Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,905 Article Results

A Lightweight Symmetric Cryptography Scheme for Identifying Compromised Node in WSN

10.11591/ijeecs.v2.i2.pp431-451
Yassine Maleh , Abdellah Ezzati
Wireless Sensor Network (WSN) is consisting of independent and distributed sensors to monitor physical or environmental conditions, such as temperature, sound, pressure, etc. The most crucial and fundamental challenge facing WSN is security. Due to minimum capacity in-term of memory cost, processing and physical accessibility to sensors devices the security attacks are problematic. They are mostly deployed in open area, which expose them to different kinds of attacks. In this paper, we present an illustration of different attacks and vulnerabilities in WSN. Then we proposed a new lightweight cryptography algorithm for identifying compromised node in WSN called Leap Enhanced. Our evaluations on TOSSIM give a precise and detailed idea of the extra cost of consumption of resources needed to ensure the high level of expected security compared to other cryptography schemes in literature.
Volume: 2
Issue: 2
Page: 431-451
Publish at: 2016-05-01

The Gender Effects of Heart Rate Variability Response during Short-Term Exercise using Stair Stepper from Statistical Analysis

10.11591/ijeecs.v2.i2.pp359-366
Nor Aziyatul Izni Mohd Rosli , Mohd Azizi Abdul Rahman , Malarvili Balakrishnan , Takashi Komeda , Saiful Amri Mazlan , Hairi Zamzuri
This study is aimed to explore the Heart Rate Variability (HRV) response during short-term exercise by stair stepper and to compare the finding between young healthy male and female subjects. The responses were statistically analyzed by applying independent-samples t-test statistical method. The calculation of Coefficient of Variation (CoV (%)) and the slope of the linear regression is used to assess the steadiness of the HRV. Furthermore, the results also demonstrated that female subjects had greater significant p-value of RMSSD feature and significance p-value in a LF feature is greater in male. Thus, the ongoing results demonstrated that males have the sympathetic drive and females have predominant parasympathetic drive using short-term exercise by stepper. Thus, the experiment results indicate the suitability of developing rehabilitation devices in the field of Autonomic Nervous System (ANS), research, control system and rehabilitation enginering, which may help to isolate males and females.
Volume: 2
Issue: 2
Page: 359-366
Publish at: 2016-05-01

Energy Preservation in Heterogeneous Wireless Sensor Networks through Zone Partitioning

10.11591/ijeecs.v2.i2.pp390-395
Shahzad Hassan , Muhammad S.Nisar , Hongbo Jiang
Energy preservation is critical task in the wireless sensor networks and the energy cost increases proportionally as the transmission distance increases. Since nodes are equipped with limited energy it is very crucial to decrease the energy consumption by decreasing the communication distance between the nodes. In clustering protocols inter-cluster and intra-cluster communication is most neglected part. We have proposed a new zone based clustering protocol which reduces the intra- clustering and inter-clustering transmission distance between the communicating nodes. Experimental results reveal that our proposed protocols have outperformed the compared protocols in terms of stability period, instability period and throughput.
Volume: 2
Issue: 2
Page: 390-395
Publish at: 2016-05-01

Capacitor Voltage Balancing of Five Level Diode Clamped Converter based STATCOM

10.11591/ijeecs.v2.i2.pp259-267
D. Sindhuja , V. Yuvaraju M.E.
The power quality determines the fitness of the electrical power to the consumer devices. To improve the quality of the power delivered many compensating devices are used. The FACTS devices are normally used to reduce the power quality problems by inducing one or more AC transmission parameters. The static synchronous compensator (STATCOM) can act as either a source or sink of reactive AC power to an electricity network. The basic electronic block of the STATCOM is the voltage-source inverter that converts an input dc voltage into a three-phase output voltage. The STATCOM employs an inverter in order to obtain the voltage source of adjustable magnitude and phase from the DC link voltage on the capacitor. In this model, the STATCOM is designed with the five level diode clamped converter (DCC) controlled by space vector pulse width modulation (SVPWM) technique. The space vector technique with α, β frame is referred here. The dc link capacitor voltage equalization for the five level diode clamped converter was explained. The Total Harmonic Distortion of the source current will be considerably reduced.
Volume: 2
Issue: 2
Page: 259-267
Publish at: 2016-05-01

Power Sharing for Inverters Based on Virtual Synchronous Generator Control

10.11591/ijeecs.v2.i2.pp305-314
Hashim Hasabelrasul Hamid , Amar Ibrahim Hamza Ahmed
Power sharing is the most important challenging today, especially for parallel operation inverters. Recently to fixed this problem the virtual synchronous generator control strategy has been used. This paper introduced the parallel operation of three phase multilevel inverters with different capacities to share load power by used a newly strategy named VSG with droop method controller. The control strategy is used to make the inverters to emulate the transient , dynamic features of conventional synchronous generator and to gives accurate load sharing among the inverters in proportional to their ratings. To verify the performance of the proposed technique MATLAB/Simulink package for simulation experiment is established.
Volume: 2
Issue: 2
Page: 305-314
Publish at: 2016-05-01

Daily Constant PV Output Power Supplying AC pumps using Batteries

10.11591/ijeecs.v2.i2.pp275-284
Mohamed Mahmoud Ismail
This paper presents 200 KW three phase standalone photovoltaic systems supplying pumping station consist of four pumps 40 KW rating. The system utilizes a two stage energy conversion power conditioning unit topology composed of a DC-DC boost converter and three level-three phase voltage source inverter (VSI). The Boost converter in this paper is designed to operate in continuous mode and controlled for maximum power point tracking (MPPT). The fluctuating output power of the PV array system during the day is the commonly problem in the power system.  In this paper a nickel-Cadmium battery will be used to maintain the output power generated from the PV array supplying the pumps to be constant all the day under different operating conditions. The system is modeled and studied using MATLAB/Simulink
Volume: 2
Issue: 2
Page: 275-284
Publish at: 2016-05-01

Weed Detection Using Fractal-Based Low Cost Commodity Hardware Raspberry Pi

10.11591/ijeecs.v2.i2.pp426-430
Mohamad Iqbal Suriansyah , Heru Sukoco , Mohamad Solahudin
Conventional weed control system is usually used by spraying herbicides uniformly throughout the land. Excessive use of herbicides on an ongoing basis can produce chemical waste that is harmful to plants and soil. The application of precision agriculture farming in the detection process in order to control weeds using Computer Vision On Farm becomes interesting, but it still has some problems due to computer size and power consumption. Raspberry Pi is one of the minicomputer with low price and low power consumption. Having computing like a desktop computer with the open source Linux operating system can be used for image processing and weed fractal dimension processing using OpenCV library and C programming. This research results the best fractal computation time when performing the image with dimension size of 128 x 128 pixels. It is about 7 milliseconds. Furthermore, the average speed ratio between personal computer and Raspberry Pi is 0.04 times faster. The use of Raspberry Pi is cost and power consumption efficient compared to personal computer.
Volume: 2
Issue: 2
Page: 426-430
Publish at: 2016-05-01

A Novel Membrane Clustering Algorithm Based on Tissue-like P System

10.11591/ijeecs.v2.i2.pp409-416
Yan Huaning , Xiang Laisheng , Liu Xiyu , Xue Jie
Clustering is a process of partitioning data points into different clusters due to their similarity, as a powerful technique of data mining, clustering is widely used in many fields. Membrane computing is a computing model abstracting from the biological area, these computing systems are proved to be so powerful that they are equivalent with Turing machines. In this paper, a modified inversion particle swarm optimization was proposed, this method and the mutational mechanism of genetics algorithm were used to combine with the tissue-like P system, through these evolutionary algorithms and the P system, the idea of a novel membrane clustering algorithm could come true. Experiments were tested on six data sets, by comparing the clustering quality with the GA-K-means, PSO-K-means and K-means proved the superiority of our method.
Volume: 2
Issue: 2
Page: 409-416
Publish at: 2016-05-01

Lifetime Prolonging for Clustered Heterogeneous Wireless Sensor Networks by SEP-FUZZY

10.11591/ijeecs.v2.i2.pp380-389
Basim Abood , Muhammed Shemyal Nisar , Aliaa Hussien , Yu Li
The most important consideration in designing protocols for wireless sensor networks is the energy constraint of nodes because in most cases battery recharging is inconvenient or impossible. Therefore, many researches have been done to overcome this demerit. Clustering is one of the main approaches in designing scalable and energy-efficient protocols for WSNs.In this paper, we proposed a novel scheme to investigate the cluster, the Fuzzy Logic Cluster Stable Election Protocol (SEP - FUZZY), which uses Fuzzy Logic Inference System (FIS) in the cluster process. We compare our technique with two approaches (LEACH, and SEP) to show that using a multi parameter FIS enhances the network lifetime significantly. Simulation results demonstrate that the network lifetime achieved by the proposed method could be increased by nearly 27% more than that obtained by LEACH protocol, and by nearly 23% more than that obtained by Stable Election Protocol.
Volume: 2
Issue: 2
Page: 380-389
Publish at: 2016-05-01

Speech Enhancement based on Wiener Filter and Compressive Sensing

10.11591/ijeecs.v2.i2.pp367-379
Amart Sulong , Teddy Surya Gunawan , Othman O. Khalifa , Mira Kartiwi , Eliathamby Ambikairajah
In the last few decades, many advanced technologies have been proposed, in which communications played a great role as well as telecommunications applications. The noise elimination in various environments became the most concerned as it greatly hindered the speech communication applications. The improvement of noisy speech interms of quality and intelligibility are taken into account without introducingany additional noise. Many speech enhancement algorithms have been proposed. Wiener filter is one of the classical algorithm that improve the noisy speech by reducing its noise components through selectively chosen Wiener gain. In this paper, compressive sensing method by randomize measurement matrix is combined with the Wiener filter to reduce the noisy speech signal to produce high signal to noise ratio. The PESQ is used to measure the quality of the proposed algorithm design. Experimental results showthe effectiveness of our proposed algorithm to enhance noisy signals corrupted by various noises compared to other traditional algorithms, in which high PESQ scores were achieved across various noises and different SNRs.
Volume: 2
Issue: 2
Page: 367-379
Publish at: 2016-05-01

Experimental Multipath Delay Profile of Underwater Acoustic Communication Channel in Shallow Water

10.11591/ijeecs.v2.i2.pp351-358
Yasin Yousif Al_Aboosi , Ahmad Zuri Sha'ameri
The shallow water channel is an environment that is of particular interest to many research fields. An underwater acoustic channel is characterized as a multipath channel. Time-varying multipath propagation is one of the major factors that limit the acoustic communication performance in shallow water. This study conducts two underwater acoustic experiments in Tanjung Balau, Johor, Malaysia. A transducer and a hydrophone are submerged at different depths and separated by different distances. Linear frequency modulated (LFM) pulses are chosen as the main transmit signal for the experiments. The cross-correlation between the transmitted and received signals represents the impulse response of the channel (multipath profile). The results show that the amplitude of the successive paths will not rapidly decline, and vice versa, when the distance between the sender and the receiver increases. Moreover, the time difference between the different paths will be small in the case of distance increase. In other words, the successive paths will converge in time.
Volume: 2
Issue: 2
Page: 351-358
Publish at: 2016-05-01

Ensuring Data Integrity Scheme Based on Digital Signature and Iris Features in Cloud

10.11591/ijeecs.v2.i2.pp452-460
Salah H. Abbdal , Thair A. Kadhim , Zaid Ameen Abduljabbar , Zaid Alaa Hussien , Ali A. Yassin , Mohammed Abdulridha Hussain , Salam Waley
Cloud computing is a novel paradigm that allows users to remotely access their data through web- based tools and applications. Later, the users do not have the ability to monitor or arrange their data. In this case, many security challenges have been raised. One of these challenges is data integrity. Contentiously, the user cannot access his data directly and he could not know whether his data is modified or not. Therefore, the cloud service provider should provide efficient ways for the user to ascertain whether the integrity of his data is protected or compromised. In this paper, we focus on the problem of ensuring the integrity of data stored in the cloud. Additionally, we propose a method which combines biometric and cryptography techniques in a cost-effective manner for data owners to gain trust in the cloud. We present efficient and secure integrity based on the iris feature extraction and digital signature.  Iris recognition has become a new, emergent approach to individual identification in the last decade. It is one of the most accurate identity verification systems. This technique gives the cloud user more confidence in detecting any block that has been changed. Additionally, our proposed scheme employs user’s iris features to secure and integrate data in a manner difficult for any internal or external unauthorized entity to take or compromise it. Iris recognition is an internal organ that is well protected against damage and wear by a highly transparent and sensitive membrane. Extensive security and performance analysis show that our proposed scheme is highly efficient and provably secure.
Volume: 2
Issue: 2
Page: 452-460
Publish at: 2016-05-01

Development of a Decision-Making System for Sultan Moulay Slimane University in Beni Mellal, Morocco

10.11591/ijeecs.v2.i2.pp469-477
Abdellah Amine , Rachid Ait Daoud , Belaid Bouikhalene
The issue dealt with in this article is to develop a decision-making information system related to the digital environment of the University work. We propose to model the data within the university in order to transform a system of information into a decision-making information system, that is based on the trades databases oriented toward the actors. A decision-making information is a system that allows the decision makers of the university to have relevant information and powerful analytical tools to help them take the right decision at the right time.
Volume: 2
Issue: 2
Page: 469-477
Publish at: 2016-05-01

An Effective Noise Adaptive Median Filter for Removing High Density Impulse Noises in Color Images

10.11591/ijece.v6i2.pp611-620
S. Abdul Saleem , T. Abdul Razak
Images are normally degraded by some form of impulse noises during the acquisition, transmission and storage in the physical media. Most of the real time applications usually require bright and clear images, hence distorted or degraded images need to be processed to enhance easy identification of image details and further works on the image. In this paper we have analyzed and tested the number of existing median filtering algorithms and their limitations. As a result we have proposed a new effective noise adaptive median filtering algorithm, which removes the impulse noises in the color images while preserving the image details and enhancing the image quality. The proposed method is a spatial domain approach and uses the 3×3 overlapping window to filter the signal based on the correct selection of neighborhood values to obtain the effective median per window. The performance of the proposed effective median filter has been evaluated using MATLAB, simulations on a both gray scale and color images that have been subjected to high density of corruption up to 90% with impulse noises. The results expose the effectiveness of our proposed algorithm when compared with the quantitative image metrics such as PSNR, MSE, RMSE, IEF, Time and SSIM of existing standard and adaptive median filtering algorithms.
Volume: 6
Issue: 2
Page: 611-620
Publish at: 2016-04-01

A cognitive approach for evaluating the usability of Storage as a Service in Cloud Computing Environment

10.11591/ijece.v6i2.pp759-769
Sharmistha Roy , Prasant Kumar Pattnaik , Rajib Mall
Cloud computing is a style of computing which thrives users requirements by delivering scalable, on-demand and pay-per-use IT services. It offers different service models, out of which Storage as a Service (StaaS) is the fundamental block of Infrastructure cloud that fulfills user’s excess demand of elastic computing resources.  But considering the competitive business scenario choosing the best cloud storage provider is a difficult task. Thus, usability is considered to be the key performance indicator which evaluates the better cloud storage based on user’s satisfaction. This paper aims to focus on the usability evaluation of StaaS providers namely Google drive, Drop box and One drive. This paper proposed a fuzzy based AHP model for measuring user satisfaction. Usability evaluation is carried out based on user feedback through Interview and Questionnaire method. Analysis of user feedback is done based on the fuzzy approach in order to remove vaguness. Whereas, AHP model is used for measuring satisfaction degree of the different cloud storage services and it solves the problem of selecting best cloud storage.
Volume: 6
Issue: 2
Page: 759-769
Publish at: 2016-04-01
Show 1657 of 1994

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration