Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,939 Article Results

An internet of things-based automatic brain tumor detection system

10.11591/ijeecs.v25.i1.pp214-222
Md. Lizur Rahman , Ahmed Wasif Reza , Shaiful Islam Shabuj
Due to the advances in information and communication technologies, the usage of the internet of things (IoT) has reached an evolutionary process in the development of the modern health care environment. In the recent human health care analysis system, the amount of brain tumor patients has increased severely and placed in the 10th position of the leading cause of death. Previous state-of-the-art techniques based on magnetic resonance imaging (MRI) faces challenges in brain tumor detection as it requires accurate image segmentation. A wide variety of algorithms were developed earlier to classify MRI images which are computationally very complex and expensive. In this paper, a cost-effective stochastic method for the automatic detection of brain tumors using the IoT is proposed. The proposed system uses the physical activities of the brain to detect brain tumors. To track the daily brain activities, a portable wrist band named Mi Band 2, temperature, and blood pressure monitoring sensors embedded with Arduino-Uno are used and the system achieved an accuracy of 99.3%. Experimental results show the effectiveness of the designed method in detecting brain tumors automatically and produce better accuracy in comparison to previous approaches.
Volume: 25
Issue: 1
Page: 214-222
Publish at: 2022-01-01

Coverage enhancements of vehicles users using mobile stations at 5G cellular networks

10.11591/ijeecs.v25.i1.pp388-395
Jaafar A. Aldhaibani , Mohanad S. Alkhazraji , Hasanain Lafta Mohammed , Abid Yaya
High mobility requirements are one of the challenges face fifth-generation wireless (5G) cellular networks by providing acceptable wireless services to users traveling at speed up to 350 km/h. This paper presents a new scenario to increase the bit rate and coverage for passengers that use the vehicles for traveling through the installation a mobile station (MS) on these vehicles to provide a high-quality service to users. Based on signal to noise ratio (SNR’s) mathematical derivation and the outage probability of the user link, the proposed system is evaluated. Numerical results indicate an enhancement for users who received signal strength (RSS) from (-72 to -55) dBm and (15 to 38) Mbps in bit rate. Moreover, their number of users increased by proposed system adoption.
Volume: 25
Issue: 1
Page: 388-395
Publish at: 2022-01-01

Design secure multi-level communication system based on duffing chaotic map and steganography

10.11591/ijeecs.v25.i1.pp238-246
Aliaa Sadoon Abd , Ehab Abdul Razzaq Hussein
Cryptography and steganography are among the most important sciences that have been properly used to keep confidential data from potential spies and hackers. They can be used separately or together. Encryption involves the basic principle of instantaneous conversion of valuable information into a specific form that unauthorized persons will not understand to decrypt it. While steganography is the science of embedding confidential data inside a cover, in a way that cannot be recognized or seen by the human eye. This paper presents a high-resolution chaotic approach applied to images that hide information. A more secure and reliable system is designed to properly include confidential data transmitted through transmission channels. This is done by working the use of encryption and steganography together. This work proposed a new method that achieves a very high level of hidden information based on non-uniform systems by generating a random index vector (RIV) for hidden data within least significant bit (LSB) image pixels. This method prevents the reduction of image quality. The simulation results also show that the peak signal to noise ratio (PSNR) is up to 74.87 dB and the mean square error (MSE) values is up to 0.0828, which sufficiently indicates the effectiveness of the proposed algorithm.
Volume: 25
Issue: 1
Page: 238-246
Publish at: 2022-01-01

Reconfigurable intelligent surfaces assisted wireless communication networks: ergodic capacity and symbol error rate

10.11591/ijeecs.v25.i1.pp358-364
Dinh-Thuan Do , Chi-Bao Le
By enabling reconfigurable intelligent surfaces (RIS), we can deploy intelligent reflecting signals from the base station to destinations. Different from traditional relaying system, RIS relies on programmable metasurfaces and mirrors to improve system performance of destinations. We derive the formulas of main system performance metrics such as ergodic capacity and symbol error rate (SER). Based on types of modulation, we need to demonstrate other parameters which make influence to system performance. We show analytically that the number of reflecting elements along with the transmit power at the source can improve system performance. Moreover, we check the exactness of derived expressions by matching Monte-Carlo with analytical simulations. Finally, we find the best performance can be achieved at specific parameters and results are verified by explicit simulations.
Volume: 25
Issue: 1
Page: 358-364
Publish at: 2022-01-01

Employing opposite ratings users in a new approach to collaborative filtering

10.11591/ijeecs.v25.i1.pp450-459
Abdellah El Fazziki , Yasser El Madani El Alami , Jalil Elhassouni , Ouafae El Aissaoui , Mohammed Benbrahim
Over the past few decades, various recommendation system paradigms have been developed for both research and industrial purposes to satisfy the needs and preferences of users when they deal with enormous data. The collaborative filtering (CF) is one of the most popular recommendation techniques, although it is still immature and suffers from some difficulties such asparsity, gray sheep and scalability impeding recommendation quality. Therefore, we propose a new CF approach to deal with the gray sheep problem in order to improve the predictions accuracy. To realize this goal, our solution aims to infer new users from real ones existing in datasets. This transformation allows for creating users with opposite preferences to the real ones. On the one hand, our approach permits to amplify the number of neighbors, especially in the case of users who have unusual behavior (gray sheep). On the other hand, it facilitates building a dense similar neighborhood. The basic assumption behind this is that if user X is not similar to user Y, then the imaginary user ¬X is similar to the user Y. The performance of our approach was evaluated using two datasets, MovieLens and FilmTrust. Experimental results have shown that our approach surpasses many traditional recommendation approaches.
Volume: 25
Issue: 1
Page: 450-459
Publish at: 2022-01-01

Characterization of silicon tunnel field effect transistor based on charge plasma

10.11591/ijeecs.v25.i1.pp138-143
Firas Natheer Abdul-kadir , Faris Hassan Taha
The aim of the proposed paper is an analytical model and realization of the characteristics for tunnel field-effect transistor (TFET) based on charge plasma (CP). One of the most applications of the TFET device which operates based on CP technique is the biosensor. CP-TFET is to be used as an effective device to detect the uncharged molecules of the bio-sample solution. Charge plasma is one of some techniques that recently invited to induce charge carriers inside the devices. In this proposed paper we use a high work function in the source (ϕ=5.93 eV) to induce hole charges and we use a lower work function in drain (ϕ=3.90 eV) to induce electron charges. Many electrical characterizations in this paper are considered to study the performance of this device like a current drain (ID) versus voltage gate (Vgs), ION/IOFF ratio, threshold voltage (VT) transconductance (gm), and sub-threshold swing (SS). The signification of this paper comes into view enhancement the performance of the device. Results show that high dielectric (K=12), oxide thickness (Tox=1 nm), channel length (Lch=42 nm), and higher work function for the gate (ϕ=4.5 eV) tend to best charge plasma silicon tunnel field-effect transistor characterization.
Volume: 25
Issue: 1
Page: 138-143
Publish at: 2022-01-01

A prototype of 3D-printed permanent magnet generator for low power applications

10.11591/ijeecs.v25.i1.pp98-104
Chaiyong Soemphol , Adisorn Nuan-on , Peeradapath Parametpisit
Recently, there has been a growing interest in the field of using 3D-printing technology for electrical machine manufacturing. However, almost research works have been done majorly on the 3D-printing technology of individual working parts for various electrical machines. This research presents a study of design, fabrication and testing of the protopype of permanent magnet generator using 3D-printing technology. The major parts of proposed generator are fabricated though 3D-printed materials. The stator winding of designed generator consists of 12 slots. The stator coil is designed to have 250 turns per slot and 12 pieces of neodymium magnets are used in to generate magnetic field in the rotor core. The prototype generator is tested under different condition; no-load and loaded-test. The experimental have been shown that in the no-load condition, this generator is able to generate output voltage of 3.3-64.5 V, when rotated at speed of 100-2,500 rpm. In the loaded-test, the output voltage and output current are also generated. Furthermore, it can be seen that a proposed generator can generate the output power of 4,245.28 mW, when rotated at speed of 2,500 rpm.
Volume: 25
Issue: 1
Page: 98-104
Publish at: 2022-01-01

Design and simulation double Ku-band Vivaldi antenna

10.11591/ijeecs.v25.i1.pp396-403
Huda Ibrahim Hamd , Israa Hazem Ali , Ahmed Mohammed Ahmed
Due to the tremendous development in the field of wireless communication and its use in several fields, whether military or commercial was proposed. A novel tapered slot Vivaldi antenna is designed and simulated at double band frequency (Ku-band) using computer simulation technology (CST) software 2020. The dimensions of the antenna are 2.3 × 1 × 0.4 mm3 with a microstrip feed of 0.5 mm. The proposed antenna is improved by cutting a number of circle shapes on the patch layer in different positions. The simulation results are divided into more sections according to the number of circle shapes cutting. The results are good acceptance and make the improved Vivaldi antenna valuable in many future wireless communication applications.
Volume: 25
Issue: 1
Page: 396-403
Publish at: 2022-01-01

Effective task scheduling algorithm in cloud computing with quality of service alert bees and grey wolf optimization

10.11591/ijeecs.v25.i1.pp550-560
Nidhi Bansal , Ajay Kumar Singh
Quality-based services are an indicative factor in providing a meaningful measure. These measures allow labeling for upcoming targets with a numerical comparison with a valid mathematical proof of reading and publications. By obtaining valid designs, organizations put this measure into the flow of technology development operations to generate higher profits. Since the conditions were met from the inception of cloud computing technology, the market was captured heavily by providing support through cloud computing. With the increase in the use of cloud computing, the complexity of data has also increased greatly. Applying natural theory to cloud technology makes it a fruit cream. Natural methods often come true, because survival depends on the live events and happenings, so using it in real life as well as any communication within technology will always be reliable. The numerical results are also showing a better value by comparing the optimization method. Finally, the paper introduces an adaptation theory with effective cloudsim coding of honey bees and grey wolf in conjunction with their natural life cycle for solving task scheduling problems. Using adapted bees improved the results by 50% compared with the original bees and secondly by honeybees and grey wolf improved 60%.
Volume: 25
Issue: 1
Page: 550-560
Publish at: 2022-01-01

Agricultural harvesting using integrated robot system

10.11591/ijeecs.v25.i1.pp152-158
Vikram Raja , Bindu Bhaskaran , Koushik Karan Geetha Nagaraj , Jai Gowtham Sampathkumar , Shri Ram Senthilkumar
In today's competitive world, robot designs are developed to simplify and improve quality wherever necessary. The rise in technology and modernization has led people from the unskilled sector to shift to the skilled sector. The agricultural sector's solution for harvesting fruits and vegetables is manual labor and a few other agro bots that are expensive and have various limitations when it comes to harvesting. Although robots present may achieve harvesting, the affordability of such designs may not be possible by small and medium-scale producers. The integrated robot system is designed to solve this problem, and when compared with the existing manual methods, this seems to be the most cost-effective, efficient, and viable solution. The robot uses deep learning for image detection, and the object is acquired using robotic manipulators. The robot uses a Cartesian and articulated configuration to perform the picking action. In the end, the robot is operated where carrots and cantaloupes were harvested. The data of the harvested crops are used to arrive at the conclusion of the robot's accuracy.
Volume: 25
Issue: 1
Page: 152-158
Publish at: 2022-01-01

A novel salp swarm clustering algorithm for prediction of the heart diseases

10.11591/ijeecs.v25.i1.pp265-272
Nitesh Sureja , Bharat Chawda , Avani Vasant
Heart diseases have a severe impact on human life and health. Cardiovascular deaths and diseases have increased at a fast rate worldwide. The early prediction of these diseases is necessary to prevent deaths. Now a day; a considerable amount of medical information is available and collected as databases. An efficient technique is required to analyse this data and predict the disease. Clustering can help medical practitioners in diagnosis by classifying the patient’s data collected for a disease. Clustering techniques can analyse such data based on each patient-generated and predict disease. A new prediction model based on salp swarm algorithm and support vector machine is proposed in this research for predicting heart diseases. Salp swarm algorithm is used to select the useful features from the database. Support vector machine classifier is used to predict heart diseases. Results obtained are compared with the other algorithms available in the literature. It is observed that the proposed approach produces better results with accuracy 98.75% and 98.46% with the dataset 1 and 2, respectively. In addition to this, the algorithm converges in significantly less time in comparison to other algorithms. This algorithm might become a perfect supporting tool for medical practitioners.
Volume: 25
Issue: 1
Page: 265-272
Publish at: 2022-01-01

New method for route efficient energy calculations with mobile-sink for wireless sensor networks

10.11591/ijeecs.v25.i1.pp365-374
Mohammad Khalaf Rahim Al-juaifari , Jammel Mohammed Ali Mohammed Mona , Zainab Abd Abbas
Despite proposing a number of algorithms and protocols, especially those related to routing, for the purpose of reducing energy consumption in wireless sensor networks, which is one of the most important issues facing this type of network. In this research paper, energy consumption and cost are calculated taking into account energy consumption and the amount of data transferred to a thousand nodes through specific paths towards the mobile sink. The proposed model simulated by sending various amounts of data with specific path to know the energy consumption of each track and the network life time with 250, 500, and 1000 bits. Cost calculated using various weight for each track of these paths and the coefficient of movement time and path loss factor and others related to the transmission and receiving circuits. And finally, the results compared with a previous method it showed the efficiency of our method used and calculating 1000 nodes with various amount of bits to show the experimental results. Deep learning used to remember each and every path of each position or nearby to avoid calculation cost later.
Volume: 25
Issue: 1
Page: 365-374
Publish at: 2022-01-01

Efficient resampling features and convolution neural network model for image forgery detection

10.11591/ijeecs.v25.i1.pp183-190
Manjunatha S , Malini M. Patil
The extended utilization of picture-enhancing or manipulating tools has led to ease of manipulating multimedia data which includes digital images. These manipulations will disturb the truthfulness and lawfulness of images, resulting in misapprehension, and might disturb social security. The image forensic approach has been employed for detecting whether or not an image has been manipulated with the usage of positive attacks which includes splicing, and copy-move. This paper provides a competent tampering detection technique using resampling features and convolution neural network (CNN). In this model range spatial filtering (RSF)-CNN, throughout preprocessing the image is divided into consistent patches. Then, within every patch, the resampling features are extracted by utilizing affine transformation and the Laplacian operator. Then, the extracted features are accumulated for creating descriptors by using CNN. A wide-ranging analysis is performed for assessing tampering detection and tampered region segmentation accuracies of proposed RSF-CNN based tampering detection procedures considering various falsifications and post-processing attacks which include joint photographic expert group (JPEG) compression, scaling, rotations, noise additions, and more than one manipulation. From the achieved results, it can be visible the RSF-CNN primarily based tampering detection with adequately higher accurateness than existing tampering detection methodologies.
Volume: 25
Issue: 1
Page: 183-190
Publish at: 2022-01-01

Power losses evaluation in low voltage distribution network: a case study of 250 kVA, 11/0.416 kV substation

10.11591/ijeecs.v25.i1.pp35-41
Emad Hussen Sadiq , Rakan Khalil Antar , Safer Taib Ahmed
Nowadays, the electrical system is more complicated duet to the continuous growing. Power losses is the biggest challenges for distribution network operators. There are several causes for technical losses. Losses caused by unbalanced phase current are one of the main reasons which can be minimized by small investment through dedicating a technical line staff. As a result of connecting many single loads to three phase four wire power supplies, the current flowing in each phase will be unequal and accordingly there will be a current flowing in the neutral wire. Unbalancing currents in phases can lead to increase the conductor temperature and accordingly the conductor resistance is higher which contribute to increase the power losses. Loss reduction can lead to enormous utility saving. Besides, it increases system capacity and save more money which can be used later for future planted system. This study concentrated on the amount of copper losses in distribution networks as a result of unequal loading of the three phases four wires network. The distribution network is more efficient and more economic assuming that the right procedure is applied to balance the distribution system and achieve the required calculations which require a little investment.
Volume: 25
Issue: 1
Page: 35-41
Publish at: 2022-01-01

Reference-free differential histogram-correlative detection of steganography: performance analysis

10.11591/ijeecs.v25.i1.pp329-338
Natiq M. Abdali , Zahir M. Hussain
Recent research has demonstrated the effectiveness of utilizing neural networks for detect tampering in images. However, because accessing a database is complex, which is needed in the classification process to detect tampering, reference-free steganalysis attracted attention. In recent work, an approach for least significant bit (LSB) steganalysis has been presented based on analyzing the derivatives of the histogram correlation. In this paper, we further examine this strategy for other steganographic methods. Detecting image tampering in the spatial domain, such as image steganography. It is found that the above approach could be applied successfully to other kinds of steganography with different orders of histogram-correlation derivatives. Also, the limits of the ratio stego-image to cover are considered, where very small ratios can escape this detection method unless  modified.
Volume: 25
Issue: 1
Page: 329-338
Publish at: 2022-01-01
Show 866 of 1996

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration