Skip to main content
SHOW DETAILS
eye
Title
Date Archived
Creator
Performance profiling and testing is one of the interesting topics in the big data management and Cloud Computing. In testing, we use test cases composed to different type of queries to evaluate the performance aspects of the information retrieval system for large scale information collection. This test scenarioperforms the evaluation ofretrieval accuracy for all kind of ambiguity and non factoid queries with result set as Training data. This stands difficult to evaluate the retrieval method in...
Topics: Big data cloud computing, Query optimization, Recommendation model, Software engineering, Testing...
Miscellaneous Contributed Journals and Academic Newsletters
by Mohammad Musa Al-Momani
texts

eye 11

favorite 0

comment 0

The evolution in different areas like e-business contributed to increase the number of data. So, a scalable database is required to accommodate a large number of data. Moreover, this data could be important and the number of accessing for reading or writing operations can make a pressure in some servers more than others, this pressure called unbalanced accessing. This will be achieved if a system that guarantees the distribution of this important data in useful form is used, because the...
Topics: Database systems, HBase, Hot data storage, Substitute regions, Unbalanced accessing
Paper and coin are the two most common currencies in all over the world. In Ethiopia also paper and coin currency are used for medium of exchange. This paper presents the comparative study of segmentation techniques towards Ethiopian paper currency classification. Otsu, FCM and K-means segmentation techniques are considered for this study and BPNN is used for classification of currencies. For the classification, images are collected from commercial bank of Ethiopia and Dashen Bank; for our data...
Topics: BPNN, FCM, K-means, Otsu
Congestion is one of the most important issues in communication networks which has attracted much research attention. To ensure a stable TCP network, we can use active queue management (AQM for early congestion detection and router queue length regulation. In this study, it was proposed to use the Grey Wolf Optimizer (GWO) algorithm in designing a fuzzy proportional integral (fuzzy-PI) controller as a novel AQM for internet routers congestion control and for achieving a low steady-state error...
Topics: AQM, Congestion control, Fuzzy-PI, Grey wolf, GWO
Boost converters of high gain are used for photo voltaic systems to obtain high efficiency. These high gain Boost converters gives increased output voltage for a low input t voltage. The High gain boost converters have the following merits. Conduction losses input current ripple and stress across the switches is reduced while the efficiency is increases. The high gain of the converters with the above said merits is obtained by changing the duty cycle of switches accordingly .In this paper a...
Topics: High voltage conversion ratio, Interleaved boost converter, Reduced input current ripple, Reduced...
Miscellaneous Contributed Journals and Academic Newsletters
by Rahmat Fauzi, Mochamad Hariadi, Supeno Mardi Susiki Nugroho, Muharman Lubis
texts

eye 36

favorite 0

comment 0

RTS Game is one of the popular genre in PC gaming, which has been played by various type of players frequently. In RTS game, NPC Defense Building (Tower) has attacking behavior to the closest enemy without considering certain enemy parameters. This causes the NPC Tower to be more predictable by the opponent and easily defeated if NPC attacked by enemies in the group. Thus, this research simulates NPC Tower using Hierarchical Finite State Machine (HFSM) method compared with Finite State Machine...
Topics: Comparison, Defense behavior, Finite state machine, Real time strategy
Miscellaneous Contributed Journals and Academic Newsletters
by F. H. W. Mustafa, S. N. Azemi, M. F. Jamlos, A. A. Al-Hadi, P. J. Soh
texts

eye 50

favorite 0

comment 0

Structural health monitoring (SHM) technologies have attained attention to monitor civil structures. SHM sensor systems have been used in various civil structures such as bridges, buildings, tunnels and so on. However the previous sensor for SHM is wired and encounter with problem to cover large areas. Therefore, wireless sensor was introduced for SHM to reduce network connecting problem. Wireless sensors for Structural Health monitoring are new technology and have many advantages to overcome...
Topics: Building damage detection, Frequency selective surface, Incident angle, Sensor technology,...
Miscellaneous Contributed Journals and Academic Newsletters
by Faris Nafiah, Ali Sophian, Md Raisuddin Khan, Ilham Mukriz Zainal Abidin
texts

eye 43

favorite 0

comment 0

Thanks to its wide bandwidth, pulsed eddy current (PEC) has attracted researchers of various backgrounds in the attempt to exploit its benefits in Non-destructive Testing (NDT). The ability of modelling PEC problems would be a precious tool in this attempt as it would help improve the understanding of the interaction between the transient magnetic field and the specimen, among others. In this work, a Finite Element Modelling (FEM) has been developed and experimental test data have been gathered...
Topics: C-scan images, Finite element modeling, Pulsed eddy current, Slanted cracks
Miscellaneous Contributed Journals and Academic Newsletters
by Amirul Asraf Roslan, Rahimi Baharom
texts

eye 32

favorite 0

comment 0

Safety system such as smoke detector and fire alarm are considered to be a counter measure for fire accident. This safety system is important as it acts as a security measure against fire accident which could lead to death and destruction of properties. This paper propose an advanced gas leakage, fire and power supply failure monitoring system with Arduino UNO and GSM Module as its embedded system. Among the features of this system are their ability to detect the presence of smoke, gases and...
Topics: Arduino UNO, GSM module, Short message service, Smart safety monitoring system
Miscellaneous Contributed Journals and Academic Newsletters
by Thulfiqar H. Mandeel, Muhammad Imran Ahmad, Said Amirul Anwar
texts

eye 44

favorite 0

comment 0

The multibiometric recognition system considered more reliable than the unimodal biometric recognition system due to the addition of an extra information that increases the discrimination between the classes. In this paper, a multi-sample multi-instance biometric recognition system is proposed. The aim of the proposed system is to increase the robustness of the identification. The proposed system also addresses the overfitting to the train samples problem of a feature extraction algorithm,...
Topics: Biometrics recognition, Fusion, Palmprint
Miscellaneous Contributed Journals and Academic Newsletters
by Lailil Muflikhah, Nurul Hidayat, Dimas Joko Hariyanto
texts

eye 20

favorite 0

comment 0

Hypertention is a degenerative disease but its healing takes a long time by consuming hypertention drugs until patient’s lifetime. The research is conducted to predict response of drug therapy using bioinformatics approach which is a blend of biological and informatics engineering methods. It is used medical record data of hypertensive patient in drug therapy which has an impact on genetic characteristics. The data is constructed as modelling for learning process. Then, it is implemented as a...
Topics: Hypertention, K-NN imputation, Missing value, Prediction, SVM
Miscellaneous Contributed Journals and Academic Newsletters
by Natrah Abdullah, Nur Farahin binti Abdul Hamid
texts

eye 36

favorite 0

comment 0

Reading Al-Quran is one of spiritual activities and as for Muslims, and they believed God would reward those who read and practice it. In order to dedicate remaining years of their life to God and to bring peace of mind, most of the senior citizens are spending their time doing spiritual activities such as reciting Al-Quran. With the advancement of technology, the sources of Al-Quran are also changing. There are many Al-Quran application being developed in the market and can be download and...
Topics: Interface design, Mobile application, Senior citizen
Miscellaneous Contributed Journals and Academic Newsletters
by A’ang Subiyakto, Abd. Rahman Ahlan, Mira Kartiwi, Nashrul Hakiem, M. Qomarul Huda, Aries Susanto
texts

eye 44

favorite 0

comment 0

Information system (IS) utilizations may have been one of the determinant factors for the survival requirement of the higher education sector in Indonesia. Despite the IS projects have been conducted since the 1980s in this country, but many studies indicated that success of the projects seems like in the low level. This survey study was purposed to know the status of the IS project success among universities by involving the internal stakeholders. The higher education database of the Ministry...
Topics: Descriptive results, Indonesia, Information system, Project profiles, Survey
Miscellaneous Contributed Journals and Academic Newsletters
by Siti Rafidah M-Dawam, Ku Ruhana Ku-Mahamud
texts

eye 74

favorite 0

comment 0

Many non-parametric techniques such as Neural Network (NN) are used to forecast current reservoir water level (RWLt). However, modelling using these techniques can be established without knowledge of the mathematical relationship between the inputs and the corresponding outputs. Another important issue to be considered which is related to forecasting is the preprocessing stage where most non-parametric techniques normalize data into discretized data. Data normalization can influence the the...
Topics: Forecasting model, Reservoir modelling, Reservoir water release, Sliding window, Temporal data...
Miscellaneous Contributed Journals and Academic Newsletters
by T. Sridevi, P. Mallikarjuna Rao, P. V Ramaraju
texts

eye 31

favorite 0

comment 0

Information hiding is the most important criteria today in several sectors, due to security issues. Mostly for the security applications used in Finance & banking sectors, hiding the information about users and their transactions are necessary at present from the hackers in all high security zones. In this consequence biometrics is progressively considered as foundation component for an extensive array of personal authentication solutions, both at the national level (E.g. India UIDAI) and...
Topics: Biometric applications, Cryptography, E-commerce, Security, Steganography
Miscellaneous Contributed Journals and Academic Newsletters
by Ameerul A. J. Jeman, Naeem M. S. Hannoon, Nabil Hidayat, Mohamed M. H. Adam, Ismail Musirin, Vijayakumar. V
texts

eye 35

favorite 0

comment 0

Voltage-source converter (VSC) topology is widely used for grid interfacing of distributed generation (DG) systems such as the photovoltaic system (PV). Since the operation of the VSC is essential to ensure quality of active and reactive power injected to the grid, a control approach is needed to deal with the uncertainties in the grid such as faults. This paper presents a non-linear controller design for a three-phase voltage source converter (VSC). The dynamic variables adopted for the VSC...
Topics: Active power, Non linear control, Photovoltaic system, Reactive power, Voltage source converter
Miscellaneous Contributed Journals and Academic Newsletters
by Suhaibah Jusoh, Aida Mustapha, Azizan Ismail, Roshidi Din
texts

eye 18

favorite 0

comment 0

Steganography is a strategy for hiding secret information in a cover document in order to avoid attacker from predict about hidden information. Steganography exploit cover message, for instance text, audio, picture and video to hide the secret message. Before this, linguistic text steganographic techniques are implemented just for the English language. But nowadays different languages are used to hide the data like Arabic language. This language is still new in the steganography and still need...
Topics: Arabic text, Hidden message, Steganography, Text steganography
Miscellaneous Contributed Journals and Academic Newsletters
by Thrivikram Bathini, Baswaraj Gadgay
texts

eye 30

favorite 0

comment 0

Medical image processing is an important aspect in diagnosis and treatment strategy. The tremendous volume of medical data has accelerated the need for automated analysis of this image, more so in the case Magnetic Resonance Imaging (MRI). An improved K-means algorithm and EM algorithm have been combined in the proposed approach to produce a hybrid strategy for better clustering and segmentation using Enhanced ICA. A classifier for based on Support Vector Machine (SVM) has been formulated and...
Topics: EICA, EM, GRB, Kernel, MRI
Miscellaneous Contributed Journals and Academic Newsletters
by Muhammad Na’im Fikri Jamaluddin, Azlan Ismail, Amir Abd Rashid, Talha Takleh Omar Takleh
texts

eye 19

favorite 0

comment 0

Parallel programming has been implemented in many areas to solve various computational problem with the aim, to improve the performance and scalability of the software application. There are a few parallel programming models commonly used, namely, threads, and message passing (distributed) models. Furthermore, various APIs have been proposed to implement these models based on two popular languages, notably, C/C++ and Java. A few studies have been done to compare the performance of parallel...
Topics: Hybrid Java, Message passing, MPJ express, Multithreading, Parallel programming
Miscellaneous Contributed Journals and Academic Newsletters
by Nurul Fatihah Sahidan, Nazrul Azha Mohamed Shaari, Hayati Abd Rahman
texts

eye 20

favorite 0

comment 0

Web-based collaborative learning is well accepted learning methods since it provides flexibilities not only in term of learners’ interaction but also its timeliness learning materials. Even though there are many websites offer learning materials for Muslims generally but for new converted Muslims getting authentic materials and proper guidance are complicated. Hence, a web-based problem-based collaborative learning is proposed. This method integrates an elected virtual instructor to...
Topics: Collaborative learning, Converted, Muslim, Islamic knowledge, Problem-based technique, Web-based...
Miscellaneous Contributed Journals and Academic Newsletters
by Nazirah Abd Hamid, Rabiah Ahmad, Siti Rahayu Selamat
texts

eye 37

favorite 0

comment 0

Numerous studies have shown that currently, role-based access control has becoming one of the successful access control model because of its principle that could simplifies the work of security administrators. However, to construct a concise, role-based access control system, a good role mining algorithm structure is needed therefore the objectives of this paper are firstly, to provide a general overview on phases that involved in designing and developing the algorithm and secondly, to...
Topics: Conceptual model, RBAC, Role mining
The brushless DC (BLDC) motor is a multi-variable and non-linear system so that it's required more advanced explaining and controlling set. In this work, an algorithm is proposed based on the harmony search algorithm (HAS) method. HSA mimics music improvisation process to find the optimal solution. In BLDC motor, many constraints are required; speed performance and current limiting control are dominated. HAS is proposed to find the optimal PID parameters for the two speed and current-limiting...
Topics: Brushless DC motor, Harmony search algorithm current controller, Speed controller, Trapezoidal...
Miscellaneous Contributed Journals and Academic Newsletters
by G. Indrawan, I K. Paramarta, K. Agustini, Sariyasa
texts

eye 34

favorite 0

comment 0

Balinese script writing, as one of Balinese cultural richness, is going to extinct because of its decreasing use. This research is a way to preserve it through collaboration between Computer Science and Language discipline that focused on accuracy comparison of Latin-to-Balinese script transliteration method on mobile application as a ubiquitous learning media. From few research in this area, there are only two existing methods to be compared, i.e. each on Android mobile application that were...
Topics: Accuracy, Balinese script, Latin script, Mobile application, Transliteration
Miscellaneous Contributed Journals and Academic Newsletters
by Nur Syuhada Selamat, Fakariah Hani Mohd Ali
texts

eye 40

favorite 0

comment 0

Currently, the volume of malware grows faster each year and poses a thoughtful global security threat. The number of malware developed increases as computers became interconnected, at an alarming rate in the 1990s. This scenario resulted the increment of malware. It also caused many protections are built to fight the malware. Unfortunately, the current technology is no longer effective to handle more advanced malware. Malware authors have created them to become more difficult to be evaded from...
Topics: Dynamic analysis, Hybrid analysis, Machine learning, Malware, Static analysis
Miscellaneous Contributed Journals and Academic Newsletters
by S. V. R. Lakshmi Kumari, M. Uma Vani
texts

eye 26

favorite 0

comment 0

This paper presents the application of dynamic voltage restorers (DVR) on power distribution Systems for mitigation of voltage sags/swells at critical loads. DVR is one of the compensating types of custom power devices. The power quality is affected mainly due to the sensitive loads which results in voltage sag and voltage swells. It is necessary to investigate the suitable methods for mitigation of voltage sags. Sensitivity is the main cause of the above power quality problems and it cannot be...
Topics: DVR, Power quality, Sag, Swel, l Voltage
Miscellaneous Contributed Journals and Academic Newsletters
by Tze Mei Kuan, Azrul Mohd. Ariffin
texts

eye 39

favorite 0

comment 0

Time domain reflectometry (TDR) is an easy technique that provides quick response which is ideal for power utility companies to conduct cable diagnostics on-site. Electricity disruption due to power cable failure is a major challenge for power utility companies due to the long length of cable installed with joints. The long time taken to diagnose the defect along the cable before electricity can be restored has not only jeopardized the reputation of power utility companies but also brings...
Topics: Cables, Defects, Joints, Time Domain Reflectometry
Miscellaneous Contributed Journals and Academic Newsletters
by Hamijah Mohd Rahman, Nureize Arbaiy, Riswan Efendi, Chuah Chai Wen
texts

eye 43

favorite 0

comment 0

Exchange rate forecasting is important to represent the expectation of exchange rates future values. The forecasting task is due to the economic factor and the historical data used to forecast are exposed to uncertainty and observational error during data collection. The existing auto regression model only deals with uncertainty exist in the model, not in the data preparation. Uncertainties may contained in the data input and should be treated during data preparation which is an early stage of...
Topics: Auto regression, Exchange rate, Triangular fuzzy number, Uncertainty
The introduction of Machine-to-Machine (M2M) communications in cellular networks creates a new set of challenges because of the unique service requirements and features of M2M devices. One of these challenges is the management of radio resources, especially on the uplink because of the unfairness and poor performance that occurs when allocating resources to users. Long Term Evolution (LTE) and LTE-Advanced (LTE-A) are excellent candidates for supporting M2M communications because of their...
Topics: LTE, LTE-A, M2M, MTC, QoS, Resource allocation, Scheduling, Uplink scheduling
Miscellaneous Contributed Journals and Academic Newsletters
by Thong Chee Ling, Yusmadi Yah Jusoh, Rusli Abdullah, Nor Hayati Alwi
texts

eye 39

favorite 0

comment 0

Information system (IS) is important to institution of higher learning (IHL) especially in the domain of curriculum design. Without the support of IS, curriculum design in IHL is time-consuming, error-prone and much effort need to put in by curriculum designers. Although there are numerous IS developed in curriculum design domain for the past few years, there is still lack of specific IS curriculum design model found in IHL. This study aims to propose an IS model which provide guidance during...
Topics: Curriculum, Curriculum design, Curriculum design information system, Information systems
Miscellaneous Contributed Journals and Academic Newsletters
by Shehab Alzaeemi, Mohd. Asyraf Mansor, Mohd Shareduwan Mohd Kasihmuddin, Saratha Sathasivam, Mustafa Mamat
texts

eye 17

favorite 0

comment 0

Radial Basis Function Neural Network (RBFNN) is very prominent in data processing. However, improving this technique is vital for the NN training process. This paper presents an integrated 2 Satisfiability in radial basis function neural network (RBFNN-2SAT). There are two different types of training in RBFNN, namely no-training technique and half-training technique. The performance of the solutions via Genetic Algorithm (GA) training was investigated by comparing the Radial Basis Function...
Topics: 2 satisfiability, Genetic algorithm, Half-training technique, No-training technique, Radial basis...
Miscellaneous Contributed Journals and Academic Newsletters
by Muhamad Najib Kamarudin, Tengku Juhana Tengku Hashim, AbdulHamid Musa
texts

eye 45

favorite 0

comment 0

Distributed generation (DG) plays an important role in improving power quality as well as system realibility. As the incorporation of DG in the power distribution network creates several problems to the network operators, locating a suitable capacity and placement for DG will essentially help to improve the quality of power delivery to the end users. This paper presents the simulation of an application of firefly algorithm (FA) for optimally locating the most suitable placement and capacity of...
Topics: Distributed generation, Firefly algorithm, IEEE 33-bus distribution system, Optimization, Power...
Miscellaneous Contributed Journals and Academic Newsletters
by N. Edward, N. A. Shairi, Z. Zakaria, T. Sutikno, I. D. Saiful Bahri
texts

eye 47

favorite 0

comment 0

A tunable circuit that functions as a power divider and a single pole double throw (SPDT) switch is proposed in this paper. The power divider design was based on the conventional Wilkinson power divider (WPD). Since WPD design has wideband properties, a modification was made in the design to make it narrowband so that it will only work for WiMAX applications. Two shorted stubs were introduced in the transmission line of the output ports to encounter the mismatch when the function was switched...
Topics: Matching stubs, Power divider, SPDT switch, Tunable function
Psychological problems in college students like depression, pessimism, eccentricity, anxiety etc. are caused principally due to the neglect of continuous monitoring of students’ psychological well-being. Identification of depression at college level is desirable so that it can be controlled by giving better counseling at the starting stage itself. If a counselor identifies depression in a student in the initial stages itself, he can effectively help that student to overcome depression. But...
Topics: Computer vision, Depression detection, Facial features, Feature extraction, Image processing
Miscellaneous Contributed Journals and Academic Newsletters
by Shalaka N. Chaphekar, Anjali A. Dharme
texts

eye 18

favorite 0

comment 0

The performance of Radial Distribution System (RDS) is enhanced by maintaining the appropriate Penetration Ratio (PR) of Distributed generation. However, it has been observed that Penetration Ratio cannot be useful to analyze the impact of a Microgrid on the performance of RDS. Hence a new index ‘Relief Factor’ (RF) is defined in this paper and the impact of a Microgrid at different RF is studied. This paper presents an approach to compute daily energy losses variation when Microgrids of...
Topics: Demand ratio, Microgrid, Radial distribution system (RDS), Relief factor
In this paper, the impact of surrounding temperature on the execution of the semiconductor laser is systematically examined in principle. We constructed the recreation display and the simulation results about showed that ambient temperature changes would influence the laser chip temperature, bringing about the laser key parameters in reproduction comes about.
Topics: Ambient temperature, ANSYS, Semiconductor laser, Thermal properties
Miscellaneous Contributed Journals and Academic Newsletters
by Hajara Abdulkarim Aliyu, Mohd Azhar Abdul Razak, Rubita Sudirman
texts

eye 32

favorite 0

comment 0

In medical field, the recognition of red blood cells (RBC) is used as an indicator to detect the type of diseases such as anaemia, malaria and leukaemia etc. The problems using manual detection of normal and abnormal RBCs under the microscope is tend to give inaccurate result and errors. This paper proposed a method to recognize the normal and abnormal shaped RBCs image by using Form Factor, Perimeter and Area as feature descriptors. Detecting normal cells of RBCs indicate a healthy patient and...
Topics: Form factor, Image processing, Red blood cells (RBCs)
This paper insight about reasons of disappointment in distribution transformers. It has been suggested that crawl may be a noteworthy purpose behind such disappointments. The impact of anxiety, temperature, and material on unfaltering state killjoy rate on aluminum and copper wires (utilized as a part of 25 KVA distribution transformers) have been introduced. Proposed study affirms that the disappointment rate of aluminum wound DTs is higher than the disappointment rate of copper injury DTs in...
Topics: Copper Wires, Creep Failure, Distribution transformer
Miscellaneous Contributed Journals and Academic Newsletters
by Nur Ashida Salim, Hasmaini Mohamad, Zuhaila Mat Yasin, Nur Fadilah Ab Aziz, Nur Azzammudin Rahmat
texts

eye 56

favorite 0

comment 0

Transmission line is one of the important elements in the process of power transfer from the source of generation to the consumer. In order to analyze the performance of a transmission line, it has to be represented by an equivalent model with suitable circuit parameters at a per phase basis. The line models are used to measure voltages, currents and the amount of power flow depending on the line length. Transmission line performance is determined by the voltage regulation and its efficiency...
Topics: Graphical user interface, Long transmission line, Medium transmission line, Short transmission...
Miscellaneous Contributed Journals and Academic Newsletters
by O. R. Kuzichkin, I. V. Loginov, V. T. Eremenko, S. V. Eremenko, G. S. Vasilyev, A. V. Grecheneva
texts

eye 15

favorite 0

comment 0

The paper deals with the problem of ranking alternatives to geodynamic monitoring systems in the case of uncertainty of their implementation time. The problem is characterized by the fact that the choice of alternatives and the effect of it depends on the quality properties of the applied organizational and technical solutions, taking into account the time of implementation. The ordering of alternatives is proposed taking into account the uncertainty of the implementation time factors. Ranking...
Topics: Geodynamic monitoring system, Implementation time, Incompleteness, Ranking, Requirements change,...
A major issue that happens in kitchens of houses and/or restaurants is the leakage of gas used as a fuel for cooker stove, which is commonly referred to as LPG (liquefied petroleum gas). LPG leakage may lead to a serious fire or even a deadly explosion that might affect the surrounding people. A substantial solution to avoid such disasters is by stopping its main cause. Therefore designing a device capable of monitoring and detecting such gases can minimize the dangerous and unwanted incidents...
Topics: Embedded systems, Liquified petrolium gas, LPG leakage, Monitoring systems, Real-time systems
Miscellaneous Contributed Journals and Academic Newsletters
by Patel Kalpana Dhanji, Santhosh Kumar Singh
texts

eye 40

favorite 0

comment 0

Remote Systems are presently prevalent worldwide to help individuals and machines to speak with each other regardless of their area, where it has an unending mission for expanded limit and enhanced quality. Despite the fact that there are many points of interest yet regardless it have a few burdens. This paper manages the vulnerabilities in the remote frameworks. The vulnerabilities show in the remote innovation that is generally identified with dangers and dangers. Despite the fact that much...
Topics: Detection, Localization, Multiple Adversaries, Remote Framework, Spoofing Attack
An installed based astute ready framework is contrived for the best possible checking and support of the waste. This structure turns away the unpredictable cleaning of the dustbins by sending alarms to the concerned individual at general interims. It additionally enhances the framework by also supporting the status of cleaning progressively and measure the execution of the group. Accordingly, this structure proves to be useful as a praiseworthy arrangement in natural support. Notwithstanding...
Topics: Dumping Area, GPRS, GPS, Remote Ship Borne, Surveillance
Miscellaneous Contributed Journals and Academic Newsletters
by Man Hee Lee, Soo Young Shin
texts

eye 38

favorite 0

comment 0

This paper proposes a modified pixel-based fast median filter (MP-FMF) for impulse noise environ- ments. The key idea behind MP-FMF is the reduction in the processing time by using modified pixels. It consists of three steps, namely, error detection, threshold decision, and noise mitigation. The presence of noise is detected by using modified pixels that include a cyclic redundancy check (CRC) function. Subse- quently, the threshold values are decided by estimating the noise density. For noise...
Topics: Pixel Modification, Cyclic Redundancy Check (CRC), Impulse Noise, Median Filter (MF), Noise...
Miscellaneous Contributed Journals and Academic Newsletters
by Andik Setyono, De Rosal Ignatius Moses Setiadi
texts

eye 25

favorite 0

comment 0

Image watermarking is one of the most popular techniques for authenticating copyright on the digital image. Many research on image watermarking has proved that the joint of Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT) combinations can improve both imperceptibility and robustness when compared to DCT or DWT only. Discrete Tchebichef Transform (DTT) denotes an alternative transformation that has a similarity property with DCT. DTT has an advantage in reducing memory...
Topics: Copyright protection, Fast computation, Reduced memory, Tchebichef, Wavelet
Miscellaneous Contributed Journals and Academic Newsletters
by Ng Jia Bao, Rohaizan Ramlan, Fazeeda Mohamad, Azlina Md Yassin
texts

eye 51

favorite 0

comment 0

The purpose of this study is to evaluate the performance of the local insurance in Malaysia for the period 2014-2015. The major challenge in the insurance industry is increasing competition in this market. Besides that, problematic in performance measurement to evaluate performance is another challenge in insurance industry. 24 local insurance companies involved in this study using quantitative method of Data Envelopment Analysis (DEA) output-orientation CCR model. This study utilizes three...
Topics: Data Envelopment Analysis (DEA), Local insurances companies, Performance measurement
Miscellaneous Contributed Journals and Academic Newsletters
by Faraz Idris Khan, Yasir Javed, Mamdouh Alenezi
texts

eye 30

favorite 0

comment 0

Incorporating Open Source Software (OSS) tools in software development is increasing day by day due to their accessibility on the internet. With the advantages of OSS comes disadvantages in terms of security vulnerabilities. Therefore, in this paper, we analyzed four famous open source software tools (i.e. Moodle, Joomla, Flask and VLC media player) which are used by software developers nowadays. For the analysis of each system, security vulnerabilities and weakness were identified, threat...
Topics: Open source software security (OSS), Secure programming, Secure software development, Software...
Miscellaneous Contributed Journals and Academic Newsletters
by Nik Noor Akmal Abdul Hamid, Rabiatul Adawiya Razali, Zaidah Ibrahim
texts

eye 44

favorite 0

comment 0

This paper presents a comparative study between Bag of Features (BoF), Conventional Convolutional Neural Network (CNN) and Alexnet for fruit recognition. Automatic fruit recognition can minimize human intervention in their fruit harvesting operations, operation time and harvesting cost. On the other hand, this task is very challenging because of the similarities in shapes, colours and textures among various types of fruits. Thus, a robust technique that can produce good result is necessary. Due...
Topics: Alexnet, Bag of features, CNN, Fruit recognition
In today’s scenario to solve the real world problem heterogeneous wireless sensor is necessary. It consists of different sensor with different sensing capability and different energy level. Routing is important task in HWSN from energy dissipation point of view. In HWSN many routing protocols were proposed but many protocols are for single hop communication between cluster head and sink. Here we have designed multi-hop routing protocol for HWSN, which will be energy efficient and also solve...
Topics: Cross layer, Multi-hop, Unequal clustering, Heterogeneous, Wireless sensor Network
Miscellaneous Contributed Journals and Academic Newsletters
by N. Y. Dahlan, S. Z. Sakimin, M. Faizwan, N. Ajmain, A. A. Aris
texts

eye 72

favorite 0

comment 0

This paper presents an optimization approach of calibrating a tomato greenhouse energy model using hybrid Evolutionary Programming (EP)- EnergyPlus. The proposed methodology applies automated simulation-based approach by coupling Matlab and EnergyPlus to perform building energy simulation and obtain the best variables configuration with minimal error between the simulated and measured energy of the greenhouse. The proposed method is tested using a tomato greenhouse system located in Universiti...
Topics: Calibrated energy simulation, Enery plus, Evolutionary programming, Greenhouse system
In the large scale distributive environment involving mobile network, metadata server and storage applications, the data access and the security measures are of paramount importance. In parallel application processing, data is distributed across multiple servers and storage location. Ensuring confidentiality and availability of the data to the authorised users at the appropriate time involves high level of encryption algorithms, key management schemes and security algorithms. In this paper, key...
Topics: Cryptography, Distributed Systems, ECC, Key Escrow, Secret Sharing, Segmentation
Miscellaneous Contributed Journals and Academic Newsletters
by Singh Poja Ramesh, Santhosh Kumar Singh
texts

eye 22

favorite 0

comment 0

Advanced Encryption Standard is the security based algorithm used to protect the data from the attackers.In this paper, Optimized Inverse MixColumn transformation has been designed with the help of Xtime multiplication process. Xtime multiplication performs the multiplication function for ‘m X m’ data; results will be m-bit data. Further the complexity of Xtime multiplication process has been identified and re-designed with the help of effective CSE techniques. Developed Reduced Xtime based...
Topics: AES, Mixcolumn, Xtime
Miscellaneous Contributed Journals and Academic Newsletters
by Rahmadwati, Luthfiyah Rachmawati, Panca Mudjirahardjo, Eka Maulana
texts

eye 29

favorite 0

comment 0

This research designed optical sensors using mercury lamp of 160W. These sensors provided voltage and current output. The design of optical sensors used the organic based material, i.e. dye carotene and phycocyanin. Fabrication of optical sensor in this research used spin coating deposition method. Based on the results of absorbance test, dye carotene had the largest absorption of light of 2.882 (a.u). Dye phycocyanin at length had the largest absorption of light of 2.787 (a.u). Combination...
Topics: Dye carotene, Dye phycocyanin, Optical sensor, Spin coating
Miscellaneous Contributed Journals and Academic Newsletters
by Norezmi Jamal, Nabilah Ibrahim, MNAH Sha’abani, Zulkifli Taat
texts

eye 19

favorite 0

comment 0

This paper presents a preliminary study related to the detection and identification of cardiac sounds components including first sound (S1), second sound (S2) and murmurs. Detection and identification of cardiac sounds are an important process in automated cardiac sound analysis system in order to automatically diagnose people who are having cardiovascular disorder and determine the existence of murmurs. Sixteen of recorded cardiac sounds (eight normal cardiac sounds, four abnormal cardiac...
Topics: Cardiac sounds, Detection, Envelope-based approach, Fourier synchrosqueezed transform,...
Miscellaneous Contributed Journals and Academic Newsletters
by Nur Athilah Abdul Rahman, Asral Bahari Jambek
texts

eye 25

favorite 0

comment 0

E-Health remote monitoring systems have bloomed rapidly with a myriad of applications. This paper discusses a design of a remote monitoring device for biomedical field. Four biomedical sensors which are electrocardiography (ECG), airflow, galvanic skin response and temperature with two boards which are the e-Health Shield Board V2.0 and Arduino Uno Board are used. The results show satisfactory output for each experiment using two test subjects. The device able to achieve high accuracy where...
Topics: Airflow sensor, Arduino Uno, Body temperature, ECG, E-Health Shield V2.0, GSR
Miscellaneous Contributed Journals and Academic Newsletters
by Hong-Seng Gan, Bakhtiar Al-Jefri Adb Salam, Aida Syafiqah Ahmad Khaizi, Muhammad Hanif Ramlee, Wan Mahani Wan Mahmud, Yeng-Seng Lee, Khairil Amir Sayuti, Ahmad Tarmizi Musa
texts

eye 26

favorite 0

comment 0

Semi-automatic segmentation is common in medical image processing because anatomical geometries demonstrated by human anatomical parts often requires manual supervision to provide desirable results. However, semi-automatic segmentation has been infamous for requiring excessive human intervention and time consuming. In order to reduce aforementioned problems, seed labels have been generated automatically using superpixels in our previous works. A fixed threshold method has been implemented to...
Topics: Adaptive threshold, Knee cartilage segmentation, Random walks, Seeds
Miscellaneous Contributed Journals and Academic Newsletters
by Wan Azllin Zurita Wan Ahmad, Muriati Mukhtar, Yazrina Yahya
texts

eye 28

favorite 0

comment 0

Social media enables unlimited open interactions between organisations and customers. Social content resulting from social media interactions are of immense value and could be beneficial to both organisations and customers. Well managed social content could be used as a basis for producing service innovations offered by the organisations. However, the meaning of social content and its definition is not clearly articulated in the literature. This led to an equally limited meaning of social...
Topics: DART model, Service dominant logic, Service science, Social content, Social content management,...
Miscellaneous Contributed Journals and Academic Newsletters
by Norfishah Ab Wahab, W. Nor Syafizan W. Muhamad, Zuhani Ismail Khan, Suzi Seroja Sarnin
texts

eye 22

favorite 0

comment 0

This paper proposed three designs of microstrip array patch antennas, to resonate at 2.4 GHz. The purpose of the study is to achieve size reduction with acceptable performance for wireless communication system applications. Based on the array concept, the array antennas are arranged using corporate network technique. It is found that the simulated 4x3 patch array antenna achieved the compact size with dimension reduced up to 26% compared to 4x1 and 4x2 array patch antennas. In terms of return...
Topics: Array antenna, Inset-Fed, Microstrip, Patch antenna
Miscellaneous Contributed Journals and Academic Newsletters
by Mujiarto, Asari Djohar, Mumu Komaro, Mohamad Afendee Mohamed, Darmawan Setia Rahayu, W. S. Mada Sanjaya, Mustafa Mamat, Aceng Sambas, Subiyanto
texts

eye 36

favorite 0

comment 0

In this paper, an Adaptive Neuro Fuzzy Inference System (ANFIS) based on Arduino microcontroller is applied to the dynamic model of 5 DoF Robot Arm presented. MATLAB is used to detect colored objects based on image processing. Adaptive Neuro Fuzzy Inference System (ANFIS) method is a method for controlling robotic arm based on color detection of camera object and inverse kinematic model of trained data. Finally, the ANFIS algorithm is implemented in the robot arm to select objects and pick up...
Topics: Adaptive Neuro Fuzzy Color Detection, Inference System, Inverse Kinematic Model, Robot Arm
Miscellaneous Contributed Journals and Academic Newsletters
by Sabo Miya Hassan, Kishore Bingi, Rosdiazli Ibrahim, Lim Jin Chein, ThasarathaRao Supramaniam
texts

eye 32

favorite 0

comment 0

Despite the advantages of the industrial wireless standards such as WirelessHART, ISA100.11a and Wireless Networks for Industrial Automation-Process Automation (WIA-PA), their application still faces a lot of challenges especially when it comes to interfacing with the real plant. This is due to lack of adequate infrastructures such as interfacing circuitry to establish communication between the WirelessHART nodes and the actuators and sensors. Therefore, this paper presents the application of...
Topics: Adaptor, Flow process, PID control, Setpoint weighting, WirelessHART sensor network
Miscellaneous Contributed Journals and Academic Newsletters
by Raja Waseem Anwar, Anazida Zainal, Saleem Iqbal
texts

eye 49

favorite 0

comment 0

The study assessed the design and development of trust-based security for wireless sensor networks. A qualitative approach was opted by employing systematic review analysis, which was assessed using secondary data collection. The design and development of trust-based security were mainly targeted, and 140 publications were randomly reviewed, from which 24 studies were finalized after excluding irrelevant data and studies that only contained abstracts. The results were analyzed focusing on the...
Topics: Design, Networks, Security, Trust, Wireless
Miscellaneous Contributed Journals and Academic Newsletters
by Zulkifli Ambak, Hizamel M.Hizan, Ahmad Ismat Abdul Rahim, Azmi Ibrahim, Mohd Zulfadli M. Yusoff, Razali Ngah
texts

eye 23

favorite 0

comment 0

This paper presents design approach for realizing multilayer End Coupled Bandpass Filter (ECBPF) using low temperature co-fired ceramic (LTCC) technology at TMRND's LTCC Lab. Design method for the ECBPF is based on the coupled-resonator filter which was realized in LTCC multilayer substrate and operating at the center frequency of 42GHz. Three samples of EC BPF have been designed, simulated, fabricated and investigated in terms of performance and structure size. This multilayer ECBPF were...
Topics: Broadband fixed wireless, End coupled BPF, LTCC
Miscellaneous Contributed Journals and Academic Newsletters
by Syahirah Shawalil, Khairul Najmy Abdul Rani, Hasliza A Rahim
texts

eye 44

favorite 0

comment 0

This paper presents a design of a wearable textile microstrip patch rectifying antenna (rectenna) array operating for Wireless Body Area Network (WBAN) at the center frequency, fc of 2.45 GHz. Precisely, jeans or denim with the relative permittivity, = 1.70 and thickness of 1.00 mm is chosen as a substrate attached to SheildIt Super as a conductive material with the thickness, h of 0.17 mm and conductivity of 6.67 105 S/m, respectively. In the first stage, a microstrip patch antenna array...
Topics: Bridge rectifier, Power conversion efficiency, Rectenna, Textile microstrip patch antenna array,...
Miscellaneous Contributed Journals and Academic Newsletters
by E. Seshatheri, T. Bhuvaneswari
texts

eye 36

favorite 0

comment 0

The data has structured is determined using the standard is known as XML whereaslarge amount of data has consumed through internet consist of the both structural data format as well as semi structural data format which gets stored and processed whereas XML allow the data of semi-structured and hierarchical data representation not only consist of concept with individual items from various kind of database but also have relationship among data items. The utilized knowledge bed is provided with...
Topics: Data mining, Linear search algorithm, Tree based association rules (TAR), Wild card search, XML...
Miscellaneous Contributed Journals and Academic Newsletters
by Mohamed S. Farag, M. M. Mohie El Din, H. A. El Shenbary
texts

eye 23

favorite 0

comment 0

There is no doubt that car parking is a very challenging and interesting topic of surveillance. In the recent years, a lot of smart systems for parking lot access control were developed to control and register the car data. The aim of this paper is to use image processing methods to control the entrance of a smart parking. The steps of car plate recognition are: preprocessing, License plate detection, character extraction and recognition. In the step of preprocessing, image was enhanced and...
Topics: Intelligent transportation systems, License plate detection, Recognition, Segmentation, Smart...
Miscellaneous Contributed Journals and Academic Newsletters
by Adel Al-Janabi, Ehsan Ali Al-Zubaidi, Radhwan Hussein Abdulzhraa Al Sagheer
texts

eye 23

favorite 0

comment 0

The consideration that the Iraqi community has concentrated on the training area has delivered another college responsibility routed to superiority viewpoints for all training connected facilities. In truth, a superiority arranged facility necessitates perfection in the structure and arranging of facility exercises, in addition to amid its conveying for the received facility execution assessment strategy. In any case, considering that facility execution assessments are profoundly founded on...
Topics: AHP, Education service, Fuzzy sets theory, Performance, Student satisfaction
Miscellaneous Contributed Journals and Academic Newsletters
by Hema C, Dr.Sharmila Sankar, Sandhya M.
texts

eye 18

favorite 0

comment 0

RFID (Radio Frequency IDentification) is a developing technology that employs electromagnetic signals to send the data among reader and tags to identify categorize and track the moveable items. The objective of this paper is to mitigate the reader collision problem by scheduling the readers in RFID system. Mobile readers in the RFID network send the same frequency signal to the air to read the data from the tags. While these two signals interfere each other and Tags are unable to backscatter...
Topics: Cluster based RFID network, Mobile reader collision tag count priority scheduling, RFID
Miscellaneous Contributed Journals and Academic Newsletters
by Md. Abbas Ali Khan, M. Raki Billah, Chandan Debnath, Sadekur Rahman, Md. Tarek Habib, Gazi Zahirul Islam
texts

eye 30

favorite 0

comment 0

In ongoing time use of surrounding astute administrations for example online ride-sharing, brilliant home, remote checking and helped human services, the utilization of advanced mobile phone for the acknowledgment of online vehicle traveler has turned into a point of high intrigue. Transportation is one of the main part of our daily life especially in Dhaka city where traffic jam, security, harassment of fare and other problems are big issue at conventional vehicle. A couple of year ago since...
Topics: Conventional vehicle, Online vehicle, Pathao
Miscellaneous Contributed Journals and Academic Newsletters
by S. M. Shah, K. Hamdan, Z. Z. Abidin, F. C. Seman, S. A. Hamzah, N. Katiran, F. Zubir
texts

eye 29

favorite 0

comment 0

A design approach for a microstrip patch antenna to achieve the reconfigurable dual-band operation with a tunable device is presented in this work. The approach uses a BB833 varactor diode in the middle of a slotted patch antenna which which is able to produce dual-band resonant frequencies. The reconfigurable antenna is designed and simulated in CST Microwave Studio® software and is later, fabricated on a FR-4 substrate with a dielectric constant, εr of 4.5, loss tangent, tan δ of 0.019 and...
Topics: Microstrip antenna, m-WiMAX, Reconfigurable antenna, Varactor diode, WLAN
Miscellaneous Contributed Journals and Academic Newsletters
by Dhurgham Ali Mohammed, Alaa Abdul Hussein Mezher, Hayder Sabeeh Hadi
texts

eye 22

favorite 0

comment 0

Handwriting character recognition involves a high degree of variability and imprecision. For that, the main factor to judge the recognition accuracy is the technique that is used to extract the features. This paper developed a novel method for handwritten Arabic characters by combining the Density-Based Clustering method with statistical and morphological features. The first stage in recognition of handwritten character image has been done by binarization the image then applies noise removal...
Topics: Density based clustering, Features extraction, Handwritten arabic cheaters recognition, Image...
Miscellaneous Contributed Journals and Academic Newsletters
by Khalid W. Al-Ani, Ahmed Subhi Abdalkafor, Aiman Majid Nassar
texts

eye 17

favorite 0

comment 0

Small devices that can sense and collect data from the surrounding environment have been produced with the rapid development of wireless technology and digital electronics. As a result, a wireless sensor network (WSN) was constructed from these sensor devices to send collected data to the base station for monitoring and analysis. This paper provides an overview of WSN, as well as its architecture and applications.
Topics: Base station, Observer, Power saving, Sensor node, WSN
Miscellaneous Contributed Journals and Academic Newsletters
by A. Adeleke, N. Samsudin, A. Mustapha, S. Ahmad Khalid
texts

eye 19

favorite 0

comment 0

Classification of Quranic verses into predefined categories is an essential task in Quranic studies. However, in recent times, with the advancement in information technology and machine learning, several classification algorithms have been developed for the purpose of text classification tasks. Automated text classification (ATC) is a well-known technique in machine learning. It is the task of developing models that could be trained to automatically assign to each text instances a known label...
Topics: Classifiers, Feature selection, Holy Quran, Machine learning, Text classification
Miscellaneous Contributed Journals and Academic Newsletters
by Faishal Harish Hidayatullah, Ubaidillah, Endra Dwi Purnomo, Dominicus Danardono Dwi Prija Tjahjana, Ilham Bagus Wiranto
texts

eye 40

favorite 0

comment 0

A magnetorheological brake (MRB) is a device to dissipate rotational energy using magnetorheological fluids (MRF). MRB can change its braking torque quickly in response to external magnetic field strength. The brake is rotational, utilizing the MRF in shear mode. In this study, the geometrical design of the MRB, magnetic circuit and MRF flow path is addressed. Mathematical models are presented that describe the braking torque of the MRB. A novel prototype is introduced combining T-shape rotor...
Topics: FEMM, Magnetorheological brake, Magnetorheological fluid
Miscellaneous Contributed Journals and Academic Newsletters
by N. H. Moktar, W. I. Roseli, M. T. Ali, R. A. Awang
texts

eye 36

favorite 0

comment 0

This paper was performed in order to study about distilled water and zamzam water which act as dielectric dense (DD) patch antenna at 5 Ghz applications. This antenna is proposed and designed using FR-4 substrate that sandwiched together to perform DD structure. The proposed antennas employ simple rectangular structure that fed with inset feeder surround by electromagnetic bandgap (EBG) structure.In order too enhance the gain, superstrate is applied on top of the antenna. This antenna offers a...
Topics: Dielectric dense (DD), Electromagnetic bandgap (EBG), FR-4 substrate, Zamzam water
Miscellaneous Contributed Journals and Academic Newsletters
by Muhammad Fathi Mohd Zulkefli, Ismail Musirin, Shahrizal Jelani, Mohd Helmi Mansor, Naeem M. S. Honnoon
texts

eye 25

favorite 0

comment 0

Distribution generation (DG) is a widely used term to describe additional supply to a power system network. Normally, DG is installed in distribution network because of its small capacity of power. Number of DGs connected to distribution system has been increasing rapidly as the world heading to increase their dependency on renewable energy sources. In order to handle this high penetration of DGs into distribution network, it is crucial to place the DGs at optimal location with optimal size of...
Topics: Adaptive mutation, Distributed generation, Embedded optimization, Evolutionary programming
Miscellaneous Contributed Journals and Academic Newsletters
by Raya. K Mohammed, Yoichiro UENO
texts

eye 33

favorite 0

comment 0

With the rapid growth of communications via the Internet, the need for an effective firewall system which has not badly affect the overall network performances has been increased. In this paper, a Field Programmable Gate Array (FPGA) -based firewall system with high performance has been implemented using Network FPGA (NetFPGA) with Xilinx Kintex-7 XC7K325T FPGA. Based on NetFPGA reference router project, a NetFPGA-based firewall system was implemented. The hardware module performs rule matching...
Topics: Firewall, FFGA, NetFPGA, Network Performance
IoT is the succeeding cohort of the digital computing environment. A swift progression in the IoT deployment and its applications are on the rise. Improving load balancing mechanisms induces healthier performance of the internet based computing as higher number of users can be comfortable. Implementing full services for tasks with unstable concurrency is an uphill process. One of the encounters allied with this administration is the task partition among the applications, regularly referred as...
Topics: Internet of thing (IoT), Load balancing, Queueing network, Scheduling mechanisms, Simulation, Task...
Miscellaneous Contributed Journals and Academic Newsletters
by Mohammed Hatem Ali Al-Hooti, Tohari Ahmad, Supeno Djanali
texts

eye 42

favorite 0

comment 0

Sharp development progress of information technology has affected many aspects including data security. This is because classified data are often transferred between systems. In this case, data hiding exists to protect such data. Some methods which have been proposed, however, are not yet optimal concerning the amount of the secret and the quality of the resulted stego data. In this paper, we explore an audio file as the medium to carry the secret data which has been extracted into binary....
Topics: Data hiding, Data protection, Information security, Secret data, Steganography
Miscellaneous Contributed Journals and Academic Newsletters
by A. N. Azlina, A. B. Zanariah, Y. Faridah
texts

eye 30

favorite 0

comment 0

Home automation system is one of the intelligent systems meant to create new opportunities for industry and business, as well as new experiences for users and consumers. This project is about designing, developing and testing a web-based intelligent home automation system called i-Home. Problems arises from the manually flick switches to control lighting and difficulty in monitoring houses, these activities can be automated. The main users will be residents in any residential area i.e. gated...
Topics: Home automation, Intelligent system, Internet of thing (IoT), Prototype, Web-based home system
Miscellaneous Contributed Journals and Academic Newsletters
by Nabila Ismail, Khairul Nizam Tahar
texts

eye 18

favorite 0

comment 0

The current techniques to extract building footprints frequently involve Light Detection and Ranging (LiDAR), as well as satellite images. The UAV is proposed to acquire aerial imagery in this study as it is more efficient, time-efficient, and inexpensive, especially for small budget projects. Hence, this study evaluated the building footprints from different UAV platforms. The objectives of this study are to perform the different UAV image processing of building footprints using fixed-wing UAV...
Topics: Accuracy, Building, Extraction, Footprints, UAV
Miscellaneous Contributed Journals and Academic Newsletters
by Hussein Ali Ameen, Abd Kadir Mahamad, Sharifah Saon, Danial Md. Nor, Kareem Ghazi
texts

eye 28

favorite 0

comment 0

The field of automated vehicle technology is developing rapidly developing. While it is likely to be many years before self-driving cars are commercially viable and used in a wide range of conditions by the general public, technological advances are speeding along the automated technology continuum towards this destination. Automated vehicle technologies troth with significant social benefits such as reduced injuries and deaths, increased road efficiency, mobility. Automated vehicles can...
Topics: Automation, Connected vehicles, ITS, Traffic management, V2V, Vehicle safety
Batteries are one of the most compact and reliable sources of sustainable energy. Lead-Acid batteries are the battery-powered sort of batteries concocted during the 1980s. The significant utilization of lead-acid battery is in beginning, lighting and start frameworks of vehicles. To guarantee the health and to dodge potential disappointments of a battery it is important to examine its Territory of health precisely. This examination expects to give efficiently evaluating the accessible writing...
Topics: Aging mechanism, Battery, Lead-acid, State of charge, State of health
Miscellaneous Contributed Journals and Academic Newsletters
by I Putu Adi Surya Gunawan, Riyanto Sigit, Agus Indra Gunawan
texts

eye 15

favorite 0

comment 0

Intravenous therapy aims to inject fluids such as medicine or nutritions into the body via vein vessel. This procedure is needed in various cases whether in an ordinary or emergency. Every person has a different difficulty level thus a nurse usually encountered a problem when locating the position of vein vessel. A visualization device that able to work in realtime and have high mobility is really necessary for an emergency situation to speed up the intravenous access. In this study, a...
Topics: Back-projection, Intravenous therapy, Ultrasonic distance, Vein visualization
Miscellaneous Contributed Journals and Academic Newsletters
by Fauziah Kasmin, Zuraini Othman, Sharifah Sakinah Syed Ahmad
texts

eye 34

favorite 0

comment 0

Binarization of historical documents nowadays is very important as digital archiving has become the best and preferred solution for the retrieval and storage of valuable archives. However, the process becomes more challenging due to the degradation of historical documents. Hence, this paper described a method on binarization of historical documents using the learning concept. Support vector machine (SVM) learning was used as a classifier in this work. After training some images with the help of...
Topics: Binarization, Grey level, Historical document, Local neighbourhood, RGB
Miscellaneous Contributed Journals and Academic Newsletters
by Benyahia Ismahane, Bassou Abdesselam, Allaoui Chems El houda, Beladgham Mohammed
texts

eye 23

favorite 0

comment 0

In this paper, an image compression method based on the Quincunx algorithm coupled with the modified SPIHT encoder (called SPIHT-Z) is presented. The SPIHT-Z encoder (coupled with quincunx transform) provides better compression results compared with two other algorithms: conventional wavelet and quincunx both coupled with the SPIHT encoder. The obtained results, using the algorithm that applies (Quincunx with SPIHT-Z) are evaluated by image quality evaluation parameters (PSNR, MSSIM, and VIF)....
Topics: Evaluation, Parameters, Image compression, Quincunx, SPIHT, SPIHT-Z
Miscellaneous Contributed Journals and Academic Newsletters
by S. Sarip, M. A. Suhot, H. M. Kaidi, M. F. Mohd Noor, S. Abdul Aziz, N. A. Bani, M. S. Noorazizi
texts

eye 32

favorite 0

comment 0

Palm oil is one of the main agricultural contributors to Malaysia’s Gross Domestic Product (GDP). Although commercial palm oil plantations have flourished in Malaysia for decades, there is still room for improvement especially in minimizing manpower load and developing efficient machinery to improve the various processes involved in the palm oil industry from estate to the mills. This paper presents a modified towable backhoe to assist in the Fresh Fruit Bunch (FFB) collecting process as an...
Topics: Fresh fruit bunch, Hydraulic, Mechanical grabber, Palm oil
Miscellaneous Contributed Journals and Academic Newsletters
by Zulkiffli Bin Abdul Hamid, Sylvester Jipinus, Ismail Musirin, Muhammad Murtadha Othman, Rahmatul Hidayah Salimin
texts

eye 20

favorite 0

comment 0

This paper proposes an optimization technique for distributed generation (DG) sizing in power system. The DG placement was done through Loss Sensitive (LS) technique to determine the suitable locations. The LS index is calculated such that the change in power losses is divided with generation increment and a rank of buses is obtained to identify the suitable locations for DG placement. Subsequently, a meta-heuristic algorithm, known as Firefly Algorithm (FA) was run to obtain the optimal size...
Topics: Distributed generation, Firefly algorithm, Voltage stability
Miscellaneous Contributed Journals and Academic Newsletters
by M.Ramesh Babu, C.Venkatesh Kumar, R.Sreekanth
texts

eye 11

favorite 0

comment 0

This paper presents a novel method for solving multi-objective Volt/Var control of radial distribution system. The Volt/Var control is formulated as a multi-objective optimization problem which consists of the following objectives: minimization of real power loss, minimization of total voltage deviation and minimization of number of OLTC’s and capacitor operation and voltage fluctuations for a day-ahead in Distribution system. The Proposed MOPSO Algorithm is used to find the optimal settings...
Topics: Dynamic crowding distance, Volt/var control, Multi objective particle swarm optimization algorithm
Miscellaneous Contributed Journals and Academic Newsletters
by Badriyah Ahmed Obaid, Ameer Lateef Saleh, Abbas Kareem Kadhim
texts

eye 7

favorite 0

comment 0

This paper exhibits a design procedure for tuning the parameters of Fractional Order Proportional Integral Derivative (FOPID) PI λD μ controller to optimize the DC motor drive operation. The optimization technique is establishing on Invasive Weed Optimization (IWO). This paper also proposes the use of anti-windup aspect to against the saturation which may occur in the FOPID controller. The objective of this design is to improve the performance of the drive subjected to different transient...
Topics: Anti-wind-up aspect, DC drive, FOPID controller, Invasive weed optimization technique
Miscellaneous Contributed Journals and Academic Newsletters
by Achmad Rizal, Risanuri Hidayat, Hanung Adi Nugroho
texts

eye 29

favorite 0

comment 0

Lung sound is a biological signal that can be used to determine the health level of the respiratory tract. Various digital signal processing techniques have been developed for automatic classification of lung sounds. Entropy is one of the parameters used to measure the biomedical signal complexity. Multiscale entropy is introduced to measure the entropy of a signal at a particular scale range. Over time, various multiscale entropy techniques have been proposed to measure the complexity of...
Topics: Multiscale entropy, Lung sound, Coarse-grained procedure, Multilayer perceptron
Sentiment analysis becomes very useful since the rise of social media and online review website and, thus, the requirement of analyzing their sentiment in an effective and efficient way. We can consider sentiment analysis as text classification problem with sentiment as its categories. In this study, we explore the use of Random Forest for sentiment classification in Indonesian language. We also explore the use of bag of words (BOW) features with some term weighting methods variation such as...
Topics: Random forest, Sentiment analysis, Term weighting, Text classification, TF.IDF
Technique to evaluate probability of occurrence of selected contingencies of 6 Bus Roy Billinton Test System (RBTS) and IEEE 9 Bus system by Markov modelling is presented in this paper. Obtained probabilities for selected contingencies are validated by comparing with binomial distribution based probabilities. Load flow analysis and performance index based contingency ranking of total elements of 6 bus RBTS and IEEE 9 Bus systems is simulated by Power System Simulation for Engineers (PSSE)...
Topics: Contingency ranking, Economic revenue, FACTS, Markov model, Transmission system
Miscellaneous Contributed Journals and Academic Newsletters
by Ahmed S A Badawi, Nurul Fadzlin Hasbullaha, Siti Hajar Yusoff, Aisha Hashim
texts

eye 40

favorite 0

comment 0

In this paper power energy estimated based on wind speed records in three different areas in Palestine Nablus, Ramallah and Gaza. The main aims of this study to calculate the total amount of power and energy that can produce and to encourage investment in renewable energy in Palestine. Available meteorological data from local weather stations are used to study the wind energy potential in the West Bank (WB) for two sites and Gaza Strip (GS) for one site. The daily average wind speed data for...
Topics: Power density, Power energy, Probability distribution function wind energy
Miscellaneous Contributed Journals and Academic Newsletters
by Oladepo Olatunde, Hasimah Abdul Rahman
texts

eye 29

favorite 0

comment 0

Voltage profile and power losses on the distribution system is a function of real and imaginary power loading condition. This can be effectively managed through the controlled real and reactive power flow by optimal placement of capacitor banks (CB) and distributed generators (DG). This paper presents Adaptive Particle Swarm Optimization (APSO) to efficiently tackle the problem of simultaneous allocation of DG and CB in radial distribution system to revamp voltage magnitude and reduce power...
Topics: Adaptive particle swarm optimization (APSO), Capacitor banks, Distribution generation, Distribution...
Miscellaneous Contributed Journals and Academic Newsletters
by D. Selvabharathi, R. Palanisamy, K.Selvakumar, V.Kalyanasundaram, D.Karthikeyan, Amal Nair, Kriti Karnavat, Annanya Sharma
texts

eye 37

favorite 0

comment 0

This paper proposes increasing the efficiency of the autonomous Photovoltaic (PV) system by utilizing zeta converter alongside neutral point clamped multilevel inverters (NPC-MLI) based on innovative PWM scheme. The PV system acts as an input source and the relevant control of zeta converter through maximum power point tracking (MPPT) offers the maximum available power from the PV array connected to DC-link. To obtain a high voltage gain we need to exhaust the dc-link voltage as much as...
Topics: PV-System, PWM scheme, NPC-MLI, MPPT, Zeta converter
Miscellaneous Contributed Journals and Academic Newsletters
by Khalil Awad, Mohammad Abdallah, Abdelfatah Tamimi, Amir Ngah, Hanadi Tamimi
texts

eye 40

favorite 0

comment 0

The Clause slicing technique is static slicing techniques which also have forward and backward slicing methods. The Clause slice criteria are the clause and the clause number. In this paper, we have discussed the Clauser tool the forward clause slicing tool introduce some improvements to it. The Clauser mechanism divides the program code statement into clauses, depending on clause slicing rules, identifies the variables and built-in functions, then slices the clauses regarding the slice...
Topics: Clause slicing, Clauser forward slicing, Program analysis, Program slicing
The Internet itself is a worldwide network connecting millions of computers and less significant networks. Computers communicated by routers. Crucial the role of a router is to our technique of communicating and computing. Routers are situated at gateways, the spaces where two or more networks connect, and are the decisive device that keeps data flow between networks and keeps the networks connected to the Internet. When data is sent between places on one network or from one network to a second...
Topics: Flow categorization, Network operations, Neural network applications, Routing
Miscellaneous Contributed Journals and Academic Newsletters
by H. Varun Chand, J. Karthikeyan
texts

eye 28

favorite 0

comment 0

Precise and appropriate traffic related data allows travellers to choose suitable travelling modes, travelling paths, and departure time, which is crucial for the success of Intelligent Transportation System (ITS). With the growth of vehicles, the rate of pollution and consumption of fuel has increased, it also creates traffic congestions. For the recent years there has been a rapid growth in technology, which can be explored to solve traffic issues. However, depending upon the available...
Topics: Intelligent Transportation System, Internet of Things, Clustering, Resource Privacy, Vanet
Miscellaneous Contributed Journals and Academic Newsletters
by Asma Abu-Samah, Normy Norfiza Abdul Razak, Ummu Kulthum Jamaludin, Fatanah Mohamad Suhaimi, Azrina Mad Ralib
texts

eye 22

favorite 0

comment 0

Stress-induced hyperglycemia is common in critically ill patients, but there is uncertainty about what constitutes an optimal blood glucose target range for glycemic control. Furthermore, to reduce the rate of hyperglycemic and hypoglycemic events, model-based glycemic control protocols have been introduced, such as the stochastic targeted (STAR) glycemic control protocol. This protocol has been used in the intensive care units of Christchurch and Gyulà Hospital since 2010, and in Malaysia...
Topics: Blood glucose target range, Feedback control, Glycemic control, Intensive care units, Malaysian...
Miscellaneous Contributed Journals and Academic Newsletters
by Prasanna Moorthi .N, Mathivananr
texts

eye 46

favorite 0

comment 0

Agricultural MDF is a sort of data framework concentrating on the agricultural generation, administration, logical research data gathering, ordering, arranging, recovery and yield; it is an imperative piece of the farming informatization. In view of the examination of circumstance and issue of rural data management, this paper give a coordination model of utilizing SOA to outline agrarian MDF. The SOA's hypothesis, execute innovation and application structure and character were talked about in...
Topics: Agriculture Management, Business Process Layer, Management Data Framework (MDF), SOA, Web...
Miscellaneous Contributed Journals and Academic Newsletters
by Keshihakumar Kalaithasan, N. A. M. Radzi, H. Z. Abidin
texts

eye 41

favorite 0

comment 0

Sick Building Syndrome (SBS) is a health condition whereby a patient is presented with either vague temporary symptoms such as fatigue, aches and sensitivity to odour or more significant temporary symptoms such as itchy eyes, skin rashes and nasal allergy when they are in a building. Numerous factors have been associated with SBS, but the lack of an accurate diagnosis for these symptoms make treatment more difficult, as risk of treating the patient with wrong diagnosis is relative when the...
Topics: FavorIot, Internet of things, Raspberry pi, Sensors, Sick building syndrome