Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,922 Article Results

Automated handwriting analysis based on pattern recognition: a survey

10.11591/ijeecs.v22.i1.pp196-206
Samsuryadi Samsuryadi , Rudi Kurniawan , Fatma Susilawati Mohamad
Handwriting analysis has wide scopes include recruitment, medical diagnosis, forensic, psychology, and human-computer interaction. Computerized handwriting analysis makes it easy to recognize human personality and can help graphologists to understand and identify it. The features of handwriting use as input to classify a person’s personality traits. This paper discusses a pattern recognition point of view, in which different stages are described. The stages of study are data collection and pre-processing technique, feature extraction with associated personality characteristics, and the classification model. Therefore, the purpose of this paper is to present a review of the methods and their achievements used in various stages of a pattern recognition system. 
Volume: 22
Issue: 1
Page: 196-206
Publish at: 2021-04-01

COVID-19 fever symptom detection based on IoT cloud

10.11591/ijece.v11i2.pp1823-1829
Mustafa Wassef Hasan
This paper presents a new method of detection COVID-19 fever symptoms depending on IoT cloud services to solve the higher time delay of checking the crowded clients that enter public or private agencies which can lead to a dangerous field to spread the disease. An automatically checking process is suggested using a practical experiment is developed using (ESP8266 Node MCU, Ultrasonic (SR-04), RFID (RC522), human body temperature (MAX30205) sensors, and ThingSpeak platform). Where Node MCU is open-source hardware used to transmit the received data (human temperature sensor) from the (MAX30205) to the cloud platform (ThingSpeak) then alert the monitoring manager user when the collected data reached a critical value that specified previously and automatically take action to solve this situation. At the same time, the cloud platform will provide a graphical representation of the received data to display it using different monitoring devices such as (computers, mobiles, and others).
Volume: 11
Issue: 2
Page: 1823-1829
Publish at: 2021-04-01

Design and implementation of a stability control system for TCP/AQM network

10.11591/ijeecs.v22.i1.pp129-136
Salam Waley Shneen , Mohammed Qasim Sulttan , Manal Kadhim Oudah
In this work, we used a new approach as active queue management (AQM) to avoid data congestion in TCP/IP networks. The new approach is PSO-PI controller which use the proportional-integral controller as a control unit and particle swarm optimization (PSO) algorithm as an optimization technique to improve the performance of the PI controller and therefore improving the performance of TCP/IP networks as a required goal. The optimization control (PSO-PI) is characterized by access to design and choosing the optimal parameters of (K_1 and K_p) to reach optimal solutions in a short way (fewer iterations). The implementation of the PSO algorithm is achieving by using the mathematical system model and M-file and SIMULINK in Mathlab program. Simulation results show good congestion management performance with PSO-PI controller better than the PI controller as AQM in TCP networks, and the proposed method was very fast and required few iterations.
Volume: 22
Issue: 1
Page: 129-136
Publish at: 2021-04-01

Three zone detection and distance relay co-ordination of power system protection

10.11591/ijece.v11i2.pp919-928
Cholleti Sriram , Y. Kusumalatha
To secure the transmission lines against power system faults, the distance relays are mostly used. Distance relay has its own Resistance (R)–Reactance (X) characteristics. Co-ordination of different distance relays is necessary for the fast operation of circuit breaker. Various distance relays which are being tripped with respect to circuit breakers which are attached at individual buses faraway from each other. These relays will be operated with respect to the distance between the occurred fault and relay location. In this paper, detection of three zones using relay characteristics, co-ordination of distance relays and circuit breakers are shown with the faults placed at different locations of an IEEE Nine bus system using MATLAB/Simulink GUI environment. A comparison also made between the relays performance and circuit breaker tripping operation with respect to severe faults at different locations on IEEE Nine bus system.
Volume: 11
Issue: 2
Page: 919-928
Publish at: 2021-04-01

Forging a deep learning neural network intrusion detection framework to curb the distributed denial of service attack

10.11591/ijece.v11i2.pp1498-1509
Arnold Adimabua Ojugo , Rume Elizabeth Yoro
Today’s popularity of the internet has since proven an effective and efficient means of information sharing. However, this has consequently advanced the proliferation of adversaries who aim at unauthorized access to information being shared over the internet medium. These are achieved via various means one of which is the distributed denial of service attacks-which has become a major threat to the electronic society. These are carefully crafted attacks of large magnitude that possess the capability to wreak havoc at very high levels and national infrastructures. This study posits intelligent systems via the use of machine learning frameworks to detect such. We employ the deep learning approach to distinguish between benign exchange of data and malicious attacks from data traffic. Results shows consequent success in the employment of deep learning neural network to effectively differentiate between acceptable and non-acceptable data packets (intrusion) on a network data traffic.
Volume: 11
Issue: 2
Page: 1498-1509
Publish at: 2021-04-01

Denoising of EEG signal based on word imagination using ICA for artifact and noise removal on unspoken speech

10.11591/ijeecs.v22.i1.pp83-88
Efy Yosrita , Rosida Nur Aziza , Rahma Farah Ningrum , Givary Muhammad
The purpose of this research is to observe the effectiveness of independent component analysis (ICA) method for denoising raw EEG signals based on word imagination, which will be used for word classification on unspoken speech. The electroencephalogram (EEG) signals are signals that represent the electrical activities of the human brain when someone is doing activities, such as sleeping, thinking or other physical activities. EEG data based on the word imagination used for the research is accompanied by artifacts, that come from muscle movements, heartbeat, eye blink, voltage and so on. In previous studies, the ICA method has been widely used and effective for relieving physiological artifacts. Artifact to signal ratio (ASR) is used to measure the effectiveness of ICA in this study. If the ratio is getting larger, the ICA method is considered effective for clearing noise and artifacts from the EEG data. Based on the experiment, the obtained ASR values from 11 subjects on 14 electrodes amounted are within the range of 0,910 to 1,080. Thus, it can be concluded that ICA is effective for removing artifacts from EEG signals based on word imagination.
Volume: 22
Issue: 1
Page: 83-88
Publish at: 2021-04-01

Monitoring of solenoid parameters based on neural networks and optical fiber squeezer for solenoid valves diagnosis

10.11591/ijece.v11i2.pp1697-1708
Abdallah Zahidi , Said Amrane , Nawfel Azami , Naoual Nasser
As crucial parts of various engineering systems, solenoid valves (SVs) operated by electromagnetic solenoid (EMS) are of great importance and their failure may lead to cause unexpected casualties. This failure, characterized by a degradation of the performances of the SVs, could be due to a fluctuations in the EMS parameters. These fluctuations are essentially attributed to the changes in the spring constant, coefficient of friction, inductance, and the resistance of the coil. Preventive maintenance by controlling and monitoring these parameters is necessary to avoid eventual failure of these actuators. The authors propose a new methodology for the functional diagnosis of electromagnetic solenoids (EMS) used in hydraulic systems. The proposed method monitors online the electrical and mechanical parameters varying over time by using artificial neural networks algorithm coupled with an optical fiber polarization squeezer based on EMS for polarization scrambling. First, the MATLAB/Simulink model is proposed to analyze the effect of the parameters on the dynamic EMS model. The result of this simulation is used for training the neural network, then a simulation is proposed using the neural net fitting toolbox to determine the solenoid parameters (Resistance of the coil R, stiffness K and coefficient of friction B of the spring) from the coefficients of the transfer function, established from the model step response. Future work will include not only diagnosing failure modes, but also predicting the remaining life based on the results of monitoring.
Volume: 11
Issue: 2
Page: 1697-1708
Publish at: 2021-04-01

A survey on predicting oil spills by studying its causes using deep learning techniques

10.11591/ijeecs.v22.i1.pp580-589
Mona Mohamed Nasr , Fahd Kamal Al-Sheref , Yasmen Samhan Abd Elwahab
It’s so easy to know the accidents as it’s already happened and solving these accidents is immediately handled, but searching for a solution for these accidents, don’t deny the existence of reasons that made accidents happen. Knowing the source of accidents will help in avoiding them to occur in the future. It’s an important field in searching as some human lives depend on the safety of such a field, so it’s so important to use a powerful technique to define these reasons as the research point in spill accidents and predicting accidents and to predict the occurrence of the accident before its happening depending on its reasons that lead to that accident in past times so with similar conditions it might happen an accident but it needs a sufficient data and a powerful technique such as deep learning techniques that give very precise results and by using this tool an Intelligent Model will build to predict oil spilling. In this survey paper, related work will be discussed to enhance that work.
Volume: 22
Issue: 1
Page: 580-589
Publish at: 2021-04-01

Searching surveillance video contents using convolutional neural network

10.11591/ijece.v11i2.pp1656-1665
Duaa Mohammad , Inad Aljarrah , Moath Jarrah
Manual video inspection, searching, and analyzing is exhausting and inefficient. This paper presents an intelligent system to search surveillance video contents using deep learning. The proposed system reduced the amount of work that is needed to perform video searching and improved the speed and accuracy. A pre-trained VGG-16 CNNs model is used for dataset training. In addition, key frames of videos were extracted in order to save space, reduce the amount of work, and reduce the execution time. The extracted key frames were processed using the sobel operator edge detector and the max-pooling in order to eliminate redundancy. This increases compaction and avoids similarities between extracted frames. A text file, that contains key frame index, time of occurrence, and the classification of the VGG-16 model, is produced. The text file enables humans to easily search for objects of interest. VIRAT and IVY LAB datasets were used in the experiments. In addition, 128 different classes were identified in the datasets. The classes represent important objects for surveillance systems. However, users can identify other classes and utilize the proposed methodology. Experiments and evaluation showed that the proposed system outperformed existing methods in an order of magnitude. The system achieved the best results in speed while providing a high accuracy in classification.
Volume: 11
Issue: 2
Page: 1656-1665
Publish at: 2021-04-01

A hybrid method of genetic algorithm and support vector machine for DNS tunneling detection

10.11591/ijece.v11i2.pp1666-1674
Fuqdan A. Al-Ibraheemi , Sattar AL-Ibraheemi , Haleh Amintoosi
With the expansion of the business over the internet, corporations nowadays are investing numerous amounts of money in the web applications. However, there are different threats could make the corporations vulnerable for potential attacks. One of these threats is harnessing the domain name protocol for passing harmful information, this kind of threats is known as DNS tunneling. As a result, confidential information would be exposed and violated. Several studies have investigated the machine learning in order to propose a detection approach. In their approaches, authors have used different and numerous types of features such as domain length, number of bytes, content, volume of DNS traffic, number of hostnames per domain, geographic location and domain history. Apparently, there is a vital demand to accommodate feature selection task in order to identify the best features. This paper proposes a hybrid method of genetic algorithm feature selection approach with the support vector machine classifier for the sake of identifying the best features that have the ability to optimize the detection of DNS tunneling. To evaluate the proposed method, a benchmark dataset of DNS tunneling has been used. Results showed that the proposed method has outperformed the conventional SVM by achieving 0.946 of f-measure
Volume: 11
Issue: 2
Page: 1666-1674
Publish at: 2021-04-01

Geometric control of quadrotor UAVs using integral backstepping

10.11591/ijeecs.v22.i1.pp53-61
Ali Bouchaib , Rachid Taleb , Ahmed Massoum , Saad Mekhilef
The traditional quadcopter control systems should deal with two common problems. Namely, the singularities related to the inverse kinematics and the ambiguity linked to the quaternion representation of the dynamic model. Moreover, the stability problem due to the system nonlinearity and high degree of coupling. This paper provides a solution to the two issues by employing a geometrical integral-backstepping control system. The integral terms were added to improve system ability to track desired trajectories. The high-level control laws are considered as a virtual control and transmitted to the low-level to track the high-level commands. The proposed control system along with the quadcopter dynamic model were expressed in the special Euclidean group SE(3). Finally, the control system robustness against mismatching parameters was studied while tracking various paths.
Volume: 22
Issue: 1
Page: 53-61
Publish at: 2021-04-01

Economic technology analysis of LTE advanced pro dual spectrum licensed and unlicensed access using discounted cash flow methods

10.11591/ijeecs.v22.i1.pp342-351
Setiyo Budiyanto , Erman Al Hakim , Fajar Rahayu
Since implementing the long term evolution (LTE) technology, the surge in data service traffic has increased, causing an increase in demand spectrum, which has resulted in gaps in capacity requirements. Wireless service providers can respond to LTE technology updates. With LTE advanced pro technology that utilizes unlicensed spectrum technology can provide solutions to increase capacity and throughput. In this study, LTE advanced pro planning by capacity method to find the number of eNodeB and using the discounted cash flow method to analyze the feasibility of the costs to be invested in the implementation of the LTE. The results of the four simulated scenarios concluded that the number of eNodeB from the IV scenario with 20 MHz bandwidth at 1800 MHz frequency and 20 MHz bandwidth at 5 GHz frequency amounted to 23 sites, with a positive NPV value of $ 271,936.96, IRR of 14.91%, and for payback period occurred in the 3rd year. Thus the fourth scenario is feasible to be implemented.
Volume: 22
Issue: 1
Page: 342-351
Publish at: 2021-04-01

Power quality considerations for embedded generation integration in Nigeria: A case study of ogba 33 kV injection substation

10.11591/ijece.v11i2.pp956-965
Agbetuyi Ayoade F. , Abdulkareem Ademola , Orovwode H. E. , Oladipupo Oluwafemi K. , Matthew Simeon , Agbetuyi Oluranti A.
The deregulation of the Nigerian power sector has resulted in the quest to explore power generation options for power quality improvement. One of such options is the pattern shift from central power generation to embedded power generation. Network integration of embedded generators (EGs) causes several regulatory, technical and economic issues. This research focuses on power quality challenges that may arise as a result of network integration of embedded generation in a weak electricity networks using Ogba 33 kV injection substation as case study. The embedded generators considered comprised of gas turbine and diesel generators. NEPLAN software was used to perform the load flow analysis with and without EGs connection on the network. This was necessary so as to ascertain the healthiness of the existing distribution network for EGs integration. The power quality issues considered in the study were bus voltage profiles and the total line losses. Simulation results showed that EGs connection improved the voltage profile, for example, bus voltage at PTC 11 kV, improved from 0.881 pu to 0.958 pu while the total active power loss was reduced by 78.16%. The results obtained suggest that the grid is healthy enough to accommodate the EGs with no quality issues.
Volume: 11
Issue: 2
Page: 956-965
Publish at: 2021-04-01

MTVRep: A movie and TV show reputation system based on fine-grained sentiment and semantic analysis

10.11591/ijece.v11i2.pp1613-1626
Abdessamad Benlahbib , El Habib Nfaoui
Customer reviews are a valuable source of information from which we can extract very useful data about different online shopping experiences. For trendy items (products, movies, TV shows, hotels, services . . . ), the number of available users and customers’ opinions could easily surpass thousands. Therefore, online reputation systems could aid potential customers in making the right decision (buying, renting, booking . . . ) by automatically mining textual reviews and their ratings. This paper presents MTVRep, a movie and TV show reputation system that incorporates fine-grained opinion mining and semantic analysis to generate and visualize reputation toward movies and TV shows. Differently from previous studies on reputation generation that treat the task of sentiment analysis as a binary classification problem (positive, negative), the proposed system identifies the sentiment strength during the phase of sentiment classification by using fine-grained sentiment analysis to separate movie and TV show reviews into five discrete classes: strongly negative, weakly negative, neutral, weakly positive and strongly positive. Besides, it employs embeddings from language models (ELMo) representations to extract semantic relations between reviews. The contribution of this paper is threefold. First, movie and TV show reviews are separated into five groups based on their sentiment orientation. Second, a custom score is computed for each opinion group. Finally, a numerical reputation value is produced toward the target movie or TV show. The efficacy of the proposed system is illustrated by conducting several experiments on a real-world movie and TV show dataset.
Volume: 11
Issue: 2
Page: 1613-1626
Publish at: 2021-04-01

Restoration for blurred noisy images based on guided filtering and inverse filter

10.11591/ijece.v11i2.pp1265-1275
Rusul H. Altaie
The development of complex life leads into a need using images in several fields, because these images degraded during capturing the image from mobiles, cameras and persons who do not have sufficient experience in capturing images. It was important using techniques differently to improve images and human perception as image enhancement and image restoration etc. In this paper, restoration noisy blurred images by guided filter and inverse filtering can be used for enhancing images from different types of degradation was proposed. In the color images denoising process, it was very significant for improving the edge and texture information. Eliminating noise can be enhanced by the image quality. In this article, at first, The color images were taken. Then, random noise and blur were added to the images. Then, the noisy blurred image passed to the guided filtering to get on denoised image. Finally, an inverse filter applied to the blurred image by convolution an image with a mask and getting on the enhanced image. The results of this research illustrated good outcomes compared with other methods for removing noise and blur based on PSNR measure. Also, it enhanced the image and retained the edge details in the denoising process. PSNR and SSIM measures were more sensitive to Gaussian noise than blur.
Volume: 11
Issue: 2
Page: 1265-1275
Publish at: 2021-04-01
Show 980 of 1995

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration