Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,939 Article Results

Proportional fair buffer scheduling algorithm for 5G enhanced mobile broadband

10.11591/ijece.v11i5.pp4165-4173
Asmae Mamane , M. Fattah , M. El Ghazi , Y. Balboul , M. El Bekkali , S. Mazer
The impending next generation of mobile communications denoted 5G intends to interconnect user equipment, things, vehicles, and cities. It will provide an order of magnitude improvement in performance and network efficiency, and different combinations of use cases enhanced mobile broadband (eMBB), ultra reliable low latency communications (URLLC), massive internet of things (mIoT) with new capabilities and diverse requirements. Adoption of advanced radio resource management procedures such as packet scheduling algorithms is necessary to distribute radio resources among different users efficiently. The proportional fair (PF) scheduling algorithm and its modified versions have proved to be the commonly used scheduling algorithms for their ability to provide a tradeoff between throughput and fairness. In this article, the buffer status is combined with the PF metric to suggest a new scheduling algorithm for efficient support for eMBB. The effectiveness of the proposed scheduling strategy is proved through à comprehensive experimental analysis based on the evaluation of different quality of service key performance indicators (QoS KPIs) such as throughput, fairness, and buffer status.
Volume: 11
Issue: 5
Page: 4165-4173
Publish at: 2021-10-01

Simulation model of 3-phase PWM rectifier by using MATLAB/Simulink

10.11591/ijece.v11i5.pp3736-3746
Salam Waley Shneen , Ghada Adel Aziz
Many industrial applications require the use of power electronic devices, which in turn help in overcoming the problems of variable load and fluctuations that occur at the end of feeding. The current study emphasizes that the use of different electric power generation systems with industrial applications needs control devices to work on improving the power quality and performance of systems in which there is an imbalance in the voltage or current due to the change of loads or feeding from the source. The present study also presents a model of a transformer widely used in industrial applications and this work includes simulating a three-phase rectifier by MATLAB. There are four cases in this work HWR (uncontrolled and controlled) and FWR (uncontrolled and uncontrolled) with different loads (R, RL & RC) including full wave type AC/DC using six electronic transformer silicon control rectifier (SCRs) once as well as unified half wave using three electronic transformer silicon control rectifier (SCRs). Simulation results include input, output voltage, and current with the waveform.
Volume: 11
Issue: 5
Page: 3736-3746
Publish at: 2021-10-01

Prediction of addiction to drugs and alcohol using machine learning: A case study on Bangladeshi population

10.11591/ijece.v11i5.pp4471-4480
Md. Ariful Islam Arif , Saiful Islam Sany , Farah Sharmin , Md. Sadekur Rahman , Md. Tarek Habib
Nowadays addiction to drugs and alcohol has become a significant threat to the youth of the society as Bangladesh’s population. So, being a conscientious member of society, we must go ahead to prevent these young minds from life-threatening addiction. In this paper, we approach a machinelearning-based way to forecast the risk of becoming addicted to drugs using machine-learning algorithms. First, we find some significant factors for addiction by talking to doctors, drug-addicted people, and read relevant articles and write-ups. Then we collect data from both addicted and nonaddicted people. After preprocessing the data set, we apply nine conspicuous machine learning algorithms, namely k-nearest neighbors, logistic regression, SVM, naïve bayes, classification, and regression trees, random forest, multilayer perception, adaptive boosting, and gradient boosting machine on our processed data set and measure the performances of each of these classifiers in terms of some prominent performance metrics. Logistic regression is found outperforming all other classifiers in terms of all metrics used by attaining an accuracy approaching 97.91%. On the contrary, CART shows poor results of an accuracy approaching 59.37% after applying principal component analysis.
Volume: 11
Issue: 5
Page: 4471-4480
Publish at: 2021-10-01

AHP validated literature review of forgery type dependent passive image forgery detection with explainable AI

10.11591/ijece.v11i5.pp4489-4501
Kalyani Kadam , Swati Ahirrao , Ketan Kotecha
Nowadays, a lot of significance is given to what we read today: newspapers, magazines, news channels, and internet media, such as leading social networking sites like Facebook, Instagram, and Twitter. These are the primary wellsprings of phony news and are frequently utilized in malignant manners, for example, for horde incitement. In the recent decade, a tremendous increase in image information generation is happening due to the massive use of social networking services. Various image editing software like Skylum Luminar, Corel PaintShop Pro, Adobe Photoshop, and many others are used to create, modify the images and videos, are significant concerns. A lot of earlier work of forgery detection was focused on traditional methods to solve the forgery detection. Recently, Deep learning algorithms have accomplished high-performance accuracies in the image processing domain, such as image classification and face recognition. Experts have applied deep learning techniques to detect a forgery in the image too. However, there is a real need to explain why the image is categorized under forged to understand the algorithm’s validity; this explanation helps in mission-critical applications like forensic. Explainable AI (XAI) algorithms have been used to interpret a black box’s decision in various cases. This paper contributes a survey on image forgery detection with deep learning approaches. It also focuses on the survey of explainable AI for images.
Volume: 11
Issue: 5
Page: 4489-4501
Publish at: 2021-10-01

Study of designing regulator for temperature electrical resistance furnace using Kalman stochastic reconstructor

10.11591/ijeecs.v24.i1.pp134-143
Benyekhlef Kada , Abdelkader El Kebir , Mohammed Berka , Hafida Belhadj , Djamel Eddine Chaouch
Electric resistance furnaces are the most popular and widely used industrial electro thermal equipment which continues to be the subject of many improvements. The aim of this paper is to control the temperature of electrical furnace for noisy thermocouple sensors. It can be assessed by observing some variables, which are very difficult to observe. Due to limitations, mainly the location of thermal sensors and their noises. In this case, the temperature measurement is trained with centered Gaussian white noise. The problem of accurate temperatures estimation for such sensors is solved using Kalman filter, which is an optimized estimator that provides a computationally efficient way to estimate system state. Thus, variables that are not directly measurable can be reconstructed from the algorithm. Kalman stochastic reconstructor (KSR). We cannot use with fixed parameters to control the temperature. For this reason, this paper comes up with a KSR approach based pole placement (PL) hybrid controller to realize an algorithm for the temperature control electrical furnace. Results based on Matlab simulation show that the improved algorithm has well produced an optimal estimate of the temperature. Evolving over time from noisy measurements. Hybrid algorithm KSR approach based PL give good performance compared to PL controllers.
Volume: 24
Issue: 1
Page: 134-143
Publish at: 2021-10-01

New 2-D interleaving grouping LBC applied on image transmission

10.11591/ijece.v11i5.pp4241-4249
Wurod Qasim Mohamed , Marwa Al–Sultani , Haraa Raheem Hatem
The modern technologies of the image transmission look for ultra-reducing of the error transmission in addition to enhancing the security over a wireless communication channel. This paper is applied and discussed two different techniques to achieve these requirements, which are linear block code (LBC) and two-dimensions (2-D) interleaving approach. We investigate a new approach of 2-D interleaving that increases the security of the image transmission and helps to diminution the bit error probability (BER). Using an investigated 2-D interleaving grouping LBC approach on image transmission, the system achieves a higher-security information and a better BER comparing with the other systems. It was done by means of peak signal to noise ratio (PSNR) and histogram analysis tests. Simulation results state these enhancements.
Volume: 11
Issue: 5
Page: 4241-4249
Publish at: 2021-10-01

Improvements in space radiation-tolerant FPGA implementation of land surface temperature-split window algorithm

10.11591/ijece.v11i5.pp3844-3854
Assaad El Makhloufi , Nisrine Chekroun , Noha Tagmouti , Samir El Adib , Naoufal Raissouni
The trend in satellite remote sensing assignments has continuously been concerning using hardware devices with more flexibility, smaller size, and higher computational power. Therefore, field programmable gate arrays (FPGA) technology is often used by the developers of the scientific community and equipment for carrying out different satellite remote sensing algorithms. This article explains hardware implementation of land surface temperature split window (LST-SW) algorithm based on the FPGA. To get a high-speed process and real-time application, VHSIC hardware description language (VHDL) was employed to design the LST-SW algorithm. The paper presents the benefits of the used Virtex-4QV of radiation tolerant series FPGA. The experimental results revealed that the suggested implementation of the algorithm using Virtex4QV achieved higher throughput of 435.392 Mbps, and faster processing time with value of 2.95 ms. Furthermore, a comparison between the proposed implementation and existing work demonstrated that the proposed implementation has better performance in terms of area utilization; 1.17% reduction in number of Slice used and 1.06% reduction in of LUTs. Moreover, the significant advantage of area utilization would be the none use of block RAMs comparing to existing work using three blocks RAMs. Finally, comparison results show improvements using the proposed implementation with rates of 2.28% higher frequency, 3.66 x higher throughput, and 1.19% faster processing time.
Volume: 11
Issue: 5
Page: 3844-3854
Publish at: 2021-10-01

High-performance AES-128 algorithm implementation by FPGA-based SoC for 5G communications

10.11591/ijece.v11i5.pp4221-4232
Paolo Visconti , Ramiro Velazquez , Stefano Capoccia , Roberto de Fazio
In this research work, a fast and lightweight AES-128 cypher based on the Xilinx ZCU102 FPGA board is presented, suitable for 5G communications. In particular, both encryption and decryption algorithms have been developed using a pipelined approach, so enabling the simultaneous processing of the rounds on multiple data packets at each clock cycle. Both the encryption and decryption systems support an operative frequency up to 220 MHz, reaching 28.16 Gbit/s maximum data throughput; besides, the encryption and decryption phases last both only ten clock periods. To guarantee the interoperability of the developed encryption/decryption system with the other sections of the 5G communication apparatus, synchronization and control signals have been integrated. The encryption system uses only 1631 CLBs, whereas the decryption one only 3464 CLBs, ascribable, mainly, to the Inverse Mix Columns step. The developed cypher shows higher efficiency (8.63 Mbps/slice) than similar solutions present in literature.
Volume: 11
Issue: 5
Page: 4221-4232
Publish at: 2021-10-01

Software engineering based secured E-payment system

10.11591/ijece.v11i5.pp4413-4422
Muayad Sadik Croock , Rawan Ali Taaban
Nowadays, the E-payment systems have been considered to be the safe way of money transfer in most of modern institutes and companies. Moreover, the security is important side of these systems to ensure that the money transfer is done safely. Software engineering techniques are used for guaranteeing the applying of security and privacy of such systems. In this paper, a secure E-payment system is proposed based on software engineering model and neural network technology. This system uses different proposed algorithms for applying authentication to the devices of users as mobile application. They are used to control the key management in the system. It uses the neural network back-propagation method for ensuring the security of generated keys that have sufficient random levels. The proposed system is tested over numerous cases and the obtained results show an efficient performance in terms of security and money transfer. Moreover, the generated keys are tested according to NIST standards.
Volume: 11
Issue: 5
Page: 4413-4422
Publish at: 2021-10-01

Development of mobile and desktop applications for a fingerprint-based attendance management system

10.11591/ijeecs.v24.i1.pp570-580
Olubunmi Adewale Akinola , Sikiru Olatunde Olopade , Akindele Segun Afolabi
Mobile application technology has been at the forefront of technological advancement in recent years. This has made life easier, and tasks that were considered herculean have been made easier and executable in a much shorter time than ever. One of such tasks is the process of taking attendance during events (such as lectures and conferences) by scribbling one’s signature and other personal details on a central register. This manual process is cumbersome and inconvenient, especially when a large number of participants are involved. To address this problem, this paper presents an automated solution in which a Java-based mobile application was developed and connected wirelessly to a central database that was created using My structured query language (MySQL) application whose task, among others, was to record attendance information. The database was connected to the backend of the web-based software program which was coded in hypertext pre-processor (PHP) programming language. Authentication was achieved through username, password, and fingerprint information. The system was deployedin a university to log students’ details, time absent, time present and cumulative attendances per month and it was realised that the system was highly effective, efficient and 5 times faster than the conventional paper-based attendance logging technique.
Volume: 24
Issue: 1
Page: 570-580
Publish at: 2021-10-01

Lifetime centric load balancing mechanism in wireless sensor network based IoT environment

10.11591/ijece.v11i5.pp4183-4193
Veerabadrappa Veerabadrappa , Booma Poolan Marikannan
Wireless sensor network (WSN) is a vital form of the underlying technology of the internet of things (IoT); WSN comprises several energy-constrained sensor nodes to monitor various physical parameters. Moreover, due to the energy constraint, load balancing plays a vital role considering the wireless sensor network as battery power. Although several clustering algorithms have been proposed for providing energy efficiency, there are chances of uneven load balancing and this causes the reduction in network lifetime as there exists inequality within the network. These scenarios occur due to the short lifetime of the cluster head. These cluster head (CH) are prime responsible for all the activity as it is also responsible for intra-cluster and inter-cluster communications. In this research work, a mechanism named lifetime centric load balancing mechanism (LCLBM) is developed that focuses on CH-selection, network design, and optimal CH distribution. Furthermore, under LCLBM, assistant cluster head (ACH) for balancing the load is developed. LCLBM is evaluated by considering the important metrics, such as energy consumption, communication overhead, number of failed nodes, and one-way delay. Further, evaluation is carried out by comparing with ES-Leach method, through the comparative analysis it is observed that the proposed model outperforms the existing model.
Volume: 11
Issue: 5
Page: 4183-4193
Publish at: 2021-10-01

Linear equation for text cryptography using letters' coordinates

10.11591/ijeecs.v24.i1.pp548-553
Thamir A. Jarjis , Yahya Q. I. Al-Fadhili
The linear encryption such as Caesar, mono-alphabetic are used to solve the encryption problem in different fields. This module usually encrypts any letter to exact and one corresponding letter. With advanced technologies in computers, these algorithms seem not to be high level secure. This paper proposed a secure encryption algorithm using modified linear encryption by considering the letters’ positions of the plaintext body. Two advantages the proposed algorithm has against traditional ones. First, the cryptography procedures are simple and secure. Secondly, it has higher security because of the non- ingrained nature of poly-alphabetic for substitution. Consequently, the plaintext body is considered as a 2-D matrix, such that, each letter has two coordinates, the ith and jth. These procedures depend on substituting the coordinates of the letter into a linear equation to provide a different substitution letter. The performance of these procedures showed better and robust results by applying the frequency analysis test for this proposed algorithm evaluating.
Volume: 24
Issue: 1
Page: 548-553
Publish at: 2021-10-01

Portable gas leak detection system using IoT and off-the shelf sensor node

10.11591/ijeecs.v24.i1.pp491-499
Marwan Ihsan Shukur Al-Jemeli , Maythem Kamal Abbas Al-Adilee
In companies that use toxic gases in vast amounts for a range of procedures, there are a host of high-risk concerns to address. People will not be able to track or control the emission of these gases on a routine basis until it becomes harmful. Sensors are expected to actively detect leaks and alert users to any potential hazards. Gas leakage may occur at multiple locations within a single installation. As a result, sensors are implanted as close to the suspected leak site as possible, enabling them to track leakage and relay signals to a base station that is situated far away. Many sensor values are received and analyzed using a microcontroller. The generated data is encoded in the wireless module and sent to the base through the internet of things link, where it is decoded and viewed by another microcontroller. When leaks are detected, the device sends an audio and visual alert, and since the detection period is very limited due to high-speed processing, leakage situations are brought under control with minimal or no effect. Using the new IoT technology and tracking from anywhere on the network, this project offers a cost-effective and reliable solution for mitigating leakage risk.
Volume: 24
Issue: 1
Page: 491-499
Publish at: 2021-10-01

Attentional bias during public speaking anxiety revealed using event-related potentials

10.11591/ijeecs.v24.i1.pp253-259
Farah Shahnaz Feroz , Ahmad Rifhan Salman , Muhammad Hairulnizam Mat Ali , Afiq Idzudden Ismail , S. Indra Devi , S. K. Subramaniam
Analysis of brain signals and their properties provides valuable information regarding the underlying neural deficiencies and enables the diagnosis of attention bias related to public speaking anxiety (PSA). Although 25% people around the world suffer from PSA, currently, there exists a lack of standard assessment in diagnosing the severity of attention bias in individuals with PSA. This study aims to distinguish behavioral and neural abnormalities related to attentional bias during PSA by comparing reaction time (RT) and event-related potential (ERP) correlates of high (H) PSA and low (L) PSA individuals. 12 individuals suffering from HPSA and 12 individuals with LPSA participated in the modified emotional Stroop experiment. Electroencephalography (EEG) was recorded with the low cost, 14-channel Emotiv Epoc+. RT showed slower responses, linked to attentional deficits in HPSA individuals. ERP results revealed the P200 emotional Stroop biomarker, found to be linked to attentional bias in HPSA, but not in LPSA individuals. These results revealed significant RT and P200 ERP abnormalities related to attentional bias in HPSA individuals using the low-cost Emotiv Epoc+.
Volume: 24
Issue: 1
Page: 253-259
Publish at: 2021-10-01

Applying calcium fluoride and silica particles: A solution to improve color homogeneity of pc-WLEDS

10.11591/ijece.v11i5.pp3864-3869
Huu Phuc Dang , Nguyen Thi Phuong Loan , Thanh Tung Nguyen , Sang Dang Ho
This article focuses on enhancing the lighting efficiency of pc-WLEDs, a new and advanced lighting solution that has received lots of attention. To adapt to the demand of modern lighting, the lighting performance of pc-WLEDs must be improved, especially the color homogeneity and luminous flux, two of the most important quality indicators of pc-WLEDs. Through experiments, this article proposes using the scattering enhancement particles (SEPs) such as CaF2 and SiO2 with yellow phosphor Y3Al5O12:Ce3+ in pc-WLEDs configuration. The pc-WLEDs model is created by using the LightTools program and set at 8500 K correlated color temperature, while the experimental results yielded from this simulation will be verified by Mie-scattering theory. The information from this article reveals the scattering coefficients of SEPs at 455 nm and 595 nm wavelengths. Moreover, it is confirmed that the employment of CaF2 is effective in promoting the color but may damage the luminous efficiency if the concentration is too high while the SEP material, SiO2, exhibits high luminous efficiency at all concentration.
Volume: 11
Issue: 5
Page: 3864-3869
Publish at: 2021-10-01
Show 903 of 1996

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration