Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,939 Article Results

Source side pre-ordering using recurrent neural networks for English-Myanmar machine translation

10.11591/ijece.v11i5.pp4513-4521
May Kyi Nyein , Khin Mar Soe
Word reordering has remained one of the challenging problems for machine translation when translating between language pairs with different word orders e.g. English and Myanmar. Without reordering between these languages, a source sentence may be translated directly with similar word order and translation can not be meaningful. Myanmar is a subject-objectverb (SOV) language and an effective reordering is essential for translation. In this paper, we applied a pre-ordering approach using recurrent neural networks to pre-order words of the source Myanmar sentence into target English’s word order. This neural pre-ordering model is automatically derived from parallel word-aligned data with syntactic and lexical features based on dependency parse trees of the source sentences. This can generate arbitrary permutations that may be non-local on the sentence and can be combined into English-Myanmar machine translation. We exploited the model to reorder English sentences into Myanmar-like word order as a preprocessing stage for machine translation, obtaining improvements quality comparable to baseline rule-based pre-ordering approach on asian language treebank (ALT) corpus.
Volume: 11
Issue: 5
Page: 4513-4521
Publish at: 2021-10-01

High precision brain tumor classification model based on deep transfer learning and stacking concepts

10.11591/ijeecs.v24.i1.pp167-177
Halima El Hamdaoui , Anass Benfares , Saïd Boujraf , Nour El Houda Chaoui , Badreddine Alami , Mustapha Maaroufi , Hassan Qjidaa
In this article, we proposed an intelligent clinical decision support system for the detection and classification of brain tumor from risk of malignancy index (RMI) images. To overcome the lack of labeled training data needed to train convolutional neural networks, we have used a deep transfer learning and stacking concepts. For this, we choosed seven convolutional neural networks (CNN) architectures already pre-trained on an ImageNet dataset that we precisely fit on magnetic resonance imaging (MRI) of brain tumors collected from the brain tumor segmentation (BraTS) 19 database. To improve the accuracy of our global model, we only predict as output the prediction that obtained the maximum score among the predictions of the seven pre-trained CNNs. We used a 10-way cross-validation approach to assess the performance of our main 2-class model: low-grade glioma (LGG) and high-grade glioma (HGG) brain tumors. A comparison of the results of our proposed model with those published in the literature, shows that our proposed model is more efficient than those published with an average test precision of 98.67%, an average f1 score of 98.62%, a test precision average of 98.06% and an average test sensitivity of 98.33%.
Volume: 24
Issue: 1
Page: 167-177
Publish at: 2021-10-01

Rule-based lip-syncing algorithm for virtual character in voice chatbot

10.12928/telkomnika.v19i5.19824
Felicia Priscilla; Universitas Multimedia Nusantara Lovely , Arya; Universitas Multimedia Nusantara Wicaksana
Virtual characters changed the way we interact with computers. The underlying key for a believable virtual character is accurate synchronization between the visual (lip movements) and the audio (speech) in real-time. This work develops a 3D model for the virtual character and implements the rule-based lip-syncing algorithm for the virtual character's lip movements. We use the Jacob voice chatbot as the platform for the design and implementation of the virtual character. Thus, audio-driven articulation and manual mapping methods are considered suitable for real-time applications such as Jacob. We evaluate the proposed virtual character using hedonic motivation system adoption model (HMSAM) with 70 users. The HMSAM results for the behavioral intention to use is 91.74%, and the immersion is 72.95%. The average score for all aspects of the HMSAM is 85.50%. The rule-based lip-syncing algorithm accurately synchronizes the lip movements with the Jacob voice chatbot's speech in real-time.
Volume: 19
Issue: 5
Page: 1517-1528
Publish at: 2021-10-01

Proportional fair buffer scheduling algorithm for 5G enhanced mobile broadband

10.11591/ijece.v11i5.pp4165-4173
Asmae Mamane , M. Fattah , M. El Ghazi , Y. Balboul , M. El Bekkali , S. Mazer
The impending next generation of mobile communications denoted 5G intends to interconnect user equipment, things, vehicles, and cities. It will provide an order of magnitude improvement in performance and network efficiency, and different combinations of use cases enhanced mobile broadband (eMBB), ultra reliable low latency communications (URLLC), massive internet of things (mIoT) with new capabilities and diverse requirements. Adoption of advanced radio resource management procedures such as packet scheduling algorithms is necessary to distribute radio resources among different users efficiently. The proportional fair (PF) scheduling algorithm and its modified versions have proved to be the commonly used scheduling algorithms for their ability to provide a tradeoff between throughput and fairness. In this article, the buffer status is combined with the PF metric to suggest a new scheduling algorithm for efficient support for eMBB. The effectiveness of the proposed scheduling strategy is proved through à comprehensive experimental analysis based on the evaluation of different quality of service key performance indicators (QoS KPIs) such as throughput, fairness, and buffer status.
Volume: 11
Issue: 5
Page: 4165-4173
Publish at: 2021-10-01

NLP-based personal learning assistant for school education

10.11591/ijece.v11i5.pp4522-4530
Ann Neethu Mathew , Rohini V. , Joy Paulose
Computer-based knowledge and computation systems are becoming major sources of leverage for multiple industry segments. Hence, educational systems and learning processes across the world are on the cusp of a major digital transformation. This paper seeks to explore the concept of an artificial intelligence and natural language processing (NLP) based intelligent tutoring system (ITS) in the context of computer education in primary and secondary schools. One of the components of an ITS is a learning assistant, which can enable students to seek assistance as and when they need, wherever they are. As part of this research, a pilot prototype chatbot was developed, to serve as a learning assistant for the subject Scratch (Scratch is a graphical utility used to teach school children the concepts of programming). By the use of an open source natural language understanding (NLU) or NLP library, and a slackbased UI, student queries were input to the chatbot, to get the sought explanation as the answer. Through a two-stage testing process, the chatbot’s NLP extraction and information retrieval performance were evaluated. The testing results showed that the ontology modelling for such a learning assistant was done relatively accurately, and shows its potential to be pursued as a cloud-based solution in future.
Volume: 11
Issue: 5
Page: 4522-4530
Publish at: 2021-10-01

Detection of cardiac arrhythmia using deep CNN and optimized SVM

10.11591/ijeecs.v24.i1.pp217-225
Mohebbanaaz Mohebbanaaz , Y. Padma Sai , L. V. Rajani Kumari
Deep learning (DL) has become a topic of study in various applications, including healthcare. Detection of abnormalities in an electrocardiogram (ECG) plays a significant role in patient monitoring. It is noted that a deep neural network when trained on huge data, can easily detect cardiac arrhythmia. This may help cardiologists to start treatment as early as possible. This paper proposes a new deep learning model adapting the concept of transfer learning to extract deep-CNN features and facilitates automated classification of electrocardiogram (ECG) into sixteen types of ECG beats using an optimized support vector machine (SVM). The proposed strategy begins with gathering ECG datasets, removal of noise from ECG signals, and extracting beats from denoised ECG signals. Feature extraction is done using ResNet18 via concept of transfer learning. These extracted features are classified using optimized SVM. These methods are evaluated and tested on the MIT-BIH arrhythmia database. Our proposed model is effective compared to all State of Art Techniques with an accuracy of 98.70%.
Volume: 24
Issue: 1
Page: 217-225
Publish at: 2021-10-01

Blockchain based voting system for Jordan parliament elections

10.11591/ijece.v11i5.pp4325-4335
Mohammad Malkawi , Muneer Bani Yassein , Asmaa Bataineh
Covid-19 pandemic has stressed more than any-time before the necessity for conducting election processes in an electronic manner, where voters can cast their votes remotely with complete security, privacy, and trust. The different voting schema in different countries makes it very difficult to utilize a one fits all system. This paper presents a blockchain based voting system (BBVS) applied to the Parliamentary elections system in the country of Jordan. The proposed system is a private and centralized blockchain implemented in a simulated environment. The proposed BBVS system implements a hierarchical voting process, where a voter casts votes at two levels, one for a group, and the second for distinct members within the group. This paper provides a novel blockchain based e-Voting system, which proves to be transparent and yet secure. This paper utilizes synthetic voter benchmarks to measure the performance, accuracy and integrity of the election process. This research introduced and implemented new algorithms and methods to maintain acceptable performance both at the time of creating the blockchain(s) for voters and candidates as well as at the time of casting votes by voters.
Volume: 11
Issue: 5
Page: 4325-4335
Publish at: 2021-10-01

Lifetime centric load balancing mechanism in wireless sensor network based IoT environment

10.11591/ijece.v11i5.pp4183-4193
Veerabadrappa Veerabadrappa , Booma Poolan Marikannan
Wireless sensor network (WSN) is a vital form of the underlying technology of the internet of things (IoT); WSN comprises several energy-constrained sensor nodes to monitor various physical parameters. Moreover, due to the energy constraint, load balancing plays a vital role considering the wireless sensor network as battery power. Although several clustering algorithms have been proposed for providing energy efficiency, there are chances of uneven load balancing and this causes the reduction in network lifetime as there exists inequality within the network. These scenarios occur due to the short lifetime of the cluster head. These cluster head (CH) are prime responsible for all the activity as it is also responsible for intra-cluster and inter-cluster communications. In this research work, a mechanism named lifetime centric load balancing mechanism (LCLBM) is developed that focuses on CH-selection, network design, and optimal CH distribution. Furthermore, under LCLBM, assistant cluster head (ACH) for balancing the load is developed. LCLBM is evaluated by considering the important metrics, such as energy consumption, communication overhead, number of failed nodes, and one-way delay. Further, evaluation is carried out by comparing with ES-Leach method, through the comparative analysis it is observed that the proposed model outperforms the existing model.
Volume: 11
Issue: 5
Page: 4183-4193
Publish at: 2021-10-01

Software engineering based secured E-payment system

10.11591/ijece.v11i5.pp4413-4422
Muayad Sadik Croock , Rawan Ali Taaban
Nowadays, the E-payment systems have been considered to be the safe way of money transfer in most of modern institutes and companies. Moreover, the security is important side of these systems to ensure that the money transfer is done safely. Software engineering techniques are used for guaranteeing the applying of security and privacy of such systems. In this paper, a secure E-payment system is proposed based on software engineering model and neural network technology. This system uses different proposed algorithms for applying authentication to the devices of users as mobile application. They are used to control the key management in the system. It uses the neural network back-propagation method for ensuring the security of generated keys that have sufficient random levels. The proposed system is tested over numerous cases and the obtained results show an efficient performance in terms of security and money transfer. Moreover, the generated keys are tested according to NIST standards.
Volume: 11
Issue: 5
Page: 4413-4422
Publish at: 2021-10-01

Raga classification based on pitch co-occurrence based features

10.11591/ijeecs.v24.i1.pp157-166
Vibhavari Rajadnya , Kalyani R. Joshi
Analysis and classification of raga is the need of time especially in music industry. With the presence of abundance of multimedia data on internet, it is imperative to develop appropriate tools to classify ragas. In this work, an attempt has been made to use occurrence pattern of pitch based svara (note) for classification. Sequence of notes is an important cue in the raga classification. Pitch based svara (note) profile is formed. This pattern presents in the signal along with its statistical distribution can be characterized using co-occurrence matrix. Proposed note co-occurrence matrix summarizes this aspect. This matrix captures both tonal and temporal aspects of melody. Ragas differ in terms of distribution of spectral power. K-nearest neighbor (KNN) has been used as the classifier. Publicly available database consisting of 300 recordings of 30 Hindustani ragas consisting of 130 hours of audio recordings stored as 160 kbps mp3 fileswhich is part of CompMusic project is used. Leave one out validation strategy is used to evaluate the performance. Experimental result indicates the effectiveness of the proposed scheme which is giving accuracy of 93.7%.
Volume: 24
Issue: 1
Page: 157-166
Publish at: 2021-10-01

Soil parameter detection of soil test kit-treated soil samples through image processing with crop and fertilizer recommendation

10.11591/ijeecs.v24.i1.pp90-98
John Joshua Federis Montañez
Standard laboratory soil testing is deemed to be expensive and time-consuming. Utilizing a soil test kit is considered to be a cost-efficient and time-saving way of soil testing. This project study aims to develop a prototype that detects soil parameters (i.e., soil pH, nitrogen, phosphorus, and potassium) and gives crop and fertilizer recommendations after the soil sample has undergone a soil treatment test kit and its acceptability for possible users. The prototype development primarily used image processing to detect the needed parameters that lead to crop and fertilizer recommendations. In the evaluation of the effectiveness of the prototype, 50 trials were conducted per parameter. All of the said parameters were recorded as highly effective except for nitrogen Low, which is interpreted as effective only. There were 30 possible users invited to assess the acceptability of the prototype. A survey based on the technology acceptance model was administered to the 30 respondents garnering a 4.85 weighted mean interpreted as excellent. The prototype was proven effective and accepted as a device that can detect soil pH and primary macronutrient levels. It gives the appropriate crop and fertilizer recommendations based on the gathered data.
Volume: 24
Issue: 1
Page: 90-98
Publish at: 2021-10-01

Prediction of addiction to drugs and alcohol using machine learning: A case study on Bangladeshi population

10.11591/ijece.v11i5.pp4471-4480
Md. Ariful Islam Arif , Saiful Islam Sany , Farah Sharmin , Md. Sadekur Rahman , Md. Tarek Habib
Nowadays addiction to drugs and alcohol has become a significant threat to the youth of the society as Bangladesh’s population. So, being a conscientious member of society, we must go ahead to prevent these young minds from life-threatening addiction. In this paper, we approach a machinelearning-based way to forecast the risk of becoming addicted to drugs using machine-learning algorithms. First, we find some significant factors for addiction by talking to doctors, drug-addicted people, and read relevant articles and write-ups. Then we collect data from both addicted and nonaddicted people. After preprocessing the data set, we apply nine conspicuous machine learning algorithms, namely k-nearest neighbors, logistic regression, SVM, naïve bayes, classification, and regression trees, random forest, multilayer perception, adaptive boosting, and gradient boosting machine on our processed data set and measure the performances of each of these classifiers in terms of some prominent performance metrics. Logistic regression is found outperforming all other classifiers in terms of all metrics used by attaining an accuracy approaching 97.91%. On the contrary, CART shows poor results of an accuracy approaching 59.37% after applying principal component analysis.
Volume: 11
Issue: 5
Page: 4471-4480
Publish at: 2021-10-01

High-performance AES-128 algorithm implementation by FPGA-based SoC for 5G communications

10.11591/ijece.v11i5.pp4221-4232
Paolo Visconti , Ramiro Velazquez , Stefano Capoccia , Roberto de Fazio
In this research work, a fast and lightweight AES-128 cypher based on the Xilinx ZCU102 FPGA board is presented, suitable for 5G communications. In particular, both encryption and decryption algorithms have been developed using a pipelined approach, so enabling the simultaneous processing of the rounds on multiple data packets at each clock cycle. Both the encryption and decryption systems support an operative frequency up to 220 MHz, reaching 28.16 Gbit/s maximum data throughput; besides, the encryption and decryption phases last both only ten clock periods. To guarantee the interoperability of the developed encryption/decryption system with the other sections of the 5G communication apparatus, synchronization and control signals have been integrated. The encryption system uses only 1631 CLBs, whereas the decryption one only 3464 CLBs, ascribable, mainly, to the Inverse Mix Columns step. The developed cypher shows higher efficiency (8.63 Mbps/slice) than similar solutions present in literature.
Volume: 11
Issue: 5
Page: 4221-4232
Publish at: 2021-10-01

New 2-D interleaving grouping LBC applied on image transmission

10.11591/ijece.v11i5.pp4241-4249
Wurod Qasim Mohamed , Marwa Al–Sultani , Haraa Raheem Hatem
The modern technologies of the image transmission look for ultra-reducing of the error transmission in addition to enhancing the security over a wireless communication channel. This paper is applied and discussed two different techniques to achieve these requirements, which are linear block code (LBC) and two-dimensions (2-D) interleaving approach. We investigate a new approach of 2-D interleaving that increases the security of the image transmission and helps to diminution the bit error probability (BER). Using an investigated 2-D interleaving grouping LBC approach on image transmission, the system achieves a higher-security information and a better BER comparing with the other systems. It was done by means of peak signal to noise ratio (PSNR) and histogram analysis tests. Simulation results state these enhancements.
Volume: 11
Issue: 5
Page: 4241-4249
Publish at: 2021-10-01

Security aware information classification in health care big data

10.11591/ijece.v11i5.pp4439-4448
Snehalata K. Funde , Gandharba Swain
These days e-medical services frameworks are getting famous for taking care of patients from far-off spots, so a lot of medical services information like the patient’s name, area, contact number, states of being are gathered distantly to treat the patients. A lot of information gathered from the different assets is named big data. The enormous sensitive information about the patient contains delicate data like systolic BP, pulse, temperature, the current state of being, and contact number of patients that should be recognized and sorted appropriately to shield it from abuse. This article presents a weightbased similarity (WBS) strategy to characterize the enormous information of health care data into two classifications like sensitive information and normal information. In the proposed method, the training dataset is utilized to sort information and it comprises of three fundamental advances like information extraction, mapping of information with the assistance of the training dataset, evaluation of the weight of input data with the threshold value to classify the data. The proposed strategy produces better outcomes with various assessment boundaries like precision, recall, F1 score, and accuracy value 92% to categorize the big data. Weka tool is utilized for examination among WBS and different existing order procedures.
Volume: 11
Issue: 5
Page: 4439-4448
Publish at: 2021-10-01
Show 902 of 1996

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration