Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,939 Article Results

Radial force cancellation of bearingless brushless direct current motor using integrated winding configuration

10.11591/ijeecs.v25.i1.pp79-88
Ali A. Yousif , Ahmed M. Mohammed , Mohammed Moanes E. Ali
A bearingless brushless direct current (BLDC) motor incorporates the function of magnetic bearings into a BLDC motor, making it a new type of high-performance motor. In this paper, the main motor windings are used to generate the radial force cancellation by injecting the required dc current, “integrated winding configuration”. The bearingless BLDC motor, direct current (DC) cancellation system model is established with the aid of (ANSYS/MAXWELL) software. The simulation results confirm that the rotor radial force is approximately zero and results from a balanced distribution of the magnetic flux density. The proposed DC excitation system is suitable to realize the rotor radial force cancellation in the bearingless BLDC motor. The simulation results of the proposed configuration show the approach of integrating winding configuration at different active pole positions to find the more efficient suspension performance and reduce the suspensions system current.
Volume: 25
Issue: 1
Page: 79-88
Publish at: 2022-01-01

An approach for slow distributed denial of service attack detection and alleviation in software defined networks

10.11591/ijeecs.v25.i1.pp404-413
Prathima Mabel John , Rama Mohan Babu Kasturi Nagappasetty
Over the last few years, the need for programmable networks has captured the interest of industrialists and academicians. It has led to the development of a paradigm called software defined network (SDN). It separates the network intelligence into the control plane and forwarding logic into the data plane. This architecture gives scope to various security issues of which denial of service (DoS) is the most common and challenging to detect. This paper focuses on the detection and mitigation of a slow DoS attack called Slowloris on Apache2 server in SDN based networks. The proposed solution is called Slowloris detection and mitigation mechanism (SDMM). Mininet, an emulator, and SimpleHTTPServer are used for simulation and the same is implemented using Zodiac FX OpenFlow switch, Ryu controller and Apache2 server. SDMM algorithm detects and mitigates prolonged Slowloris attack in typical networks as well as in slow networks with low bandwidth and high delay in 240-280s with an accuracy of 100% and 98% respectively. It uses expectation of burst size as a key factor for detection.
Volume: 25
Issue: 1
Page: 404-413
Publish at: 2022-01-01

Elliptical curve cryptography image encryption scheme with aid of optimization technique using gravitational search algorithm

10.11591/ijeecs.v25.i1.pp247-255
Ramireddy Navatejareddy , Muthukuru Jayabhaskar , Bachala Sathyanarayana
Image encryption enables users to safely transmit digital photographs via a wireless medium while maintaining enhanced anonymity and validity. Numerous studies are being conducted to strengthen picture encryption systems. Elliptical curve cryptography (ECC) is an effective tool for safely transferring images and recovering them at the receiver end in asymmetric cryptosystems. This method's key generation generates a public and private key pair that is used to encrypt and decrypt a picture. They use a public key to encrypt the picture before sending it to the intended user. When the receiver receives the image, they use their private key to decrypt it. This paper proposes an ECC-dependent image encryption scheme utilizing an enhancement strategy based on the gravitational search algorithm (GSA) algorithm. The private key generation step of the ECC system uses a GSA-based optimization process to boost the efficiency of picture encryption. The image's output is used as a health attribute in the optimization phase, such as the peak signal to noise ratio (PSNR) value, which demonstrates the efficacy of the proposed approach. As comparison to the ECC method, it has been discovered that the suggested encryption scheme offers better optimal PSNR values.
Volume: 25
Issue: 1
Page: 247-255
Publish at: 2022-01-01

Data transmitted encryption for clustering protocol in heterogeneous wireless sensor networks

10.11591/ijeecs.v25.i1.pp347-357
Basim Abood , Abeer Naser Faisal , Qasim Abduljabbar Hamed
In this paper, elliptic curves Diffie Hellman-Rivest Shamir Adleman algorithm (ECDH-RSA) is a novel encryption method was proposed, which based on ECDH and RSA algorithm to secure transmitted data in heterogeneous wireless sensor networks (HWSNs). The proposed encryption is built under cheesboard clustering routing method (CCRM). The CCRM used to regulate energy consumption of the nodes. To achieve good scalability and performance by using limited powerful max-end sensors besides a large powerful of min-end sensors. ECDH is used for the sharing of public and private keys because of its ability to provide small key size high protection. The proposed authentication key is generated by merging it with the reference number of the node, and distance to its cluster head (CH). Decreasing the energy intake of CHs, RSA encryption allows CH to compile the tha data which encrypted with no need to decrypt it. The results of the simulation show that the approach could maximize the life of the network by nearly (47%, and 35.7%) compare by secure low-energy adaptive clustering hierarchy (Sec-LEACH and SL-LEACH) approches respectively.
Volume: 25
Issue: 1
Page: 347-357
Publish at: 2022-01-01

Development of smart machine for sorting of deceased onions

10.11591/ijeecs.v25.i1.pp191-199
Kokate Mahadeo Digamber , Wankhede Vishal Ashok , Pawar Dhananjay Jagdish
Today, we are thinking to raise Farmer’s income through various means and measures. Implementation of new crop patterns, technology inclusion and promoting the eshtablishment of numerous agro processing industries will play a major role in agriculture sector. The labour issue is also one of the main concerns in many of the agricultural activities. In this paper we propose a technological evolvement in onion detection process, where we apply image processing and sensory mechanism to identify sprouted and rotten onions respectively. This will yield to quick, accurate and prompt supply of goods to the market, irrespective of lack of consistent but costly manpower. The efficiency of this prototype in identifying the sprouted onions with the help of camera is observed to be upto 87% and also the response of Gas sensing system in detecting rooten onions under prescribed chamber dimensions is analysed and obtained encouraging results.
Volume: 25
Issue: 1
Page: 191-199
Publish at: 2022-01-01

A new remote monitoring device to track magnetic resonance imaging machine cooling system failures

10.11591/ijeecs.v25.i1.pp298-306
Oussama Elallam , Mohamed Hamlich
The magnetic resonance imaging (MRI) machine cooling system has a vital role in the conduct of MRI examinations because a shutdown of the MRI cooling system in the absence of the manipulators can lead to grave consequences over time, like quench, which is the vaporization of helium liquid in the MRI tank, and it's the most expensive MRI failure. To limit the risks of this problem, several companies have tried to develop a monitoring system to track MRI cooling system failures but all solutions proposed are complicated and demand many connections with MRI. The proposed solution is simple, easy, and efficient requires only one joint with the helium compressor, and it has a humidity and temperature sensor to detect quench incident, it works using an advanced monitoring algorithm that evaluates the status of the cooling system and identifies breakdowns, in case of failure our system will send short message service (SMS) notifications and emails to the customer service team. The proposed solution shows the potential for starting the research to understand the relationship between the behavior of the MRI cooling system and the quench using machine learning algorithms.
Volume: 25
Issue: 1
Page: 298-306
Publish at: 2022-01-01

Lightweight hardware fingerprinting solution using inherent memory in off-the-shelf commodity devices

10.11591/ijeecs.v25.i1.pp105-112
Mohd Syafiq Mispan , Aiman Zakwan Jidin , Muhammad Raihaan Kamarudin , Haslinah Mohd Nasir
An emerging technology known as Physical unclonable function (PUF) can provide a hardware root-of-trust in building the trusted computing system. PUF exploits the intrinsic process variations during the integrated circuit (IC) fabrication to generate a unique response. This unique response differs from one PUF to the other similar type of PUFs. Static random-access memory PUF (SRAM-PUF) is one of the memory-based PUFs in which the response is generated during the memory power-up process. Non-volatile memory (NVM) architecture like SRAM is available in off-the-shelf microcontroller devices. Exploiting the inherent SRAM as PUF could wide-spread the adoption of PUF. Therefore, in this study, we evaluate the suitability of inherent SRAM available in ATMega2560 microcontroller on Arduino platform as PUF that can provide a unique fingerprint. First, we analyze the start-up values (SUVs) of memory cells and select only the cells that show random values after the power-up process. Subsequently, we statistically analyze the characteristic of fifteen SRAM-PUFs which include uniqueness, reliability, and uniformity. Based on our findings, the SUVs of fifteen on-chip SRAMs achieve 42.64% uniqueness, 97.28% reliability, and 69.16% uniformity. Therefore, we concluded that the available SRAM in off-the-shelf commodity hardware has good quality to be used as PUF.
Volume: 25
Issue: 1
Page: 105-112
Publish at: 2022-01-01

K-NN supervised learning algorithm in the predictive analysis of the quality of the university administrative service in the virtual environment

10.11591/ijeecs.v25.i1.pp521-528
Omar Freddy Chamorro-Atalaya , Guillermo Morales Romero , Adrián Quispe Andía , Beatriz Caycho Salas , Elizabeth Katerin Auqui Ramos , Primitiva Ramos Salazar , Carlos Palacios Huaraca
The objective of this study is to analyze and discuss the metrics of the predictive model using the K-nearest neighbor (K-NN) learning algorithm, which will be applied to the data on the perception of engineering students on the quality of the virtual administrative service, such as part of the methodology was analyzed the indicators of accuracy, precision, sensitivity and specificity, from the obtaining of the confusion matrix and the receiver operational characteristic (ROC) curve. The collected data were validated through Cronbach's Alpha, finding consistency values higher than 0.9, which allows to continue with the analysis. Through the predictive model through the Matlab R2021a software, it was concluded that the average metrics for all classes are optimal, presenting a precision of 92.77%, sensitivity 86.62%, and specificity 94.7%; with a total accuracy of 85.5%. In turn, the highest level of the area under the curve (AUC) is 0.98, which is why it is considered an optimal predictive model. Having carried out this study, it is possible to contribute significantly to the decision-making of the higher institution in relation to the improvement of the quality of the virtual administrative service.
Volume: 25
Issue: 1
Page: 521-528
Publish at: 2022-01-01

Customer churn analysis using XGBoosted decision trees

10.11591/ijeecs.v25.i1.pp488-495
Muthupriya Vasudevan , Revathi Sathya Narayanan , Sabiyath Fatima Nakeeb , Abhishek Abhishek
Customer relationship management (CRM) is an important element in all forms of industry. This process involves ensuring that the customers of a business are satisfied with the product or services that they are paying for. Since most businesses collect and store large volumes of data about their customers; it is easy for the data analysts to use that data and perform predictive analysis. One aspect of this includes customer retention and customer churn. Customer churn is defined as the concept of understanding whether or not a customer of the company will stop using the product or service in future. In this paper a supervised machine learning algorithm has been implemented using Python to perform customer churn analysis on a given data-set of Telco, a mobile telecommunication company. This is achieved by building a decision tree model based on historical data provided by the company on the platform of Kaggle. This report also investigates the utility of extreme gradient boosting (XGBoost) library in the gradient boosting framework (XGB) of Python for its portable and flexible functionality which can be used to solve many data science related problems highly efficiently. The implementation result shows the accuracy is comparatively improved in XGBoost than other learning models.
Volume: 25
Issue: 1
Page: 488-495
Publish at: 2022-01-01

Automated breast cancer detection system from breast mammogram using deep neural network

10.11591/ijeecs.v25.i1.pp580-588
Suneetha Chittineni , Sai Sandeep Edara
All over the world breast cancer is a major disease which mostly affects the women and it may also cause death if it is not diagnosed in its early stage. But nowadays, several screening methods like magnetic resonance imaging (MRI), ultrasound imaging, thermography and mammography are available to detect the breast cancer. In this article mammography images are used to detect the breast cancer. In mammography image the cancerous lumps/microcalcifications are seen to be tiny with low contrast therefore it is difficult for the doctors/radiologist to detect it. Hence, to help the doctors/radiologist a novel system based on deep neural network is introduced in this article that detects the cancerous lumps/microcalcifications automatically from the mammogram images. The system acquires the mammographic images from the mammographic image analysis society (MIAS) data set. After pre-processing these images by 2D median image filter, cancerous features are extracted from the images by the hybridization of convolutional neural network with rat swarm optimization algorithm. Finally, the breast cancer patients are classified by integrating random forest with arithmetic optimization algorithm. This system identifies the breast cancer patients accurately and its performance is relatively high compared to other approaches.
Volume: 25
Issue: 1
Page: 580-588
Publish at: 2022-01-01

A new smart approach of an efficient energy consumption management by using a machine-learning technique

10.11591/ijeecs.v25.i1.pp68-78
Maha Yousif Hasan , Dheyaa Jasim Kadhim
Many consumers of electric power have excesses in their electric power consumptions that exceed the permissible limit by the electrical power distribution stations, and then we proposed a validation approach that works intelligently by applying machine learning (ML) technology to teach electrical consumers how to properly consume without wasting energy expended. The validation approach is one of a large combination of intelligent processes related to energy consumption which is called the efficient energy consumption management (EECM) approaches, and it connected with the internet of things (IoT) technology to be linked to Google Firebase Cloud where a utility center used to check whether the consumption of the efficient energy is satisfied. It divides the measured data for actual power (A_p ) of the electrical model into two portions: the training portion is selected for different maximum actual powers, and the validation portion is determined based on the minimum output power consumption and then used for comparison with the actual required input power. Simulation results show the energy expenditure problem can be solved with good accuracy in energy consumption by reducing the maximum rate (A_p ) in a given time (24) hours for a single house, as well as electricity’s bill cost, is reduced.
Volume: 25
Issue: 1
Page: 68-78
Publish at: 2022-01-01

Design of an environmental management information system for the Universidad Distrital

10.11591/ijeecs.v25.i1.pp529-539
Edwin Arturo Quintero Torres , William Andrés León Beltrán , Juan Manuel Sánchez Céspedes
This article presents the design, development and implementation of a software tool, serving as an alternative to the problems involving management, control and reporting of processes within the institutional plan for environmental management (known as plan institucional de gestión ambiental (PIGA) by its Spanish acronym) for the Universidad Distrital Francisco José de Caldas. The software is focused on carrying out such processes to the automation setting, based on the extreme programming (XP) Agile methodology that mainly centers on the continuous development of the customer requirements to offer a more assertive tool, in line with the plan institucional de gestión ambiental in Spanish (PIGA) processes. The result is a complete satisfaction of users and a highly usable, adaptable and efficient software, inherently optimizing and automating the environmental management processes of the PIGA program. This work delivers an applet that meets the design and implementation requirements of environmental management policies. The proposed tool manages to reduce process-related times by 97%, therefore, allowing to aim efforts in other missional functions and increase the overall value offer of the organization.
Volume: 25
Issue: 1
Page: 529-539
Publish at: 2022-01-01

State and fault estimation based on fuzzy observer for a class of Takagi-Sugeno singular models

10.11591/ijeecs.v25.i1.pp172-182
Kaoutar Ouarid , Mohamed Essabre , Abdellatif El Assoudi , El Hassane El Yaagoubi
Singular nonlinear systems have received wide attention in recent years, and can be found in various applications of engineering practice. On the basis of the Takagi-Sugeno (T-S) formalism, which represents a powerful tool allowing the study and the treatment of nonlinear systems, many control and diagnostic problems have been treated in the literature. In this work, we aim to present a new approach making it possible to estimate simultaneously both non-measurable states and unknown faults in the actuators and sensors for a class of continuous-time Takagi-Sugeno singular model (CTSSM). Firstly, the considered class of CTSSM is represented in the case of premise variables which are non-measurable, and is subjected to actuator and sensor faults. Secondly, the suggested observer is synthesized based on the decomposition approach. Next, the observer’s gain matrices are determined using the Lyapunov theory and the constraints are defined as linear matrix inequalities (LMIs). Finally, a numerical simulation on an application example is given to demonstrate the usefulness and the good performance of the proposed dynamic system.
Volume: 25
Issue: 1
Page: 172-182
Publish at: 2022-01-01

Segregation of oil palm fruit ripeness using color sensor

10.11591/ijeecs.v25.i1.pp130-137
Aiman Mustaffa , Faiz Arith , Nurin Izzati Fauzi Peong , Nurul Rafiqah Jaffar , Evelyn Larwy Linggie , Ahmad Nizamuddin Mustafa , Fara Ashikin Ali
Oil palm is an important industry that has contributed to income and support to the economic sector especially for Malaysia and Indonesia. However, most of the equipment in the oil palm industry is still operated manually. This work developed a system to separate bunches of oil palm fruit using color sensors according to maturity level. Fruit color plays a decisive point in determining fruit maturity. Here, a specific threshold point of red green blue (RGB) was obtained for the determination of the maturity level of oil palm fruit. Point values of < 120, 120 < x < 150 and > 150 represent the maturity levels of unripe, under ripe and ripe, respectively. This paper is the first to report the RGB points for use in the development of automated oil palm segregation system in the oil palm plantation industry. Thus, this paper will pave the way in producing an accurate and reliable oil palm separation system, which in turn has a positive effect in reducing human error. In the future, a set of sensors is proposed to detect a bunch of the oil palm fruits. This further can speed up the segregation process and more suitable for adaptation to the industry.
Volume: 25
Issue: 1
Page: 130-137
Publish at: 2022-01-01

An internet of things-based automatic brain tumor detection system

10.11591/ijeecs.v25.i1.pp214-222
Md. Lizur Rahman , Ahmed Wasif Reza , Shaiful Islam Shabuj
Due to the advances in information and communication technologies, the usage of the internet of things (IoT) has reached an evolutionary process in the development of the modern health care environment. In the recent human health care analysis system, the amount of brain tumor patients has increased severely and placed in the 10th position of the leading cause of death. Previous state-of-the-art techniques based on magnetic resonance imaging (MRI) faces challenges in brain tumor detection as it requires accurate image segmentation. A wide variety of algorithms were developed earlier to classify MRI images which are computationally very complex and expensive. In this paper, a cost-effective stochastic method for the automatic detection of brain tumors using the IoT is proposed. The proposed system uses the physical activities of the brain to detect brain tumors. To track the daily brain activities, a portable wrist band named Mi Band 2, temperature, and blood pressure monitoring sensors embedded with Arduino-Uno are used and the system achieved an accuracy of 99.3%. Experimental results show the effectiveness of the designed method in detecting brain tumors automatically and produce better accuracy in comparison to previous approaches.
Volume: 25
Issue: 1
Page: 214-222
Publish at: 2022-01-01
Show 865 of 1996

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration