Subjects -> ENGINEERING (Total: 2844 journals)
    - CHEMICAL ENGINEERING (247 journals)
    - CIVIL ENGINEERING (248 journals)
    - ELECTRICAL ENGINEERING (176 journals)
    - ENGINEERING (1448 journals)
    - ENGINEERING MECHANICS AND MATERIALS (451 journals)
    - HYDRAULIC ENGINEERING (62 journals)
    - INDUSTRIAL ENGINEERING (97 journals)
    - MECHANICAL ENGINEERING (115 journals)

ELECTRICAL ENGINEERING (176 journals)                     

Showing 1 - 176 of 176 Journals sorted alphabetically
3C TIC     Open Access   (Followers: 4)
Acta Electronica Malaysia     Open Access  
Acta Universitatis Sapientiae Electrical and Mechanical Engineering     Open Access  
Actuators     Open Access   (Followers: 4)
Advanced Electromagnetics     Open Access   (Followers: 19)
Advances in Electrical and Electronic Engineering     Open Access   (Followers: 9)
Advances in Electrical Engineering     Open Access   (Followers: 51)
Advances in Microelectronic Engineering     Open Access   (Followers: 13)
Advances in Signal Processing     Open Access   (Followers: 13)
American Journal of Electrical and Electronic Engineering     Open Access   (Followers: 28)
American Journal of Sensor Technology     Open Access   (Followers: 4)
APSIPA Transactions on Signal and Information Processing     Open Access   (Followers: 9)
Archives of Control Sciences     Open Access   (Followers: 3)
Archives of Electrical Engineering     Open Access   (Followers: 16)
Atom Indonesia     Open Access   (Followers: 2)
Australian Journal of Electrical and Electronics Engineering     Hybrid Journal  
Balkan Journal of Electrical and Computer Engineering     Open Access  
Bulletin of Electrical Engineering and Informatics     Open Access   (Followers: 10)
Carpathian Journal of Electronic and Computer Engineering     Open Access  
Case Studies in Mechanical Systems and Signal Processing     Open Access  
CES Transactions on Electrical Machines and Systems     Open Access   (Followers: 3)
Chinese Journal of Electrical Engineering     Open Access   (Followers: 2)
Circuits, Systems, and Signal Processing     Hybrid Journal   (Followers: 13)
Computers & Electrical Engineering     Hybrid Journal   (Followers: 9)
CPSS Transactions on Power Electronics and Applications     Open Access   (Followers: 3)
CSEE Journal of Power and Energy Systems     Open Access   (Followers: 3)
Current Trends in Signal Processing     Full-text available via subscription   (Followers: 4)
ECTI Transactions on Computer and Information Technology (ECTI-CIT)     Open Access  
ECTI Transactions on Electrical Engineering, Electronics, and Communications     Open Access   (Followers: 2)
Edu Elektrika Journal     Open Access   (Followers: 1)
Electric Power Components and Systems     Hybrid Journal   (Followers: 9)
Electric Power Systems Research     Partially Free   (Followers: 23)
Electrica     Open Access  
Electrical and Electronic Engineering     Open Access   (Followers: 57)
Electrical and Power Engineering Frontier     Open Access   (Followers: 37)
Electrical Engineering     Hybrid Journal   (Followers: 23)
Electrical Engineering and Automation     Open Access   (Followers: 9)
Electrical Engineering and Power Engineering     Open Access   (Followers: 2)
Electrical Engineering in Japan     Hybrid Journal   (Followers: 8)
Electrical, Control and Communication Engineering     Open Access   (Followers: 14)
Electrochemical Energy Reviews     Hybrid Journal   (Followers: 1)
Elektron     Open Access  
Elektronika ir Elektortechnika     Open Access   (Followers: 2)
Elkha : Jurnal Teknik Elektro     Open Access  
Emerging and Selected Topics in Circuits and Systems     Hybrid Journal   (Followers: 9)
Emitor : Jurnal Teknik Elektro     Open Access   (Followers: 3)
ETRI Journal     Open Access  
EURASIP Journal on Advances in Signal Processing     Open Access   (Followers: 7)
Ferroelectrics     Hybrid Journal   (Followers: 1)
Ferroelectrics Letters Section     Hybrid Journal   (Followers: 1)
Frequenz     Hybrid Journal   (Followers: 1)
Frontiers of Electrical and Electronic Engineering     Hybrid Journal   (Followers: 8)
Frontiers of Information Technology & Electronic Engineering     Hybrid Journal  
IEA Electricity Information     Full-text available via subscription   (Followers: 3)
IEEE Access     Open Access   (Followers: 120)
IEEE Electrical Insulation Magazine     Full-text available via subscription   (Followers: 74)
IEEE Journal of Electromagnetics, RF and Microwaves in Medicine and Biology     Hybrid Journal   (Followers: 3)
IEEE Journal of Photovoltaics     Hybrid Journal   (Followers: 17)
IEEE Journal of Radio Frequency Identification     Hybrid Journal   (Followers: 3)
IEEE Journal of Selected Topics in Signal Processing     Hybrid Journal   (Followers: 42)
IEEE Journal on Miniaturization for Air and Space Systems     Hybrid Journal   (Followers: 4)
IEEE Letters on Electromagnetic Compatibility Practice and Applications     Hybrid Journal   (Followers: 4)
IEEE Networking Letters     Hybrid Journal   (Followers: 3)
IEEE Open Access Journal of Power and Energy     Open Access   (Followers: 2)
IEEE Open Journal of Antennas and Propagation     Open Access   (Followers: 3)
IEEE Open Journal of Circuits and Systems     Open Access   (Followers: 3)
IEEE Open Journal of Intelligent Transportation Systems     Open Access   (Followers: 6)
IEEE Open Journal of Power Electronics     Open Access   (Followers: 3)
IEEE Open Journal of Signal Processing     Open Access   (Followers: 3)
IEEE Sensors Journal     Hybrid Journal   (Followers: 100)
IEEE Sensors Letters     Hybrid Journal   (Followers: 3)
IEEE Signal Processing Magazine     Full-text available via subscription   (Followers: 87)
IEEE Solid-State Circuits Letters     Hybrid Journal   (Followers: 3)
IEEE Transactions on Control of Network Systems     Hybrid Journal   (Followers: 27)
IEEE Transactions on Dielectrics and Electrical Insulation     Hybrid Journal   (Followers: 28)
IEEE Transactions on Green Communications and Networking     Hybrid Journal   (Followers: 3)
IEEE Transactions on Network Science and Engineering     Hybrid Journal   (Followers: 3)
IEEE Transactions on Quantum Engineering     Open Access   (Followers: 3)
IEEE Transactions on Radiation and Plasma Medical Sciences     Hybrid Journal   (Followers: 4)
IEEE Transactions on Signal and Information Processing over Networks     Hybrid Journal   (Followers: 13)
IEEE Transactions on Sustainable Energy     Hybrid Journal   (Followers: 18)
IEEJ Transactions on Electrical and Electronic Engineering     Hybrid Journal   (Followers: 19)
IET Control Theory & Applications     Hybrid Journal   (Followers: 26)
IET Electric Power Applications     Hybrid Journal   (Followers: 46)
IET Electrical Systems in Transportation     Hybrid Journal   (Followers: 11)
IET Energy Systems Integration     Open Access   (Followers: 1)
IET Nanodielectrics     Open Access  
IET Smart Grid     Open Access   (Followers: 1)
IETE Journal of Education     Open Access   (Followers: 4)
IJEIS (Indonesian Journal of Electronics and Instrumentation Systems)     Open Access   (Followers: 3)
InComTech : Jurnal Telekomunikasi dan Komputer     Open Access   (Followers: 1)
Indonesian Journal of Electrical Engineering and Computer Science     Open Access   (Followers: 18)
Industrial Technology Research Journal Phranakhon Rajabhat University     Open Access  
Ingeniería Electrónica, Automática y Comunicaciones     Open Access  
Integrated Ferroelectrics: An International Journal     Hybrid Journal  
International Journal of Advances in Telecommunications, Electrotechnics, Signals and Systems     Open Access   (Followers: 12)
International Journal of Electrical and Computer Engineering     Open Access   (Followers: 12)
International Journal of Electrical Engineering Education     Hybrid Journal   (Followers: 6)
International Journal of Electrical Power & Energy Systems     Open Access   (Followers: 33)
International Journal of Emerging Electric Power Systems     Hybrid Journal   (Followers: 7)
International Journal of Microwave Engineering and Technology     Full-text available via subscription   (Followers: 2)
International Journal of Monitoring and Surveillance Technologies Research     Full-text available via subscription   (Followers: 3)
International Journal of Nuclear Security     Open Access   (Followers: 1)
International Journal of Turbomachinery, Propulsion and Power     Open Access   (Followers: 10)
International Transaction of Electrical and Computer Engineers System     Open Access   (Followers: 2)
International Transactions on Electrical Energy Systems     Hybrid Journal   (Followers: 9)
Iranian Journal of Science and Technology, Transactions of Electrical Engineering     Hybrid Journal  
Izvestiya Vysshikh Uchebnykh Zavedenii. Materialy Elektronnoi Tekhniki : Materials of Electronics Engineering     Full-text available via subscription  
J3eA     Open Access   (Followers: 2)
JAREE (Journal on Advanced Research in Electrical Engineering)     Open Access  
Journal of Control, Automation and Electrical Systems     Hybrid Journal   (Followers: 10)
Journal of Electrical and Computer Engineering     Open Access   (Followers: 9)
Journal of Electrical and Computer Engineering Innovations     Open Access   (Followers: 4)
Journal of Electrical and Electronics Engineering Research     Open Access   (Followers: 38)
Journal of Electrical Bioimpedance     Open Access   (Followers: 2)
Journal of Electrical Engineering     Open Access   (Followers: 43)
Journal of Electrical Engineering & Electronic Technology     Hybrid Journal   (Followers: 7)
Journal of Electrical Engineering & Technology     Hybrid Journal  
Journal of Electrical Systems and Information Technology     Open Access   (Followers: 7)
Journal of Electrical, Electronics and Informatics     Open Access  
Journal of Field Robotics     Hybrid Journal   (Followers: 4)
Journal of International Council on Electrical Engineering     Open Access  
Journal of Micro-Bio Robotics     Hybrid Journal   (Followers: 1)
Journal of Microwaves, Optoelectronics and Electromagnetic Applications     Open Access   (Followers: 11)
Journal of Power Technologies     Open Access   (Followers: 7)
Journal of Science and Application Technology     Open Access  
Journal of the Society for Information Display     Hybrid Journal  
Journal of World's Electrical Engineering and Technology     Open Access   (Followers: 2)
JPhys Energy     Open Access  
JPhys Materials     Open Access  
Jurnal ELTIKOM : Jurnal Teknik Elektro, Teknologi Informasi dan Komputer     Open Access  
Jurnal Ilmiah Mahasiswa SPEKTRUM     Open Access  
Jurnal Nasional Teknik Elektro     Open Access   (Followers: 4)
Jurnal Rekayasa Elektrika     Open Access  
Jurnal Teknik Elektro     Open Access  
Jurnal Teknik Elektro dan Komputer     Open Access  
Jurnal Teknologi Elektro     Open Access  
Kinetik : Game Technology, Information System, Computer Network, Computing, Electronics, and Control     Open Access  
La Rivista del Nuovo Cimento     Hybrid Journal   (Followers: 2)
Majalah Ilmiah Teknologi Elektro : Journal of Electrical Technology     Open Access   (Followers: 2)
Majlesi Journal of Electrical Engineering     Open Access   (Followers: 1)
Material Design & Processing Communications     Hybrid Journal  
Micro and Nano Systems Letters     Open Access   (Followers: 6)
Nanotechnology Development     Open Access   (Followers: 19)
npj Materials Degradation     Open Access  
Open Electrical & Electronic Engineering Journal     Open Access  
Open Signal Processing Journal     Open Access   (Followers: 1)
Periodica Polytechnica Electrical Engineering and Computer Science     Open Access  
Presence : Teleoperators and Virtual Environments     Hybrid Journal   (Followers: 3)
Progress in Additive Manufacturing     Hybrid Journal   (Followers: 2)
Quantum Beam Science     Open Access   (Followers: 1)
Radio Science     Full-text available via subscription   (Followers: 44)
Recent Advances in Communications and Networking Technology     Hybrid Journal   (Followers: 3)
Recent Advances in Electrical & Electronic Engineering     Hybrid Journal   (Followers: 11)
Research & Reviews : Journal of Embedded System & Applications     Full-text available via subscription   (Followers: 6)
Russian Electrical Engineering     Hybrid Journal   (Followers: 5)
SAIEE Africa Research Journal     Open Access   (Followers: 1)
SID Symposium Digest of Technical Papers     Hybrid Journal  
Signal Processing     Hybrid Journal   (Followers: 8)
Signals     Open Access   (Followers: 1)
Simetris : Jurnal Teknik Mesin, Elektro dan Ilmu Komputer     Open Access  
Sustainable Energy, Grids and Networks     Hybrid Journal   (Followers: 6)
Synthesis Lectures on Electrical Engineering     Full-text available via subscription   (Followers: 2)
System analysis and applied information science     Open Access  
Telematique     Open Access  
The Scientific Bulletin of Electrical Engineering Faculty     Open Access  
Transactions of the International Society for Music Information Retrieval     Open Access  
Transactions on Electrical and Electronic Materials     Hybrid Journal   (Followers: 1)
Transactions on Environment and Electrical Engineering     Open Access  
Trends in Electrical Engineering     Full-text available via subscription   (Followers: 4)
Tri Dasa Mega : Jurnal Teknologi Reaktor Nuklir     Open Access  
Turkish Journal of Electrical Engineering and Computer Science     Open Access   (Followers: 2)
Universal Journal of Electrical and Electronic Engineering     Open Access   (Followers: 7)
Ural Radio Engineering Journal     Open Access   (Followers: 1)
Wireless Engineering and Technology     Open Access   (Followers: 5)
Електротехніка і Електромеханіка     Open Access   (Followers: 1)

           

Similar Journals
Journal Cover
Bulletin of Electrical Engineering and Informatics
Number of Followers: 10  

  This is an Open Access Journal Open Access journal
ISSN (Print) 2089-3191 - ISSN (Online) 2302-9285
Published by Universitas Ahmad Dahlan Homepage  [18 journals]
  • An improved age invariant face recognition using data augmentation

    • Authors: Kennedy Okokpujie; Samuel John, Charles Ndujiuba, Joke Badejo, Etinosa Noma-Osaghae
      Abstract: In spite of the significant advancement in face recognition expertise, accurately recognizing the face of the same individual across different ages still remains an open research question. Face aging causes intra-subject variations (such as geometric changes during childhood & adolescence, wrinkles and saggy skin in old age) which negatively affects the accuracy of face recognition systems. Over the years, researchers have devised different techniques to improve the accuracy of age invariant face recognition (AIFR) systems. In this paper, the face and gesture recognition network (FG-NET) aging dataset was adopted to enable the benchmarking of experimental results. The FG-Net dataset was augmented by adding four different types of noises at the preprocessing phase in order to improve the trait aging face features extraction and the training model used at the classification stages, thus addressing the problem of few available training aging for face recognition dataset. The developed model was an adaptation of a pre-trained convolution neural network architecture (Inception-ResNet-v2) which is a very robust noise. The proposed model on testing achieved a 99.94% recognition accuracy, a mean square error of 0.0158 and a mean absolute error of 0.0637. The results obtained are significant improvements in comparison with related works.
      PubDate: Mon, 01 Feb 2021 00:00:00 +000
       
  • Enhancing reliability of electricity supply of city electric networks
           cities of dushanbe

    • Authors: Alexander Ivanovich Sidorov; Saidjon Tavarov
      Abstract: A mathematical model is proposed to increase the reliability of power supply on the basis of reducing the technical cause of damage by the expressed relative probability of a flow of failure depending on power consumption. To test the adequacy of the proposed mathematical model, the data of daily winter and summer power consumption schedules are used to determine the dependence of the relative flow of failure from power consumption during peak hours.
      PubDate: Mon, 01 Feb 2021 00:00:00 +000
       
  • Design of 4-stage Marx Generator Using Gas Discharge Tube

    • Authors: Wijono Wijono; Zainul Abidin, Waru Djuriatno, Eka Maulana, Nola Ribath
      Abstract: In this paper, a marx generator voltage multiplier as an impulse generator made of multi stage resistors and capacitors to generate a high voltage is proposed. In order to generate a high voltage pulse, a number of capacitors are connected in parallel to charge up during on time and then in series to generate higher voltage during off period. In this research, a 6kV marx generator voltage multiplier is designed using Gas Discharge Tube (GDT) as an electronic switch to breakdown voltage. The marx generator circuit is designed to charge the storage capacitor for high impulse voltage and current generator applications. According to IEC  61000-4-5 class 4 standard, the storage capacitor must be charged up to 4 kV. The results show that the proposed marx generator can produce voltages up to 6.8 kV. However, the storage capacitor could be charged up to 1 kV, instead of 4 kV in the standard. That is because the output impulse voltage has narrow time period.
      PubDate: Mon, 01 Feb 2021 00:00:00 +000
       
  • A Novel Technique for Speech Encryption Based on K-Means Clustering and
           Quantum Chaotic Map

    • Authors: amal hameed khaleel; Iman Qays Abduljaleel
      Abstract: In information transmission such as speech information, higher security and confidentiality are specially required. Therefore, data encryption is a pre-requisite for a secure communication system to protect such information from unauthorized access. A new algorithm for speech encryption is introduced in this paper. It depends on the quantum chaotic map and K-means clustering, which are employed in keys generation. Also, two stages of scrambling were used: the first relied on bits using the proposed algorithm (Binary Representation Scrambling BiRS) and the second relied on K-means using the proposed algorithm (Block Representation Scrambling BlRS). The objective test used statistical analysis measures (Signal-to-Noise-Ratio, Segmental Signal-to-Noise-Ratio, Frequency-Weighted Signal-to-Noise Ratio, Correlation Coefficient, Log-Likelihood Ratio) applied to evaluate the proposed system. Via Matlab simulations, it is shown that the proposed technique is secure, reliable and efficient to be implemented in secure speech communication, as well as also being characterized by high clarity of the recovered speech signal.

      PubDate: Mon, 01 Feb 2021 00:00:00 +000
       
  • 3D reconstruction using convolution smooth method

    • Authors: Sofyan Arifianto; Hardianto Wibowo, Wildan Suharso, Raditya Novidianto, Agus Eko Minarno, Dani Harmanto
      Abstract: 3D image is something image with depth data or often also called with depth. use of 3D depth sensors in 3D cameras still many have a weakness, especially on results The resulting image. Raw data generated by camera intel realsense these still not yet seen Nice. In research, this will used method Convolution smooth for do repair 3D image. Noise in the image could be removed and smoothed, but this smooth operation have effect equalization level gray, so images obtained look more run away contrast. Effect blurring this called blurring effect. Conclusion of the research is the method can be applied on 3D image, but not perfect. There are many problems can fix it for the next research, one of is the predicted for the motive from the object tested, so we can get be perfect for the result.
      PubDate: Mon, 01 Feb 2021 00:00:00 +000
       
  • A Study on Edge Preserving Filter in Image Matching

    • Authors: Rostam Affendi Hamzah; A.F. Kadmin, S. F. A. Gani, K. A. Aziz, T. M. F. T. Wook, N. Mohamood, M. G. Y. Wei
      Abstract: This article presents a study on edge preserving filter in image matching. This study comprises a novel development of stereo matching algorithm using edge preserving filter in the algorithm framework. Fundamentally, the matching process consist of several stages which will produce the disparity or depth map. The clear problem and the most challenging problem for matching process is to get an accurate corresponding point between two images. Hence, this article proposes an algorithm for stereo matching using Sum of Squared Differences (SSD) and dual edge preserving filters. It is Median Filter (MF) and Bilateral Filter (BF) to surge up the accuracy. The SSD will be implemented at the first stage to get the preliminary corresponding result, then the BF works as an edge-preserving filter to remove the noise from the first stage. The MF is used at the last stage to improve final disparity map. A standard benchmarking dataset from the Middlebury has been used for the experimental analysis and validation. The proposed work in this article achieves good accuracy about 6.65% and 9.32% of nonocc and all errors respectively. The comparison is also conducted with some established methods where the proposed framework performs much better.
      PubDate: Mon, 01 Feb 2021 00:00:00 +000
       
  • BPF comparison of hairpin line and square open-loop resonator method

    • Authors: Yuyun Siti Rohmah; Budi Prasetya, Dwi Andi Nurmantris, Sarah Mulyawati, Reza Dipayana
      Abstract: This paper presents the comparison of two methods of bandpass filter (BPF) design using hairpin-line and square open loop resonator. Both methods were applied to obtain filter designs that can work at television broadcasting system. Bandpass filter was simulated using design software and fabricated using epoxy FR-4 substrate. The results of simulation and measurement showed return loss value at 27.3 dB for hairpin line BPF and 25.901 for square open loop resonator BPF. Meanwhile, VSWR parameter values were 1.09 and 1.1067 for hairpin line and square open loop BPF respectively. The insertion loss values for the Hairpin line BPF and square open loop BPF were 6.9 and 5.9511 dB, respectively. Fractional bandwidth (FBW), for hairpin line BPF was 6.7% while for square open loop BPF was 4.8%. Regarding the size, the dimension of square open loop resonator was approximately three times larger than that of hairpin-line band pass filter.
      PubDate: Mon, 01 Feb 2021 00:00:00 +000
       
  • Effect of the Defected Microstrip Structure Shapes on the Performance of
           Dual-band bandpass Filter for Wireless Communications

    • Authors: Mussa Mabrok; Zahriladha Zakaria, Yully Masrukin, Tole Sutikno, Hussein Alsariera
      Abstract: Due to the progression growth of multiservice wireless communication systems in a single device, multiband bandpass filter has attract a great attention to the end user. Therefore, multiband bandpass filter is a crucial component in the multiband transceivers systems which can support multiple services in one device. This paper presents a design of dual-band bandpass filter at 2.4 GHz and 3.5 GHz for WLAN and WiMAX applications. Firstly, the wideband bandpass filter is designed at a center frequency of 3 GHz based on quarter-wavelength short circuited stub. Three types of defected microstrip structure (DMS) are implemented to produce a wide notch band, which are T-inversed shape, C-shape, and U- Shape. Based on the performance comparisons, U-shaped DMS is selected to be integrated with the bandpass filter. The designed filter achieved two passbands centered at 2.51 GHz and 3.59 GHz with 3 dB bandwidth of 15.94 % and 15.86 %. The proposed design is very useful for wireless communication systems and its applications such as WLAN and WiMAX.
      PubDate: Mon, 01 Feb 2021 00:00:00 +000
       
  • Bangla Handwritten Character Recognition using MobileNet v1 Architecture

    • Authors: Tapotosh Ghosh; Min-Ha-Zul Abedin, Shayer Mahmud Chowdhury, Zarin Tasnim, Tajbia Karim, S M Salim Reza, Sabrina Saika, Dilshad Ara Hossain
      Abstract: Handwritten Character Recognition is a very tough task in case of complex shaped alphabet set like Bangla script. As OCR has a huge application in mobile devices, model needs to be suitable for mobile applications. Many researches have been performed in this arena but none of them achieved satisfactory accuracy or could not detect more than 200 characters. MobileNet is a state of art CNN architecture which is designed for mobile devices as it requires less computing power. In this paper, we used MobileNet for handwritten character recognition. It has achieved 96.46% accuracy in recognizing 231 classes (171 compound, 50 basic & 10 numerals), 96.17% accuracy in 171 compound character classes, 98.37% accuracy in 50 basic character classes and 99.56% accuracy in 10 numeral character classes.
      PubDate: Mon, 01 Feb 2021 00:00:00 +000
       
  • Towards An Objective Comparison of Feature Extraction Techniques for
           Automatic Speaker Recognition Systems

    • Authors: Ayoub BOUZIANE; Jamal KHARROUBI, Arsalane ZARGHILI
      Abstract: A common limitation of the previous comparative studies on speaker-features extraction techniques lies in the fact that the comparison is done independently of the used speaker modeling technique and its parameters. The aim of the present paper is twofold. Firstly, it aims to review the most significant advancements in feature extraction techniques used for automatic speaker recognition. Secondly, it seeks to evaluate and compare the currently dominant ones using an objective comparison methodology that overcome the limitation of the previous studies.
      PubDate: Mon, 01 Feb 2021 00:00:00 +000
       
  • Reconfiguration Layers of Convolutional Neural Network for Fundus Patches
           Classification

    • Authors: Wahyudi Setiawan; Moh. Imam Utoyo, Riries Rulaningtyas
      Abstract: Convolutional Neural Network (CNN) is a method of supervised deep learning. The architectures including AlexNet, VGG16, VGG19, ResNet 50, ResNet101, GoogleNet, Inception-V3, Inception ResNet-V2, and Squeezenet that have 25 to 825 layers. This study aims to simplify layers of CNN architectures and an increased accuracy for fundus patches classification. Fundus patches classify two categories: normal and neovascularization. Data used for classification is MESSIDOR and Retina Image Bank that have 2,080 patches. Results show the best accuracy of 93.17% for original data and 99,33% for augmentation data using CNN 31 layers. It consists input layer, 7 convolutional layers, 7 batch normalization, 7 Rectified Linear Unit, 6 max-pooling, fully connected layer, softmax, and output layer.
      PubDate: Mon, 01 Feb 2021 00:00:00 +000
       
  • An Efficient Apriori algorithm for Frequent Pattern Mining using MapReduce
           in Healthcare Data

    • Authors: Seifedine Kadry
      Abstract: The development for data mining technology in healthcare is growing today as knowledge and data mining are a must for the medical sector. Healthcare organizations generate and gather large quantities of daily information. Use of IT allows for the automation of data mining and information that help to provide some interesting patterns which remove manual tasks and simple data extraction from electronic records, a process of electronic data transfer which secures medical records, saves lives and cuts the cost of medical care and enables early detection of infectious diseases. In this research paper an improved Apriori algorithm names Enhanced Parallel and Distributed Apriori (EPDA) is presented for the health care industry, based on the scalable environment known as Hadoop MapReduce. The main aim of the work proposed is to reduce the huge demands for resources and to reduce overhead communication when frequent data are extracted, through split-frequent data generated locally and the early removal of unusual data. The paper shows test results, whereby the EPDA performs in terms of the time and number of rules generated with a database of healthcare and different minimum support values.
      PubDate: Mon, 01 Feb 2021 00:00:00 +000
       
  • Selection of Optimal Hyperparameter Values of Support Vector Machine for
           Sentiment Analysis Tasks Using Nature-Inspired Optimisation Methods

    • Authors: Seifedine Kadry
      Abstract: Sentiment analysis and classification task is used in recommender systems to analyse movie reviews, tweets, Facebook posts, online product reviews, blogs, discussion forums, and online comments in social networks. Usually, the classification is performed using supervised machine learning methods such as Support Vector Machine (SVM) classifier, which have many distinct parameters. The selection of the values for these parameters can greatly influence the classification accuracy and can be addressed as an optimisation problem. Here we analyze the use of three heuristic, nature-inspired optimization techniques, Cuckoo Search Optimisation (CSO), Ant Lion Optimisation (ALO), and Polar Bear Optimisation (PBO), for parameter tuning of SVM models using various kernel functions. We validate our approach for the sentiment classification task of Twitter dataset. The results are compared using classification accuracy metric and the Nemenyi test.
      PubDate: Mon, 01 Feb 2021 00:00:00 +000
       
  • Radio Frequency Peak and Average Power Density from Cellular Mobile Base
           Stations in Ekiti State, Nigeria

    • Authors: Ilesanmi Oluwafemi; Deji Faluru, Dunni FemiJemilohun, Tayo Dorcas Obasanya
      Abstract: In this paper, peak and average power density of radio frequency radiation from selected mobile stations in rural, subrural and urban area of Ekiti State, Nigeria is investigated. Investigation was conducted with four available mobile operators with the three sub frequency band via 900, 1800 and 2100 MHz. the power density of radio frequencyradiation was estimatedthrough measurementwith the aid of A 3-axis RF radiationstrength meter TM-196, used to measure the detailed RF power density.values in microW/m2 and mW/m2. and handheld spectrum analyzer model NA-773,144/430 MHz in fill mode was used to measure the spectrum, the x axisof the spctran scanrepresent the radiation strength in dBm.Measurements of the radiation were performed at the intervalof 5m up to 250 m from the base station.The peak and average power densitywas computed using the methos of theorectical calculation. the safety distance from the antenna were also estimated. The measured and calculated values were comparedwith the international commission onnon-ionizing radiation protection standardfor public and occupational expoure level. Results shows that the radiations from the base staion are below the recommended exposure level
      PubDate: Mon, 01 Feb 2021 00:00:00 +000
       
  • A Fuzzy Multi-Criteria Decision-Making method for Purchasing Life
           Insurance in India

    • Authors: Vicente Garcia Diaz
      Abstract: Life insurance is an agreement between an insured and an insurer, where the insurer pays out a sum of money either on a certain period of time or the death of the insured. Online term policies are attractive Life insurance plans in India. It provides the online platform for purchasing an insurance policy, where customer can buy policy directly without help of the agents. In this study 12 companies are being considered. The theory of insurance can be expressed as “the good fortune of the many" compensates for “the misfortune of the few". So, insurance companies prepare themselves to take this burden on their shoulders in exchange of an assessed payment. Selecting the best insurance company for purchasing an online term plan is a very complex problem. A questionnaire was provided to get expert opinion on online term plans on different companies. This paper contains a fuzzy Multi Criterion Decision-Making approach, Technique for Order Preference by Similarity to Ideal Solution is applied to rank the different insurance companies based on online term plans.
      PubDate: Mon, 01 Feb 2021 00:00:00 +000
       
  • Single event latch-up (SEL) detection for nano-satellite external solar
           radiation mitigation system

    • Authors: Norsuzila Yaa’cob; Muhammad Fauzan Ayob, Noraisyah Tajudin, Murizah Kassim, Azita Laily Yusof
      Abstract: This paper presents the Single Event Latch-up (SEL) Detection for Nano-Satellite External Solar Radiation Mitigation System. In this study, the SEL detection analysis was conducted using circuit test and simulation. An Electrical Power Subsystem (EPS) is a part of all CubeSat bus subsystems and it comprises solar arrays, rechargeable batteries, and a Power Control and Distribution Unit (PCDU).In order to extract the maximum power generated by the solar arrays, a peak power tracking topology is required. This may lead to the Single Event Latch-up (SEL) with the presence of high voltage produced by solar.To overcome the SEL problems, the circuit test and simulation must be done so that the flow of SEL will be easily detected and mitigate. The method that been used are by using microcontroller, the SEL will be created in the certain time. The programable integrated circuit (PIC) are used to mitigate SEL effect. It indicates that, the SEL occur very fast in certain time. When the simulation is conducted by using SPENVIS, the result shows, only Single Event Upset (SEU) was affected on UiTMSAT-1.
      PubDate: Mon, 01 Feb 2021 00:00:00 +000
       
  • An optimal placement of phasor measurement unit using new sensitivity
           indices

    • Authors: K. Khalid; Ahmad Asrul Ibrahim, N. A. M. Kamari, M. H. M. Zaman
      Abstract: This paper presents an alternative approach to solve an optimal phasor measurement unit (PMU) placement by introducing two new sensitivity indices. The indices are constructed from the information measured from PMUs such as voltage magnitude and angle. These two parameters are essential for power system stability assessment and control. Therefore, fault analysis is carried out to obtain the voltage magnitude and angle deviations at all buses in order to construct the indices. An exhaustive search method is used to solve the linear integer programming problem where all possible combinations of PMU placement are evaluated to obtain the optimal solution. Unfortunately, the traditional objective function to minimize the total number of PMU placement leads to multiple solutions. The indices can be used to assess multiple solutions of PMU placement from the exhaustive method. In this work, an optimal solution is selected based on the performance of PMU placement in according to the indices. The proposed method is tested on the IEEE 14 bus test system. Only four PMUs are required to monitor the whole test system. However, the number of PMUs can be reduced to three PMUs after applying zero injection bus elimination.
      PubDate: Mon, 01 Feb 2021 00:00:00 +000
       
  • Data-based PID control of flexible joint robot using adaptive safe
           experimentation dynamics algorithm

    • Authors: Mohd Ashraf Ahmad; Haszuraidah Ishak, Ahmad Nor Kasruddin Nasir, Normaniha Abd Ghani
      Abstract: This paper proposes the data-based PID controller of flexible joint robot based on Adaptive Safe Experimentation Dynamics (ASED) algorithm. The ASED algorithm is an enhanced version of SED algorithm where the updated tuning variable is modified to adapt to the change of the objective function. By adopting the adaptive term to the updated equation of SED, it is expected that the convergence accuracy can be further improved. The effectiveness of the ASED algorithm is verified to tune the PID controller of flexible joint robot. In this flexible joint control problem, two PID controllers are utilized to control both rotary angle tracking and vibration of flexible joint robot. The performance of the proposed data-based PID controller is assessed in terms of trajectory tracking of angular motion, vibration reduction and statistical analysis of the pre-defined control objective function. The simulation results showed that the data-based PID controller based on ASED is able to produce better control accuracy than the conventional SED based method.
      PubDate: Mon, 01 Feb 2021 00:00:00 +000
       
  • Integrating D2D network with IoHT : toward minimum power allocation

    • Authors: Mahmoud Shuker Mahmoud; Dalal Abdulmohsin Hammood, Ahmed Alkhayyat
      Abstract: One of the important technologies of the 5G is the device to device (D2D) network, where mobile device will communication together either over direct transmission or over multihop transmission without need for the base-station. And it is quite possible that D2D users overlap with human body network. For this reason, we proposed an internet of health things (IoHT) design that make cooperation possible between D2D users and human body sensors. Because we can consider the energy as the rarest provider in the Wireless Body Area Network (WBAN). Finding optimal and minimum required transmission power that can achieve a certain level of utility while utilizing as little power for transmission as possible plays an important role in reducing energy consumption. In this paper, we found the required transmission power of four transmission modes: the direct transmission mode, the dual-hop transmission mode, and two incremental cooperative transmission modes with Rayleigh channel fading in proposed IoHT design. In addition, we propose a power-efficient algorithm that we have termed efficient-power transmission mode selection-based (EPTMS) algorithm. The proposed algorithm is select appropriate transmission mode that it provides a minimum required transmission power which ensures a certain transmission rate. The numerical and simulation results exhibit that, when compared with the two master node cooperative protocol (TMNCP), EPTMS can improve network performance under general circumstances.
      PubDate: Mon, 01 Feb 2021 00:00:00 +000
       
  • An enhanced fireworks algorithm to generate prime key for multiple users
           in fingerprinting domain

    • Authors: Hussein Ali Ismael; Jamal Mustafa Abbas, Salama A. Mostafa, Ali Hussein Fadel
      Abstract: This work presents a new method to enhance the performance of fireworks algorithm to generate a prime key for multiple users. A threshold technique in image segmentation is used as one of the major steps.It is used processing the digital image.Some useful algorithms and methods for dividing and sharing an image, including measuring, recognizing, and recognizing, are common. In this research, we proposed a hybrid technique of Fireworks and Camel Herd algorithms (HFCA), where Fireworks are based on 3-Dimension (3D) logistic chaotic maps. Both, the Otsu method and the convolution technique are used in the pre-processing image for further analysis. The Otsu is employed to segment the image and find the threshold for each image, and convolution is used to extract the features of the used images. The sample of the images consists of two images of fingerprints taken from the Biometric System Lab (University of Bologna). The performance of the anticipated method is evaluated by using FVC2004 dataset. The results of the work enhanced algorithm, so Quick Response code (QRcode) is used to generate a stream key by using random text or number, which is a class of symmetric-key algorithm that operates on individual bits or bytes.
      PubDate: Mon, 01 Feb 2021 00:00:00 +000
       
  • Deblurring of noisy iris images in iris recognition

    • Authors: Shahrizan Jamaludin; Nasharuddin Zainal, W Mimi Diyana W Zaki
      Abstract: Iris recognition used the iris features to verify and identify the identity of human. The iris has many advantages such as stability over time, easy to use and high recognition accuracy. However, the poor quality of iris images can degrade the recognition accuracy of iris recognition system. The recognition accuracy of this system is depended on the iris pattern quality captured during the iris acquisition. The iris pattern quality can degrade due to the blurry image. Blurry image happened due to the movement during image acquisition and poor camera resolution. Due to that, a deblurring method based on the Wiener filter was proposed to improve the quality of iris pattern. This work is significant since the proposed method can enhance the quality of iris pattern in the blurry image. Based to the results, the proposed method improved the quality of iris pattern in the blurry image. Moreover, it recorded the fastest execution time to improve the quality of iris pattern compared to the other methods.
      PubDate: Mon, 01 Feb 2021 00:00:00 +000
       
  • Statistical survey and comprehensive review on human skin detection

    • Authors: Hussein Ali Hussein Al Naffakh; Rozaida Ghazali, Nidhal Khdhair El Abbadi
      Abstract: With the advancement of data society today, pictures have turned out to be increasingly imperative. Automatic detection of human skin has been an area of active research for the past few years. Human skin detection assumes a vital job in a wide scope of picture preparing applications going from face detection, steganography, face tracking, age detection, discover pornographic images, the discovery of skin diseases gesture analysis and substance based picture recovery frameworks and to different human PC association spaces. Detecting human skin in complex pictures have ended up being a difficult issue since skin shading can fluctuate drastically in its appearance because of numerous variables, for example, illumination, race, maturing, imaging conditions, and complex foundation. In this study, we will study and analyze skin researches, where we will treat the weakness of previous research of survey on human skin detection methods. The reason for this investigation is to give a state-of-the-art study on human skin molding and detection methods in 1998-2019 periods. Furthermore, this research presented the statistical study for each issue stated before. we finish up with a few ramifications for a future course. Study results will benefit all researchers who are interested in human skin detection topic.
      PubDate: Mon, 01 Feb 2021 00:00:00 +000
       
  • A review of human skin detection applications based on image processing

    • Authors: Hussein Ali Hussein Al Naffakh; Rozaida Ghazali, Nidhal Khdhair El Abbadi
      Abstract: In computer science, virtual image processing is the use of a digital computer to manipulate digital images through an algorithm for many applications. To begin with a new research topic, the must trend application that gets many requests to develop should know. Therefore, many applications based on human skin and human life are reviewed in this article, such as detection, classification, blocking, cryptography, identification, localization, steganography, segmentation, tracking, and recognition. In this article, the published articles with the topic of human skin-based image processing are investigated. The international publishers, such as Springer, IEEE, arXiv, and Elsevier are selected. The searching is implemented with the duration criteria of 2015-2019. It noted that human skin detection and recognition are the most repetitive articles with 43% and 28.5%, respectively of the total number of the investigated articles. The usage of human skin models is being widely used in the image processing of various applications.
      PubDate: Mon, 01 Feb 2021 00:00:00 +000
       
  • Analyzing bit error rate of relay sensors selection in wireless
           cooperative communication systems

    • Authors: Ahmed Allawy Alawady; Ahmed Alkhayyat, Mohammed Ahmed Jubair, Mustafa Hamid Hassan, Salama A. Mostafa
      Abstract: Cooperative communication systems, which make use of the intermediate relays between the transmitter and the receiver, have been employed as an effective technique to combat the channel fading and to enhance system performance. Cooperative systems have some drawbacks such as high latency and may diversity order not guaranteed. To alleviate the negative effects of these factors, the relay selection protocol is employed in cooperative communication systems to increase overall cooperative system performance. Relay selection in the cooperative systems enables the source to cooperate with the single relay node rather than multiple relay nodes which guaranteed the diversity order.
      PubDate: Mon, 01 Feb 2021 00:00:00 +000
       
  • Physical activity prediction using fitness data: Challenges and issues

    • Authors: Nur Zarna Elya Binti Zakariya; Marshima Mohd Rosli
      Abstract: In the new healthcare transformations, individuals are encourage to maintain healthy life based on their food diet and physical activity routine to avoid risk of serious disease. One of the recent healthcare technologies to support self health monitoring is wearable device that allow individual play active role on their own healthcare. However, there is still questions in terms of the accuracy of wearable data for recommending physical activity due to enormous fitness data generated by wearable devices. In this study, we conducted a literature review on machine learning techniques to predict suitable physical activities based on personal context and fitness data. We categorize and structure the research evidence that has been publish in the area of machine learning techniques for predicting physical activities using fitness data. We found 10 different models in Behavior Change Technique (BCT) and we selected two suitable models which are Fogg Behavior Model (FBM) and Trans-theoretical Behavior Model (TTM) for predicting physical activity using fitness data. We proposed a conceptual framework which consists of personal fitness data, combination of TTM and FBM to predict the suitable physical activity based on personal context. This study will provide new insights in software development of healthcare technologies to support personalization of individuals in managing their own health.
      PubDate: Mon, 01 Feb 2021 00:00:00 +000
       
  • Multischeme feedforward artificial neural network architecture for DDoS
           attack detection

    • Authors: Arif Wirawan Muhammad; Cik Feresa Mohd Foozy, Kamaruddin Malik
      Abstract: Distributed denial of service attack classified as a structured attack to deplete server, sourced from various bot computers to form a massive data flow. Distributed denial of service (DDoS) data flows behave as regular data packet flows, so it is challenging to distinguish between the two. Data packet classification to detect DDoS attacks is one solution to prevent DDoS attacks and to maintain server resources maintained. The machine learning method especially artificial neural network (ANN), is one of the effective ways to detect the flow of data packets in a computer network. Based on the research that has carried out, it concluded that ANN with hidden layer architecture that contains neuron twice as neuron on the input layer (2n) produces a stable detection accuracy value on Quasi-Newton, Scaled-Conjugate and Resilient-Propagation training functions. Based on the studies conducted, it concluded that ANN Architecture sufficiently affected the Scaled-Conjugate and Resilient-Propagation training functions, otherwise the Quasi-Newton training function. The best detection accuracy achieved from the experiment is 99.60%, 1.000 recall, 0.988 precision, and 0.993 f-measure using the Quasi-Newton training function with 6-(12)-2 neural network architecture.
      PubDate: Mon, 01 Feb 2021 00:00:00 +000
       
  • Research trends review on RSA scheme of asymmetric cryptography techniques

    • Authors: Mohd Saiful Adli Mohamad; Roshidi Din, Jasmin Ilyani Ahmad
      Abstract: One of the cryptography classifications is asymmetric cryptography, which uses two different keys to encrypt and decrypt the message. This paper discusses a review of RSA scheme of asymmetric cryptography techniques. It is trying to present the domains of RSA scheme used including in public network, wireless sensor network, image encryption, cloud computing, proxy signature, Internet of Things and embedded device, based on the perspective of researchers’ effort in the last decade. Other than that, this paper reviewed the trends and the performance metrics of RSA scheme such as security, speed, efficiency, computational complexity and space based on the number of researches done. Finally, the technique and strengths of the proposed scheme are also stated in this paper.
      PubDate: Mon, 01 Feb 2021 00:00:00 +000
       
  • “Scrumbear” framework for solving traditional scrum model
           problems

    • Authors: Leanah Alsaber; Ebtesam Al Elsheikh, Sarah Aljumah, Nor Shahida Mohd Jamail
      Abstract: Software engineering is a discipline that is little understood by people. It defines how software is developed and maintained to meet the clients’ requirements. Software engineers follow certain systems and standards in their work to meet the clients’ desires. It is on this background that engineers follow specific models in coming up with the final product. One of the models highly used is scrum, which is one of the agile methodologies. However, despite being highly used, it has inherent flaws that need to be corrected. Those flaws are product owner continues changing; do not accept changes in working scrum, sprint’s release time limitation, finally wasting team time within each sprint. This paper presents a new framework, which is an updated version of the current Scrum, to overcome the scum models mentioned issues. In this study, a new framework is presented in a way that is understandable and needed by software developer’s team upon the collected qualitative and quantitative data. The implementation was by making some changes to the current scrum model leading to the “Scrumbear”, certain flaws can be corrected. One of the presented changes involve adding the control master rule to ensure controlling the requirements changing
      PubDate: Mon, 01 Feb 2021 00:00:00 +000
       
  • Optimal tuning of a wind plant energy production based on improved grey
           wolf optimizer

    • Authors: Mohd Zaidi Mohd Tumari; Mohd Muzaffar Zahar, Mohd Ashraf Ahmad
      Abstract: The tuning of optimal controller parameters in wind plant is crucial in order to minimize the effect of wake interaction between turbines. The purpose of this paperis to develop anImprovedGrey Wolf Optimizer (I-GWO) in order to tune the controller parameters of the turbines so that the total energy production of a wind plant is increased. The updating mechanism of original GWO is modified to improve the efficiency of exploration and exploitation phase while avoiding trapping in local minima solution. A row of ten turbines is considered to evaluate the effectiveness of the I-GWO by maximizing the total energy production. The proposed approach is compared with original GWO and previously published modified GWO. Finally, I-GWO produces the highest total energy production as compared to other methods, as shown in statistical performance analysis.
      PubDate: Mon, 01 Feb 2021 00:00:00 +000
       
  • Mobile ad-hoc network routing protocols of time-critical events for search
           and rescue missions

    • Authors: Marwan Hamid Hassan; Salama A. Mostafa, Hairulnizam Mahdin, Aida Mustapha, Azizul Azhar Ramli, Mustafa Hamid Hassan, Mohammed Ahmed Jubair
      Abstract: The most important experiences we discovered from several disasters are that cellular networks were vulnerable, and the loss of the communication system may have a catastrophic consequence. Mobile Ad-hoc Networks (MANETs) play a significant role in the construction of campus, resident, battlefield and search/rescue region. MANET is an appropriate network for supporting a communication where is no permanent infrastructure. MANET is an effective network that uses to establishing urgent communication between rescue members in critical situations like, disaster or natural calamities. The sending and receiving data in MANET is depending on the routing protocols to adapt the dynamic topology and maintain the routing information. Consequently, This paper evaluates the performance of three routing protocols in MANET: Ad-hoc On-demand Distance Vector (AODV), Destination Sequenced Distance Vector (DSDV), and Ad-hoc On-demand Multipath Distance Vector (AOMDV). These protocols are inherent from different types of routing protocols: single-path, multi-path, reactive and proactive mechanisms. The NS2 simulator is utilized to evaluate the quality of these protocols. Several metrics are used to assess the performance of these protocols such: Packet Delivery Ratio (PDR), Packet Loss Ratios (PLR), Throughput (TP), and End-to-End delay (E2E delay). The outcomes reveal the AOMDV is the most suitable protocol for time-critical events of search and rescue missions.
      PubDate: Mon, 01 Feb 2021 00:00:00 +000
       
  • Cyclic voltammetry readout circuitry for DNA biosensor application

    • Authors: I. H. Hamzah; A. A. Malik, A. F. A. Rahim, Z. H. C. Soh
      Abstract: Cyclic voltammetry electrochemical biosensors reported a wide usage and applications for its fast response, able to be miniaturized and its sensitivity. However, the bulky, expensive and laboratory-based readout circuitry made it impossible to be used in the field-based environment. A miniaturized and portable readout circuitry for the DNA detection using hybridization technique had been design and developed in this work. It embedded with fabricated FR4 based sensor and produced respective current when the applied voltage was within the range of 0V to 0.5V. The readout circuitry had been verified with five analysis environment; Bare Au with Distilled Water (dH2O), Bare Au with Ferricyanide Reagent Solution, DNA Immobilization, DNA Non-Hybridization and DNA Hybridization. All the results performed produced peak cathodic current when the applied input voltage were within 0.5V to 3V and hence proved that the miniaturized and portable readout circuitry is suitable to be implemented for cyclic voltammetry electrochemical biosensor.
      PubDate: Mon, 01 Feb 2021 00:00:00 +000
       
  • Integration of LED-based lighting in academic buildings for energy
           efficiency considerations

    • Authors: Mohamad Zhafran Hussin; Saiful Firdaus Abdul Shukor, Nor Diyana Md Sin, Yusrina Yusof, Muhammad Zairil Muhammad Nor, Noor Hasliza Abdul Rahman
      Abstract: This paper presents an assessment by integration of LED T8 tube lamps in academic buildings for energy efficiency considerations. The proposed project was implemented in conjunction with a national mission, National Energy Efficiency Action Plan (NEEAP) for 10-year implementation period of 2016-2025 in reducing allocation on subsidies for efficient expenditure towards energy-saving measures. A case of study in a real environment at one of the UiTM’s buildings as a target task area has been tested by replacing a LED lighting technologyin consideration of current operating costs and power factor performances. From the results, LED T8 tubes have shown a better power factor of 0.89compared to fluorescent lamps with about 0.61 and primarily driven by economic benefits in terms of cost savings of up to 50% with return-on-investment (ROI) 6 months after installation. By integrating this technology, nearly 50% of the total energy consumption in indoor lighting system could be significantly saved, thus reducing the total cost of electricity bills in the future within the target area.
      PubDate: Mon, 01 Feb 2021 00:00:00 +000
       
  • Visualizing stemming techniques on online news articles text analytics

    • Authors: Nurul Atiqah Razmi; Muhammad Zharif Zamri, Sharifah Syafiera Syed Ghazalli, Noraini Seman
      Abstract: Stemming is the process to convert words into their root words by the stemming algorithm. It is one of the main processes in text analytics where the text data needs to go through stemming process before proceeding to further analysis. Text analytics is a very common practice nowadays that is practiced toanalyze contents of text data from various sources such as the mass media and media social. In this study, two different stemming techniques; Porter and Lancaster are evaluated.  The differences in the outputs that are resulted from the different stemming techniques are discussed based on the stemming error and the resulted visualization. The finding from this study shows that Porter stemming performs better than Lancaster stemming, by 43%, based on the stemming error produced. Visualization can still be accommodated by the stemmed text data but some understanding of the background on the text data is needed by the tool users to ensure that correct interpretation can be made on the visualization outputs.
      PubDate: Mon, 01 Feb 2021 00:00:00 +000
       
  • Review on feature-based method performance in text steganography

    • Authors: Mohd Hilal Muhammad; Hanizan Shaker Hussain, Roshidi Din, Hafiza Samad, Sunariya Utama
      Abstract: The implementation of steganography in text domain is one the crutial issue that can hide an essential message to avoid the intruder. It is caused every personal information mostly in medium of text, and the steganography itself is expectedly as the solution to protect the information that is able to hide the hidden message that is unrecognized by human or machine vision. This paper concerns about one of the categories in steganography on medium of text called text steganography that specifically focus on feature-based method. This paper reviews some of previous research effort in last decade to discover the performance of technique in the development the feature-based on text steganography method. Then, ths paper also concern to discover some related performance that influences the technique and several issues in the development the feature-based on text steganography method.
      PubDate: Mon, 01 Feb 2021 00:00:00 +000
       
  • Analyzing the impact of the number of nodes on the performance of the
           routing protocols in MANET environment

    • Authors: Hussein M. Haglan; Salama A. Mostafa, Noor Zuraidin Mohd Safar, Aida Mustapha, Mohd. Zainuri Saringatb, Hosam Alhakami, Wajdi Alhakami
      Abstract: Mobile Ad-hoc Networks (MANETs) are independent systems that can work without the requirement for unified controls, pre-setup to the paths/routes or advance communication structures. The nodes/hubs of a MANET are independently controlled, which permit them to behave unreservedly in a randomized way inside the MANET. The hubs can leave their MANET and join different MANETs whenever the need arises. These attributes, in any case, may contrarily influence the performance of the routing conventions (or protocols) and the general topology of the systems. Along these lines, MANETs include uniquely planned routing conventions that responsively as well as proactively carry out the routing. This paper assesses and looks at the effectiveness (or performance) of five directing conventions which are AOMDV, DSDV, AODV, DSR and OLSR in a MANET domain. The research incorporates executing a simulating environment to look at the operation of the routing conventions dependent on the variable number of hubs. Three evaluation indices are utilized: Throughput (TH), Packet Delivery Ratio (PDR), and End-to-End delay (E2E). The assessment outcomes indicate that the AODV beats other conventions in the majority of the simulated scenarios.
      PubDate: Mon, 01 Feb 2021 00:00:00 +000
       
  • Statistical analysis of air-conditioning and total load diversity in
           typical residential buildings

    • Authors: Naja Aqilah Hisham; Sheikh Ahmad Zaki, Aya Hagishima, Fitri Yakub, Hafizah Farhah Saipan Saipol
      Abstract: This research investigated the electricity consumption behaviour of Malaysian occupants in residential buildings by acquiring the electricity usage pattern specifically of air-conditioning (AC) load which consumes more energy and significantly affects the load curve. This paper explored the AC household operation and total load operation characteristics in 20 dwellings located in Kuala Lumpur and Selangor. The main outcomes were as follows :1) 10 selected dwellings obtained 0.9 ratio of daily AC usage and 5 dwellings operated the AC for five to six hours daily; 2) The AC usage accounted for 41% at night time and only 17% during day time from the total energy consumption; 3)  The AC load for one dwelling showed a high frequency and strong fluctuations with time; 4) The AC usage showed a positive correlation to outdoor temperature for which the highest and lowest correlation coefficients were 0.52 and -0.10 respectively; 5) The linear correlation between the  AC usage time and the daily AC energy consumption proved the dependency of AC energy consumption on the usage time; 6) Clustering process revealed uncommon behaviour whereby high AC energy consumption was recorded at low outdoor temperature. The findings obtained are useful for residential energy simulations in forecasting realistic AC loads, particularly in hot and humid climate such as in Malaysia.
      PubDate: Mon, 01 Feb 2021 00:00:00 +000
       
  • Behavioral studies of surge protection components

    • Authors: Teik Hua Kuan; Kuew Wai Chew, Kein Huat Chua
      Abstract: In our daily life, almost all the items we used, being a computer, television, cooking apparatus, lift or vehicle we drive consist of some kind of electrical or electronics component inside. The operation of this device could be severely affected by lightning activity or electrical switching events, as there are more than 2000 thunderstorms in progress at any time resulting in 100 lightning flashes to ground per second. In practice, any device as long as it consists of an electrical component and is using electricity will subject to surge damages induced from the lightning or switching of heavy load. For consumer product applications, the equipment supplier advised the user to add a Surge Protection Device at the power distribution panel to protect equipment failure due to the lightning and surges. For the industrial product application, in addition to the protection at the power supply, the control or system engineers are advised to include additional Surge Protection Device to its critical control loop to prevent damage subsequently cause plant shutdown. There are many questions raised on the Surge Protection Device. How can this small device protect the equipment from large energy release by the lightning' What is inside the device' How does it work' This paper provides comprehensive detail in revealing the science and engineering behind the Surge Protection Device, its individual component characteristic and how does it work. The technical information presented is limited to surge protection on equipment; surge protection for building structure will not be discussed here.
      PubDate: Mon, 01 Feb 2021 00:00:00 +000
       
  • Robot control and kinematic analysis with 6DoF manipulator using direct
           kinematic method

    • Authors: Khalaf S Gaeid; Asaad F Nashee, Ibrahim A Ahmed, Mohammed H Dekheel
      Abstract: The robots pay important role in all parts of our life. Hence, the modeling of the robot is essential to develop the performance specification. Robot model of six degree of freedom (6DoF) manipulator implemented numerically using model-based technique. The kinematic analysis and simulation were studied with Inverse kinematics of the robot manipulator through Denevit and Hartenberg method. Matrix transformation method is used in this work in order to separate joint variables from kinematic equations. The finding of the desired configuration is obtained precisely in all motion trajectory along the end-effector path. MatlabSimulink with R2018b is used for the implementation of the model-based robot system. Simulation results showed that the robot rinks follow their references smoothly and precisely and ensure the effectiveness of direct kinematic algorithm in the analysis and control of the robotic field.
      PubDate: Mon, 01 Feb 2021 00:00:00 +000
       
  • Generation of High Dynamic Range for Enhancing the Panorama Environment

    • Authors: Roa'a M. Al_airaji; Ibtisam A. Aljazaery, Suha Kamal Al_Dulaimi, Haider TH.Salim Alrikabi
      Abstract: This paper presents a methodology for enhancement of panorama images environment by calculating high dynamic range. Panorama is constructing by merge of several photographs that are capturing by traditional cameras at different exposure times. Traditional cameras usually have much lower dynamic range compared to the high dynamic range in the real panorama environment, where the images are captured with traditional cameras will have regions that are too bright or too dark. A more details will be visible in bright regions with a lower exposure time and more details will be visible in dark regions with a higher exposure time. Since the details in both bright and dark regions cannot preserving in the images that are creating using traditional cameras, the proposed system have to calculate one using the images that traditional camera can actually produce. The proposed system start by get LDR panorama image from multiple LDR images using SIFT features technology and then convert LDR panorama image the to the HDR panorama image using inverted local patterns.
      PubDate: Mon, 01 Feb 2021 00:00:00 +000
       
  • Correlation of learning disabilities to porn addiction based on EEG

    • Authors: Norhaslinda Kamaruddin; Nurul Izzati Mat Razi, Abdul Wahab
      Abstract: Researchers were able to correlate porn addiction based on electroencephalogram (EEG) signal analysis to the psychological instruments’ findings. In this paper we attempt to correlate the porn addiction to various cases of learning disorders through analyzing EEG signals. Since porn addiction involved the brainwave power at the frontal of the brain, which reflects the executive functions, this may have correlation to learning disorder. Only three types of learning disorder will be of interest in our study involving dyslexic, attention deficit and hyperactivity disorder (ADHD) and autistic children because they involved reduced intellectual ability observed from the lack of listening, speaking, reading, writing, reasoning, or mathematical proficiencies.Children with such disorder when expose to the internet unfiltered porn contents may have minimal understanding of the negative effects of the contents. Such unmonitored exposure to pornographic contents may result to porn addiction because it may trigger excitement and induced pleasure. Experimental results show strong correlation of learning disorders to porn addiction, which can be worthwhile for further analysis. In addition, this paper also indicates that analyzing brainwave patterns could provide a better insight into predicting and detecting children with learning disorders and addiction with direct analysis of the brain wave patterns.
      PubDate: Mon, 01 Feb 2021 00:00:00 +000
       
  • DEH-DoSv6: A defendable security model against IPv6 extension headers
           denial of service attack

    • Authors: Marlon A. Naagas; Alvin R. Malicdem, Thelma D. Palaoag
      Abstract: With the rapid depletion of IPv4 protocol in these recent years, the IETF introduced IPv6 as a solution to address the exhaustion, however, as a new protocol exists, new characteristics have been introduced and new threats have been discovered. IPv6 Extension Headers as a new characteristic has a serious security implication that we need to consider, once taken for granted it will lead to Denial of Service (DoS) attack. This security issue has become one of the biggest concerns which can impact IPv6 transition and this factor has led to the development of our proposed model. The proposed model protects the router’s control and forwarding plane that hardens the IPv6 Network against mishandling of IPv6 Extension Headers that is causing Denial of Service (DoS) Attacks. Moreover, test results show that our model worked successfully on defending against the aforementioned attack.
      PubDate: Mon, 01 Feb 2021 00:00:00 +000
       
  • Development of patch stack antenna for CP-SAR sensor

    • Authors: Muhammad Fauzan Edy Purnomo; Vita Kusumasari, Rusmi Ambarwati, Sigit Kusmaryanto, Sholeh Hadi Pramono, Dwi Fadila Kurniawan, Akio Kitagawa
      Abstract: In this paper, we obtain the basic configuration of the Left-Hand Circular Polarization (LHCP) array two patches stack triangular truncated microstrip antenna. This construction use the basic corporate feed microstrip-line with modified lossless T-junction power divider on radiating patch for Circularly Polarized-Synthetic Aperture Radar (CP-SAR) sensor embedded on airspace with compact, small, and simple configuration. The design of Circular Polarization (CP) is realized by truncating the whole three tips and adjusting the parameters of antenna at the resonant frequency, f = 5.2 GHz. The results of characteristic performance and S-parameter for the LHCP array two patches stack antenna at the resonant frequency show successively about 7.24 dBic of gain, 1.99 dB of axial ratio (Ar), and -11.43 dB of S-parameter. Moreover, the impedance bandwidth and the 3 dB-Ar bandwidth of this antenna are around 560 MHz (10.77%) and 50 MHz (0.96%), respectively.
      PubDate: Mon, 01 Feb 2021 00:00:00 +000
       
  • A Review of Website Evaluation Using Web Diagnostic Tools and Data
           Envelopment Analysis

    • Authors: Hassan Najadat; Amer Al-Badarneh, Sawsan Alodibat
      Abstract: This paper presents a review of the most recently published works of the use of Data Envelopment Analysis (DEA) in the evaluation of websites of different fields such as healthcare, e-business, e-commerce, and e-government. The evaluation of websites is performed using Web Diagnostic Tools (WDTs). Some studies have evaluated e-government websites using WDTs only, while others integrate them with Data Envelopment Analysis. We summarize each study including the country that was conducted in, the size of data set, inputs to DEA, outputs from DEA, the approach used, the tools used, and the results obtained. It also covers whether there is a use of combination between DEA and data mining or machine learning approaches to classify the efficiency of these websites

      PubDate: Mon, 01 Feb 2021 00:00:00 +000
       
  • Signature PSO: A novel inertia weight adjustment using fuzzy signature for
           LQR tuning

    • Authors: Achmad Komarudin; Novendra Setyawan, Leonardo Kamajaya, Mas Nurul Achmadiah, Zulfatman Has
      Abstract: Particle swarm optimization (PSO) is an optimization algorithm that is simple and reliable to complete optimization. The balance between exploration and exploitation of PSO searching characteristics is maintained by inertia weight. Since this parameter has been introduced, there have been several different strategies to determine the inertia weight during a train of the run. This paper describes the method of adjusting the inertia weights using fuzzy signatures called Signature PSO. Some parameters were used as a fuzzy signature variable to represent the particle situation in a run. The implementation to solve the tuning problem of linear quadratic regulator (LQR) control parameters is also presented in this paper. Another weight adjustment strategy is also used as a comparison in performance evaluation using an integral time absolute error (ITAE). Experimental results show that Signature PSO was able to give a good approximation to the optimum control parameters of LQR in this case.
      PubDate: Mon, 01 Feb 2021 00:00:00 +000
       
  • Implementation of vehicle ventilation system using nodemcu ESP8266 for
           remote monitoring

    • Authors: Amirun Murtaza Abd Jalil; Roslina Mohamad, Nuzli Mohamad Anas, Murizah Kassim, Saiful Izwan Suliman
      Abstract: In this paper, an implementation of vehicle ventilation system using microcontroller NodeMCU is described, as a internet of things (IoT) platform. A low-cost wireless fidelity (Wi-Fi) microchip ESP8266 integrated with NodeMCU provides full-stack transmission control protocol/internet protocol (TCP/IP) to communicate between mobile applications. This chip is capable to monitor and control sensor devices connected to the IoT platform. In this reserach, data was collected from a temperature sensor integrated to the platform, which then monitored using Blynk application. The vehicle ventilation system was activated/deactivated through mobile application and controlled using ON/OFF commands sent to the connected devices. From the results, the vehicle ventilation system built using NodeMCU microcontroller is capable to provide near real-time data monitoring for temperature in the car before and after the ventilation system was applied.
      PubDate: Mon, 01 Feb 2021 00:00:00 +000
       
  • Improved El Gamal Public Key Cryptosystem using 3D Chaotic Maps

    • Authors: muna KH Al-naamee
      Abstract: Digital information is any type of data that is stored electronically. These data need to protect its assets and unauthorized access to it and therefore need measures to protect digital privacy. This process is done in different ways, one of which is encryption. Encryption provides secure transfer of unauthorized data over insecure channels. In this paper a method is proposed to create the keys to the El Gamal PKC algorithm based on chaos theory. The proposed algorithm uses 3D chaos maps to create keys used in the encryption and decryption process using an El Gamal algorithm. The results obtained exceeded most of the statistical and NIST tests.
      PubDate: Mon, 01 Feb 2021 00:00:00 +000
       
  • Enhancement of Digital Signature Algorithm in Bitcoin Wallet

    • Authors: farah Jass Jasim
      Abstract: Bitcoin is a peer-to-peer electronic cash system largely used for online financial transactions. It gained popularity due to its anonymity, privacy, and comparatively low transaction cost. Its wallet heavily relies on Elliptic Curve Digital Signature Algorithm (ECDSA). Weaknesses in such algorithms can significantly affect the safety and the security of bitcoin wallets. In this paper, a secure key management wallet was designed based on several changes in the wallet parts. In the cold wallet, we employed an image-based passphrase to achieve a strong entropy source of master seed. The hot wallet, the proposed key_ Gen algorithm is modifying to the key generation step of the ECDSA that it is to generate a fresh key pair at each transaction. The final part ensures recovering all keys on both hot and cold wallets without daily backups in case of losing the wallet. The findings prove that the proposed cold wallet is resisting against a dictionary attack and overcoming the memorizing problem. The proposed hot wallet model acquires good anonymity and privacy for bitcoin users by eliminating transaction linkability without additional cost. The execution time for signing a transaction of the proposed model is ~70 millisecond, which is then important in the bitcoin domain.
      PubDate: Mon, 01 Feb 2021 00:00:00 +000
       
  • Analyzing sentiment system to specify polarity by lexicon-based

    • Authors: Dhafar Hamed Abd; Ayad R. Abbas, Ahmed T. Sadiq
      Abstract: Currently, sentiment analysis into positive or negative getting more attention from the researchers.  With the rapid development of the Internet and social media have made people express their views and opinion publicly. Analyzing the sentiment in people views and opinion impact many fields such as services and productions that companies offer. Movie reviewer needs many processing to be prepared to detect emotion, classify them and achieve high accuracy. The difficulties arise due of the structure and grammar of the language and manages the dictionary. We present a system that assigns scores indicating positive or negative opinion to each distinct entity in the text corpus. Propose an innovative formula to compute the polarity score for each word occurring in the text and find it in positive dictionary or negative dictionary we have to remove it from text. After classification, the words are stored in a list that will be used to calculate the accuracy. The results reveal that the system achieved the best results in accuracy of 76.585%.
      PubDate: Mon, 01 Feb 2021 00:00:00 +000
       
  • Temperature monitoring using polymer optical fiber with integration to the
           Internet of Things

    • Authors: Hazura Haroon; Siti Khadijah Idris, Anis Suhaila Mohd Zain, Hanim Abdul Razak, Fauziyah Salehuddin
      Abstract: In this paper, a polymer optical fiber (POF) is applied for temperature measuring of water solution using a light source of 650nm. The aim is to analyse the impact of temperature variations on the output of POF sensor device in terms of output power and sensitivity. From the study, the POF sensor shows a linear trend when the temperature is increased from 30°C to 80°C with the sensitivity of the polymer optical fiber for output power to the temperature are 0.00973 dBm/°C or 0.14797 nW/°C, for optical characterization and 0.0011 V/°C for electrical characterization. The integration of the Internet of Things to the system helps the user to monitor the temperature of various space anywhere at any time. The sensed values are controlled by Arduino Uno R3 and then sent to Blynk to provide wireless monitoring by the user.
      PubDate: Mon, 01 Feb 2021 00:00:00 +000
       
  • Traid-bit embedding process on arabic text steganography method

    • Authors: Roshidi Din; Reema Ahmed Thabit, Nur Izura Udzir, Sunariya Utama
      Abstract: The enormous development in the utilization of the Internet has driven by a continuous improvement in the region of security. The enhancement of the security embedded techniques is applied to save the intellectual property. There are numerous types of security mechanisms. Steganography is the art and science of concealing secret information inside a cover media such as image, audio, video and text, without drawing any suspicion to the eavesdropper. The text is ideal for steganography due to its ubiquity. There are many steganography embedded techniques used Arabic language to embed the hidden message in the cover text. Kashida, Shifting Point and Sharp-edges are the three Arabic steganography embedded techniques with high capacity. However, these three techniques have lack of performance to embed the hidden message into the cover text .This paper present about Traid-bit method by integrating these three Arabic text steganography embedded techniques. It is an effective way to evaluate many embedded techniques at the same time, and introduced one solution for various cases.
      PubDate: Mon, 15 Jun 2020 07:09:32 +000
       
  • The Best Discretization Method on Bayesian Network in Disaster

    • Authors: Devni Prima Sari; Dedi Rosadi, Adhitya Ronnie Effendie, Danardono Danardono
      Abstract: Bayesian Network is a graphical model to represent interactions between variables. Bayesian Network is described by a graph consisting of nodes and arcs. The Bayesian network model has been widely applied in various fields. In applying this model, we can use continuous variables, discrete variables, or a mixture of both types of variables However, in this paper, we used the discrete Bayesian network model to determine the level of risk of earthquake damage. So we separated all continuous variables. Variable discretization can be done in various ways, including Equal-Width Interval, Equal-Frequency Interval, and K-means clustering. Based on three methods, for this case, the most accurate results are obtained using the K-means clustering method.
      PubDate: Thu, 11 Jun 2020 03:57:11 +000
       
  • Requirements identification for distributed agile team communication

    • Authors: Nor Hidayah Zainal Abidin; Pathiah Abdul Samat
      Abstract: Communication plays an important role to deliver the correct information. However, the communication became challenging especially for agile software teams, which are in geographical distributed. The problem arise when there are exchanging information using unstructured communication platform, misunderstanding on the information communicated and lack of documentation. The aims of this study is to propose a text classification technique for requirements identification in text messages.  In this study, we adopted the cascade and cluster classification concept of Carotene that relies on the hash tag function. It classifies the text messages into requirements types instead of job title. This technique called as High Level Carotene (HLC) technique that embedded into the tool to identify the functional requirement and non-functional requirements. The result shows that our technique effectiveness to identify both of requirements in text messaging.
      PubDate: Thu, 07 May 2020 14:27:55 +000
       
  • Wireless sensor network calibration technique for low-altitude unmanned
           aerial vehicle localization in paddy field

    • Authors: Azhar Jaafar; Norashikin M. Thamrin, Noorolpadzilah Mohamed Zan
      Abstract: This paper presents the use of the Received Signal Strength Indicator (RSSI) from the RF signal to estimate the distance from a point where the signal is transmitted to the point where the signal is received.This can be a challenge as in the paddy field, the watery and dry conditions, as well as the height of the paddy plant can affect signal transmission during this estimation process. Two low-cost ground beacons, Beacon1 and Beacon2 (The Coordinator), are used and placed in a known location with a fixed distance across the paddy field, which becomes the reference point during the distance estimation for the Unmanned Aerial Vehicle (UAV). These signals are analyzed by using the non-right-angle trigonometry computation, to estimate the distance between the transmitter and the receiver. The estimated distance is compared with the measured value to determine the efficiency of this approach. The calibration trendlines of these beacons in the open, watery and dry paddy fields are discussed and presented. It is found that the dry paddy field gives less RSSI mean error and proved that humidity can contribute to the distance estimation error.
      PubDate: Sat, 01 Feb 2020 00:00:00 +000
       
 
JournalTOCs
School of Mathematical and Computer Sciences
Heriot-Watt University
Edinburgh, EH14 4AS, UK
Email: journaltocs@hw.ac.uk
Tel: +00 44 (0)131 4513762
 


Your IP address: 3.81.28.10
 
Home (Search)
API
About JournalTOCs
News (blog, publications)
JournalTOCs on Twitter   JournalTOCs on Facebook

JournalTOCs © 2009-