Subjects -> ENGINEERING (Total: 2848 journals)
    - CHEMICAL ENGINEERING (248 journals)
    - CIVIL ENGINEERING (249 journals)
    - ELECTRICAL ENGINEERING (177 journals)
    - ENGINEERING (1449 journals)
    - ENGINEERING MECHANICS AND MATERIALS (451 journals)
    - HYDRAULIC ENGINEERING (62 journals)
    - INDUSTRIAL ENGINEERING (97 journals)
    - MECHANICAL ENGINEERING (115 journals)

ELECTRICAL ENGINEERING (177 journals)                     

Showing 1 - 177 of 177 Journals sorted alphabetically
3C TIC     Open Access   (Followers: 4)
Acta Electronica Malaysia     Open Access  
Acta Universitatis Sapientiae Electrical and Mechanical Engineering     Open Access  
Actuators     Open Access   (Followers: 4)
Advanced Electromagnetics     Open Access   (Followers: 19)
Advances in Electrical and Electronic Engineering     Open Access   (Followers: 10)
Advances in Electrical Engineering     Open Access   (Followers: 52)
Advances in Microelectronic Engineering     Open Access   (Followers: 13)
Advances in Signal Processing     Open Access   (Followers: 15)
American Journal of Electrical and Electronic Engineering     Open Access   (Followers: 28)
American Journal of Sensor Technology     Open Access   (Followers: 4)
APSIPA Transactions on Signal and Information Processing     Open Access   (Followers: 8)
Archives of Control Sciences     Open Access   (Followers: 3)
Archives of Electrical Engineering     Open Access   (Followers: 16)
Atom Indonesia     Open Access   (Followers: 2)
Australian Journal of Electrical and Electronics Engineering     Hybrid Journal  
Balkan Journal of Electrical and Computer Engineering     Open Access  
Bulletin of Electrical Engineering and Informatics     Open Access   (Followers: 10)
Carpathian Journal of Electronic and Computer Engineering     Open Access  
Case Studies in Mechanical Systems and Signal Processing     Open Access  
CES Transactions on Electrical Machines and Systems     Open Access   (Followers: 3)
Chinese Journal of Electrical Engineering     Open Access   (Followers: 2)
Circuits, Systems, and Signal Processing     Hybrid Journal   (Followers: 15)
Computers & Electrical Engineering     Hybrid Journal   (Followers: 9)
CPSS Transactions on Power Electronics and Applications     Open Access   (Followers: 3)
CSEE Journal of Power and Energy Systems     Open Access   (Followers: 4)
Current Trends in Signal Processing     Full-text available via subscription   (Followers: 5)
ECTI Transactions on Computer and Information Technology (ECTI-CIT)     Open Access  
ECTI Transactions on Electrical Engineering, Electronics, and Communications     Open Access   (Followers: 2)
Edu Elektrika Journal     Open Access   (Followers: 1)
Electric Power Components and Systems     Hybrid Journal   (Followers: 9)
Electric Power Systems Research     Partially Free   (Followers: 23)
Electrica     Open Access  
Electrical and Electronic Engineering     Open Access   (Followers: 60)
Electrical and Power Engineering Frontier     Open Access   (Followers: 37)
Electrical Engineering     Hybrid Journal   (Followers: 23)
Electrical Engineering and Automation     Open Access   (Followers: 9)
Electrical Engineering and Power Engineering     Open Access   (Followers: 2)
Electrical Engineering in Japan     Hybrid Journal   (Followers: 8)
Electrical, Control and Communication Engineering     Open Access   (Followers: 15)
Electrochemical Energy Reviews     Hybrid Journal   (Followers: 1)
Elektron     Open Access  
Elektronika ir Elektortechnika     Open Access   (Followers: 7)
Elkha : Jurnal Teknik Elektro     Open Access  
Emerging and Selected Topics in Circuits and Systems     Hybrid Journal   (Followers: 8)
Emitor : Jurnal Teknik Elektro     Open Access   (Followers: 7)
ETRI Journal     Open Access  
EURASIP Journal on Advances in Signal Processing     Open Access   (Followers: 7)
Ferroelectrics     Hybrid Journal   (Followers: 1)
Ferroelectrics Letters Section     Hybrid Journal   (Followers: 1)
Frequenz     Hybrid Journal   (Followers: 1)
Frontiers of Electrical and Electronic Engineering     Hybrid Journal   (Followers: 8)
Frontiers of Information Technology & Electronic Engineering     Hybrid Journal  
IEA Electricity Information     Full-text available via subscription   (Followers: 3)
IEEE Access     Open Access   (Followers: 120)
IEEE Electrical Insulation Magazine     Full-text available via subscription   (Followers: 77)
IEEE Journal of Electromagnetics, RF and Microwaves in Medicine and Biology     Hybrid Journal   (Followers: 3)
IEEE Journal of Photovoltaics     Hybrid Journal   (Followers: 18)
IEEE Journal of Radio Frequency Identification     Hybrid Journal   (Followers: 3)
IEEE Journal of Selected Topics in Signal Processing     Hybrid Journal   (Followers: 42)
IEEE Journal on Miniaturization for Air and Space Systems     Hybrid Journal   (Followers: 2)
IEEE Letters on Electromagnetic Compatibility Practice and Applications     Hybrid Journal   (Followers: 4)
IEEE Networking Letters     Hybrid Journal   (Followers: 3)
IEEE Open Access Journal of Power and Energy     Open Access   (Followers: 4)
IEEE Open Journal of Antennas and Propagation     Open Access   (Followers: 4)
IEEE Open Journal of Circuits and Systems     Open Access   (Followers: 3)
IEEE Open Journal of Intelligent Transportation Systems     Open Access   (Followers: 6)
IEEE Open Journal of Power Electronics     Open Access   (Followers: 4)
IEEE Open Journal of Signal Processing     Open Access   (Followers: 4)
IEEE Sensors Journal     Hybrid Journal   (Followers: 101)
IEEE Sensors Letters     Hybrid Journal   (Followers: 4)
IEEE Signal Processing Magazine     Full-text available via subscription   (Followers: 91)
IEEE Solid-State Circuits Letters     Hybrid Journal   (Followers: 3)
IEEE Transactions on Control of Network Systems     Hybrid Journal   (Followers: 27)
IEEE Transactions on Dielectrics and Electrical Insulation     Hybrid Journal   (Followers: 29)
IEEE Transactions on Green Communications and Networking     Hybrid Journal   (Followers: 3)
IEEE Transactions on Network Science and Engineering     Hybrid Journal   (Followers: 3)
IEEE Transactions on Quantum Engineering     Open Access   (Followers: 3)
IEEE Transactions on Radiation and Plasma Medical Sciences     Hybrid Journal   (Followers: 4)
IEEE Transactions on Signal and Information Processing over Networks     Hybrid Journal   (Followers: 14)
IEEE Transactions on Sustainable Energy     Hybrid Journal   (Followers: 18)
IEEJ Transactions on Electrical and Electronic Engineering     Hybrid Journal   (Followers: 19)
IET Control Theory & Applications     Hybrid Journal   (Followers: 27)
IET Electric Power Applications     Hybrid Journal   (Followers: 47)
IET Electrical Systems in Transportation     Hybrid Journal   (Followers: 11)
IET Energy Systems Integration     Open Access   (Followers: 1)
IET Nanodielectrics     Open Access  
IET Smart Grid     Open Access   (Followers: 1)
IETE Journal of Education     Open Access   (Followers: 3)
IJEIS (Indonesian Journal of Electronics and Instrumentation Systems)     Open Access   (Followers: 3)
InComTech : Jurnal Telekomunikasi dan Komputer     Open Access   (Followers: 1)
Indonesian Journal of Electrical Engineering and Computer Science     Open Access   (Followers: 18)
Industrial Technology Research Journal Phranakhon Rajabhat University     Open Access  
Ingeniería Electrónica, Automática y Comunicaciones     Open Access  
Integrated Ferroelectrics: An International Journal     Hybrid Journal  
International Journal of Advances in Telecommunications, Electrotechnics, Signals and Systems     Open Access   (Followers: 12)
International Journal of Electrical and Computer Engineering     Open Access   (Followers: 12)
International Journal of Electrical Engineering Education     Hybrid Journal   (Followers: 7)
International Journal of Electrical Power & Energy Systems     Open Access   (Followers: 34)
International Journal of Emerging Electric Power Systems     Hybrid Journal   (Followers: 7)
International Journal of Microwave Engineering and Technology     Full-text available via subscription   (Followers: 2)
International Journal of Monitoring and Surveillance Technologies Research     Full-text available via subscription   (Followers: 3)
International Journal of Nuclear Security     Open Access   (Followers: 1)
International Journal of Turbomachinery, Propulsion and Power     Open Access   (Followers: 10)
International Transaction of Electrical and Computer Engineers System     Open Access   (Followers: 2)
International Transactions on Electrical Energy Systems     Hybrid Journal   (Followers: 9)
Iranian Journal of Science and Technology, Transactions of Electrical Engineering     Hybrid Journal  
Izvestiya Vysshikh Uchebnykh Zavedenii. Materialy Elektronnoi Tekhniki : Materials of Electronics Engineering     Full-text available via subscription  
J3eA     Open Access   (Followers: 2)
JAREE (Journal on Advanced Research in Electrical Engineering)     Open Access  
Journal of Control, Automation and Electrical Systems     Hybrid Journal   (Followers: 10)
Journal of Electrical and Computer Engineering     Open Access   (Followers: 9)
Journal of Electrical and Computer Engineering Innovations     Open Access   (Followers: 5)
Journal of Electrical and Electronics Engineering Research     Open Access   (Followers: 39)
Journal of Electrical Bioimpedance     Open Access   (Followers: 2)
Journal of Electrical Engineering     Open Access   (Followers: 44)
Journal of Electrical Engineering & Electronic Technology     Hybrid Journal   (Followers: 7)
Journal of Electrical Engineering & Technology     Hybrid Journal  
Journal of Electrical Systems and Information Technology     Open Access   (Followers: 7)
Journal of Electrical, Electronics and Informatics     Open Access  
Journal of Field Robotics     Hybrid Journal   (Followers: 4)
Journal of International Council on Electrical Engineering     Open Access  
Journal of Micro-Bio Robotics     Hybrid Journal   (Followers: 1)
Journal of Microwaves, Optoelectronics and Electromagnetic Applications     Open Access   (Followers: 10)
Journal of Power Technologies     Open Access   (Followers: 7)
Journal of Science and Application Technology     Open Access  
Journal of the Society for Information Display     Hybrid Journal  
Journal of World's Electrical Engineering and Technology     Open Access   (Followers: 2)
Journal on Today's Ideas - Tomorrow's Technologies     Open Access  
JPhys Energy     Open Access  
JPhys Materials     Open Access  
Jurnal ELTIKOM : Jurnal Teknik Elektro, Teknologi Informasi dan Komputer     Open Access  
Jurnal Ilmiah Mahasiswa SPEKTRUM     Open Access  
Jurnal Nasional Teknik Elektro     Open Access   (Followers: 4)
Jurnal Rekayasa Elektrika     Open Access  
Jurnal Teknik Elektro     Open Access  
Jurnal Teknik Elektro dan Komputer     Open Access  
Jurnal Teknologi Elektro     Open Access  
Kinetik : Game Technology, Information System, Computer Network, Computing, Electronics, and Control     Open Access  
La Rivista del Nuovo Cimento     Hybrid Journal   (Followers: 2)
Majalah Ilmiah Teknologi Elektro : Journal of Electrical Technology     Open Access   (Followers: 2)
Majlesi Journal of Electrical Engineering     Open Access   (Followers: 1)
Material Design & Processing Communications     Hybrid Journal  
Micro and Nano Systems Letters     Open Access   (Followers: 6)
Nanotechnology Development     Open Access   (Followers: 19)
npj Materials Degradation     Open Access  
Open Electrical & Electronic Engineering Journal     Open Access  
Open Signal Processing Journal     Open Access   (Followers: 1)
Periodica Polytechnica Electrical Engineering and Computer Science     Open Access  
Presence : Teleoperators and Virtual Environments     Hybrid Journal   (Followers: 3)
Progress in Additive Manufacturing     Hybrid Journal   (Followers: 4)
Quantum Beam Science     Open Access   (Followers: 1)
Radio Science     Full-text available via subscription   (Followers: 43)
Recent Advances in Communications and Networking Technology     Hybrid Journal   (Followers: 3)
Recent Advances in Electrical & Electronic Engineering     Hybrid Journal   (Followers: 11)
Research & Reviews : Journal of Embedded System & Applications     Full-text available via subscription   (Followers: 6)
Russian Electrical Engineering     Hybrid Journal   (Followers: 5)
SAIEE Africa Research Journal     Open Access   (Followers: 1)
SID Symposium Digest of Technical Papers     Hybrid Journal  
Signal Processing     Hybrid Journal   (Followers: 8)
Signals     Open Access   (Followers: 1)
Simetris : Jurnal Teknik Mesin, Elektro dan Ilmu Komputer     Open Access  
Sustainable Energy, Grids and Networks     Hybrid Journal   (Followers: 6)
Synthesis Lectures on Electrical Engineering     Full-text available via subscription   (Followers: 2)
System analysis and applied information science     Open Access  
Telematique     Open Access  
The Scientific Bulletin of Electrical Engineering Faculty     Open Access  
Transactions of the International Society for Music Information Retrieval     Open Access  
Transactions on Electrical and Electronic Materials     Hybrid Journal   (Followers: 1)
Transactions on Environment and Electrical Engineering     Open Access  
Trends in Electrical Engineering     Full-text available via subscription   (Followers: 4)
Tri Dasa Mega : Jurnal Teknologi Reaktor Nuklir     Open Access  
Turkish Journal of Electrical Engineering and Computer Science     Open Access   (Followers: 2)
Universal Journal of Electrical and Electronic Engineering     Open Access   (Followers: 7)
Ural Radio Engineering Journal     Open Access   (Followers: 1)
Wireless Engineering and Technology     Open Access   (Followers: 5)
Електротехніка і Електромеханіка     Open Access   (Followers: 1)

           

Similar Journals
Journal Cover
Bulletin of Electrical Engineering and Informatics
Number of Followers: 10  

  This is an Open Access Journal Open Access journal
ISSN (Print) 2089-3191 - ISSN (Online) 2302-9285
Published by Universitas Ahmad Dahlan Homepage  [18 journals]
  • Statistical analysis of air-conditioning and total load diversity in
           typical residential buildings

    • Authors: Naja Aqilah Hisham; Sheikh Ahmad Zaki Shaikh Salim, Aya Hagishima, Fitri Yakub, Hafizah Farhah Saipan Saipol
      Abstract: Electricity consumption by air-conditioners in residential buildings significantly affects the electrical grid. The stability of the grid can be improved by a precise prediction of air-conditioning (AC) variations. Therefore, more information about the electricity usage patterns specifically on AC load is important. This paper aims to determine the consumption patterns of AC and total load through a field measurement of 20 dwellings located in Kuala Lumpur and Selangor. Next, correlation and clustering are employed to identify the relationship between outdoor temperature and AC electricity consumption. The results revealed 75% of the occupants use the AC almost every day for about five to six hours per day at the rates of 0.93 kWh/day during day time and 3.43 kWh/day during night time. The correlation coefficient between the total daily AC consumption and the mean daily outdoor temperature ranged from -0.1 to 0.48. The variation of electricity consumption with time shows that AC electricity consumption increases with the increase of usage time. Lastly, the clustering process of AC usage pattern based on outdoor temperature displayed the uncommon behaviour from dwellings whereby high AC electricity consumption was recorded at low outdoor temperature.

      PubDate: Mon, 01 Feb 2021 00:00:00 +000
       
  • Behavioral studies of surge protection components

    • Authors: Teik Hua Kuan; Kuew Wai Chew, Kein Huat Chua
      Abstract: In our daily life, almost all the items we used, being a computer, television, lift or vehicle we drive consist of some kind of electrical or electronics component inside. The operation of these devices could be severely affected by lightning activity or electrical switching events, as there are more than 2000 thunderstorms in progress at any time resulting in 100 lightning flashes to ground per second. In practice, any device using electricity will subject to surge damages induced from the lightning or switching of heavy load. Surge protection device (SPD) is added at the power distribution panel and critical process loop to prevent damage subsequently cause plant shutdown. There are many questions raised on the SPD. How can this small device protect the equipment from large energy release by the lightning' What is inside the device' How does it work' This paper provides comprehensive detail in revealing the science and engineering behind the SPD, its individual component characteristic and how does it work. The technical information presented is limited to surge protection on equipment; surge protection for building structure will not be discussed here.
      PubDate: Mon, 01 Feb 2021 00:00:00 +000
       
  • Optimal tuning of a wind plant energy production based on improved grey
           wolf optimizer

    • Authors: Mohd Zaidi Mohd Tumari; Mohd Muzaffar Zahar, Mohd Ashraf Ahmad
      Abstract: The tuning of optimal controller parameters in wind plant is crucial in order to minimize the effect of wake interaction between turbines. The purpose of this paper is to develop an improved grey wolf optimizer (I-GWO) in order to tune the controller parameters of the turbines so that the total energy production of a wind plant is increased. The updating mechanism of original GWO is modified to improve the efficiency of exploration and exploitation phase while avoiding trapping in local minima solution. A row of ten turbines is considered to evaluate the effectiveness of the I-GWO by maximizing the total energy production. The proposed approach is compared with original GWO and previously published modified GWO. Finally, I-GWO produces the highest total energy production as compared to other methods, as shown in statistical performance analysis.
      PubDate: Mon, 01 Feb 2021 00:00:00 +000
       
  • An optimal placement of phasor measurement unit using new sensitivity
           indices

    • Authors: K. Khalid; A. A. Ibrahim, N. A. M. Kamari, M. H. M. Zaman
      Abstract: This paper presents an alternative approach to solve an optimal phasor measurement unit (PMU) placement by introducing two new sensitivity indices. The indices are constructed from the information measured from PMUs such as voltage magnitude and angle. These two parameters are essential for power system stability assessment and control. Therefore, fault analysis is carried out to obtain the voltage magnitude and angle deviations at all buses in order to construct the indices. An exhaustive search method is used to solve the linear integer programming problem where all possible combinations of PMU placement are evaluated to obtain the optimal solution. Unfortunately, the traditional objective function to minimize the total number of PMU placement leads to multiple solutions. The indices can be used to assess multiple solutions of PMU placement from the exhaustive method. In this work, an optimal solution is selected based on the performance of PMU placement in according to the indices. The proposed method is tested on the IEEE 14 bus test system. Only four PMUs are required to monitor the whole test system. However, the number of PMUs can be reduced to three PMUs after applying zero injection bus elimination.
      PubDate: Mon, 01 Feb 2021 00:00:00 +000
       
  • Single event latch-up detection for nano-satellite external solar
           radiation mitigation system

    • Authors: Norsuzila Yaa’cob; Muhammad Fauzan Ayob, Noraisyah Tajudin, Murizah Kassim, Azita Laily Yusof
      Abstract: This paper presents the single event latch-up (SEL) detection for nano-satellite external solar radiation mitigation system. In this study, the SEL detection analysis was conducted using circuit test and simulation. An electrical power subsystem (EPS) is a part of all CubeSat bus subsystems and it comprises solar arrays, rechargeable batteries, and a power control and distribution unit (PCDU). In order to extract the maximum power generated by the solar arrays, a peak power tracking topology is required. This may lead to the SEL with the presence of high voltage produced by solar. To overcome the SEL problems, the circuit test and simulation must be done so that the flow of SEL will be easily detected and mitigate. The method that been used are by using microcontroller, the SEL will be created in the certain time. The programable integrated circuit (PIC) are used to mitigate SEL effect. It indicates that, the SEL occur very fast in certain time. When the simulation is conducted by using SPENVIS, the result shows, only single event upset (SEU) was affected on UiTMSAT-1.

      PubDate: Mon, 01 Feb 2021 00:00:00 +000
       
  • Enhancing reliability of electricity supply of city electric networks
           cities of Dushanbe

    • Authors: Alexander Ivanovich Sidorov; Saidjon Tavarov
      Abstract: The article is devoted to the actual problem of how to improve the reliability of the urban electric network. Based on the statistical analysis of the breakdown of electrical equipment in urban distribution networks in Dushanbe for the periods of 2017-2018 and for the reasons of damage leading to these emergency outages, the factors that affect the distribution of damage leading to emergency outages are identified. Taking into account the identified factors, a power consumption forecasting system is proposed that takes into account the local conditions of the city of Dushanbe. it allows us to suggest a way to control the operating parameters of the electric network, thereby increasing the reliability of the city's electric network in Dushanbe based on the recommendation of power consumption standards. Implementation of the control of the proposed method for improving the reliability of power supply to the urban electric network is proposed on the basis of the functionality of modern smart electricity metering using the control algorithm. To implement the control algorithm, schematic design for receiving and transmitting information from smart power metering to the data collection centre is proposed.
      PubDate: Mon, 01 Feb 2021 00:00:00 +000
       
  • Design of 4-stage Marx generator using gas discharge tube

    • Authors: Wijono Wijono; Zainul Abidin, Waru Djuriatno, Eka Maulana, Nola Ribath
      Abstract: In this paper, a Marx generator voltage multiplier as an impulse generator made of multi-stage resistors and capacitors to generate a high voltage is proposed. In order to generate a high voltage pulse, a number of capacitors are connected in parallel to charge up during on time and then in series to generate higher voltage during off period. In this research, a 6kV Marx generator voltage multiplier is designed using gas discharge tube (GDT) as an electronic switch to breakdown voltage. The Marx generator circuit is designed to charge the storage capacitor for high impulse voltage and current generator applications. According to IEC 61000-4-5 class 4 standards, the storage capacitor must be charged up to 4 kV. The results show that the proposed Marx generator can produce voltages up to 6.8 kV. However, the storage capacitor could be charged up to 1 kV, instead of 4 kV in the standard. That is because the output impulse voltage has narrow time period.

      PubDate: Mon, 01 Feb 2021 00:00:00 +000
       
  • Peak power shaving in hybrid power supplied 5G base station

    • Authors: Lee Jia Woon; Gobbi Ramasamy, Siva Priya Thiagarajah
      Abstract: The Information and Communication Technology sector consumes approximately 3% of the world’s electrical energy due to the exploding demand for internet service. The most energy-intensive part of cellular communications is the base station, which there are about four million of them deployed globally. As Fifth Generation (5G) wireless networks are introduced, the number of base stations will be growing in parallel with the data traffic which in turn will increase the energy consumption of  the base station to cater for the growing capacity. The high-power consumption and dynamic traffic demand overburden the base station and consequently reduce energy efficiency. In this paper, an energy-efficient hybrid power supply system for a 5G macro base station is proposed. It is analysed that with the solar energy working in conjunction with the conventional supply from the grid, the reduction of poor power quality is observed as the fluctuation of the demand is greatly decreased. The proposed model showed a reduction in the average grid power by 14.9%. Furthermore, the power supply showed peak power shaving of 5kW; thus, reducing the reliance on the grid as well as increased the energy-efficient of this hybrid power supply system.
      PubDate: Mon, 01 Feb 2021 00:00:00 +000
       
  • Robot control and kinematic analysis with 6DoF manipulator using direct
           kinematic method

    • Authors: Khalaf S Gaeid; Asaad F Nashee, Ibrahim A. Ahmed, Mohammed H. Dekheel
      Abstract: The robots pay important role in all parts of our life. Hence, the modeling of the robot is essential to develop the performance specification. Robot model of six degree of freedom (6DoF) manipulator implemented numerically using model-based technique. The kinematic analysis and simulation were studied with Inverse kinematics of the robot manipulator through Denevit and Hartenberg method. Matrix transformation method is used in this work in order to separate joint variables from kinematic equations. The finding of the desired configuration is obtained precisely in all motion trajectory along the end-effector path. MATLAB/SIMULINK with R2018b is used for the implementation of the model-based robot system. Simulation results showed that the robot rinks follow their references smoothly and precisely and ensure the effectiveness of direct kinematic algorithm in the analysis and control of the robotic field.
      PubDate: Mon, 01 Feb 2021 00:00:00 +000
       
  • Data-based PID control of flexible joint robot using adaptive safe
           experimentation dynamics algorithm

    • Authors: Mohd Ashraf Ahmad; Haszuraidah Ishak, Ahmad Nor Kasruddin Nasir, Normaniha Abd Ghani
      Abstract: This paper proposes the data-based PID controller of flexible joint robot based on adaptive safe experimentation dynamics (ASED) algorithm. The ASED algorithm is an enhanced version of SED algorithm where the updated tuning variable is modified to adapt to the change of the objective function. By adopting the adaptive term to the updated equation of SED, it is expected that the convergence accuracy can be further improved. The effectiveness of the ASED algorithm is verified to tune the PID controller of flexible joint robot. In this flexible joint control problem, two PID controllers are utilized to control both rotary angle tracking and vibration of flexible joint robot. The performance of the proposed data-based PID controller is assessed in terms of trajectory tracking of angular motion, vibration reduction and statistical analysis of the pre-defined control objective function. The simulation results showed that the data-based PID controller based on ASED is able to produce better control accuracy than the conventional SED based method.
      PubDate: Mon, 01 Feb 2021 00:00:00 +000
       
  • Cyclic voltammetry readout circuitry for DNA biosensor application

    • Authors: I. H. Hamzah; A. A. Malik, A. F. A. Rahim, Z. H. C. Soh
      Abstract: Cyclic voltammetry electrochemical biosensors reported a wide usage and applications for its fast response, able to be miniaturized and its sensitivity. However, the bulky, expensive and laboratory-based readout circuitry made it impossible to be used in the field-based environment. A miniaturized and portable readout circuitry for the DNA detection using hybridization technique had been design and developed in this work. It embedded with fabricated FR4 based sensor and produced respective current when the applied voltage was within the range of 0 to 0.5 V. The readout circuitry had been verified with five analysis environments. Bare Au with distilled water (dH2O), bare Au with ferricyanide reagent solution, DNA immobilization, DNA non-hybridization and DNA hybridization. All the results performed produced peak cathodic current when the applied input voltage is within 0.5 V to 3 V and hence proved that the miniaturized and portable readout circuitry is suitable to be implemented for cyclic voltammetry electrochemical biosensor.
      PubDate: Mon, 01 Feb 2021 00:00:00 +000
       
  • Integration of LED-based lighting in academic buildings for energy
           efficiency considerations

    • Authors: Mohamad Zhafran Hussin; Saiful Firdaus Abdul Shukor, Nor Diyana Md Sin, Yusrina Yusof, Muhammad Zairil Muhammad Nor, Noor Hasliza Abdul Rahman
      Abstract: This paper presents an assessment by integration of LED T8 tube lamps in academic buildings for energy efficiency considerations. The proposed project was implemented in conjunction with a national mission, national energy efficiency action plan (NEEAP) for 10-year implementation period of 2016-2025 in reducing allocation on subsidies for efficient expenditure towards energy-saving measures. A case of study in a real environment at one of the UiTM’s buildings as a target task area has been tested by replacing a LED lighting technology in consideration of current operating costs and power factor performances. From the results, LED T8 tubes have shown a better power factor of 0.89 compared to fluorescent lamps with about 0.61 and primarily driven by economic benefits in terms of cost savings of up to 50% with return-on-investment (ROI) 6 months after installation. By integrating this technology, nearly 50% of the total energy consumption in indoor lighting system could be significantly saved, thus reducing the total cost of electricity bills in the future within the target area.

      PubDate: Mon, 01 Feb 2021 00:00:00 +000
       
  • Band pass filter comparison of Hairpin line and square open-loop resonator
           method for digital TV community

    • Authors: Budi Prasetya; Yuyun Siti Rohmah, Dwi Andi Nurmantris, Sarah Mulyawati, Reza Dipayana
      Abstract: The selection of the right filter design method is a very important first step for a radio frequency engineer. This paper presents the comparison of two methods of band pass filter design using hairpin-line and square open-loop resonator. Both methods were applied to obtain filter designs that can work for broadcasting system in digital television community. Band pass filter was simulated using design software and fabricated using epoxy FR-4 substrate. The results of simulation and measurement shown return loss value at 27.3 dB for hairpin line band pass filter and 25.901 for square open-loop resonator band pass filter. Voltage standing wave ratio parameter values were 1.09 and 1.1067 for hairpin line and square open-loop band pass filter respectively. The insertion loss values for the Hairpin line band pass filter and square open-loop band pass filter were 0.9692 and near 0 dB, respectively. Fractional bandwidth, for hairpin line band pass filter, was 6.7% while for square open-loop band pass filter was 4.8%. Regarding the size, the dimension of square open-loop resonator was approximately five times larger than hairpin-line band pass filter. Based on the advantages of the hairpin line method, we recommend that researchers choose the filter for digital TV broadcasting.
      PubDate: Mon, 01 Feb 2021 00:00:00 +000
       
  • A study of edge preserving filters in image matching

    • Authors: Rostam Affendi Hamzah; A. F. Kadmin, S. F. A. Gani, K. A. Aziz, T. M. F. T. Wook, N. Mohamood, M. G. Y. Wei
      Abstract: This article presents a study on edge preserving filters in image matching which comprises a development of stereo matching algorithm using two edge preserving filters. Fundamentally, the framework is reconstructed by several sequential processes. The output of these processes is a disparity map or depth map. The corresponding points between two images require accurate matching to make accurate depth map estimation. Thus, the propose work in this article utilizes sum of squared differences (SSD) with dual edge preserving filters. These filters are used due to edge preserved properties and to increase the accuracy. The median filter (MF) and bilateral filter (BF) will be utilized. The SSD produces preliminary results with low noise and the edge preserving filters reduce noise on the low texture regions with edge preserving properties. Based on the experimental analysis using the standard benchmarking evaluation system from the Middlebury, the disparity map produced is 6.65% for all error pixels. It shows an accurate edge preserved properties on the disparity maps. To make the proposed work more reliable with current available methods, the quantitative measurement has been made to compare with other existing methods and it displays the proposed work in this article perform much better.
      PubDate: Mon, 01 Feb 2021 00:00:00 +000
       
  • Statistical survey and comprehensive review on human skin detection

    • Authors: Hussein Ali Hussein Al Naffakh; Rozaida Ghazali, Nidhal Khdhair El Abbadi
      Abstract: With the advancement of data society today, pictures have turned out to be increasingly imperative. Automatic detection of human skin has been an area of active research for the past few years. Human skin detection assumes a vital job in a wide scope of picture preparing applications going from face detection, steganography, face tracking, age detection, discover pornographic images, the discovery of skin diseases gesture analysis and substance based picture recovery frameworks and to different human PC association spaces. Detecting human skin in complex pictures have ended up being a difficult issue since skin shading can fluctuate drastically in its appearance because of numerous variables, for example, illumination, race, maturing, imaging conditions, and complex foundation. In this study, we will study and analyze skin researches, where we will treat the weakness of previous research of survey on human skin detection methods. The reason for this investigation is to give a state-of-the-art study on human skin molding and detection methods in 1998-2019 periods. Furthermore, this research presented the statistical study for each issue stated before. We finish up with a few ramifications for a future course. Study results will benefit all researchers who are interested in human skin detection topic.

      PubDate: Mon, 01 Feb 2021 00:00:00 +000
       
  • A review of human skin detection applications based on image processing

    • Authors: Hussein Ali Hussein Al Naffakh; Rozaida Ghazali, Nidhal Khdhair El Abbadi, Ali Nadhim Razzaq
      Abstract: In computer science, virtual image processing is the use of a digital computer to manipulate digital images through an algorithm for many applications. To begin with a new research topic, the must trend application that gets many requests to develop should know. Therefore, many applications based on human skin and human life are reviewed in this article, such as detection, classification, blocking, cryptography, identification, localization, steganography, segmentation, tracking, and recognition. In this article, the published articles with the topic of human skin-based image processing are investigated. The international publishers, such as Springer, IEEE, arXiv, and Elsevier are selected. The searching is implemented with the duration criteria of 2015-2019. It noted that human skin detection and recognition are the most repetitive articles with 43% and 28.5%, respectively of the total number of the investigated articles. The usage of human skin models is being widely used in the image processing of various applications.
      PubDate: Mon, 01 Feb 2021 00:00:00 +000
       
  • Generation of high dynamic range for enhancing the panorama environment

    • Authors: Roa'a M. Al_airaji; Ibtisam A. Aljazaery, Suha Kamal Al_Dulaimi, Haider TH.Salim Alrikabi
      Abstract: This paper presents a methodology for enhancement of panorama images environment by calculating high dynamic range. Panorama is constructing by merge of several photographs that are capturing by traditional cameras at different exposure times. Traditional cameras usually have much lower dynamic range compared to the high dynamic range in the real panorama environment, where the images are captured with traditional cameras will have regions that are too bright or too dark. A more details will be visible in bright regions with a lower exposure time and more details will be visible in dark regions with a higher exposure time. Since the details in both bright and dark regions cannot preserve in the images that are creating using traditional cameras, the proposed system have to calculate one using the images that traditional camera can actually produce. The proposed systems start by get LDR panorama image from multiple LDR images using SIFT features technology and then convert this LDR panorama image to the HDR panorama image using inverted local patterns. The results in this paper explained that the HDR panorama images that resulting from the proposed method is more realistic image and appears as it is a real panorama environment.
      PubDate: Mon, 01 Feb 2021 00:00:00 +000
       
  • Correlation of learning disabilities to porn addiction based on EEG

    • Authors: Norhaslinda Kamaruddin; Nurul Izzati Mat Razi, Abdul Wahab
      Abstract: Researchers were able to correlate porn addiction based on electroencephalogram (EEG) signal analysis to the psychological instruments’ findings. In this paper we attempt to correlate the porn addiction to various cases of learning disorders through analyzing EEG signals. Since porn addiction involved the brainwave power at the frontal of the brain, which reflects the executive functions, this may have correlation to learning disorder. Only three types of learning disorder will be of interest in our study involving dyslexic, attention deficit and hyperactivity disorder (ADHD) and autistic children because they involved reduced intellectual ability observed from the lack of listening, speaking, reading, writing, reasoning, or mathematical proficiencies. Children with such disorder when expose to the internet unfiltered porn contents may have minimal understanding of the negative effects of the contents. Such unmonitored exposure to pornographic contents may result to porn addiction because it may trigger excitement and induced pleasure. Experimental results show strong correlation of learning disorders to porn addiction, which can be worthwhile for further analysis. In addition, this paper also indicates that analyzing brainwave patterns could provide a better insight into predicting and detecting children with learning disorders and addiction with direct analysis of the brain wave patterns.

      PubDate: Mon, 01 Feb 2021 00:00:00 +000
       
  • Deblurring of noisy iris images in iris recognition

    • Authors: Shahrizan Jamaludin; Nasharuddin Zainal, W Mimi Diyana W Zaki
      Abstract: Iris recognition used the iris features to verify and identify the identity of human. The iris has many advantages such as stability over time, easy to use and high recognition accuracy. However, the poor quality of iris images can degrade the recognition accuracy of iris recognition system. The recognition accuracy of this system is depended on the iris pattern quality captured during the iris acquisition. The iris pattern quality can degrade due to the blurry image. Blurry image happened due to the movement during image acquisition and poor camera resolution. Due to that, a deblurring method based on the Wiener filter was proposed to improve the quality of iris pattern. This work is significant since the proposed method can enhance the quality of iris pattern in the blurry image. Based to the results, the proposed method improved the quality of iris pattern in the blurry image. Moreover, it recorded the fastest execution time to improve the quality of iris pattern compared to the other methods.
      PubDate: Mon, 01 Feb 2021 00:00:00 +000
       
  • A novel technique for speech encryption based on k-means clustering and
           quantum chaotic map

    • Authors: Amal Hameed Khaleel; Iman Qays Abduljaleel
      Abstract: In information transmission such as speech information, higher security and confidentiality are specially required. Therefore, data encryption is a pre-requisite for a secure communication system to protect such information from unauthorized access. A new algorithm for speech encryption is introduced in this paper. It depends on the quantum chaotic map and k-means clustering, which are employed in keys generation. Also, two stages of scrambling were used: the first relied on bits using the proposed algorithm (binary representation scrambling BiRS) and the second relied on k-means using the proposed algorithm (block representation scrambling BlRS). The objective test used statistical analysis measures (signal-to-noise-ratio, segmental signal-to-noise-ratio, frequency-weighted signal-to-noise ratio, correlation coefficient, log-likelihood ratio) applied to evaluate the proposed system. Via MATLAB simulations, it is shown that the proposed technique is secure, reliable and efficient to be implemented in secure speech communication, as well as also being characterized by high clarity of the recovered speech signal.

      PubDate: Mon, 01 Feb 2021 00:00:00 +000
       
  • Linear discriminate analysis and k-nearest neighbor based diagnostic
           analytic of harmonic source identification

    • Authors: Mohd Hatta Jopri; Abdul Rahim Abdullah, Mustafa Manap, M. Badril Nor Shah, Tole Sutikno, Jingwei Too
      Abstract: The diagnostic analytic of harmonic source is crucial research due to identify and diagnose the harmonic source in the power system. This paper presents a comparison of machine learning (ML) algorithm known as linear discriminate analysis (LDA) and k-nearest neighbor (KNN) in identifying and diagnosing the harmonic sources. Voltage and current features that estimated from time-frequency representation (TFR) of S-transform analysis are used as the input for ML. Several unique cases of harmonic source location are considered, whereas harmonic voltage (HV) and harmonic current (HC) source type-load are used in the diagnosing process. To identify the best ML, each ML algorithm is executed 10 times due to prevent any overfitting result and the performance criteria are measured consist of the accuracy, precision, geometric mean, specificity, sensitivity, and F measure are calculated.

      PubDate: Mon, 01 Feb 2021 00:00:00 +000
       
  • An improved age invariant face recognition using data augmentation

    • Authors: Kennedy Okokpujie; Samuel John, Charles Ndujiuba, Joke A. Badejo, Etinosa Noma- Osaghae
      Abstract: In spite of the significant advancement in face recognition expertise, accurately recognizing the face of the same individual across different ages still remains an open research question. Face aging causes intra-subject variations (such as geometric changes during childhood & adolescence, wrinkles and saggy skin in old age) which negatively affects the accuracy of face recognition systems. Over the years, researchers have devised different techniques to improve the accuracy of age invariant face recognition (AIFR) systems. In this paper, the face and gesture recognition network (FG-NET) aging dataset was adopted to enable the benchmarking of experimental results. The FG-Net dataset was augmented by adding four different types of noises at the preprocessing phase in order to improve the trait aging face features extraction and the training model used at the classification stages, thus addressing the problem of few available training aging for face recognition dataset. The developed model was an adaptation of a pre-trained convolution neural network architecture (Inception-ResNet-v2) which is a very robust noise. The proposed model on testing achieved a 99.94% recognition accuracy, a mean square error of 0.0158 and a mean absolute error of 0.0637. The results obtained are significant improvements in comparison with related works.
      PubDate: Mon, 01 Feb 2021 00:00:00 +000
       
  • Mobile ad-hoc network routing protocols of time-critical events for search
           and rescue missions

    • Authors: Marwan Hamid Hassan; Salama A. Mostafa, Hairulnizam Mahdin, Aida Mustapha, Azizul Azhar Ramli, Mustafa Hamid Hassan, Mohammed Ahmed Jubair
      Abstract: The most important experiences we discovered from several disasters are that cellular networks were vulnerable, and the loss of the communication system may have a catastrophic consequence. Mobile ad-hoc networks (MANETs) play a significant role in the construction of campus, resident, battlefield and search/rescue region. MANET is an appropriate network for supporting
      a communication where is no permanent infrastructure. MANET is an effective network that uses to establishing urgent communication between rescue members in critical situations like, disaster or natural calamities. The sending and receiving data in MANET is depending on the routing protocols to adapt the dynamic topology and maintain the routing information. Consequently, This paper evaluates the performance of three routing protocols in MANET: ad-hoc on-demand distance vector (AODV), destination sequenced distance vector (DSDV), and ad-hoc on-demand multipath distance vector (AOMDV). These protocols are inherent from different types of routing protocols: single-path, multi-path, reactive and proactive mechanisms. The NS2 simulator is utilized to evaluate the quality of these protocols. Several metrics are used to assess the performance of these protocols such: packet delivery ratio (PDR), packet loss ratios (PLR), throughput (TP), and end-to-end delay (E2E delay). The outcomes reveal the AOMDV is the most suitable protocol for time-critical events of search and rescue missions.

      PubDate: Mon, 01 Feb 2021 00:00:00 +000
       
  • Development of patch stack antenna for CP-SAR sensor

    • Authors: Muhammad Fauzan Edy Purnomo; Vita Kusumasari, Rusmi Ambarwati, Sigit Kusmaryanto, Sholeh Hadi Pramono, Dwi Fadila Kurniawan, Akio Kitagawa
      Abstract: In this paper, we obtain the basic configuration of the left-hand circular polarization (LHCP) array two patches stack triangular truncated microstrip antenna. This construction use the basic corporate feed microstrip-line with modified lossless T-junction power divider on radiating patch for circularly polarized-synthetic aperture radar (CP-SAR) sensor embedded on airspace with compact, small, and simple configuration. The design of Circular Polarization (CP) is realized by truncating the whole three tips and adjusting the parameters of antenna at the resonant frequency, f=5.2 GHz. The results of characteristic performance and S-parameter for the LHCP array two patches stack antenna at the resonant frequency show successively about 7.24 dBic of gain, 1.99 dB of axial ratio (Ar), and -11.43 dB of S-parameter. Moreover, the impedance bandwidth and the 3 dB-Ar bandwidth of this antenna are around 560 MHz (10.77%) and 50 MHz (0.96%), respectively.
      PubDate: Mon, 01 Feb 2021 00:00:00 +000
       
  • Wireless sensor network calibration technique for low-altitude unmanned
           aerial vehicle localization in paddy field

    • Authors: Azhar Jaafar; Norashikin M. Thamrin, Noorolpadzilah Mohamed Zan
      Abstract: This paper presents the use of the received signal strength indicator (RSSI) from the RF signal to estimate the distance from a point where the signal is transmitted to the point where the signal is received. This can be a challenge as in the paddy field, the watery and dry conditions, as well as the height of the paddy plant can affect signal transmission during this estimation process. Two low-cost ground beacons, Beacon1 and Beacon2 (The coordinator), are used and placed in a known location with a fixed distance across the paddy field, which becomes the reference point during the distance estimation for the unmanned aerial vehicle (UAV). These signals are analyzed by using the non-right-angle trigonometry computation, to estimate the distance between the transmitter and the receiver. The estimated distance is compared with the measured value to determine the efficiency of this approach. The calibration trendlines of these beacons in the open, watery and dry paddy fields are discussed and presented. It is found that the dry paddy field gives less RSSI mean error and proved that humidity can contribute to the distance estimation error.
      PubDate: Mon, 01 Feb 2021 00:00:00 +000
       
  • Analyzing bit error rate of relay sensors selection in wireless
           cooperative communication systems

    • Authors: Ahmed Allawy Alawady; Ahmed Alkhayyat, Mohammed Ahmed Jubair, Mustafa Hamid Hassan, Salama A. Mostafa
      Abstract: Cooperative communication systems, which make use of the intermediate relays between the transmitter and the receiver, have been employed as an effective technique to combat the channel fading and to enhance system performance. Cooperative systems have some drawbacks such as high latency and may diversity order not guaranteed. To alleviate the negative effects of these factors, the relay selection protocol is employed in cooperative communication systems to increase overall cooperative system performance. Relay selection in the cooperative systems enables the source to cooperate with the single relay node rather than multiple relay nodes which guaranteed the diversity order.
      PubDate: Mon, 01 Feb 2021 00:00:00 +000
       
  • Radio frequency peak and average power density from mobile base stations
           in Ekiti State, Nigeria

    • Authors: Ilesanmi B. Oluwafemi; Adedeji M. Faluru, Tayo D. Obasanyo
      Abstract: The ever-increasing number of mobile telecommunication base station as a result of increasing demand for broadband applications has raised a growing concern and worry over the health implications and safety of the radiations from these base stations by the resident of Ekiti State and Nigeria in Nigeria. Measurement of radio frequency was conducted in this research in order to study the electromagnetic field radiation level in Ekiti State Nigeria. Investigation was conducted with the four available mobile operators with the three sub-frequency band viz 900 MHz, 1800 MHz and 2100 MHz. The power density of radio frequency radiation was estimated through measurement with the aid of A 3-Axis RF Radiation Strength Meter TM-196 and Handheld Spectrum Analyzer Model NA-773, 144/430. The peak and average power density was computed using the method of theoretical calculation and the safety distance from the antennas were estimated. The measured and the calculated values were compared with the international commission on non-ionizing radiation protection (ICNIRP) standard for public and occupational exposure level. Results show that the radiations from the base stations adheres to the standard provided by ICNIRP
      PubDate: Mon, 01 Feb 2021 00:00:00 +000
       
  • Effect of the defected microstrip structure shapes on the performance of
           dual-band bandpass filter for wireless communications

    • Authors: Mussa Mabrok; Zahriladha Zakaria, Yully Erwanti Masrukin, Tole Sutikno, Hussein Alsariera
      Abstract: Due to the progression growth of multiservice wireless communication systems in a single device, multiband bandpass filter has attract a great attention to the end user. Therefore, multiband bandpass filter is a crucial component in the multiband transceivers systems which can support multiple services in one device. This paper presents a design of dual-band bandpass filter at 2.4 GHz and 3.5 GHz for WLAN and WiMAX applications. Firstly, the wideband bandpass filter is designed at a center frequency of 3 GHz based on quarter-wavelength short circuited stub. Three types of defected microstrip structure (DMS) are implemented to produce a wide notch band, which are T-inversed shape, C-shape, and U- Shape. Based on the performance comparisons, U-shaped DMS is selected to be integrated with the bandpass filter. The designed filter achieved two passbands centered at 2.51 GHz and 3.59 GHz with 3 dB bandwidth of 15.94 % and 15.86 %. The proposed design is very useful for wireless communication systems and its applications such as WLAN and WiMAX 
      PubDate: Mon, 01 Feb 2021 00:00:00 +000
       
  • Employing non-orthogonal multiple access scheme in UAV-based wireless
           networks

    • Authors: Chi- Bao Le; Dinh- Thuan Do
      Abstract: This paper studies the two-hop transmission relying unmanned aerial vehicle (UAV) relays which is suitable to implement in the internet of things (IoT) systems. To enhance system performance in order to overcome the large scale fading between the base station (BS) and destination as well as achieve the higher spectrum efficiency, where non-orthogonal multiple access (NOMA) strategies were typically applied for UAV relays to implement massive connections transmission. In particular, outage probability is evaluated via signal to noise ratio (SNR) criterion so that the terminal node can obtain reasonable performance. The derivations and analysis results showed that the considered fixed power allocation scheme provides performance gap among two signals at destination.The numerical simulation confirmed the exactness of derived expressions in the UAV assisted system.
      PubDate: Mon, 01 Feb 2021 00:00:00 +000
       
  • Requirements identification for distributed agile team communication using
           high level carotene

    • Authors: Nor Hidayah Zainal Abidin; Pathiah Abdul Samat
      Abstract: Communication plays an important role to deliver the correct information. However, the communication became challenging especially for agile software teams, which are in geographical distributed. The problem arise when there are exchanging information using unstructured communication platform, misunderstanding on the information communicated and lack of documentation. The aim of this study is to propose a text classification technique for requirements identification in text messages. In this study, we adopted the cascade and cluster classification concept of Carotene that relies on the hash tag function. It classifies the text messages into requirements types instead of job title. This technique called as high-level carotene (HLC) technique that embedded into the tool to identify the functional requirement and non-functional requirements. The result shows that most of criterias evaluated have achieved more than 85% of effectiveness in identifying both of requirement in text messaging by using this technique.
      PubDate: Mon, 01 Feb 2021 00:00:00 +000
       
  • A review of website evaluation using web diagnostic tools and data
           envelopment analysis

    • Authors: Hassan Najadat; Amer Al-Badarneh, Sawsan Alodibat
      Abstract: This paper presents a review of the most recently published works of the use of data envelopment analysis (DEA) in the evaluation of websites of different fields such as healthcare, e-business, e-commerce, and e-government. The evaluation of websites is performed using web diagnostic tools (WDTs). Some studies have evaluated e-government websites using WDTs only, while others integrate them with data envelopment analysis. We summarize each study including the country that was conducted in, the size of data set, inputs to DEA, outputs from DEA, the approach used, the tools used, and the results obtained. It also covers whether there is a use of combination between DEA and data mining or machine learning approaches to classify the efficiency of these websites.

      PubDate: Mon, 01 Feb 2021 00:00:00 +000
       
  • A Review of anomaly detection techniques in advanced metering
           infrastructure

    • Authors: Abbas M. Al-Ghaili; Zul- Azri Ibrahim, Syazwani Arissa Shah Hairi, Fiza Abdul Rahim, Hasventhran Baskaran, Noor Afiza Mohd Ariffin, Hairoladenan Kasim
      Abstract: Advanced Metering Infrastructure (AMI) is a component of electrical networks that combines the energy and telecommunication infrastructure to collect, measure and analyze consumer energy consumptions. One of the main elements of AMI is a smart meter that used to manage electricity generation and distribution to end-user. The rapid implementation of AMI raises the need to deliver better maintenance performance and monitoring more efficiently while keeping consumers informed on their consumption habits. The convergence from analog to digital has made AMI tend to inherit the current vulnerabilities of digital devices that prone to cyber-attack, where attackers can manipulate the consumer energy consumption for their benefit. A huge amount of data generated in AMI allows attackers to manipulate the consumer energy consumption to their benefit once they manage to hack into the AMI environment. Anomalies detection is a technique can be used to identify any rare event such as data manipulation that happens in AMI based on the data collected from the smart meter. The purpose of this study is to review existing studies on anomalies techniques used to detect data manipulation in AMI and smart grid systems. Furthermore, several measurement methods and approaches used by existing studies will be addressed.
      PubDate: Mon, 01 Feb 2021 00:00:00 +000
       
  • DEH-DoSv6: A defendable security model against IPv6 extension headers
           denial of service attack

    • Authors: Marlon A. Naagas; Alvin R. Malicdem, Thelma D. Palaoag
      Abstract: With the rapid depletion of IPv4 protocol in these recent years, the IETF introduced IPv6 as a solution to address the exhaustion, however, as a new protocol exists, new characteristics have been introduced and new threats have been discovered. Extension Headers are the new characteristics of IPv6 that have an emerging and re-emerging security threats that is needed to be taken into consideration during the full migration to the IPv6 network. This study revealed that up to this moment, the popular vendors are still vulnerable and doesn’t have any default protection to deal with extension headers’ Denial of Service Attack (DoS). Also, this study leads to the development of new security model which creates a new solution to address the emerging threats of IPv6 extension headers’ Denial of Service Attack. Moreover, the results of this study show that our proposed security model is more effective in terms of neutralizing the unwanted traffic causing evasion attack by filtering, rate-limiting and discarding the malformed packets of prohibited extension headers’ payload versus the traditional router protection.
      PubDate: Mon, 01 Feb 2021 00:00:00 +000
       
  • Analyzing sentiment system to specify polarity by lexicon-based

    • Authors: Dhafar Hamed Abd; Ayad R. Abbas, Ahmed T. Sadiq
      Abstract: Currently, sentiment analysis into positive or negative getting more attention from the researchers. With the rapid development of the internet and social media have made people express their views and opinion publicly. Analyzing the sentiment in people views and opinion impact many fields such as services and productions that companies offer. Movie reviewer needs many processing to be prepared to detect emotion, classify them and achieve high accuracy. The difficulties arise due of the structure and grammar of the language and manage the dictionary. We present a system that assigns scores indicating positive or negative opinion to each distinct entity in the text corpus. Propose an innovative formula to compute the polarity score for each word occurring in the text and find it in positive dictionary or negative dictionary we have to remove it from text. After classification, the words are stored in a list that will be used to calculate the accuracy. The results reveal that the system achieved the best results in accuracy of 76.585%.

      PubDate: Mon, 01 Feb 2021 00:00:00 +000
       
  • Selection of optimal hyper-parameter values of support vector machine for
           sentiment analysis tasks using nature-inspired optimization methods

    • Authors: Lakshmana Kumar Ramasamy; Seifedine Kadry, Sangsoon Lim
      Abstract: Sentiment analysis and classification task is used in recommender systems to analyze movie reviews, tweets, Facebook posts, online product reviews, blogs, discussion forums, and online comments in social networks. Usually, the classification is performed using supervised machine learning methods such as support vector machine (SVM) classifier, which have many distinct parameters. The selection of the values for these parameters can greatly influence the classification accuracy and can be addressed as an optimization problem. Here we analyze the use of three heuristics, nature-inspired optimization techniques, cuckoo search optimization (CSO), ant lion optimizer (ALO), and polar bear optimization (PBO), for parameter tuning of SVM models using various kernel functions. We validate our approach for the sentiment classification task of Twitter dataset. The results are compared using classification accuracy metric and the Nemenyi test.
      PubDate: Mon, 01 Feb 2021 00:00:00 +000
       
  • Discretization methods for Bayesian networks in the case of the earthquake

    • Authors: Devni Prima Sari; Dedi Rosadi, Adhitya Ronnie Effendie, Danardono Danardono
      Abstract: The Bayesian networks are a graphical probability model that represents interactions between variables. This model has been widely applied in various fields, including in the case of disaster. In applying field data, we often find a mixture of variable types, which is a combination of continuous variables and discrete variables. For data processing using hybrid and continuous Bayesian networks, all continuous variables must be normally distributed. If normal conditions unsatisfied, we offer a solution, is to discretize continuous variables. Next, we can continue the process with the discrete Bayesian networks. The discretization of a variable can be done in various ways, including equal-width, equal-frequency, and K-means. The combination of BN and k-means is a new contribution in this study called the k-means Bayesian networks (KMBN) model. In this study, we compared the three methods of discretization used a confusion matrix. Based on the earthquake damage data, the K-means clustering method produced the highest level of accuracy. This result indicates that K-means is the best method for discretizing the data that we use in this study.
      PubDate: Mon, 01 Feb 2021 00:00:00 +000
       
  • Signature PSO: A novel inertia weight adjustment using fuzzy signature for
           LQR tuning

    • Authors: Achmad Komarudin; Novendra Setyawan, Leonardo Kamajaya, Mas Nurul Achmadiah, Zulfatman Zulfatman
      Abstract: Particle swarm optimization (PSO) is an optimization algorithm that is simple and reliable to complete optimization. The balance between exploration and exploitation of PSO searching characteristics is maintained by inertia weight. Since this parameter has been introduced, there have been several different strategies to determine the inertia weight during a train of the run. This paper describes the method of adjusting the inertia weights using fuzzy signatures called signature PSO. Some parameters were used as a fuzzy signature variable to represent the particle situation in a run. The implementation to solve the tuning problem of linear quadratic regulator (LQR) control parameters is also presented in this paper. Another weight adjustment strategy is also used as a comparison in performance evaluation using an integral time absolute error (ITAE). Experimental results show that signature PSO was able to give a good approximation to the optimum control parameters of LQR in this case.
      PubDate: Mon, 01 Feb 2021 00:00:00 +000
       
  • “Scrumbear” framework for solving traditional scrum model
           problems

    • Authors: Leanah Alsaber; Ebtesam Al Elsheikh, Sarah Aljumah, Nor Shahida Mohd Jamail
      Abstract: Software engineering is a discipline that is little understood by people. It defines how software is developed and maintained to meet the clients’ requirements. Software engineers follow certain systems and standards in their work to meet the clients’ desires. It is on this background that engineers follow specific models in coming up with the final product. One of the models highly used is scrum, which is one of the agile methodologies. However, despite being highly used, it has inherent flaws that need to be corrected. Those flaws are product owner continues changing; do not accept changes in working scrum, sprint’s release time limitation, finally wasting team time within each sprint. This paper presents a new framework, which is an updated version of the current Scrum, to overcome the scum models mentioned issues. In this study, a new framework is presented in a way that is understandable and needed by software developer’s team upon the collected qualitative and quantitative data. The implementation was by making some changes to the current scrum model leading to the “Scrumbear”, certain flaws can be corrected. One of the presented changes involve adding the control master rule to ensure controlling the requirements changing.
      PubDate: Mon, 01 Feb 2021 00:00:00 +000
       
  • Implementation of vehicle ventilation system using NodeMCU ESP8266 for
           remote monitoring

    • Authors: Amirun Murtaza Abd Jalil; Roslina Mohamad, Nuzli Mohamad Anas, Murizah Kassim, Saiful Izwan Suliman
      Abstract: In this paper, an implementation of vehicle ventilation system using microcontroller NodeMCU is described, as an internet of things (IoT) platform. A low-cost wireless fidelity (Wi-Fi) microchip ESP8266 integrated with NodeMCU provides full-stack transmission control protocol/internet protocol (TCP/IP) to communicate between mobile applications. This chip is capable to monitor and control sensor devices connected to the IoT platform. In this reserach, data was collected from a temperature sensor integrated to the platform, which then monitored using Blynk application. The vehicle ventilation system was activated/deactivated through mobile application and controlled using ON/OFF commands sent to the connected devices. From the results, the vehicle ventilation system built using NodeMCU microcontroller is capable to provide near real-time data monitoring for temperature in the car before and after the ventilation system was applied.

      PubDate: Mon, 01 Feb 2021 00:00:00 +000
       
  • An enhanced fireworks algorithm to generate prime key for multiple users
           in fingerprinting domain

    • Authors: Hussein Ali Ismael; Jamal Mustafa Abbas, Salama A. Mostafa, Ali Hussein Fadel
      Abstract: This work presents a new method to enhance the performance of fireworks algorithm to generate a prime key for multiple users. A threshold technique in image segmentation is used as one of the major steps. It is used processing the digital image. Some useful algorithms and methods for dividing and sharing an image, including measuring, recognizing, and recognizing, are common. In this research, we proposed a hybrid technique of fireworks and camel herd algorithms (HFCA), where Fireworks are based on 3-dimension (3D) logistic chaotic maps. Both, the Otsu method and the convolution technique are used in the pre-processing image for further analysis. The Otsu is employed to segment the image and find the threshold for each image, and convolution is used to extract the features of the used images. The sample of the images consists of two images of fingerprints taken from the Biometric System Lab (University of Bologna). The performance of the anticipated method is evaluated by using FVC2004 dataset. The results of the work enhanced algorithm, so quick response code (QRcode) is used to generate a stream key by using random text or number, which is a class of symmetric-key algorithm that operates on individual bits or bytes.
      PubDate: Mon, 01 Feb 2021 00:00:00 +000
       
  • A fuzzy multi-criteria decision-making method for purchasing life
           insurance in India

    • Authors: Chinmaya Ranjan Pattnaik; Sachi Nandan Mohanty, Sarita Mohanty, Jyotir Moy Chatterjee, Biswajit Jana, Vicente Garcia Diaz
      Abstract: Life insurance is an agreement between an insured and an insurer, where the insurer pays out a sum of money either on a specific period or the death of the insured. Now a day, People can buy a policy through an online platform. There are a lot of insurance companies available in the market, and each company has various policies. Selecting the best insurance company for purchasing an online term plan is a very complex problem. People may confuse to choose the best insurance company for buying an online term. It is a multi-criteria decision making (MCDM) problem, and the problem consists of different criteria and various alternatives. Here in this paper, a model has been proposed to solve this decision-making problem. In this model, a fuzzy multi-criteria decision-making approach combined with technique for order preference by similarity to ideal solution (TOPSIS) and it has been applied to rank the different insurance companies based on online term plans. The experimental results show that the life insurance corporation of India (LIC) gets the top rank out of 12 companies for purchasing an online term plan. A sensitivity analysis has been performed to validate the proposed model.
      PubDate: Mon, 01 Feb 2021 00:00:00 +000
       
  • Temperature monitoring using polymer optical fiber with integration to the
           internet of things

    • Authors: Hazura Haroon; Siti Khadijah Idris, Anis Suhaila Mohd Zain, Hanim Abdul Razak, Fauziyah Salehuddin
      Abstract: In this paper, a polymer optical fiber (POF) is applied for temperature measuring of water solution using a light source of 650nm. The aim is to analyse the impact of temperature variations on the output of POF sensor device in terms of output power and sensitivity. From the study, the POF sensor shows a linear trend when the temperature is increased from 30°C to 80°C with the sensitivity of the polymer optical fiber for output power to the temperature are 0.00973 dBm/°C or 0.14797 nW/°C, for optical characterization and 0.0011 V/°C for electrical characterization. The integration of the Internet of Things to the system helps the user to monitor the temperature of various spaces anywhere at any time. The sensed values are controlled by Arduino Uno R3 and then sent to Blynk to provide wireless monitoring by the user. 
      PubDate: Mon, 01 Feb 2021 00:00:00 +000
       
  • Visualizing stemming techniques on online news articles text analytics

    • Authors: Nurul Atiqah Razmi; Muhammad Zharif Zamri, Sharifah Syafiera Syed Ghazalli, Noraini Seman
      Abstract: Stemming is the process to convert words into their root words by the stemming algorithm. It is one of the main processes in text analytics where the text data needs to go through stemming process before proceeding to further analysis. Text analytics is a very common practice nowadays that is practiced toanalyze contents of text data from various sources such as the mass media and media social. In this study, two different stemming techniques; Porter and Lancaster are evaluated. The differences in the outputs that are resulted from the different stemming techniques are discussed based on the stemming error and the resulted visualization. The finding from this study shows that Porter stemming performs better than Lancaster stemming, by 43%, based on the stemming error produced. Visualization can still be accommodated by the stemmed text data but some understanding of the background on the text data is needed by the tool users to ensure that correct interpretation can be made on the visualization outputs.
      PubDate: Mon, 01 Feb 2021 00:00:00 +000
       
  • Towards an objective comparison of feature extraction techniques for
           automatic speaker recognition systems

    • Authors: Ayoub Bouziane; Jamal Kharroubi, Arsalane Zarghili
      Abstract: A common limitation of the previous comparative studies on speaker-features extraction techniques lies in the fact that the comparison is done independently of the used speaker modeling technique and its parameters. The aim of the present paper is twofold. Firstly, it aims to review the most significant advancements in feature extraction techniques used for automatic speaker recognition. Secondly, it seeks to evaluate and compare the currently dominant ones using an objective comparison methodology that overcomes the various limitations and drawbacks of the previous comparative studies. The results of the carried out experiments underlines the importance of the proposed comparison methodology. 
      PubDate: Mon, 01 Feb 2021 00:00:00 +000
       
  • Reconfiguration layers of convolutional neural network for fundus patches
           classification

    • Authors: Wahyudi Setiawan; Moh. Imam Utoyo, Riries Rulaningtyas
      Abstract: Convolutional neural network (CNN) is a method of supervised deep learning. The architectures including AlexNet, VGG16, VGG19, ResNet 50, ResNet101, GoogleNet, Inception-V3, Inception ResNet-V2, and Squeezenet that have 25 to 825 layers. This study aims to simplify layers of CNN architectures and increased accuracy for fundus patches classification. Fundus patches classify two categories: normal and neovascularization. Data used for classification is MESSIDOR and Retina Image Bank that have 2,080 patches. Results show the best accuracy of 93.17% for original data and 99,33% for augmentation data using CNN 31 layers. It consists input layer, 7 convolutional layers, 7 batch normalization, 7 rectified linear unit, 6 max-pooling, fully connected layer, softmax, and output layer.

      PubDate: Mon, 01 Feb 2021 00:00:00 +000
       
  • An efficient apriori algorithm for frequent pattern mining using mapreduce
           in healthcare data

    • Authors: M. Sornalakshmi; S. Balamurali, M. Venkatesulu, M. Navaneetha Krishnan, Lakshmana Kumar Ramasamy, Seifedine Kadry, Sangsoon Lim
      Abstract: The development for data mining technology in healthcare is growing today as knowledge and data mining are a must for the medical sector. Healthcare organizations generate and gather large quantities of daily information. Use of IT allows for the automation of data mining and information that help to provide some interesting patterns which remove manual tasks and simple data extraction from electronic records, a process of electronic data transfer which secures medical records, saves lives and cuts the cost of medical care and enables early detection of infectious diseases. In this research paper an improved Apriori algorithm names Enhanced Parallel and Distributed Apriori (EPDA) is presented for the health care industry, based on the scalable environment known as Hadoop MapReduce. The main aim of the work proposed is to reduce the huge demands for resources and to reduce overhead communication when frequent data are extracted, through split-frequent data generated locally and the early removal of unusual data. The paper shows test results, whereby the EPDA performs in terms of the time and number of rules generated with a database of healthcare and different minimum support values.

      PubDate: Mon, 01 Feb 2021 00:00:00 +000
       
  • Improved El Gamal public key cryptosystem using 3D chaotic maps

    • Authors: Muna KH. Al-naamee; Sura Mazin Ali
      Abstract: Digital information is any type of data that is stored electronically. These data need to protect its assets and unauthorized access to it and therefore need measures to protect digital privacy. This process is done in different ways, one of which is encryption. Encryption provides secure transfer of unauthorized data over insecure channels. In this paper a method is proposed to create the keys to the El Gamal PKC algorithm based on chaos theory. The proposed algorithm uses 3D chaos maps to create keys used in the encryption and decryption process using an El Gamal algorithm. The time spent encoding and decoding in milliseconds was calculated and compared with methods that used 1D and 2D chaotic maps. Also, the results obtained exceeded most of the statistical and NIST tests. The generated results are tested their reactions against many types of attacks. Then, the results showed that the proposed method had an excellent randomness efficiency for creating public and private keys for El Gamal's algorithm.

      PubDate: Mon, 01 Feb 2021 00:00:00 +000
       
  • Data falsification attacks in advanced metering infrastructure

    • Authors: Hasventhran Baskaran; Abbas M. Al-Ghaili, Zul- Azri Ibrahim, Fiza Abdul Rahim, Saravanan Muthaiyah, Hairoladenan Kasim
      Abstract: Smart grids are the cutting-edge electric power systems that make use of the latest digital communication technologies to supply end-user electricity, but with more effective control and can completely fill end user supply and demand. Advanced Metering Infrastructure (AMI), the backbone of smart grids, can be used to provide a range of power applications and services based on AMI data. The increased deployment of smart meters and AMI have attracted attackers to exploit smart grid vulnerabilities and try to take advantage of the AMI and smart meter’s weakness. One of the possible major attacks in the AMI environment is False Data Injection Attack (FDIA). FDIA will try to manipulate the user’s electric consumption by falsified the data supplied by the smart meter value in a smart grid system using additive and deductive attack methods to cause loss to both customers and utility providers. This paper will explore two possible attacks, the additive and deductive data falsification attack and illustrate the taxonomy of attack behaviors that results in additive and deductive attacks. This paper contributes to real smart meter datasets in order to come up with a financial impact to both energy provider and end-user.
      PubDate: Mon, 01 Feb 2021 00:00:00 +000
       
  • Physical activity prediction using fitness data: Challenges and issues

    • Authors: Nur Zarna Elya Zakariya; Marshima Mohd Rosli
      Abstract: In the new healthcare transformations, individuals are encourage to maintain healthy life based on their food diet and physical activity routine to avoid risk of serious disease. One of the recent healthcare technologies to support self health monitoring is wearable device that allow individual play active role on their own healthcare. However, there is still questions in terms of the accuracy of wearable data for recommending physical activity due to enormous fitness data generated by wearable devices. In this study, we conducted a literature review on machine learning techniques to predict suitable physical activities based on personal context and fitness data. We categorize and structure the research evidence that has been publish in the area of machine learning techniques for predicting physical activities using fitness data. We found 10 different models in Behavior Change Technique (BCT) and we selected two suitable models which are Fogg Behavior Model (FBM) and Trans-theoretical Behavior Model (TTM) for predicting physical activity using fitness data. We proposed a conceptual framework which consists of personal fitness data, combination of TTM and FBM to predict the suitable physical activity based on personal context. This study will provide new insights in software development of healthcare technologies to support personalization of individuals in managing their own health.
      PubDate: Mon, 01 Feb 2021 00:00:00 +000
       
  • Review on feature-based method performance in text steganography

    • Authors: Mohd Hilal Muhammad; Hanizan Shaker Hussain, Roshidi Din, Hafiza Samad, Sunariya Utama
      Abstract: The implementation of steganography in text domain is one the crutial issue that can hide an essential message to avoid the intruder. It is caused every personal information mostly in medium of text, and the steganography itself is expectedly as the solution to protect the information that is able to hide the hidden message that is unrecognized by human or machine vision. This paper concerns about one of the categories in steganography on medium of text called text steganography that specifically focus on feature-based method. This paper reviews some of previous research effort in last decade to discover the performance of technique in the development the feature-based on text steganography method. Then, ths paper also concern to discover some related performance that influences the technique and several issues in the development the feature-based on text steganography method.
      PubDate: Mon, 01 Feb 2021 00:00:00 +000
       
  • Analyzing the impact of the number of nodes on the performance of the
           routing protocols in manet environment

    • Authors: Hussein M. Haglan; Salama A. Mostafa, Noor Zuraidin Mohd Safar, Aida Mustapha, Mohd. Zainuri Saringatb, Hosam Alhakami, Wajdi Alhakami
      Abstract: Mobile Ad-hoc Networks (MANETs) are independent systems that can work without the requirement for unified controls, pre-setup to the paths/routes or advance communication structures. The nodes/hubs of a MANET are independently controlled, which permit them to behave unreservedly in a randomized way inside the MANET. The hubs can leave their MANET and join different MANETs whenever the need arises. These attributes, in any case, may contrarily influence the performance of the routing conventions (or protocols) and the general topology of the systems. Along these lines, MANETs include uniquely planned routing conventions that responsively as well as proactively carry out the routing. This paper assesses and looks at the effectiveness (or performance) of five directing conventions which are AOMDV, DSDV, AODV, DSR and OLSR in a MANET domain. The research incorporates executing a simulating environment to look at the operation of the routing conventions dependent on the variable number of hubs. Three evaluation indices are utilized: Throughput (TH), Packet Delivery Ratio (PDR), and End-to-End delay (E2E). The assessment outcomes indicate that the AODV beats other conventions in the majority of the simulated scenarios.

      PubDate: Mon, 01 Feb 2021 00:00:00 +000
       
  • What affects digitalization process in developing economies' An
           evidence from SMEs sector in Oman

    • Authors: Mansour Naser Alraja; Muawya Ahmed Hussein, Hanaa Mahmoud Sid Ahmed
      Abstract: The main objective of this paper is to investigate the SMEs’ leader perspective about the basic factors influencing the transformation into digitalization by SMEs they lead, using technological, organizational, and environmental (TOE) Model. The data were collected from 61 SMEs leaders in Oman, to achieve the study objective TOE model has been adopted. Internal consistency and data normality, and factor analysis were implemented. Structural equation modeling (SEM) used to test the proposed hypotheses. The outcomes of SEM indicate that TOE factors are significantly affects the ability of SMEs to digitalize their business process. The study findings come in the context of Omani definition of SMEs. More, no control was made for industry type to which SMEs participants are belong. Leaders of SMEs should frame strategies to simplify the digital transformation of their enterprises and attempt to provide organizational and technological facilities that will smooth their digitalization which will improve SMEs capabilities, as well as, increasing the international competitiveness of the SMEs. To the best of the authors' knowledge, this study is one of the first that investigated the digital transformation among SMEs from the leaders’ perspective in Oman.
      PubDate: Mon, 01 Feb 2021 00:00:00 +000
       
  • Enhancement of digital signature algorithm in bitcoin wallet

    • Authors: Farah Maath Jasem; Ali Makki Sagheer, Abdullah M. Awad
      Abstract: Bitcoin is a peer-to-peer electronic cash system largely used for online financial transactions. It gained popularity due to its anonymity, privacy, and comparatively low transaction cost. Its wallet heavily relies on Elliptic Curve Digital Signature Algorithm (ECDSA). Weaknesses in such algorithms can significantly affect the safety and the security of bitcoin wallets. In this paper, a secure key management wallet was designed based on several changes in the wallet parts. In the cold wallet, we employed an image-based passphrase to achieve a strong entropy source of master seed. The hot wallet, the proposed key_ Gen algorithm is modifying to the key generation step of the ECDSA that it is to generate a fresh key pair at each transaction. The final part ensures recovering all keys on both hot and cold wallets without daily backups in case of losing the wallet. The findings prove that the proposed cold wallet is resisting against a dictionary attack and overcoming the memorizing problem. The proposed hot wallet model acquires good anonymity and privacy for bitcoin users by eliminating transaction likability without additional cost. The execution time for signing a transaction of the proposed model is~70 millisecond, which is then important in the bitcoin domain.
      PubDate: Mon, 01 Feb 2021 00:00:00 +000
       
  • Multischeme feedforward artificial neural network architecture for DDoS
           attack detection

    • Authors: Arif Wirawan Muhammad; Cik Feresa Mohd Foozy, Kamaruddin Malik bin Mohammed
      Abstract: Distributed denial of service attack classified as a structured attack to deplete server, sourced from various bot computers to form a massive data flow. Distributed denial of service (DDoS) data flows behave as regular data packet flows, so it is challenging to distinguish between the two. Data packet classification to detect DDoS attacks is one solution to prevent DDoS attacks and to maintain server resources maintained. The machine learning method especially artificial neural network (ANN), is one of the effective ways to detect the flow of data packets in a computer network. Based on the research that has carried out, it concluded that ANN with hidden layer architecture that contains neuron twice as neuron on the input layer (2n) produces a stable detection accuracy value on Quasi-Newton, Scaled-Conjugate and Resilient-Propagation training functions. Based on the studies conducted, it concluded that ANN Architecture sufficiently affected the Scaled-Conjugate and Resilient-Propagation training functions, otherwise the Quasi-Newton training function. The best detection accuracy achieved from the experiment is 99.60%, 1.000 recall, 0.988 precision, and 0.993 f-measure using the Quasi-Newton training function with 6-(12)-2 neural network architecture.
      PubDate: Mon, 01 Feb 2021 00:00:00 +000
       
  • Hardware-software partitioning using three-level hybrid algorithm for
           system-on-chip platform

    • Authors: Tiong Reng Xian; Zaini Abdul Halim, Ching Chia Leong, Tan Jiunn Gim
      Abstract: This study discusses hardware-software partitioning, which is useful for system-on-chip (SoC) applications. Hardware-software partitioning attempts to obtain the lowest execution time by combining a hardware processor system and a field programmable gate array on the SoC platform in embedded system applications. A three-level hybrid algorithm called GAGAPSO is proposed in this study. The algorithm consists of two successive genetic algorithms (GAs) and one particle swarm optimization (PSO). The drawbacks of these two algorithms are GA has low convergence speed and PSO has premature convergence because of low diversity. These algorithms are combined in this study to achieve high-capacity global convergence and enhanced search efficiency. In this study, three algorithms are developed, namely, GA, GAPSO and GAGAPSO using MATLAB. These algorithms are evaluated on the basis of the number of nodes and the minimum cost that can be achieved. The number of nodes varies from 10 to 1000 nodes. The minimum cost and the number of iterations to achieve the minimum cost are recorded. Results show that GAGAPSO can converge faster than GA and GAPSO. Furthermore, GAGAPSO can achieve the lowest cost for all nodes. 
      PubDate: Mon, 01 Feb 2021 00:00:00 +000
       
  • Advanced exponential sliding mode control for microgrid at autonomous and
           grid-connected modes

    • Authors: A. Elnady; Mohammad AlShabi
      Abstract: This paper introduces a novel control scheme for the operation of multilevel inverters forming a microgrid. The core of the suggested control scheme is an advanced (power-rate) exponential sliding mode controller. This developed controller is robust toward any variation of the system’s parameters and loads in addition to its fast and accurate performance. The presented control scheme provides advantageous characteristics to the microgrid operation in an autonomous mode (microgrid mode) and grid-connected mode. In the microgrid mode, the voltages and frequency are stable at any variable balanced and unbalanced load. In the grid-connected mode, an effective procedure for connecting the microgrid to the main grid is proposed to guarantee a seamless and fast transition to the grid-connected mode. The performance of the presented control scheme along with its proposed controller is validated by comparing its results to another linear and non-linear controllers for the same microgrid loading conditions.
      PubDate: Mon, 01 Feb 2021 00:00:00 +000
       
  • Research trends review on RSA scheme of asymmetric cryptography techniques

    • Authors: Mohd Saiful Adli Mohamad; Roshidi Din, Jasmin Ilyani Ahmad
      Abstract: One of the cryptography classifications is asymmetric cryptography, which uses two different keys to encrypt and decrypt the message. This paper discusses a review of RSA scheme of asymmetric cryptography techniques. It is trying to present the domains of RSA scheme used including in public network, wireless sensor network, image encryption, cloud computing, proxy signature, Internet of Things and embedded device, based on the perspective of researchers’ effort in the last decade. Other than that, this paper reviewed the trends and the performance metrics of RSA scheme such as security, speed, efficiency, computational complexity and space based on the number of researches done. Finally, the technique and strengths of the proposed scheme are also stated in this paper. 
      PubDate: Mon, 01 Feb 2021 00:00:00 +000
       
  • Traid-bit embedding process on Arabic text steganography method

    • Authors: Roshidi Din; Reema Ahmed Thabit, Nur Izura Udzir, Sunariya Utama
      Abstract: The enormous development in the utilization of the Internet has driven by a continuous improvement in the region of security. The enhancement of the security embedded techniques is applied to save the intellectual property. There are numerous types of security mechanisms. Steganography is the art and science of concealing secret information inside a cover media such as image, audio, video and text, without drawing any suspicion to the eavesdropper. The text is ideal for steganography due to its ubiquity. There are many steganography embedded techniques used Arabic language to embed the hidden message in the cover text. Kashida, Shifting Point and Sharp-edges are the three Arabic steganography embedded techniques with high capacity. However, these three techniques have lack of performance to embed the hidden message into the cover text. This paper present about traid-bit method by integrating these three Arabic text steganography embedded techniques. It is an effective way to evaluate many embedded techniques at the same time, and introduced one solution for various cases.
      PubDate: Mon, 01 Feb 2021 00:00:00 +000
       
  • Drunken drive detection with smart ignition lock

    • Authors: S. L. A. Muthukarpan; M. N. Osman, M. Jusoh, T. Sabapathy, M. K. A. Rahim, M. Elshaikh, Z. I. A. Khalib
      Abstract: Drink and drive issue have become solemnly that needs immediate attention. This is due to drivers’ ignorance towards road rules and regulations and their selfish attitude that caused loss of innocent lives. Although previously there is a drunk detecting mechanism using breathalyzer but it isn’t suitable for current fast-paced lifestyle. Therefore, to overcome these issues, this system is proposed. This system is fixed on vehicle’s steering to measure alcohol concentration reading using MQ-3 sensor from the driver’s exhaled breath. If the driver found to be drunk beyond the threshold level of 400 ppm, then ignition lock is activated and the car engine does not start till alcohol concentration falls to a safe level. Or, if the driver consumes an alcoholic drink while driving, upon exceeding permissible limit, the car slows down till it stops. Then, the location of the vehicle is tracked and sent as Google Map integrated link via text message to authorized unit. Simultaneously, the car buzzer goes off while the car slows down so that surrounding road users are aware of the driver’s condition and drives at a distance. The proposed detection system is highly potential to be implemented for reducing the drunk and drive accidents.
      PubDate: Mon, 01 Feb 2021 00:00:00 +000
       
  • An algorithm to measure unsymmetrical circle shape of intravascular
           ultrasound image using image processing techniques

    • Authors: Suhaili Beeran Kutty; Rahmita Wirza O. K. Rahmat, Sazzli Shahlan Kassim, Hizmawati Madzin, Hazlina Hamdan
      Abstract: In diagnosing coronary artery disease, measurement of the cross-sectional area of the lumen, maximum and minimum diameter is very important. Mainly, it will be used to confirm the diagnosing, to predict the stenosis if any and to ensure the size of the stent to be used. However, the measurement only offers by the existing software and some of the software needs human interaction to complete the process. The purpose of this paper is to present the algorithm to measure the region of interest (ROI) on intravascular ultrasound (IVUS) using an image processing technique. The methodology starts with image acquisition process followed by image segmentation. After that, border detection for each ROI was detected and the algorithm was applied to calculate the corresponding region. The result shows that the measurement is accurate and could be used not only for IVUS but applicable to solid circle and unsymmetrical circle shape. 
      PubDate: Mon, 01 Feb 2021 00:00:00 +000
       
  • Diabetics blood glucose control based on GA-FOPID technique

    • Authors: Wesam M. Jasim; Yousif I. Al Mashhadany
      Abstract: In this paper, an optimized Fractional Order Proportional, Integral, Derivative based Genetic Algorithm GA-FOPID optimization technique is proposed for glucose level normalization of diabetic patients. The insulin pump with diabetic patient system used in the simulation is the Bergman minimal model, which is used to simulate the overall system. The main purpose is to obtain the optimal controller parameters that regulate the system smoothly to the desired level using GA optimization to find the FOPID parameters. The next step is to obtain the FOPID controller parameters and the traditional PID controller parameters normally. Then, the simulation output results of using the proposed GA-FOPID controller was compared with that of using the normal FOPID and the traditional PID controllers. The comparison shows that all the three controllers can regulate the glucose level but the use of GA-FOPID controller was outperform the use of the other two controllers in terms of speed of normalization and the overshoot value.
      PubDate: Mon, 01 Feb 2021 00:00:00 +000
       
  • Improving cross-docking operations for consumer goods sector using
           metaheuristics

    • Authors: Rodrigo Andrés Gómez- Montoya; Jose Alejandro Cano, Emiro Antonio Campo, Fernando Salazar
      Abstract: This paper aims to model a consumer goods cross-docking problem, which is solved using metaheuristics to minimize makespan and determine the capacity in terms of inbound and outbound docks. The consumer-goods cross-docking problem is represented through inbound and outbound docks, customer orders (products to be delivered to customers), and metaheuristics as a solution method. Simulated annealing (SA) and particle swarm optimization (PSO) are implemented to solve the cross-docking problem. Based on the results of statistical analysis, it was identified that the two-way interaction effect between inbound and outbound docks, outbound docks and items, and items and metaheuristics are the most statistically significant on the response variable. The best solution provides the minimum makespan of 973.42 minutes considering nine inbound docks and twelve outbound docks. However, this study detected that the combination of six inbound docks and nine outbound docks represents the most efficient solution for a cross-docking design since it reduces the requirement of docks by 28.6% and increases the makespan by only 4.2% when compared to the best solution, representing a favorable trade-off for the cross-docking platform design. 
      PubDate: Mon, 01 Feb 2021 00:00:00 +000
       
  • Classification of texture using random box counting and binarization
           methods

    • Authors: Wijdan Jaber AL-kubaisy; Maha Mahmood
      Abstract: The heterogeneous texture classifications with the complexity of structures provide variety of possibilities in image processing, as an example of the multifractal analysis features. The task of texture analysis is a highly significant field of study in the field of machine vision. Most of the real-life surfaces exhibit textures and an efficiently modelled vision system must have the ability to deal with this variety of surfaces. A considerable number of surfaces maintain a self-similarity quality as well as statistical roughness at different scales. Fractals could provide a great deal of advantages; also, they are popular in the process of modelling these properties in the tasks related to the field of image processing. With two distinct methods, this paper presents classification of texture using random box counting and binarization methods calculate the estimation measures of the fractal dimension BCM. There methods are the banalization and random selecting boxes. The classification of the white blood cells is presented in this paper based on the texture if it is normal or abnormal with the use of a number of various methods.
      PubDate: Mon, 01 Feb 2021 00:00:00 +000
       
 
JournalTOCs
School of Mathematical and Computer Sciences
Heriot-Watt University
Edinburgh, EH14 4AS, UK
Email: journaltocs@hw.ac.uk
Tel: +00 44 (0)131 4513762
 


Your IP address: 3.235.159.8
 
Home (Search)
API
About JournalTOCs
News (blog, publications)
JournalTOCs on Twitter   JournalTOCs on Facebook

JournalTOCs © 2009-