a single phase full bridge dc-ac inverter. The control strategy for the proposed inverter to distribute the power reasonably to the sources and it achieved a priority of the new energy utilization is discussed. This multi-input dc-ac inverter is capable of being operated in five conditions and power delivered to the ac load can be either individually or simultaneously. First to third condition occurs when the power delivered from either renewable energy sources individually, fourth condition happens when power is demanded from two sources simultaneously, and finally when power are available from three sources simultaneously. The proposed inverter has been simulated by employing NI Multisim 12.0 circuit simulator.
Volume: 6
Issue: 1
Page: 40-52
Publish at: 2016-02-01

Design of Quadcopter Robot as a Disaster Environment Remote Monitor

10.11591/ijece.v6i1.pp188-197
Made Sudarma , I.B. Alit Swamardika , Adinata Mas Pratama
As technology development increase, human more use robot technology to help in many fields. One of robot technology advances is the flying robot Quadcopter. The quadcopter robot is an Unmanned Aerial Vehicle or UAV that consists of four propellers and four brushless motors that function as actuator. Quadcopter was designed by using KK Board V 2.0 Flight Controller which is a series of motor rotation controller and all at once has Accelerometer censor as acceleration censor and Gyroscop censor as a balance or stability censor. The robot controlling is by using remote control (RC), and GoPro HD Hero2 camera was installed to monitor the condition of the environment. Result of testing is that the quadcopter has maximum load for 4.4 kg and maximum range distance of RC is 100 meters without any barrier and 50 meters with barrier.  In the testing, robot can fly with maximum height for 30 meters from land surface. The robot is equipped with camera, so the quadcopter flying robot can be used to monitor any places that are hard to reach.
Volume: 6
Issue: 1
Page: 188-197
Publish at: 2016-02-01

Prediction Data Processing Scheme using an Artificial Neural Network and Data Clustering for Big Data

10.11591/ijece.v6i1.pp330-336
Se-Hoon Jung , Jong-Chan Kim , Chun-Bo Sim
Various types of derivative information have been increasing exponentially, based on mobile devices and social networking sites (SNSs), and the information technologies utilizing them have also been developing rapidly. Technologies to classify and analyze such information are as important as data generation. This study concentrates on data clustering through principal component analysis and K-means algorithms to analyze and classify user data efficiently. We propose a technique of changing the cluster choice before cluster processing in the existing K-means practice into a variable cluster choice through principal component analysis, and expanding the scope of data clustering. The technique also applies an artificial neural network learning model for user recommendation and prediction from the clustered data. The proposed processing model for predicted data generated results that improved the existing artificial neural network–based data clustering and learning model by approximately 9.25%.
Volume: 6
Issue: 1
Page: 330-336
Publish at: 2016-02-01

Information Base Security Threats and Challenges' in Information Forensic: A Survey

10.11591/ijeecs.v1.i2.pp406-410
Dilip Kumar Barai , G. Sridevi , Syed Umar , MSR Prasad
Generally to store the information or Information of any organization then they will be maintain Information base to manage that Information base we use some management techniques like Information base management systems so called DBMS. In this paper we introduced Relational DBMS which is a collection of applications that can store various information which can be easily retrieve, manipulate and storage of Information. So in this we are concentrating on forensic analysis and Information base of it which is very sensitive Information. In this paper we are analyzing and surveying of forensic Information based using various methodologies with different tools and algorithms for investigations, through which we got what are the challenges are facing in the forensic Information bases since the years.
Volume: 1
Issue: 2
Page: 406-410
Publish at: 2016-02-01

Noise Uncertainty Effect on a Modified Two-Stage Spectrum Sensing Technique

10.11591/ijeecs.v1.i2.pp341-348
Heba A.Tag El-Dien , Rokaia M. Zaki , Mohsen M. Tantawy , Hala M. Abdel-Kader
Detecting the presence or absence of primary user is the key task of cognitive radio networks. However, relying on single detector reduces the probability of detection and increases the probability of missed detection. Combining two conventional spectrum sensing techniques by integrating their individual features improves the probability of detection especially under noise uncertainty. This paper introduces a modified two-stage detection technique that depends on the energy detection as a first stage due to its ease and speed of detection, and the proposed Modified Combinational Maximum-Minimum Eigenvalue based detection as a second stage under noise uncertainty and comperes it with the case of using Maximum-Minimum Eigenvalue and  Combinational Maximum-Minimum Eigenvalue as a second stage.
Volume: 1
Issue: 2
Page: 341-348
Publish at: 2016-02-01

On Sparse Compression Complexity of Speech Signals

10.11591/ijeecs.v1.i2.pp329-340
Ahmed Omara , Alaa Hefnawy , Abdelhalim Zekry
In this paper, we have addressed the issue of the sparse compression complexity for the speech signals. First of all, this work illustrated the effect of the signal length on the complexity levels of Matching Pursuit (MP) and Orthogonal Matching Pursuit (OMP) algorithms. Also, this paper introduced a study of possibility to reduce that complexity by exploiting the shared atoms among the contiguous speech compressions. By comparing the shared atoms levels and a threshold level induced by an analytic model based on the both the central and non-central hyper-geometric distributions, we proved the ability of the shared atoms criterion to detect if there is biasing towards a subspace of atoms or not, and to decide if the biasing occurs due to the redundancy in the dictionary of atoms, or due to the redundancy in the signal itself. Moreover, we suggested a subspace bias-based approaches for complexity reduction called "Atoms Reuse" and "Active Cluster". Both methods exploits the higher levels of the shared atoms to reduce the compression complexity by reducing the search space during the pursuit iterations.
Volume: 1
Issue: 2
Page: 329-340
Publish at: 2016-02-01

Tuning of PID Controller for Load Frequency Control Problem via Harmony Search Algorithm

10.11591/ijeecs.v1.i2.pp255-263
M. Omar , M. A. Ebrahim , A. M. Abdel Ghany , F. Bendary
In this paper, a new artificial intelligence technique, Harmony Search (HS), will be used for the optimization of a classical order PID for a two-area load frequency control (LFC) model using the participation factor concept. The HS has four main variants, these variants had been used for the optimization of classical order PID controllers in case of centralized control scheme, the results had been compared to select and recommend the best HS variant. Then, this best HS variant had been used for the tuning of PID controllers in case of decentralized scheme.
Volume: 1
Issue: 2
Page: 255-263
Publish at: 2016-02-01

Portable Dual Mode Mobile Charger with Hand Crank Generator and Solar Panel

10.11591/ijeecs.v1.i2.pp282-287
Md. Atiqur Rahaman , Nusrat Hoque , Nipu kumar Das , Farial Nur Maysha , MD Morshed Alam
A new method of charging a mobile phone with the help of hand crank generator, and solar panel is being presented in this paper. Solar panel is useful during daylight and hand crank generator can be used at night. So this is a dual mode charger which is operated in either way and both ways do not consume system power. This type of mobile charger is very useful when traveling because it uses solar panel to convert renewable source light into electricity. Mechanical hand crank generator is used which converts mechanical energy into electrical energy and then charges the mobile. No electrical sources are needed for it. Our design uses a compound gear train for transformation of the mechanical energy generated from the hand crank to the generator. For that reason it is convenient as well as economical to use such kind of mobile charger for our mobile phone.
Volume: 1
Issue: 2
Page: 282-287
Publish at: 2016-02-01
Show 1562 of 1880

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration