Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,939 Article Results

Beam division multiple access for millimeter wave massive MIMO: Hybrid zero-forcing beamforming with user selection

10.11591/ijece.v12i1.pp445-452
Hong Son Vu , Kien Truong , Minh Thuy Le
Massive multiple-input multiple-output (MIMO) systems are considered a promising solution to minimize multiuser interference (MUI) based on simple precoding techniques with a massive antenna array at a base station (BS). This paper presents a novel approach of beam division multiple access (BDMA) which BS transmit signals to multiusers at the same time via different beams based on hybrid beamforming and user-beam schedule. With the selection of users whose steering vectors are orthogonal to each other, interference between users is significantly improved. While, the efficiency spectrum of proposed scheme reaches to the performance of fully digital solutions, the multiuser interference is considerably reduced.
Volume: 12
Issue: 1
Page: 445-452
Publish at: 2022-02-01

Thriving information system through business intelligence knowledge management excellence framework

10.11591/ijece.v12i1.pp506-514
Abdul Karim Mohamad , Mailasan Jayakrishnan , Mokhtar Mohd Yusof
In the current digitalization dilemma of an organization, there is a need for the business intelligence and knowledge management element for enhancing a perspective of learning and strategic management. These elements will comprise a significant evolution of learning, insight gained, experiences and knowledge through compelling theoretical impact for practitioners, academicians, and scholars in the pertinent field of interest. This phenomenon occurs due to digitalization transformation towards industry revolution 5.0 and organizational excellence in the information system area. This research focuses on the characteristic of a comprehensive performance measure perspective in an organization that conceives information assessment and key challenges of Business Intelligence and Knowledge Management in perceiving a relevant organizational excellence framework. The dynamic research focusing on the decision-making process and leveraging better knowledge creation. The future of organization excellence seemed to be convergent in determining the holistic performance measure perspective and its factors towards industry revolution 5.0. The research ends up with a typical basic excellence framework that will mash up some characteristics in designing an organizational strategic performance framework. The output is a conceptual performance measure framework for a typical decision-making application for organizational strategic performance management dashboarding.
Volume: 12
Issue: 1
Page: 506-514
Publish at: 2022-02-01

Deep segmentation of the liver and the hepatic tumors from abdomen tomography images

10.11591/ijece.v12i1.pp303-310
Nermeen Elmenabawy , Mervat El-Seddek , Hossam El-Din Moustafa , Ahmed Elnakib
A pipelined framework is proposed for accurate, automated, simultaneous segmentation of the liver as well as the hepatic tumors from computed tomography (CT) images. The introduced framework composed of three pipelined levels. First, two different transfers deep convolutional neural networks (CNN) are applied to get high-level compact features of CT images. Second, a pixel-wise classifier is used to obtain two output-classified maps for each CNN model. Finally, a fusion neural network (FNN) is used to integrate the two maps. Experimentations performed on the MICCAI’2017 database of the liver tumor segmentation (LITS) challenge, result in a dice similarity coefficient (DSC) of 93.5% for the segmentation of the liver and of 74.40% for the segmentation of the lesion, using a 5-fold cross-validation scheme. Comparative results with the state-of-the-art techniques on the same data show the competing performance of the proposed framework for simultaneous liver and tumor segmentation.
Volume: 12
Issue: 1
Page: 303-310
Publish at: 2022-02-01

Social cyber-criminal, towards automatic real time recognition of malicious posts on Twitter

10.11591/ijeecs.v25.i2.pp1199-1207
Yasser Ibrahim , Mohammed Abdel Razek , Nasser El-Sherbeny
Easy access to the internet throughout the world has fully reformed the usage of social communication such as Facebook, Twitter, Linked In which are becoming a part of our life. Accordingly, cybercrime has become a vital problem, especially in developing countries. The dissemination of information with no risk of being discovered and fetched leads to an increase in cyber-criminal. Meanwhile, the huge amount of data continuously produced from Twitter made the discovery process of cyber-criminals is a tough assignment. This research will contribute in determined on the build the comparable vectors for (positive and negative classes) and then the classify incoming tweets to predicate his class (positive or negative). The proposed routines staring with the construct super comparable vectors (SCV) (positive and negative vectors), and the construct vector for the incoming tweet, and then calculate similarities with both SCV and compare calculated similarities to predicate class of incoming tweet. In this research, we used some common techniques for calculating the weight of terms in tweets to construct SCV. To ensure the successful operation of the proposed system, we performed a pilot analysis on a real example of an examination. Research Improves precision, recall, and F1 values by 87%, 59%, 69.99%, respectively.
Volume: 25
Issue: 2
Page: 1199-1207
Publish at: 2022-02-01

Solution for intra/inter-cluster event-reporting problem in cluster-based protocols for wireless sensor networks

10.11591/ijece.v12i1.pp868-879
Raed Taleb Al-Zubi , Abdulraheem Ahmed Kreishan , Mohammad Qasem Alawad , Khalid Ahmad Darabkh
In recent years, wireless sensor networks (WSNs) have been considered one of the important topics for researchers due to their wide applications in our life. Several researches have been conducted to improve WSNs performance and solve their issues. One of these issues is the energy limitation in WSNs since the source of energy in most WSNs is the battery. Accordingly, various protocols and techniques have been proposed with the intention of reducing power consumption of WSNs and lengthen their lifetime. Cluster-oriented routing protocols are one of the most effective categories of these protocols. In this article, we consider a major issue affecting the performance of this category of protocols, which we call the intra/inter-cluster event-reporting problem (IICERP). We demonstrate that IICERP severely reduces the performance of a cluster-oriented routing protocol, so we suggest an effective Solution for IICERP (SIICERP). To assess SIICERP’s performance, comprehensive simulations were performed to demonstrate the performance of several cluster-oriented protocols without and with SIICERP. Simulation results revealed that SIICERP substantially increases the performance of cluster-oriented routing protocols.
Volume: 12
Issue: 1
Page: 868-879
Publish at: 2022-02-01

Soft computing techniques for early diabetes prediction

10.11591/ijeecs.v25.i2.pp1167-1176
Sabah Anwer Abdulkareem , Hussein Y. Radhi , Yousra Ahmed Fadil , Hussain Mahdi
Diabetes mellitus is a chronic, life-threatening, and complicated condition. Around 1.5 million deaths due to diabetes have been documented, according to a World Health Organization (WHO) estimation in 2019. In the world of medicine, predicting diabetes risk is a difficult and time-consuming task. Many past studies have been conducted to investigate and clarify diabetes symptoms and variables. To solve these persisting issues, however, more critical clinical criteria must be considered. A comparative analysis based on three soft computing strategies for diabetes prediction has been carried out and achieved in this work. Among the computational intelligence methods used in this study are fuzzy analytical hierarchy processes (FAHP), support vector machine (SVM), and artificial neural networks (ANNs). The techniques reveal promising performance in predicting diabetes reliably and effectively in terms of several classification evaluation metrics, according to experimental analysis and assessment conducted on 520 participants using a publicly available dataset.
Volume: 25
Issue: 2
Page: 1167-1176
Publish at: 2022-02-01

Comparative analysis of Dimensions and Scopus bibliographic data sources: an approach to university research productivity

10.11591/ijece.v12i1.pp706-720
Pachisa Kulkanjanapiban , Tipawan Silwattananusarn
This paper shows a significant comparison of two primary bibliographic data sources at the document level of Scopus and Dimensions. The emphasis is on the differences in their document coverage by institution level of aggregation. The main objective is to assess whether Dimensions offers at the institutional level good new possibilities for bibliometric analysis as at the global level. The results of a comparative study of the citation count profiles of articles published by faculty members of Prince of Songkla University (PSU) in Dimensions and Scopus from the year the databases first included PSU-authored papers (1970 and 1978, respectively) through the end of June 2020. Descriptive statistics and correlation analysis of 19,846 articles indexed in Dimensions and 13,577 indexed in Scopus. The main finding was that the number of citations received by Dimensions was highly correlated with citation counts in Scopus. Spearman’s correlation between citation counts in Dimensions and Scopus was a high and mighty relationship. The findings mainly affect Dimensions’ possibilities as instruments for carrying out bibliometric analysis of university members’ research productivity. University researchers can use Dimensions to retrieve information, and the design policies can be used to evaluate research using scientific databases.
Volume: 12
Issue: 1
Page: 706-720
Publish at: 2022-02-01

Predicting students' learning styles using regression techniques

10.11591/ijeecs.v25.i2.pp1177-1185
Ahmad Mousa Altamimi , Mohammad Azzeh , Mahmoud Albashayreh
Traditional learning systems have responded quickly to the COVID pandemic and moved to online or distance learning. Online learning requires a personalization method because the interaction between learners and instructors is minimal, and learners have a specific learning method that works best for them. One of the personalization methods is detecting the learners' learning style. To detect learning styles, several works have been proposed using classification techniques. However, the current detection models become ineffective when learners have no dominant style or a mix of learning styles. Thus, the objective of this study is twofold. Firstly, constructing a prediction model based on regression analysis provides a probabilistic approach for inferring the preferred learning style. Secondly, comparing regression models and classification models for detecting learning style. To ground our conceptual model, a set of machine learning algorithms have been implemented based on a dataset collected from a sample of 72 students using visual, auditory, reading/writing, and kinesthetic (VARK's) inventory questionnaire. Results show that regression techniques are more accurate and representative for real-world scenarios than classification algorithms, where students might have multiple learning styles but with different probabilities. We believe that this research will help educational institutes to engage learning styles in the teaching process.
Volume: 25
Issue: 2
Page: 1177-1185
Publish at: 2022-02-01

Third harmonic current minimization using third harmonic blocking transformer

10.11591/ijeecs.v25.i2.pp697-709
Vishnuprasada Vittal Bhat , Pinto Pius
Zero sequence blocking transformers (ZSBTs) are used to suppress third harmonic currents in 3-phase systems. Three-phase systems where single-phase loading is present, there is every chance that the load is not balanced. If there is zero-sequence current due to unequal load current, then the ZSBT will impose high impedance and the supply voltage at the load end will be varied which is not desired. This paper presents Third harmonic blocking transformer (THBT) which suppresses only higher harmonic zero sequences. The constructional features using all windings in single-core and construction using three single-phase transformers explained. The paper discusses the constructional features, full details of circuit usage, design considerations, and simulation results for different supply and load conditions. A comparison of THBT with ZSBT is made with simulation results by considering four different cases.
Volume: 25
Issue: 2
Page: 697-709
Publish at: 2022-02-01

Parametric estimation in photovoltaic modules using the crow search algorithm

10.11591/ijece.v12i1.pp82-91
Oscar Danilo Montoya , Carlos Alberto Ramírez-Vanegas , Luis Fernando Grisales-Noreña
The problem of parametric estimation in photovoltaic (PV) modules considering manufacturer information is addressed in this research from the perspective of combinatorial optimization. With the data sheet provided by the PV manufacturer, a non-linear non-convex optimization problem is formulated that contains information regarding maximum power, open-circuit, and short-circuit points. To estimate the three parameters of the PV model (i.e., the ideality diode factor (a) and the parallel and series resistances (Rp and Rs)), the crow search algorithm (CSA) is employed, which is a metaheuristic optimization technique inspired by the behavior of the crows searching food deposits. The CSA allows the exploration and exploitation of the solution space through a simple evolution rule derived from the classical PSO method. Numerical simulations reveal the effectiveness and robustness of the CSA to estimate these parameters with objective function values lower than 1 × 10−28 and processing times less than 2 s. All the numerical simulations were developed in MATLAB 2020a and compared with the sine-cosine and vortex search algorithms recently reported in the literature.
Volume: 12
Issue: 1
Page: 82-91
Publish at: 2022-02-01

Review of microgrid protection strategies: current status and future prospects

10.12928/telkomnika.v20i1.19652
Zaid; Universiti Tun Hussein Onn Malaysia Alhadrawi , Mohd Noor; Department of Electrical Engineering and principal researcher of Green and Sustainable Energy (GSEnergy) Focus Group, Faculty of Electrical and Electronic Engineering (FKEE), Universiti Tun Hussein Onn Malaysia (UTHM). Abdullah , Hazlie; Department of Electrical Engineering and the Head of Power and Energy System Research Group, Universiti Malaya Mokhlis
A microgrid is a developed form of a distribution system, which is integrated with a set of different types of distributed generation (DG) to supply local demand. In spite of that microgrids have many advantages as they increase reliability, raise efficiency, decrease feeder losses and voltage sag correction. However, there are many technical challenges faced, one of them is the protection of microgrid. Conventional protections have been made for radial distribution systems configuration. Where supplying source has one direction and the power flow is defined. The DG penetration converts the distribution network to a multi sources system causes a bidirectional power flow. Also, the most of DG uses a DC to AC converter which limit the fault current level. Therefore, a suitable protection scheme for microgrid ought to be designed to protect a microgrid from any disturbances may occur for both modes of operation grid-connected and islanded. The purpose of this paper is to summarize the challenges and problems facing microgrid protection. As well as the most strategies to date are presented with a discussion of their basic principles of operation to solve these problems. Finally, some conclusions and suggestions for microgrid protection in the future are presented.
Volume: 20
Issue: 1
Page: 173-184
Publish at: 2022-02-01

Optimized load balance scheduling algorithm

10.12928/telkomnika.v20i1.22464
Rawaa Mohammed; Mustansiriyah University Abdul-Hussein , Ahmed Hashim; Mustansiriyah University Mohammed
The cloud computing environment faces several challenges as a federation of clouds, controlling the traffic flow, scalability, and balancing the load on virtual machines that are considered the most crucial issue due to their impact on the execution time, resource utilization, and cost. This paper is interested in some of the existing algorithms that distribute the workload evenly. These algorithms aim to avoid the blind assignment that often results in some over-loaded servers while another node might be under-loaded. In this work a combination of two inspired metaheuristic algorithms BAT and cuckoo search was proposed; the first algorithm can utilize fast exploration using global search, the latter algorithm can avoid trapping into BAT local optimum problem using levy flight with a far random walk. Additonaly, the proposed algorithm could be used to mitigate distributed denial of service (DDoS) attack that aims to cause endless load on the servers and stop the service. Experimental results for five virtual machine (VM), ten VM, with the varying number of tasks showed that the proposed algorithm has better resource utilization and less makespan time in almost all the cases.
Volume: 20
Issue: 1
Page: 81-88
Publish at: 2022-02-01

Deep learning-based decision support system for weeds detection in wheat fields

10.11591/ijece.v12i1.pp816-825
Brahim Jabir , Noureddine Falih
In precision farming, identifying weeds is an essential first step in planning an integrated pest management program in cereals. By knowing the species present, we can learn about the types of herbicides to use to control them, especially in non-weeding crops where mechanical methods that are not effective (tillage, hand weeding, and hoeing and mowing). Therefore, using the deep learning based on convolutional neural network (CNN) will help to automatically identify weeds and then an intelligent system comes to achieve a localized spraying of the herbicides avoiding their large-scale use, preserving the environment. In this article we propose a smart system based on object detection models, implemented on a Raspberry, seek to identify the presence of relevant objects (weeds) in an area (wheat crop) in real time and classify those objects for decision support including spot spray with a chosen herbicide in accordance to the weed detected.
Volume: 12
Issue: 1
Page: 816-825
Publish at: 2022-02-01

Design and development of DrawBot using image processing

10.11591/ijece.v12i1.pp365-375
Krithika Vaidyanathan , Nandhini Murugan , Subramani Chinnamuthu , Sivashanmugam Shivasubramanian , Surya Raghavendran , Vimala Chinnaiyan
Extracting text from an image and reproducing them can often be a laborious task. We took it upon ourselves to solve the problem. Our work is aimed at designing a robot which can perceive an image shown to it and reproduce it on any given area as directed. It does so by first taking an input image and performing image processing operations on the image to improve its readability. Then the text in the image is recognized by the program. Points for each letter are taken, then inverse kinematics is done for each point with MATLAB/Simulink and the angles in which the servo motors should be moved are found out and stored in the Arduino. Using these angles, the control algorithm is generated in the Arduino and the letters are drawn.
Volume: 12
Issue: 1
Page: 365-375
Publish at: 2022-02-01

Chaotic elliptic map for speech encryption

10.11591/ijeecs.v25.i2.pp1103-1114
Obaida M. Al-hazaimeh , Ashraf A. Abu-Ein , Khalid M. Nahar , Isra S. Al-Qasrawi
Using a new key management system and Jacobian elliptic map, a new speech encryption scheme has been developed for secure speech communication data. Jacobian elliptic map-based speech encryption has been developed as a novel method to improve the existing speech encryption methods' drawbacks, such as poor quality in decrypted signals, residual intelligibility, high computational complexity, and low-key space. Using the Jacobian elliptic map as a key management solution, a new cryptosystem was created. The proposed scheme's performance is evaluated using spectrogram analysis, histogram analysis, key space analysis, correlation analysis, key sensitivity analysis and randomness test analysis. Using the results, we can conclude that the proposed speech encryption scheme provides a better security system with robust decryption quality.
Volume: 25
Issue: 2
Page: 1103-1114
Publish at: 2022-02-01
Show 856 of 1996

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration