Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,939 Article Results

Local information pattern descriptor for corneal diseases diagnosis

10.11591/ijece.v11i6.pp4972-4981
Samer Kais Jameel , Sezgin Aydin , Nebras H. Ghaeb
Light penetrates the human eye through the cornea, which is the outer part of the eye, and then the cornea directs it to the pupil to determine the amount of light that reaches the lens of the eye. Accordingly, the human cornea must not be exposed to any damage or disease that may lead to human vision disturbances. Such damages can be revealed by topographic images used by ophthalmologists. Consequently, an important priority is the early and accurate diagnosis of diseases that may affect corneal integrity through the use of machine learning algorithms, particularly, use of local feature extractions for the image. Accordingly, we suggest a new algorithm called local information pattern (LIP) descriptor to overcome the lack of local binary patterns that loss of information from the image and solve the problem of image rotation. The LIP based on utilizing the sub-image center intensity for estimating neighbors' weights that can use to calculate what so-called contrast based centre (CBC). On the other hand, calculating local pattern (LP) for each block image, to distinguish between two sub-images having the same CBC. LP is the sum of transitions of neighbors' weights, from sub-image center value to one and vice versa. Finally, creating histograms for both CBC and LP, then blending them to represent a robust local feature vector. Which can use for diagnosing, detecting.
Volume: 11
Issue: 6
Page: 4972-4981
Publish at: 2021-12-01

Design a control system for observing vibration and temperature of turbines

10.11591/ijeecs.v24.i3.pp1437-1444
Omar Farhan Al-Hardanee , İlyas Çankaya , Abdulmuttalib A. Muhsen , Huseyin Canbolat
The core of a typical hydroelectric power plant is the turbine. Vibration and overheating in a turbine occur when water flows through it, and with increased vibration and high temperature, it will cause the turbine blade to break. In this study, the control and monitoring system is designed to predict and avoid any error before it occurs. This process is achieved by measuring vibration and temperature using sensors and sending signals through the Arduino to the graphical user interfaces (GUI), the system compares the signals taken from the sensors with the permissible limits, and when the permissible limits are exceeded, the processor takes appropriate measures to open and close the turbine gates, where the data is displayed in matrix laboratory graphical user interfaces (MATLAB’s GUI) screen. In this way, monitoring is done, and the appropriate action are taken to avoid mistakes.
Volume: 24
Issue: 3
Page: 1437-1444
Publish at: 2021-12-01

Improved uplink throughput and energy efficiency of LoRaWAN using 2-hop LEACH protocol

10.11591/ijeecs.v24.i3.pp1557-1563
Yassine Oukessou , Mohamed Baslam , Mohamed Oukessou
The low power wide area networks (LPWAN) is the new connectivity technology that is geared towards energy constrained internet of things (IoT) devices, is starting to become one of the drivers of the re-accelerating IoT market and has one goal: ensure the wide range distance while reducing the battery energy consumption. We focus in this paper on the evaluation of the uplink throughput of the long-range wide area networks (LoRaWAN) then we attempt optimize the throughput and power dissipation using low energy adaptive clustering hierarchy (LEACH) protocol. Therefore, we exploit a novel module developed in NS-3 simulator for obtaining the first measurements scenario, then the LEACH algorithm for the second optimization case. As result, the simulation analysis will help us to add a new LoRaWAN routing protocol feature.
Volume: 24
Issue: 3
Page: 1557-1563
Publish at: 2021-12-01

Power quality mitigation and transient analysis in AC/DC hybrid microgrid for electric vehicle charging

10.11591/ijeecs.v24.i3.pp1315-1322
Sumana Sreenivasa Rao , Dhanalakshmi Rangaswamy
The usage of electric vehicles (EV) increased in recent years as the vehicles design and performances are nearly similar to petrol vehicles. The main source of energy for EV is taken from the grid for charging. So, the penetration of EVs in alternating current (AC) grid creates more power quality issues like voltage sag, swell and harmonics in the current. This energy can also be produced from the renewable energy resources like photovoltaic (PV) power generation. This PV energy can also be used as direct current (DC) grid. The electric vehicle chargers which come with intelligent grid operation is considered as load in this paper. This paper is an attempt to discuss the penetration of EVs in AC/DC hybrid micro grid which causes the power quality problems, and the power quality problem is mitigated by using the unified power quality conditioner (UPQC). The results are analyzed for three cases and four scenarios which is based on the function of UPQC and the action of smart charger in grid connected as well as autonomous mode operation of the AC/DC micro grid when the load is considered as dynamic load. The simulation is carried out in MATLAB2017b environment
Volume: 24
Issue: 3
Page: 1315-1322
Publish at: 2021-12-01

From IT service management to IT service governance: An ontological approach for integrated use of ITIL and COBIT frameworks

10.11591/ijece.v11i6.pp5292-5300
Lamia Moudoubah , Abir El Yamami , Khalifa Mansouri , Mohammed Qbadou
Some companies have achieved better performance as a result of their IT investments, while others have not, as organizations are interested in calculating the value added by their IT. There is a wide range of literature that agrees that the best practices used by organizations promote continuous improvement in service delivery. Nevertheless, overuse of these practices can have undesirable effects and unquantified investments. This paper proposed a practical tool formally developed according to the DSR design science approach, it addresses a domain relevant to both practitioners and academics by providing IT service governance (ITSG) domain model ontology, concerned with maximizing the clarity and veracity of the concepts within it. The results revealed that the proposed ontology resolved key barriers to ITSG process adoption in organizations, and that combining COBIT and ITIL practices would help organizations better manage their IT services and achieve better business-IT alignment.
Volume: 11
Issue: 6
Page: 5292-5300
Publish at: 2021-12-01

A performance evaluation of convolutional neural network architecture for classification of rice leaf disease

10.11591/ijai.v10.i4.pp1069-1078
Afis Julianto , Andi Sunyoto
Plant disease is a challenge in the agricultural sector, especially for rice production. Identifying diseases in rice leaves is the first step to wipe out and treat diseases to reduce crop failure. With the rapid development of the convolutional neural network (CNN), rice leaf disease can be recognized well without the help of an expert. In this research, the performance evaluation of CNN architecture will be carried out to analyze the classification of rice leaf disease images by classifying 5932 image data which are divided into 4 disease classes. The comparison of training data, validation, and testing are 60:20:20. Adam optimization with a learning rate of 0.0009 and softmax activation was used in this study. From the experimental results, the InceptionV3 and InceptionResnetV2 architectures got the best accuracy, namely 100%, ResNet50 and DenseNet201 got 99.83%, MobileNet 99.33%, and EfficientNetB3 90.14% accuracy.
Volume: 10
Issue: 4
Page: 1069-1078
Publish at: 2021-12-01

An insight into internet sector in Iraq

10.11591/ijece.v11i6.pp5137-5143
Ruaa Alsabah , Mustafa Aljshamee , Ammar M. Abduljabbar , Ali Al-Sabbagh
The internet is considered to be the most advanced technology today and a gateway to modern communication and the sharing of information, products, services, and technology. Nowadays, users want to be able to access anywhere and anytime several services and applications, which is increasing data traffic and triggering a mobile data explosion. Iraq has major problems in increasing the growth and use of the internet and changing the standard method of communication. This is a big challenge, however, since there are several variables that characterize this phase of transformation. In this paper, the problems, vision, and solutions are presented in details. This study aims to clarify the factors of internet use in Iraq by the use of an acceptable approach and by suggesting new solutions for all the presented problems. This work also, clarify the expected traffic and the mechanism to transform the traffic between local ISP’s networks (AS) internet exchange points.
Volume: 11
Issue: 6
Page: 5137-5143
Publish at: 2021-12-01

Could coronavirus 2019-infected disease patients get cope with the treatment?: A qualitative study

10.11591/ijphs.v10i4.20912
Fery AM Mendrofa , Umi Hani , Yuni Nurhidayat
A pandemic of a novel coronavirus-infected disease is currently ongoing in the world. Most patients have to be isolated due to the treatments. This study aimed to make sense of how patients with coronavirus-infected disease understand and experience infectious isolation. The research used a qualitative design with a phenomenological approach. Data collection was conducted with in-depth interviews of nine patients with coronavirus disease-2019 (COVID-19) confirmed who had been in the isolation room. The analysis was conducted on interview transcripts by organizing keywords found into categories, sub-themes, and themes based on Colaizzi's approach. The results indicated that the participants experienced fright due to the isolation and attempted to integrate their isolation experiences. Isolation highlighted a sense of threat posed by cross-infection, a threat that participants experienced as originating from others and from themselves to others. Participants described feeling changes experienced after several days of treatment. Participants reported various symptoms of the disease and received careful care while in isolation. They still communicate with family. Isolated patients are able to deal with the treatment by improving their coping strategies. Participants reported the most support from their families, even from a distance. Future research could explore experiences of isolation from family and staff perspectives and identify the psychological aspect in caring for the COVID-19 patients.
Volume: 10
Issue: 4
Page: 880-887
Publish at: 2021-12-01

A conceptual learner discipline management model for secondary schools in Mauritius

10.11591/ijere.v10i4.20683
Belle Louis Jinot , Van Niekerk Eldridge Johannes
Learner discipline management is a major but challenging function of school leadership. Adolescents of the 21st century are complex in nature, and school stakeholders are having much difficulty to handle the problem of indiscipline in secondary schools. This paper aims at providing a conceptual model framework for learner discipline management. This model is the result of an empirical investigation conducted in four secondary schools. Focus group discussion and individual interviews were carried out with 80 participants, including 24 teachers, 24 learners, 24 parents, four school principals, and four school superintendents. The non-participant observation was also conducted in the four schools. Based on the conceptual, theoretical and empirical literature on positive, proactive, preventive and restorative discipline, the researcher proposed the model that considers all the research- and evidence-based strategies that are combined with the current effective measures prescribed by the Ministry of Education, Science and Technology of Mauritius. The model is framed within the context of the Nine Year Continuous Basic Education reform that requires a shift in the conception of discipline from the punitive or reactive approach to the positive approach. This paper formulates a conceptual model framework to implement in an attempt to prevent, reverse and restore discipline among learners in secondary schools.
Volume: 10
Issue: 4
Page: 1359-1365
Publish at: 2021-12-01

Enhancement of digital chest images using a modified Sobel edge detection algorithm

10.11591/ijeecs.v24.i3.pp1718-1726
Archana J. N. , Aishwarya P. , Hanson Joseph
Computed tomography (CT) images are an essential factor in the diagnosing procedure for various diseases affecting the internal organs. Edge detection can be used for the appropriate enhancement of the lung CT scan images for the diagnosis of the various interstitial lung diseases (ILD). In order to solve the issues of edge detection provided by the traditional Sobel operator, the paper proposes a Sobel 12D edge detection algorithm which uses the additional direction templates for the better identification of the edge details. First, the vertical and horizontal directions available in the traditional Sobel operator are extended to few more directions (a total of 12 directions) which enhances the edge extraction ability. Next part, compute the edge detected image using the Sobel 12D, Laplace, Prewitt, Robert’s Cross and Scharr operators for edge detection separately. It is followed by image fusion method which optimizes the edge detection by combining the edge detected images obtained using the Sobel 12D approach and the Laplace operator. The experimental results shows that the proposed algorithms generates a better detection of the edges than the other edge detection operators.
Volume: 24
Issue: 3
Page: 1718-1726
Publish at: 2021-12-01

Bayesian estimate of system availability for consecutive k-out-of-n:F system

10.11591/ijeecs.v24.i3.pp1692-1699
Madhumitha J. , G. Vijayalakshmi
In the efficient design and functionality of complex systems, redundancy problems in systems play a key role. The consecutive-k-out-of-n:F structure, which has broad application in street light arrangements, vacuum systems in an accelerator, sliding window detection, relay stations for a communication system. Availability is one of the significant measures for a maintained device because availability accounts for the repair capability. A very significant feature is the steady-state availability of a repairable device. For the repairable consecutive k-out-of-n:F system with independent and identically distributed components, the Bayesian point estimate (B.P.E) of steady-state availability under squared error loss function (SELF) and confidence interval are obtained.
Volume: 24
Issue: 3
Page: 1692-1699
Publish at: 2021-12-01

An adaptive multi-hop routing with IoT abstraction for minimizing delay-node capacity trade-offs in mobile ad-hoc network

10.11591/ijece.v11i6.pp5315-5326
Haitham Shiaibth Chasib , Saddam Raheem Salih , Israa Jaber Khalaf Al-Ogaili
Delay and node capacity are incompatible mobile ad hoc constraints because of the network's versatility and self-disciplined design. It is a challenging problem to maximize the trade-off between the above mobility correlation factors. This manuscript proposes an adaptive multi-hop routing (A.M.R.) for mobile ad-hoc network (MANET) to minimize the trade-off by integrating the internet of things (IoT). IoT nodes' smart computing and offloading abilities are extended to ad-hoc nodes to improve routing and transmission. Dor MANET nodes in route exploration, neighbor selection, and data transmission, the beneficial features of IoT include enhanced decision making. The traditional routing protocols use IoT at the time of the neighbor discovery process in updating the routing table and localization. The harmonizing technologies with their extended support improve the performance of MANETs has been estimated. The proposed method achieves better throughput (14.16 Mbps), delay (0.118), packet drop (126), and overhead (36 packets) when compared to existing methods.
Volume: 11
Issue: 6
Page: 5315-5326
Publish at: 2021-12-01

On data collection time by an electronic nose

10.11591/ijece.v11i6.pp4767-4773
Piotr Borowik , Leszek Adamowicz , Rafał Tarakowski , Krzysztof Siwek , Tomasz Grzywacz
We use electronic nose data of odor measurements to build machine learning classification models. The presented analysis focused on determining the optimal time of measurement, leading to the best model performance. We observe that the most valuable information for classification is available in data collected at the beginning of adsorption and the beginning of the desorption phase of measurement. We demonstrated that the usage of complex features extracted from the sensors’ response gives better classification performance than use as features only raw values of sensors’ response, normalized by baseline. We use a group shuffling cross-validation approach for determining the reported models’ average accuracy and standard deviation.
Volume: 11
Issue: 6
Page: 4767-4773
Publish at: 2021-12-01

Implementation of wheelchair controller using mouth and tongue gesture

10.11591/ijeecs.v24.i3.pp1663-1671
Rafia Hassani , Mohamed Boumehraz , Maroua Hamzi
In this paper, a simple human-machine interface allowing people with severe disabilities to control a motorized wheelchair using mouth and tongue gesture is presented. The development of the proposed system consists of three principal phases: the first phase is mouth detection which performed by using haar cascade to detect the face area and template matching to detect mouth and tongue gestures from the lower face region. The second phase is command extraction; it is carried by determining the mouth and tongue gesture commands according to the detected gesture, the time taken to execute the gestures, and the previous command which is stored in each frame. Finally, the gesture commands are sent to the wheelchair as instruction using the Bluetooth serial port. The hardware used for this project were; laptop with universal serial bus (USB) webcam as a vision-based control unit, Bluetooth module to receive instructions comes from the vision control unit, standard joystick used in case of emergency, joystick emulator which delivers to the control board signals similar to the signals that are usually generated by the standard joystick, and ultrasonic sensors to provide safe navigation. The experimental results showed the success of the proposed control system based on mouth and tongue gestures.
Volume: 24
Issue: 3
Page: 1663-1671
Publish at: 2021-12-01

Deadlock detection in distributed system

10.11591/ijeecs.v24.i3.pp1596-1603
Kshirod Kumar Rout , Debani Prasad Mishra , Surender Reddy Salkuti
In highly automated devices, deadlock is a case that occurs when no system can permit its event which may give irrelevant economic losses. A process can request or release resources that are either available or are on hold by others. If a process requesting a resource is not available at any time, then that process enters into the waiting state. But if a waiting state is not converted into its present state, it enters more than two processes are having an indefinite waiting state. The proposed algorithm gives an efficient way for deadlock detection. For the implementation of this work, C++ and python as the basic programming language are used. It gives an idea about how resources are allocated, and how few processes result in deadlock.
Volume: 24
Issue: 3
Page: 1596-1603
Publish at: 2021-12-01
Show 891 of 1996

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration