Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,922 Article Results

Forging a deep learning neural network intrusion detection framework to curb the distributed denial of service attack

10.11591/ijece.v11i2.pp1498-1509
Arnold Adimabua Ojugo , Rume Elizabeth Yoro
Today’s popularity of the internet has since proven an effective and efficient means of information sharing. However, this has consequently advanced the proliferation of adversaries who aim at unauthorized access to information being shared over the internet medium. These are achieved via various means one of which is the distributed denial of service attacks-which has become a major threat to the electronic society. These are carefully crafted attacks of large magnitude that possess the capability to wreak havoc at very high levels and national infrastructures. This study posits intelligent systems via the use of machine learning frameworks to detect such. We employ the deep learning approach to distinguish between benign exchange of data and malicious attacks from data traffic. Results shows consequent success in the employment of deep learning neural network to effectively differentiate between acceptable and non-acceptable data packets (intrusion) on a network data traffic.
Volume: 11
Issue: 2
Page: 1498-1509
Publish at: 2021-04-01

COVID-19 fever symptom detection based on IoT cloud

10.11591/ijece.v11i2.pp1823-1829
Mustafa Wassef Hasan
This paper presents a new method of detection COVID-19 fever symptoms depending on IoT cloud services to solve the higher time delay of checking the crowded clients that enter public or private agencies which can lead to a dangerous field to spread the disease. An automatically checking process is suggested using a practical experiment is developed using (ESP8266 Node MCU, Ultrasonic (SR-04), RFID (RC522), human body temperature (MAX30205) sensors, and ThingSpeak platform). Where Node MCU is open-source hardware used to transmit the received data (human temperature sensor) from the (MAX30205) to the cloud platform (ThingSpeak) then alert the monitoring manager user when the collected data reached a critical value that specified previously and automatically take action to solve this situation. At the same time, the cloud platform will provide a graphical representation of the received data to display it using different monitoring devices such as (computers, mobiles, and others).
Volume: 11
Issue: 2
Page: 1823-1829
Publish at: 2021-04-01

Global convergence of new conjugate gradient method with inexact line search

10.11591/ijece.v11i2.pp1469-1475
Chergui Ahmed , Bouali Tahar
In this paper, We propose a new nonlinear conjugate gradient method (FRA) that satisfies a sufficient descent condition and global convergence under the inexact line search of strong wolf powell. Our numerical experiment shaw the efficiency of the new method in solving a set of problems from the CUTEst package, the proposed new formula gives excellent numerical results at CPU time, number of iterations, number of gradient ratings when compared to WYL, DY, PRP, and FR methods.
Volume: 11
Issue: 2
Page: 1469-1475
Publish at: 2021-04-01

Monitoring of solenoid parameters based on neural networks and optical fiber squeezer for solenoid valves diagnosis

10.11591/ijece.v11i2.pp1697-1708
Abdallah Zahidi , Said Amrane , Nawfel Azami , Naoual Nasser
As crucial parts of various engineering systems, solenoid valves (SVs) operated by electromagnetic solenoid (EMS) are of great importance and their failure may lead to cause unexpected casualties. This failure, characterized by a degradation of the performances of the SVs, could be due to a fluctuations in the EMS parameters. These fluctuations are essentially attributed to the changes in the spring constant, coefficient of friction, inductance, and the resistance of the coil. Preventive maintenance by controlling and monitoring these parameters is necessary to avoid eventual failure of these actuators. The authors propose a new methodology for the functional diagnosis of electromagnetic solenoids (EMS) used in hydraulic systems. The proposed method monitors online the electrical and mechanical parameters varying over time by using artificial neural networks algorithm coupled with an optical fiber polarization squeezer based on EMS for polarization scrambling. First, the MATLAB/Simulink model is proposed to analyze the effect of the parameters on the dynamic EMS model. The result of this simulation is used for training the neural network, then a simulation is proposed using the neural net fitting toolbox to determine the solenoid parameters (Resistance of the coil R, stiffness K and coefficient of friction B of the spring) from the coefficients of the transfer function, established from the model step response. Future work will include not only diagnosing failure modes, but also predicting the remaining life based on the results of monitoring.
Volume: 11
Issue: 2
Page: 1697-1708
Publish at: 2021-04-01

Grid search of multilayer perceptron based on the walk-forward validation methodology

10.11591/ijece.v11i2.pp1742-1751
Tran Thanh Ngoc , Le Van Dai , Dang Thi Phuc
Multilayer perceptron neural network is one of the widely used method for load forecasting. There are hyperparameters which can be used to determine the network structure and used to train the multilayer perceptron neural network model. This paper aims to propose a framework for grid search model based on the walk-forward validation methodology. The training process will specify the optimal models which satisfy requirement for minimum of accuracy scores of root mean square error, mean absolute percentage error and mean absolute error. The testing process will evaluate the optimal models along with the other ones. The results indicated that the optimal models have accuracy scores near the minimum values. The US airline passenger and Ho Chi Minh city load demand data were used to verify the accuracy and reliability of the grid search framework.
Volume: 11
Issue: 2
Page: 1742-1751
Publish at: 2021-04-01

Energy audit: types, scope, methodology and report structure

10.11591/ijeecs.v22.i1.pp45-52
Pankaj Sharma , Surender Reddy Salkuti , Seong-Cheol Kim
The objective of this paper is to study various methods adopted during the energy audit. Many countries are focusing on energy, not only enhancing the tenable power generation sources but also on utilizing the power more proficiently for economic utilization. The energy audit is an important parameter for all the developing and developed countries and they focus on energy efficiency, energy quality, and energy intensity. In the industrial, residential, and commercial sectors the top operating expense is found to be are material, machine, manpower, and energy. Identification of the energy-consuming sector is the prior attention to look for the energy-saving potential and quality improvement. Implementation of an energy audit can enhance the efficiency, quality of power, reduce the tariff of bills, and reduces the wastage of energy. The need for energy audits, different types of energy audits, various types of software used, and the energy audit report structure were presented in this paper.
Volume: 22
Issue: 1
Page: 45-52
Publish at: 2021-04-01

Power quality considerations for embedded generation integration in Nigeria: A case study of ogba 33 kV injection substation

10.11591/ijece.v11i2.pp956-965
Agbetuyi Ayoade F. , Abdulkareem Ademola , Orovwode H. E. , Oladipupo Oluwafemi K. , Matthew Simeon , Agbetuyi Oluranti A.
The deregulation of the Nigerian power sector has resulted in the quest to explore power generation options for power quality improvement. One of such options is the pattern shift from central power generation to embedded power generation. Network integration of embedded generators (EGs) causes several regulatory, technical and economic issues. This research focuses on power quality challenges that may arise as a result of network integration of embedded generation in a weak electricity networks using Ogba 33 kV injection substation as case study. The embedded generators considered comprised of gas turbine and diesel generators. NEPLAN software was used to perform the load flow analysis with and without EGs connection on the network. This was necessary so as to ascertain the healthiness of the existing distribution network for EGs integration. The power quality issues considered in the study were bus voltage profiles and the total line losses. Simulation results showed that EGs connection improved the voltage profile, for example, bus voltage at PTC 11 kV, improved from 0.881 pu to 0.958 pu while the total active power loss was reduced by 78.16%. The results obtained suggest that the grid is healthy enough to accommodate the EGs with no quality issues.
Volume: 11
Issue: 2
Page: 956-965
Publish at: 2021-04-01

Effect of controlling maximum-SNR-based relay selection strategy in cooperative wireless communication systems

10.11591/ijeecs.v22.i1.pp335-341
Essam Saleh Altubaishi
Relay selection strategy under maximum-signal-to-noise ratio (MAX-SNR) criterion was proven to maximize performance but at the expense of losing fairness among the cooperative relays. In this work, the effect of controlling the MAX-SNR criterion on the spectral efficiency of cooperative wireless communication system with adaptive modulation is investigated. Specifically, the probability density function (PDF) of the end-to-end SNR for the considered system is derived when the controlled selection criterion is considered. Base on that PDF, the average spectral efficiency is then derived and investigated. The results show how the spectral efficiency of the system deteriorates as controlling the selection of a relay. Furthermore, the results of Monte Carlo simulation validate the derived expression.
Volume: 22
Issue: 1
Page: 335-341
Publish at: 2021-04-01

Design and monitoring body temperature and heart rate in humans based on WSN using star topology

10.11591/ijeecs.v22.i1.pp326-334
Setiyo Budiyanto , Freddy Artadima Silaban , Lukman Medriavin Silalahi , Selamet Kurniawan , Fajar Rahayu I. M. , Ucuk Darusalam , Septi Andryana
Electronic health (E-health) uses information and communication technology including electronics, telecommunications, computers, and informatics to process various types of medical information, to carry out clinical services (diagnosis or therapy). Health is the most important asset in human life, therefore maintaining health is a top priority and serious attention needed. Heart rate and body temperature are vital signs that the hospital routinely checks for clinical signs and are useful for strengthening the diagnosis of a disease. In this research monitoring heart rate and body temperature with the wireless sensor network (WSN) method that uses NodeMCU 1.0 as a controller module and wireless as communication between nodes, the wireless network used in this research Wi-Fi network. As a data taker, a DS18b20 temperature sensor and a heart rate sensor (pulse sensor) are needed, which will be displayed by the ThingSpeak web and smartphones. From the test results, the success rate of the system in detecting heart rates is 97.17%. Whereas in detecting body temperature the success rate of the system is 99.28%. For data transmission, the system can send data smoothly at a maximum distance of 15 meters with a barrier.
Volume: 22
Issue: 1
Page: 326-334
Publish at: 2021-04-01

New design of wideband microstrip branch line coupler using T-shape and open stub for 5G application

10.11591/ijece.v11i2.pp1346-1355
Ali Abdulateef Abdulbari , Sharul Kamal Abdul Rahim , Mohamad Zoinol Abidin Abd Aziz , K. G. Tan , N. K. Noordin , M. Z. M. Nor
A new design of wideband branch-line coupler (BLC) using T-shape with open stub microstrip line is proposed. The branch line coupler is integrated with low and high impedance λ/4 transmission lines to achieve the comparatively compact size of (27.2 mm × 16.5 mm). operating the bandwidth in simulated of BLC from 2.9 to 4 GHz is obtained 30.22% with a frequency center of 3.5 GHz. Meanwhile, the measured bandwidth of the BLC is cover from 2.8 GHz to 4.22 GHz is equal 33.40% at the center frequency 3.55 GHz respectively. The BLC simulated has low isolation and high return loss of -29.28 dB and -30.69 dB at the center frequency 3.5 GHz.Whereas, the measured result has a simple difference in the return loss and isolation are -27.43dB and -24.46 dB at the frequency 3.55GHz respectively. This BLC design has a good coupling factor of -2.97 and insertion loss of -3.65 dB. Furthermore, it obtains an excellent amplitude and phases different between two output of ±0.1 and 93.6°±3.4° with high performance. There is a good agreement between the simulated result and the measured result. This branch line coupler design used for 5G applications for future wireless communication systems.
Volume: 11
Issue: 2
Page: 1346-1355
Publish at: 2021-04-01

Restoration for blurred noisy images based on guided filtering and inverse filter

10.11591/ijece.v11i2.pp1265-1275
Rusul H. Altaie
The development of complex life leads into a need using images in several fields, because these images degraded during capturing the image from mobiles, cameras and persons who do not have sufficient experience in capturing images. It was important using techniques differently to improve images and human perception as image enhancement and image restoration etc. In this paper, restoration noisy blurred images by guided filter and inverse filtering can be used for enhancing images from different types of degradation was proposed. In the color images denoising process, it was very significant for improving the edge and texture information. Eliminating noise can be enhanced by the image quality. In this article, at first, The color images were taken. Then, random noise and blur were added to the images. Then, the noisy blurred image passed to the guided filtering to get on denoised image. Finally, an inverse filter applied to the blurred image by convolution an image with a mask and getting on the enhanced image. The results of this research illustrated good outcomes compared with other methods for removing noise and blur based on PSNR measure. Also, it enhanced the image and retained the edge details in the denoising process. PSNR and SSIM measures were more sensitive to Gaussian noise than blur.
Volume: 11
Issue: 2
Page: 1265-1275
Publish at: 2021-04-01

Measuring information security policy compliance: content validity of questionnaire

10.11591/ijeecs.v22.i1.pp469-475
Angraini Angraini , Rose Alinda Alias , Okfalisa Okfalisa
Instruments used to measure compliance with information security policies have been developed by many researchers before, but only a few have conducted validity tests per item, especially for variables selected based on qualitative research. This study aims to validate the questionnaire will be used to measure user compliance with policies of information security. This study began by designing a questionnaire and conducting content validation using content ratio validation (CVR) and content index validation (CVI). As many as eight experts from the university assessed the items given. The results of 72 items submitted a questionnaire, as many as 22 items eliminated, and only 50 items that have CVR and CVI values above 0.75. Also, Kappa statistical calculations show that items have excellent reliability among assessors at the item level. This study revealed that this instrument had obtained an appropriate level of validity to measure compliance with information security policies. 
Volume: 22
Issue: 1
Page: 469-475
Publish at: 2021-04-01

Intelligent machine for ontological representation of massive pedagogical knowledge based on neural networks

10.11591/ijece.v11i2.pp1675-1688
Abdelladim Hadioui , Yassine Benjelloun Touimi , Nour-eddine El Faddouli , Samir Bennani
Higher education is increasingly integrating free learning management systems (LMS). The main objective underlying such systems integration is the automatization of online educational processes for the benefit of all the involved actors who use these systems. The said processes are developed through the integration and implementation of learning scenarios similar to traditional learning systems. LMS produce big data traces emerging from actors’ interactions in online learning. However, we note the absence of instruments adequate for representing knowledge extracted from big traces. In this context, the research at hand is aimed at transforming the big data produced via interactions into big knowledge that can be used in MOOCs by actors falling within a given learning level within a given learning domain, be it formal or informal. In order to achieve such an objective, ontological approaches are taken, namely: mapping, learning and enrichment, in addition to artificial intelligence-based approaches which are relevant in our research context. In this paper, we propose three interconnected algorithms for a better ontological representation of learning actors’ knowledge, while premising heavily on artificial intelligence approaches throughout the stages of this work. For verifying the validity of our contribution, we will implement an experiment about knowledge sources example.
Volume: 11
Issue: 2
Page: 1675-1688
Publish at: 2021-04-01

Real-time FPGA implementation of concatenated AES and IDEA cryptography system

10.11591/ijeecs.v22.i1.pp71-82
Sara M. Hassan , Gihan. G. Hamza
The data encryption is one of the most critical issues in the communication system design. Nowadays, many encryption algorithms are being updated to keep pace with the remarkable progress in the communication field. The advanced encryption standard (AES) is a common algorithm that has proved its efficacy. The main drawback of AES is that it uses too simple algebraic structures, since every block is always encrypted in the same way that makes the hacking process possible if the hacker captures the key and the uses S-Box in the input stage. This especially applies to the unwired communication systems where chances of hacking exceed those found in the wired systems. The paper proposes a security enhancement method that is based on utilizing concatenated AES and international data encryption algorithm (IDEA) algorithms. Upon applying the proposed algorithm, the hacking process becomes a great challenge. The paper incorporates the real-time FPGA implementation of the proposed algorithm in the encryption and the decryption stages. Besides, the paper presents a clear analysis of the system’s performance.
Volume: 22
Issue: 1
Page: 71-82
Publish at: 2021-04-01

High speed modified carry save adder using a structure of multiplexers

10.11591/ijece.v11i2.pp1591-1598
Ahmed Salah Hameed , Marwa Jawad Kathem
Adders are the heart of data path circuits for any processor in digital computer and signal processing systems. Growth in technology keeps supporting efficient design of binary adders for high speed applications. In this paper, a fast and area-efficient modified carry save adder (CSA) is presented. A multiplexer based design of full adder is proposed to implement the structure of the CSA. The proposed design of full adder is employed in designing all stages of traditional CSA. By modifying the design of full adder in CSA, the complexity and area of the design can be reduced, resulting in reduced delay time. The VHDL implementations of CSA adders including (the proposed version, traditional CSA, and modified CSAs presented in literature) are simulated using Quartus II synthesis software tool with the altera FPGA EP2C5T144C6 device (Cyclone II). Simulation results of 64-bit adder designs demonstrate the average improvement of 17.75%, 1.60%, and 8.81% respectively for the worst case time, thermal power dissipation and number of FPGA logic elements.
Volume: 11
Issue: 2
Page: 1591-1598
Publish at: 2021-04-01
Show 979 of 1995

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration