Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,939 Article Results

Semantic feature extraction method for hyperspectral crop classification

10.11591/ijeecs.v23.i1.pp387-395
M. C. Girish Baabu , Padma M. C.
Hyperspectral imaging (HSI) is composed of several hundred of narrow bands (NB) with high spectral correlation and is widely used in crop classification; thus induces time and space complexity, resulting in high computational overhead and Hughes phenomenon in processing these images. Dimensional reduction technique such as band selection and feature extraction plays an important part in enhancing performance of hyperspectral image classification. However, existing method are not efficient when put forth in noisy and mixed pixel environment with dynamic illumination and climatic condition. Here the proposed Sematic Feature Representation based HSI (SFR-HSI) crop classification method first employ Image Fusion (IF) method for finding meaningful features from raw HSI spectrally. Second, to extract inherent features that keeps spatially meaningful representation of different crops by eliminating shading elements. Then, the meaningful feature set are used for training using Support vector machine (SVM). Experiment outcome shows proposed HSI crop classification model achieves much better accuracies and Kappa coefficient performance. 
Volume: 23
Issue: 1
Page: 387-395
Publish at: 2021-07-01

Flight parameters improvement for an unmanned aerial vehicle using a lookup table based fuzzy PID controller

10.11591/ijeecs.v23.i1.pp171-178
Abderrahmen Benbouali , Fayçal Chabni , Rachid Taleb , Noureddine Mansour
In this paper, a control scheme based on lookup table fuzzy proportionalintegral-derivate (PID) controller for the quadrotor unmanned aerial vehicle (UAV) movement control is proposed. This type of control provides enhanced quadrotor movement control beyond what can be achieved with conventional controllers and has a less computational burden on the processor. The proposed control scheme uses three lookup table based fuzzy logic controllers to control the different movement ranges of a quadrotor (i.e. roll, pitch, and yaw) to achieve stability. The mathematical model of a quadrotor, used to design the proposed controller, is derived based on the Lagrange approach. The processor in the loop (PIL) technique was used to test and validate the proposed control scheme. MATLAB/Simulink environment was used as a platform for the quadrotor model, whereas a low cost and high-performance STM32F407 microcontroller was used to implement the controllers. Data transfer between the hardware and software is via serial communication converter. The control system designed based on simulation is tested and validated using “processor in the loop” techniques.
Volume: 23
Issue: 1
Page: 171-178
Publish at: 2021-07-01

An improvement to hybrid beamforming precoding scheme for mmWave massive MIMO systems based on channel matrix

10.11591/ijeecs.v23.i1.pp285-292
Zahra Amirifar , Jamshid Abouei
The massive multiple-input multiple-output (MIMO) technology has been applied innew generation wireless systems due to growing demand for reliability and high datarate. Hybrid beamforming architectures in both receiver and transmitter, includinganalog and digital precoders, play a significant role in 5G communication networksand have recently attracted a lot of attention. In this paper, we propose a simple andeffective beamforming precoder approach for mmWave massive MIMO systems. Wefirst solve an optimization problem by a simplification subject, and in the second step,we use the covariance channel matrixfCk=Cov(Hk)andBk=HkHHkinstead of chan-nel matrixHk. Simulation results verify that the proposed scheme can enjoy a highersum rate and energy efficiency than previous methods such as spatially sparse method,analog method, and conventional hybrid method even with inaccurate Channel StateInformation (CSI). Percentage difference of the achievable rate ofCk=Cov(Hk)andBk=HkHHkschemes compared to conventional methods are 2.51% and 48.94%, re-spectively.
Volume: 23
Issue: 1
Page: 285-292
Publish at: 2021-07-01

Sentiment classification of user's reviews on drugs based on global vectors for word representation and bidirectional long short-term memory recurrent neural network

10.11591/ijeecs.v23.i1.pp345-353
Hadab Khalid Obayed , Firas Sabah Al-Turaihi , Khaldoon H. Alhussayni
The process of product development in the health sector, especially pharmaceuticals, goes through a series of precise procedures due to its directrelevance to human life. The opinion of patients or users of a particular drugcan be relied upon in this development process, as the patients convey their experience with the drugs through their opinion. The social media field provides many datasets related to drugs through knowing the user's ratingand opinion on a drug after using it. In this work, a dataset is used that includes the user’s rating and review on the drug, for the purpose of classifying the user’s opinions (reviews) whether they are positive ornegative. The proposed method in this article includes two phases. The first phase is to use the Global vectors for word representation model for converting texts into the vector of embedded words. As for the second stage, the deep neural network (Bidirectional longshort-termmemory) is employedin the classification of reviews. The user's rating is used as a ground truth inevaluating the classification results. The proposed method present sencouraging results, as the classification results are evaluated through threecriteria, namely Precision, Recall and F-score, whose obtained values equal(0.9543, 0.9597and0.9558), respectively. The classification results of theproposed method are compared to a number of classifiers, and it was noticed that the results of the proposed method exceed those of the alternative classifiers.
Volume: 23
Issue: 1
Page: 345-353
Publish at: 2021-07-01

Intelligent voltage regulator for distributed generation-based network

10.11591/ijeecs.v23.i1.pp98-109
Zwawi Hamadouche , Mounir Khiat , Muhammad Asad Iqbal
Power grids are being transformed into a smart distribution network that incorporates multiple distributed energy resources (DERs), ensuring stable operation and improved power quality at the same time. Many research papers have been published in recent years that discuss the voltage violation issues that emerge from the high penetration of distributed generation (DG). In this paper, we propose a new optimal voltage control technique based on feedforward neural networks (FFNN) to maintain a stable voltage profile. MATLAB®/Simulink® has been used to carry out the simulation. The simulation results show the efficiency of this method in voltage control. The proposed approach ensured a stable voltage profile for the considered schemes.
Volume: 23
Issue: 1
Page: 98-109
Publish at: 2021-07-01

Designing a secure campus network and simulating it using Cisco packet tracer

10.11591/ijeecs.v23.i1.pp479-489
Alaa H. Ahmed , Mokhaled N. A. Al-Hamadani
The network is a massive part of life today. It participates not only on one side of life but in nearly every station, especially in educational organizations. The key aim of education is to share data and knowledge, making the network important for education. In particular, it is essential to ensure the exchange of information; thus, no one can corrupt it. To safe and trustworthy transfers between users, integrity and reliability are crucial questions in all data transfer problems. Therefore, we have developed a secure campus network (SCN) for sending and receiving information among high-security end-users. We created a topology for a campus of multi networks and virtual local area networks (VLANs’) using cisco packet tracer. We also introduced the most critical security configurations, the networking used in our architecture. We used a large number of protocols to protect and accommodate the users of the SCN scheme.
Volume: 23
Issue: 1
Page: 479-489
Publish at: 2021-07-01

Secured protection of transmission line by distance relay using data mining approach

10.11591/ijeecs.v23.i1.pp1-13
M. Kiruthika , Bindu S.
Distance relay is one of the most important protection element of a transmission line used in protection schemes. Relay may malfunction if it is not able to distinguish faults from system stressed conditions. This work mainly focusses on enhancing the performance of the distance relay in a secured manner based on data mining approach which uses two phases of classification. Level 1 classifier identifies the system conditions like normal, fault, and power swing and level 2 classifier gets initiated when there is a power swing and distinguishes between the persistence of power swing condition and a three-phase fault. In both the phases, the protection scheme in the respective zone where the fault occurred gets activated. The proposed methodology is tested for an IEEE 9-bus system wherein the data is collected from phasor measurement units placed in optimal locations. Optimal PMU placement is economical since it overcomes issues like cost, communication infrastructure issues, maintenance and complexity. The results proved that the proposed method is effective with good efficiency and higher accuracy with less number of PMUs.
Volume: 23
Issue: 1
Page: 1-13
Publish at: 2021-07-01

Efficient multi-keyword similarity search over encrypted cloud documents

10.11591/ijeecs.v23.i1.pp510-518
Ayad I. Abdulsada , Dhafer G. Honi , Salah Al-Darraji
Many organizations and individuals are attracted to outsource their data into remote cloud service providers. To ensure privacy, sensitive data should be encrypted be-fore being hosted. However, encryption disables the direct application of the essential data management operations like searching and indexing. Searchable encryption is acryptographic tool that gives users the ability to search the encrypted data while being encrypted. However, the existing schemes either serve a single exact search that loss the ability to handle the misspelled keywords or multi-keyword search that generate very long trapdoors. In this paper, we address the problem of designing a practical multi-keyword similarity scheme that provides short trapdoors and returns the correct results according to their similarity scores. To do so, each document is translated intoa compressed trapdoor. Trapdoors are generated using key based hash functions to en-sure their privacy. Only authorized users can issue valid trapdoors. Similarity scores of two textual documents are evaluated by computing the Hamming distance between their corresponding trapdoors. A robust security definition is provided together withits proof. Our experimental results illustrate that the proposed scheme improves thesearch efficiency compared to the existing schemes. Further more, it shows a high level of performance.
Volume: 23
Issue: 1
Page: 510-518
Publish at: 2021-07-01

Busway distribution system-sizing and planning aspects for automotive weld shop

10.11591/ijeecs.v23.i1.pp600-611
Sana Zaheer , Sana Zaheer , Raja Masood Larik
Resistance spot welding with its characteristic “dirty electrical load” is adistinctive engineering problem. The wide range of its industrial applications has made the subject an exciting research domain. Owing to the in term it tence of a welding operation, random overlapping of welding pulses, its sensitivity to voltage variation and application-specific quality control requirements, the electrical distribution system for welding loads need to be tied strongly with the process-related requirements. One of the most important applications of resistance welding is an automotive body shop, also called weld shop. This is where various units of a car body are welded together to form a shell that begins to look like a car. This paper focuses on explaining the nature of welding load and process requirements of a weld shop, leading towards the design and development of a Microsoft Excel based tool for optimal sizing of high current busway distribution system for resistance spot welding machines.This tool can be effectively used as a desktop application for efficient design development and comprehension of various design criteria. Besides, numerical based calculations have been provided with sound reasoning, progressively developing the proposed design criteria.
Volume: 23
Issue: 1
Page: 600-611
Publish at: 2021-07-01

An analysis of CRM practices in the telecommunication industry in Iraq

10.11591/ijeecs.v23.i1.pp453-462
Hosam Alden Riyadh , Salsabila Aisyah Alfaiza , Abdulsatar Abduljabbar Sultan , Munadil K. Faaeq , Radyan Dananjoyo
Today, concerning the capacityto react straight for wardly to client demands and offer the client a profound experience that is customized and interactive, organizations in the telecommunication industry must have the capacity toset up, support and continue the connections toward long-term clients. This study attempts to analyze and observe the customer relationship management (CRM) practices that affectfirm performance telecommunication corporations. Thus, the study employed a qualitative method, the primary data were obtained using the questionnaire and the respondents consisted of 100 people. The results propose that customer relationships' management factors included the gathering of information, the processing of data, the management of information, the loyalty of customers, and the retention of customers with significantly related to the performance of a firm in the industry of telecommunication in Iraq.
Volume: 23
Issue: 1
Page: 453-462
Publish at: 2021-07-01

Logistics tracking system based on decentralized IoT and blockchain platform

10.11591/ijeecs.v23.i1.pp421-430
Marouane El Midaoui , El Mehdi Ben Laoula , Mohammed Qbadou , Khalifa Mansouri
Most of supply chain networks have encountered difficulties when trying to integrate all components and stakeholders (Customers, warehouse, transportation, and raw material production. Etc...), which make supply chain management system suffering from a lack of efficiency and transparency that make a steady increase in good’s falsification and consumer’s disappointment. All information about good’s production, storage and transportation should flow clearly during all stages of the supply chain by tracking and authenticating to avoid product’s contamination or fraud in the network. Current tracking IoT-based systems are built on top of centralized architecture and this leaves a gap for tampering and false information especially in urban area, but also the exsiting solutions cannot allow the information to be shared with authority or consumers. To effectively assess and assure traceability and transparency this paper propose an approach using a distributed ledger (blockchain) besides a configuable IoT-based system to take into account all needed data including specific case of urban area, with an opendata platform at the disposal of stockholders, authority and consumers.
Volume: 23
Issue: 1
Page: 421-430
Publish at: 2021-07-01

Measuring the accuracy of LSTM and BiLSTM models in the application of artificial intelligence by applying chatbot programme

10.11591/ijeecs.v23.i1.pp197-205
Prasnurzaki Anki , Alhadi Bustamam
Python programme contains a question and answer system that derived from data sets that have used and implemented the chatbot in this modern era. where the data collected is in the form of corpuses containing extensive metadata-rich fictional conversations derived from extracted film scripts, commonly called cornell movie dialogue corpus. The various models have been used chatbots in python programmes, and LSTM and BiLSTM models were specifically used in this study. Where the form of accuracy will be reported as a result of the implementation of LSTM and BiLSTM models in the chatbot programme. The programme performance will be influenced by the data from the model selection, because the level of accuracy is determined by the target programme being taken. So this is the main factor that determines which model to choose. Based on considerations required for choosing the programme model, in the end the LSTM and the BiLSTM models are chosen and will be applied to the programme. Based on the LSTM and BiLSTM chatbot programmes that have been tested, it can be concluded that the best parameters come from a pair of BiLSTM chatbots using the BiLTSM model with an average accuracy value of 0.995217.
Volume: 23
Issue: 1
Page: 197-205
Publish at: 2021-07-01

Work function variations on electrostatic and RF performances of JLSDGM Device

10.11591/ijeecs.v23.i1.pp150-161
K K. E. Kaharudin , F. Salehuddin , A. S. M. Zain , Ameer F. Roslan , I Ahmad
This paper offers a systematic analysis on the impact of work function (WF) variations on electrostatic and radio frequency (RF) performances of nchannel junctionless strained double gate (DG) (n-JLSDGM) metal oxide semiconductor field effect transistor (MOSFET). The study has been performed under othe constant level of design parameters that operates in saturation as a transconductance amplifier, considering the dependence of electrostatic and RF performance on the variation of WF. Furthermore, this paper aims to provide physical insight into the improved electrostatic and RF performances of the proposed n-JLSDGM device. The device layout and characteristics were designed and extracted respectively via a comprehensive 2-D simulation. Device performances such as on-state current (ION), off-state current (IOFF), on-off current ratio, subthreshold swing (SS), intrinsic capacitances, dynamic power dissipation (Pdyn), cut-off frequency (fT) and maximum oscillation frequency (fmax) are intensively investigated in conjunction with WF variations.
Volume: 23
Issue: 1
Page: 150-161
Publish at: 2021-07-01

Towards using UAV for improving 5G cellular communication systems

10.11591/ijeecs.v23.i1.pp265-272
Mohamed El Sayed Kotb , Wagdy R. Anis , Ahmed A. Abd-Elhafez
Unmanned aerial vehicles (UAVs) have sparked a lot of interest in the wireless networking community as an emerging subject in aerial robotics. The UAV environment can be used to improve UAV communications in various ways. These smart devices cater for a broad variety of wireless technologies and applications because of UAV's inherent features related to versatile mobility in 3D space, autonomous operations as well as intelligent positioning. This study will investigate the convergence synergies between 5G/B5G mobile systems and UAV technologies, with the UAV being integrated into current cellular networks as a modern aerial user equipment (UE). In this integration, UAVs play the function of cellular flying customers, and are hence referred to as cellularly linked UAVs (a.k.a. UAVUE, drone-UE, 5G-connected drone, or aerial user). The major goal of this research is to provide a thorough analysis of the integration task, as well as major technical breakthroughs from 5G/B5G and current work in prototyping architecture and field trials that support cell-based UAVs. This study examines recent 3GPP standards advances as well as socio-economic challenges that must be addressed before this promising technology can be properly implemented. There are already some accessible issues clearing the way for potential study opportunities.
Volume: 23
Issue: 1
Page: 265-272
Publish at: 2021-07-01

A deep web data extraction model for web mining: a review

10.11591/ijeecs.v23.i1.pp519-528
Ily Amalina Ahmad Sabri , Mustafa Man
The World Wide Web has become a large pool of information. Extracting structured data from a published web pages has drawn attention in the last decade. The process of web data extraction (WDE) has many challenges, dueto variety of web data and the unstructured data from hypertext mark up language (HTML) files. The aim of this paper is to provide a comprehensive overview of current web data extraction techniques, in termsof extracted quality data. This paper focuses on study for data extraction using wrapper approaches and compares each other to identify the best approach to extract data from online sites. To observe the efficiency of the proposed model, we compare the performance of data extraction by single web page extraction with different models such as document object model (DOM), wrapper using hybrid dom and json (WHDJ), wrapper extraction of image using DOM and JSON (WEIDJ) and WEIDJ (no-rules). Finally, the experimentations proved that WEIDJ can extract data fastest and low time consuming compared to other proposed method. 
Volume: 23
Issue: 1
Page: 519-528
Publish at: 2021-07-01
Show 945 of 1996

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration