Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,939 Article Results

Performance analysis of power beacon-assisted D2D communication networks in the presence of eavesdropper and co-channel interference

10.11591/ijeecs.v24.i2.pp888-895
Bui Vu Minh , Van-Duc Phan
Performance analysis of power beacon-assisted D2D communication networks in the presence of eavesdropper and co-channel interference is presented is investigated. The outage probability and the intercept probability of the proposed system are analyzed and derived. The impact of the main system parameters on the system performance is investigated. The Monte Carlo simulation is used for verifying the correctness of the analytical section.
Volume: 24
Issue: 2
Page: 888-895
Publish at: 2021-11-01

Evaluation of one of leading Indonesia’s digital wallet using the unified theory of acceptance and use of technology

10.11591/ijeecs.v24.i2.pp1036-1046
Natalia Limantara , Jevan Jovandy , Anindya Khansalihara Wardhana , Steven Steven , Fredy Jingga
The goal of this research is to assess the utilization of one of Indonesia's most popular digital wallets. Respondents in this study range in age from 15 to 44 years old and live on Java Island. The author employs the unified theory of acceptance and utilization of technology (UTAUT) paradigm to assess the use of this digital wallet. This UTAUT model comprises four latent variables that affect behavioral intention (BI) and use behavior (UB): performance expectancy (PE), effort expectancy (EE), social influence (SI), and facilitating conditions (FC). In this study, the UTAUT model is combined with two additional variables: perceived risk (PR) and promotional benefits (PB). According to the findings, performance expectancy, social influence, and perceived risk all have an impact on behavioral intention, whereas effort expectancy has a less impact. Furthermore, the factors facilitating conditions and promotional benefits have a minor impact on use behavior, whereas behavioral intention factors have a considerable impact on use behavior.
Volume: 24
Issue: 2
Page: 1036-1046
Publish at: 2021-11-01

Feature extraction with mel scale separation method on noise audio recordings

10.11591/ijeecs.v24.i2.pp815-824
Roy Rudolf Huizen , Florentina Tatrin Kurniati
This paper focuses on improving the accuracy of noise audio recordings. High-quality audio recording, extraction using the mel frequency cepstral coefficients (MFCC) method produces high accuracy. While the low-quality is because of noise, the accuracy is low. Improved accuracy by investigating the effect of bandwidth on the mel scale. The proposed improvement uses the mel scale separation methods into two frequency channels (MFCC dual-channel). For the comparison method using the mel scale bandwidth without separation (MFCC single-channel). Feature analysis using k-mean clustering. The data uses a noise variance of up to -16 dB. Testing on the MFCC single-channel method for -16 dB noise has an accuracy of 47.5%, while the MFCC dual-channel method has an accuracy better of 76.25%. The next test used adaptive noise-canceling (ANC) to reduce noise before extraction. The result is that the MFCC single-channel method has an accuracy of 82.5% and the MFCC dual-channel method has an accuracy better of 83.75%. High-quality audio recording testing for the MFCC single-channel method has an accuracy of 92.5% and the MFCC dual-channel method has an accuracy better of 97.5%. The test results show the effect of mel scale bandwidth to increase accuracy. The MFCC dual-channel method has higher accuracy.
Volume: 24
Issue: 2
Page: 815-824
Publish at: 2021-11-01

High gain multiphase boost converter based-on capacitor clamping structure

10.11591/ijeecs.v24.i2.pp689-696
Oday Saad Fares , Jasim Farhood Hussen
In the last few years, the non-isolated dc converters involving high voltage gain with adequate performance are becoming quite popular in industrial applications. This is resulting in high voltage and current stress on the power device (switches and diodes), as well as a limited output voltage with a high duty cycle. This paper proposes a multi-phase non-isolated boost converter that uses capacitor clamping to increase output voltage while reducing stress across the power device. There are two stages in the proposed converter (first stage is three inductors and three switches and the second stage is clamper circuit of three capacitors and three diodes). The proposed converter is high voltage gain, with low voltage stress through switches transistors. To justify the theoretical analysis, the concept was validated through mathematical analysis and by simulation using MATLAB/SIMULINK. The results carried out the results permit the converter behavior and performance to be accurately.
Volume: 24
Issue: 2
Page: 689-696
Publish at: 2021-11-01

Compact MIMO antenna using dual-band for fifth-generation mobile communication system

10.11591/ijeecs.v24.i2.pp921-929
Debani Prasad Mishra , Kshirod Kumar Rout , Surender Reddy Salkuti
This paper presents the design of a multiple-input and multiple-output (MIMO) antenna for a fifth-generation (5G) smartphone that will work in dual-band. The antenna proposed in this work operates at 2 frequency ranges, i.e., (3300-3600) MHz and (4800-5000) MHz. The antenna design consists of four antennas that are placed perpendicular to the edge of the system and this makes it different from the traditional 5G antennas. The area of each antenna on the side frames is (3.9×17 mm), and hence can be used in ultra-thin smartphones for 5G applications. The reflection coefficient obtained in the simulations is less than -6 dB for the required band, which suggests that the required impedance matching is obtained. The antenna proposed is designed by using central time zone (CST) microwave studio.
Volume: 24
Issue: 2
Page: 921-929
Publish at: 2021-11-01

Machine learning approach on road accidents analysis in Calabarzon, Philippines: an input to road safety management

10.11591/ijeecs.v24.i2.pp993-1000
Kristelle Anne R. Torres , Jonardo R. Asor
This research was conducted to help the traffic policy makers and general public in preventing road incidents using the collected traffic accident dataset between the years 2016 and 2019. Data mining using classification algorithm was utilized to develop a predictive model for predicting occurrences of traffic accidents. Classification algorithms such as decision tree, k-nn, naïve bayes and neural network have been compared in identifying better classification capability in classifying stage of felony. Neural network shows a very promising result in classifying road accident with a total accuracy result of 87.63%. Nonetheless, k-nn and naïve bayes both acquired a higher than 80% accuracy which shows that this classification algorithms were also good in predicting road accidents. Moreover, public vehicle is more prone in accident rather than private vehicle in both stage of felony and accident may occur between or on 3:00pm and 6:00pm.
Volume: 24
Issue: 2
Page: 993-1000
Publish at: 2021-11-01

The adoption of social media by small and medium enterprise: a systematic literature review

10.11591/ijeecs.v24.i2.pp1220-1227
Ahmed Abdullah Alhamami , Noor Azuan Hashim , Roshayati Abdul Hamid , Siti Ngayesah Ab. Hamid
Social media (SM) has become a necessity and a method to confront challenges and fierce competition. More than half of the population are using SM. However, its implication for small and medium enterprises (SMEs) is not well documented and researched. Therefore, the purpose of this study is to review the literature pertaining to the adoption of SM by SMEs. A systematic literature review was conducted using specific keywords and database. This has resulted in reviewing 28 related articles. The findings was presented using frequency analysis. Number of articles are increasing steadily especially in emerging markets with large number of studies deploying the exploratory nature. The most widely used theory is the technological-organizational-environmental framework (TOE) and the sample size of the reviewed studies is adequate. Increasingly the structural equation modelling are being used. However, the use of intervening variable is minimal. The finding also showed that organizational and environmental context variables are the most important predictors of SM adoption by SMEs while the consequence of this adoption on business performance is mixed. There is a need for more studies to discover the consequence of adopting SM by SMEs using a combination of theories.
Volume: 24
Issue: 2
Page: 1220-1227
Publish at: 2021-11-01

Implementation of feature extraction and deep learning-based ensemble classifier for interference mitigation in radar signals

10.11591/ijeecs.v24.i2.pp1195-1201
N. Durga Indira , M. Venu Gopala Rao
In automotive vehicles, radar is the one of the component for autonomous driving, used for target detection and long-range sensing. Whereas interference exists in signals, noise increases and it effects severely while detecting target objects. For these reasons, various interference mitigation techniques are implemented in this paper. By using these mitigation techniques interference and noise are reduced and original signals are reconstructed. In this paper, we proposed a method to mitigate interference in signal using deep learning. The proposed method provides the best and accurate performance in relate to the various interference conditions and gives better accuracy compared with other existing methods.
Volume: 24
Issue: 2
Page: 1195-1201
Publish at: 2021-11-01

Development of an optical pH measurement system based on colorimetric effect

10.11591/ijeecs.v24.i2.pp728-735
Puteri Nur Syahirah Mohamed Mustafa , Aiman Shahmi Azam , Mohd Suhaimi Sulaiman , Ahmad Fairuz Omar , Mohamad Faizal Abd Rahman
This paper proposed an optical pH measurement system developed to measure the changes of pH levels based on colorimetric reactions with phenol red reagent. The optical sensing was achieved through the implementation of a pair of light emitting diode (LED) and photodiode. The detection mechanism was based on different absorbance of light intensity at pH values of 2.36, 8.32, 9.08 and 12.83. The data processing method was carried out using LabVIEW software and interfaced with NI USB DAQ 6008. The measured voltage showed a good correlation in relation to the pH level with R2 equals to 0.9624. This relationship was used as a calibration curve in the final system testing. The final measurement of pH showed a good agreement between the actual and measured values with an error of less than 5%, thus indicating the reliability of the proposed system.
Volume: 24
Issue: 2
Page: 728-735
Publish at: 2021-11-01

A cloud based 3-tier data security framework for industrial internet of things

10.11591/ijeecs.v24.i2.pp780-788
Mirador G. Labrador , Abegail Bordios , Weiyan Hou
The convergence of microelectronics and micromechanical system within a sensing device, the proliferation of wireless communication, and the use of software-driven equipment are already changing the landscape of the manufacturing industries. This situation compels the industries to adopt industrial internet of things (IIoT) systems and processes with the main objective-to improve the processes and increase production. However, it is undeniable that despite IIoT advantages, it posed significant issues on the security and privacy on industry automation especially along data generation and control system. Hence, this paper proposes a cloud based 3-tier data security framework that performs two-level security verification processes. The framework has been tested and validated using an experimental industry automation system and has been found to be functionally effective with an acceptable handoff delay.
Volume: 24
Issue: 2
Page: 780-788
Publish at: 2021-11-01

The readiness of Iraqi EFL teachers to use mobile learning in teaching English in schools

10.11591/ijeecs.v24.i2.pp880-887
Ibtihal Hassan Mussa , Nurhasmiza Abu Hasan Sazalli
The importance of mobile learning (M-learning) has increased during the outbreak of Coronavirus disease 2019 (COVID-19). Level of English foreign language (EFL) teachers to use the technology should be assessed to understand the perception and readiness of EFL teachers to use M-learning. Building on existing literature, this study proposed that performance expectancy, effort expectancy, social influence and facilitating condition will affect positively the readiness to use M-learning. The study also proposed attitude as a mediator and technology self-efficacy as a moderator. The data was collected from 163 EFL teachers in Iraq. The findings showed that facilitating condition, performance expectancy, effort expectancy, and social influence affected positively the readiness to use M-learning. Attitude fully mediated the effect of performance expectancy, effort expectancy, social influence on readiness to use M-learning. Technology self-efficacy did not moderate the effect of the variables but it has a significant direct effect on readiness to use M-learning. Decision makers are recommended to enhance the infrastructure and to initiate training courses to enhance the information technology knowledge of the EFL teachers.
Volume: 24
Issue: 2
Page: 880-887
Publish at: 2021-11-01

Video steganography using 3D distance calculator based on YCbCr color components

10.11591/ijeecs.v24.i2.pp831-842
Esraa Jaffar Baker , Adil Abbas Majeed , Sundos Abdulameer Alazawi , Shahreen Kasim , Rohayanti Hassan , Noor Hidayah Zakaria , Tole Sutikno
Steganography techniques have taken a major role in the development in the field of transferring multimedia contents and communications. Therefore, field of steganography become interested as the need for security increased significantly. Steganography is a technique to hide information within cover media so that this media does not change significantly. Steganography process in a video is to hide the information from the intruder and prevent him access to that hidden information. This paper presents the algorithm of steganography in the video frames. The proposed algorithm selected the best frames to hide the message in video using 3D distance equation to increasing difficulty onto the intruder to detect and guess the location of the message in the video frames. As well as selected the best frames in this algorithm increased the difficulty and give us the best stego-video quality using structural similarity (SSIM). Also, the hash function was used to generate random positions to hide the message in the lines of video frames. The proposed algorithm evaluated with mean squared error (MSE), peak signalto-noise ratio (PSNR) and SSIM measurement. The results were acceptable and shows that is the difficulty of distinguishing the hidden message in stego-video with the human eye.
Volume: 24
Issue: 2
Page: 831-842
Publish at: 2021-11-01

New algorithm for clustering unlabeled big data

10.11591/ijeecs.v24.i2.pp1054-1062
Marwan B. Mohammed , Wafaa AL-Hameed
The clustering analysis techniques play an important role in the area of data mining. Although from existence several clustering techniques. However, it still to their tries to improve the clustering process efficiently or propose new techniques seeks to allocate objects into clusters so that two objects in the same cluster are more similar than two objects in different clusters and careful not to duplicate the same objects in different groups with the ability to cover all data as much as possible. This paper presents two directions. The first is to propose a new algorithm that coined a name (MB Algorithm) to collect unlabeled data and put them into appropriate groups. The second is the creation of a lexical sequence sentence (LCS) based on similar semantic sentences which are different from the traditional lexical word chain (LCW) based on words. The results showed that the performance of the MB algorithm has generally outperformed the two algorithms the hierarchical clustering algorithm and the K-mean algorithm.
Volume: 24
Issue: 2
Page: 1054-1062
Publish at: 2021-11-01

High performance of solar panel based on new cooling and cleaning technique

10.11591/ijeecs.v24.i2.pp803-814
Ahmed Khudhair Abbas , Kaleid Waleed Abed , Osama Ibrahim Abd , Yousif Al Mashhadany , Abdulrahman Hammad Jasim
There is a requirement for an elective wellspring of inexhaustible and earth feasible electrical vitality because of expanded power use and an unnatural weather change issues the world over. With the accumulation of dust and the surface temperature of cells or sun-based boards increase, their productivity drops significantly. Cooling and cleaning by using water can be utilized. Proteus and MikroC software have been used to simulate the model and write the code. In this paper, is design and an experimental study shrewd customized cleaning and cooling system for photo-voltaic (PV) modules installed in Ramadi, Iraq. Which is started dependent on low essentialness coming about due to dust accumulating and high temperature conditions. This was attempted by presenting two indistinct photovoltaic modules close to one another. The fundamental unit was equipped with a model of the cleaning structure while the resulting unit was seen as standard. An upgraded cleaning and cooling methodology are gotten with the data acquiring structure. An expansion in vitality profitability of 12.4% was acquired because of lessening the operational aggravations of residue amassing and warming of the board surface. The automatic cleaning mechanism used in the system reduces human stress by washing the PV panel with low energy use.
Volume: 24
Issue: 2
Page: 803-814
Publish at: 2021-11-01

High impedance fault detection in 11 kV overhead line with discrete wavelet transform and independent component analysis

10.11591/ijeecs.v24.i2.pp661-672
Md Ferdouse Hossain Bhuiya , Rohaiza Hamdan , Dur Mohammad Soomro , Abdelrehman Omer Idris , Hussain Sharif
This paper proposes an analysis of high-impedance fault detection algorithms for medium voltage distribution lines based on the discrete wavelet transform (DWT) technique and a more advanced technique named independent component analysis (ICA) independently. Three-phase distribution line model and two diodes high impedance fault model, which represents the unsymmetrical fault current of electric arc, simulated using MATLAB/Simulink. High impedance fault (HIF) detection algorithm initially analyzes the sampled current waveforms through DWT and the resultant third level high-frequency components “d3” coefficients are analyzed through one cycle moving window approach. The proposed algorithm successfully detects any HIF in the distribution current even if there is a slight or no difference in the amplitude of the HIF and the waveform of the phase current. On the other hand, the ICA more developed algorithm than DWT successfully separated the noise signals from the obtained current waveforms and HIF noise signals can be differentiated with non-HIF noise signals. Because of this reason ICA is chosen in this research. The detected HIF current can be from 50 ma and up.
Volume: 24
Issue: 2
Page: 661-672
Publish at: 2021-11-01
Show 897 of 1996

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration