Download Complete Issue
Current Issue features key papers related to multidisciplinary domains involving complex system stemming from numerous disciplines; this is exactly how this journal differs from other interdisciplinary and multidisciplinary engineering journals. This issue contains 34 accepted papers in Computer Systems, Information Technology, Electrical and Electronics Engineering domains.
Editorial
Front Cover
Adv. Sci. Technol. Eng. Syst. J. 2(1), (2017);
Editorial Board
Adv. Sci. Technol. Eng. Syst. J. 2(1), (2017);
Editorial
Adv. Sci. Technol. Eng. Syst. J. 2(1), (2017);
Table of Contents
Adv. Sci. Technol. Eng. Syst. J. 2(1), (2017);
Articles
Controls
Adaptive Intelligent Systems applied to two-wheeled robot and the effect of different terrains on performance
Sender Rocha dos Santos, Jorge L. M. Amaral, José Franco M. Amaral
Adv. Sci. Technol. Eng. Syst. J. 2(1), 1-5 (2017);
View Description
This work discuss two different intelligent controllers: Online Neuro Fuzzy Controller (ONFC) and Proportional-Integral-Derivative Neural Network (PID-NN). They were applied to maintain the equilibrium and to control the position of a two-wheeled robot prototype. Experiments were carried out to investigate the equilibrium control and movement of the two-wheeled robot first on flat terrain, then in other situations, where terrain may not be flat, horizontal surface. The effectiveness of each controller was verified by experimental results, and the performance was compared with conventional PID control scheme applied for the prototype.
IR, Big Data, Business Intelligence, & Knowledge Management
System Testing Evaluation for Enterprise Resource Planning to Reduce Failure Rate
Samantha Mathara Arachchi, Siong Choy Chong, Alik Kathabi
Adv. Sci. Technol. Eng. Syst. J. 2(1), 6-15 (2017);
View Description
Enterprise Resource Planning (ERP) systems are widely used applications to manage resources, communication and data exchange between different departments and modules with the purpose of managing the overall business process of the organization using one integrated software system. Due to the large scale and the complexity nature of these systems, many ERP implementation projects have become failure. It is necessary to have a better test project management and test performance assessing system. To build a successful ERP system these processes are important. The purpose of the Test project management is verification and validation of the system. There was a separate stage to test the quality of software in the software development lifecycle and there is a separate independent Quality Assurance and testing team for a successful ERP development team. According to best practice testing principles it is necessary to, understand the requirements, test planning, test execution, identify and improve processes. Identify the necessary infrastructure; hardware and software are the major areas when developing test procedures. The aim of this survey is to identify ERP failures associated with the ERP projects, general and security within the Asian region, so that the parties responsible for the project can take necessary precautions to deal with those failures for a successful ERP implementation and bring down the ERP failure rate.
The Class Imbalance Problem in the Machine Learning Based Detection of Vandalism in Wikipedia across Languages
Arsim Susuri, Mentor Hamiti, Agni Dika
Adv. Sci. Technol. Eng. Syst. J. 2(1), 16-22 (2017);
View Description
This paper analyses the impact of current trend in applying machine learning in detection of vandalism, with the specific aim of analyzing the impact of the class imbalance in Wikipedia articles. The class imbalance problem has the effect that almost all the examples are labelled as one class (legitimate editing); while far fewer examples are labelled as the other class, usually the more important class (vandalism). The obtained results show that resampling strategies: Random Under Sampling (RUS) and Synthetic Minority Oversampling TEchnique (SMOTE) have a partial effect on the improvement of the classification performance of all tested classifiers, excluding Random Forest, on both tested languages (simple English and Albanian) of the Wikipedia. The results from experimentation extended on two different languages show that they are comparable to the existing work.
Operational Efficiencies and Simulated Performance of Big Data Analytics Platform over Billions of Patient Records of a Hospital System
Dillon Chrimes, Belaid Moa, Mu-Hsing (Alex) Kuo, Andre Kushniruk
Adv. Sci. Technol. Eng. Syst. J. 2(1), 23-41 (2017);
View Description
Big Data Analytics (BDA) is important to utilize data from hospital systems to reduce healthcare costs. BDA enable queries of large volumes of patient data in an interactively dynamic way for healthcare. The study objective was high performance establishment of interactive BDA platform of hospital system. A Hadoop/MapReduce framework was established at University of Victoria (UVic) with Compute Canada/Westgrid to form a Healthcare BDA (HBDA) platform with HBase (NoSQL database) using hospital-specific metadata and file ingestion. Patient data profiles and clinical workflow derived from Vancouver Island Health Authority (VIHA), Victoria, BC, Canada. The proof-of-concept implementation tested patient data representative of the entire Provincial hospital systems. We cross-referenced all data profiles and metadata with real patient data used in clinical reporting. Query performance tested Apache tools in Hadoop’s ecosystem. At optimized iteration, Hadoop Distributed File System (HDFS) ingestion required three seconds but HBase required four to twelve hours to complete the Reducer of MapReduce. HBase bulkloads took a week for one billion (10TB) and over two months for three billion (30TB). Simple and complex query results showed about two seconds for one and three billion, respectively. Apache Drill outperformed Apache Spark. However, it was restricted to running more simplified queries with poor usability for healthcare. Jupyter on Spark offered high performance and customization to run all queries simultaneously with high usability. BDA platform of HBase distributed over Hadoop successfully; however, some inconsistencies of MapReduce limited operational efficiencies. Importance of Hadoop/MapReduce on representation of platform performance discussed.
Multimedia, Computer Vision and Image Processing
A Web-Based Decision Support System for Evaluating Soil Suitability for Cassava Cultivation
Adewale Opeoluwa Ogunde, Ajibola Rasaq Olanbo
Adv. Sci. Technol. Eng. Syst. J. 2(1), 42-50 (2017);
View Description
Precision agriculture in recent times had assumed a different dimension in order to improve on the poor standard of agriculture. Similarly, the upsurge in technological advancement, most especially in the aspect of machine learning and artificial intelligence, is a promising trend towards a positive solution to this problem. Therefore, this research work presents a decision support system for analyzing and mining knowledge from soil data with respect to its suitability for cassava cultivation. Past data consisting of some major soil attributes were obtained from relevant literature sources. This data was preprocessed using the ARFF Converter, available in WEKA. 70% of the data were used as training data set while remaining 30% were used for testing. Classification rule mining was carried out using J48 decision tree algorithm for the data training. ‘If-then’ construct models were then generated from the decision tree, which was used to develop a system for predicting the suitability status of soil for cassava cultivation. The percentage accuracy of the data classification was 76.5% and 23.5% for correctly classified and incorrectly classified instances respectively. Practically, the developed system was esteemed a prospective tool for farmers, soil laboratories and other users in predicting soil suitability for cassava cultivation.
Optimized Multi-focus Image Fusion Using Genetic Algorithm
Arti Khaparde, Vaidehi Deshmukh
Adv. Sci. Technol. Eng. Syst. J. 2(1), 51-56 (2017);
View Description
Optical imaging systems or cameras have a convex lens with limited depth of field. So, multi-focus images are obtained when such systems are used to capture an image of a particular scene. These images are fused to get all-in-focus image. This paper proposes a new simpler method of multi-focus image fusion. Instead of decomposing input image into blocks in pyramid style, the proposed algorithm considers the complete image for edge detection. The proposed algorithm uses the genetic algorithm (GA) to find out the optimum weights from extracted edges and then fuses the images with the fusion rule based on optimized weights. Experimental results show that this superimposition method performs well; consumes less computation time and thus proves to be suitable for hardware implementation.
A Novel Approach for Designing Mobile Native Apps
Sasmita Pani, Jibitesh Mishra
Adv. Sci. Technol. Eng. Syst. J. 2(1), 57-68 (2017);
View Description
Mobile devices are differed from desktop based systems in terms of particular execution environment, constrained resources, and high mobility requirement. To overcome these shortcomings, various agile based methodologies are developed for native mobile applications such as Mobile-D, Scrum etc. These agile techniques are based on various phases and these phases begin from exploring, initializing and implementing the mobile apps. But these techniques are not focusing on elaborating design model for mobile native apps. The aim of the paper is to provide a layered approach or layered model for design of mobile native apps which can be used as a framework for developing mobile native apps. Any mobile native app developer can use this sequential approach or design model for design and development of mobile native apps. This design model gives a standard or framework, based on which generic native mobile apps can be designed and developed. This paper also shows an empirical analysis among the web app design models with the proposed design model for mobile native app development.
Recent Trends in ELM and MLELM: A review
R. Manju Parkavi, R. Manju Parkavi, M. Shanthi, M.C. Bhuvaneshwari
Adv. Sci. Technol. Eng. Syst. J. 2(1), 69-75 (2017);
View Description
Extreme Learning Machine (ELM) is a high effective learning algorithm for the single hidden layer feed forward neural networks. Compared with the existing neural network learning algorithm it solves the slow training speed and over-fitting problems. It has been used in different fields and applications such as biomedical engineering, computer vision, remote sensing, chemical process and control and robotics. It has better generalization stability, sparsity, accuracy, robustness, optimal control and fast learning rate This paper introduces a brief review about ELM and MLELM, describing the principles and latest research progress about the algorithms, theories and applications. Next, Multilayer Extreme Learning Machine (MLELM) and other state-of-the-art classifiers are trained on this suitable training feature vector for classification of data. Deep learning has the advantage of approximating the complicated function and mitigating the optimization difficulty associated with deep models. Multilayer extreme learning machine is a learning algorithm of an Artificial Neural Network (ANN) which takes to be good for deep learning and extreme learning machine. This review presents a comprehensive view of these advances in ELM and MLELM which may be worthy of exploring in the future.
Frame Filtering and Skipping for Point Cloud Data Video Transmission
Carlos Moreno, Ming Li
Adv. Sci. Technol. Eng. Syst. J. 2(1), 76-83 (2017);
View Description
Sensors for collecting 3D spatial data from the real world are becoming more important. They are a prime research area topic and have applications in consumer markets, such as medical, entertainment, and robotics. However, a primary concern with collecting this data is the vast amount of information being generated, and thus, needing to be processed before being transmitted. To address the issue, we propose the use of filtering methods and frame skipping. To collect the 3D spatial data, called point clouds, we used the Microsoft Kinect sensor. In addition, we utilized the Point Cloud Library to process and filter the data being generated by the Kinect. Two different computers were used: a client which collects, filters, and transmits the point clouds; and a server that receives and visualizes the point clouds. The client is also checking for similarity in consecutive frames, skipping those that reach a similarity threshold. In order to compare the filtering methods and test the effectiveness of the frame skipping technique, quality of service (QoS) metrics such as frame rate and percentage of filter were introduced. These metrics indicate how well a certain combination of filtering method and frame skipping accomplishes the goal of transmitting point clouds from one location to another. We found that the pass through filter in conjunction with frame skipping provides the best relative QoS. However, results also show that there is still too much data for a satisfactory QoS. For a real-time system to provide reasonable end-to-end quality, dynamic compression and progressive transmission need to be utilized.
Circuits and Systems
Design and Fabrication of a Dielectrophoretic Cell Trap Array
Logeeshan Velmanickam, Dharmakeerthi Nawarathna
Adv. Sci. Technol. Eng. Syst. J. 2(1), 84-89 (2017);
View Description
We present a design and fabrication of an integrated micro-fabricated dielectrophoretic (DEP) cell trap array in a microfluidic channel. The cell trap array is capable of isolating target cells in high-throughput manner and producing cell clusters of tunable cell numbers. In this work, we have used commercially available polystyrene beads to show the concept. Bead clusters of various sizes were successfully produced using DEP force (attractive or repulsive). We have found that the number of beads in a cluster depends on the frequency of electric field and the concentration of beads in the mixture.
Configuration/Infrastructure-aware testing of MapReduce programs
Jesús Morán, Bibiano Rivas, Claudio de la Riva, Javier Tuya, Ismael Caballero, Manuel Serrano
Adv. Sci. Technol. Eng. Syst. J. 2(1), 90-96 (2017);
View Description
The implemented programs in the MapReduce processing model are focused in the analysis of large volume of data in a distributed and parallel architecture. This architecture is automatically managed by the framework, so the developer could be focused in the program functionality regardless of infrastructure failures or resource allocation. However, the infrastructure state can cause different parallel executions and some could mask the faults but others could derive in program failures that are difficult to reveal. During the testing phase the infrastructure is usually not considered because commonly the test cases contain few data, so it is not necessary to deploy a parallel execution or handle infrastructure failures, among others potential issues. This paper proposes a testing technique to generate and execute different infrastructure configurations given the test input data and the program under test. The testing technique is automatized by a test engine and is applied to real world case studies. As a result, the test engine generates and executes several infrastructure configurations, revealing a functional fault in two programs.
Cloud, Parallel, Distributed and High Performance Computing
Cross layers security approach via an implementation of data privacy and by authentication mechanism for mobile WSNs
Imen Bouabidi, Pr. Mahmoud Abdellaoui
Adv. Sci. Technol. Eng. Syst. J. 2(1), 97-107 (2017);
View Description
To implement a new secure network with high mobility and low energy consumption, we use smart sensors. These sensors are powered by micro batteries generally non rechargeable. So, to extend their lifetime, it is necessary to implement new energy conservation techniques. Existing works separate the two features (security, energy conservation) and are interested specifically in only one layer. Consequently, the originality of this work consists to combine together the two features using a crossing between three layers: physical layer, data link layer and network layer. Our proposition consists firstly in developing a new network deployment in hierarchical areas. This model takes place at the network layer. Secondly, implementing an energy efficient and secure MAC protocol providing a secure authentication, data privacy and integrity in a mobile WSN. Finally, implementing an intrusion detection system protecting the physical layer from malware and viruses that threaten it. We have been used OMNet++ for simulation .Our proposed protocol SXMachiavel offered the best performances and more reliability at the mobility rate (can reach 99% compared with XMachiavel, which doesn’t exceed 35%), loss packets rate (0.05% for a small network size) and energy consumption (decreases by 0.01% for each exchanged packet).
Mobi-Sim: An Emulation and Prototyping Platform for Protocols Validation of Mobile Wireless Sensors Networks
Omina Mezghani, Pr. Mahmoud Abdellaoui
Adv. Sci. Technol. Eng. Syst. J. 2(1), 108-120 (2017);
View Description
The objective of this paper is to provide a new simulator framework for mobile WSN that emulate a sensor node at a laptop i.e. the laptop will model and replace a sensor node within a network. This platform can implement di?erent WSN routing protocols to simulate and validate new developed protocols in terms of energy consumption, loss packets rate, delivery ratio, mobility support, connectivity and exchanged messages number in real time. To evaluate the performance of Mobi-Sim, we implement into it two popular protocols (LEACH-M and LEACH sink-mobile) and compare its results to TOSSIM. Then, we propose another routing protocol based on clustering that we compare it to LEACH-M.
Expression of balance function during exposure to stereoscopic video clips
Fumiya Kinoshita, Masaru Miyao, Masumi Takada, Hiroki Takada
Adv. Sci. Technol. Eng. Syst. J. 2(1), 121-126 (2017);
View Description
Recently, with the rapid progress in image processing and three-dimensional (3D) technologies, stereoscopic images are available not only on television but also in theaters and gaming consoles. Asthenopia and visually induced motion sickness (VIMS) are well-known phenomena experienced by users while viewing video clips, playing immersive video games, and other such activities. In previous studies, we showed evidence that peripherally viewing plays a role in the pathogenesis of VIMS and described the anomalous sway with the use of mathematical models. Stochastic differential equations are known to be a mathematical model of body sway. In this study, we discuss the evolution in potential functions to control the standing posture during exposure to stereoscopic video clips.
Social and Mobile Computing
A Survey of Text Mining in Social Media: Facebook and Twitter Perspectives
Said A. Salloum, Mostafa Al-Emran, Azza Abdel Monem, Khaled Shaalan
Adv. Sci. Technol. Eng. Syst. J. 2(1), 127-133 (2017);
View Description
Text mining has become one of the trendy fields that has been incorporated in several research fields such as computational linguistics, Information Retrieval (IR) and data mining. Natural Language Processing (NLP) techniques were used to extract knowledge from the textual text that is written by human beings. Text mining reads an unstructured form of data to provide meaningful information patterns in a shortest time period. Social networking sites are a great source of communication as most of the people in today’s world use these sites in their daily lives to keep connected to each other. It becomes a common practice to not write a sentence with correct grammar and spelling. This practice may lead to different kinds of ambiguities like lexical, syntactic, and semantic and due to this type of unclear data, it is hard to find out the actual data order. Accordingly, we are conducting an investigation with the aim of looking for different text mining methods to get various textual orders on social media websites. This survey aims to describe how studies in social media have used text analytics and text mining techniques for the purpose of identifying the key themes in the data. This survey focused on analyzing the text mining studies related to Facebook and Twitter; the two dominant social media in the world. Results of this survey can serve as the baselines for future text mining research.
Power Generation, Transmission and Distribution
Privacy-by-Design(PbD) IoT Framework : A Case of Location Privacy Mitigation Strategies for Near Field Communication (NFC) Tag Sensor
V.Ragunatha Nadarajah, Manmeet Mahinderjit Singh
Adv. Sci. Technol. Eng. Syst. J. 2(1), 134-148 (2017);
View Description
Near Field Communication (NFC) technology is a short range (range about 10cm) standard extended from the core standard Radio Frequency Identifier (RFID). These technologies are a portion of wireless communication technology. Even though NFC technologies benefit in various field, but it’s still exposed to multiple type of privacy attacks and threat as well since the communication occur in an open environment. The filtering technique been perform on the tag in order to get access to the embedded information. As solution based on tag filtering techniques, existing NFC filtering, Intent filtering has merged together with Bloom filtering from RFID technology. This help in term of elimination the duplicate tag and verify the receiving tag. Meanwhile, as a content protection to NFC Data Exchange Format (NDEF) message been transmitted through the communication channel, Advance Encryption Standard (AES) 128bit has been implemented on the NDEF message. AES provide solution to encrypt the NDEF message which has been communicated. Bloom filtering performed the hashing operation using MD5 technique as a verification of registered user to the NFC system. While the default Intent filtering direct the user to the selected invocation as registered on the tag after the Bloom filtering verification. Besides that, implementation of AES cryptographic in NDEF message, took approximately about 80 trillion years++ to crack the key using brute force attack. Communication of two legitimate entities is secured with AES encryption. Hence, secured user validation or filtering with encrypted message, prevent the possibility for MITM attacker to retrieve sensitive or personal information. The overall framework provide a better security solution compare to the existing framework.
Digital Living including E-Learning, E-Governement, E-Health
Semantic modeling of portfolio assessment in e-learning environment
Lucila Romero, Milagros Gutierrez, Laura Caliusco
Adv. Sci. Technol. Eng. Syst. J. 2(1), 149-156 (2017);
View Description
In learning environment, portfolio is used as a tool to keep track of learner’s progress. Particularly, when it comes to e-learning, continuous assessment allows greater customization and efficiency in learning process and prevents students lost interest in their study. Also, each student has his own characteristics and learning skills that must be taken into account in order to keep learner`s interest. So, personalized monitoring is the key to guarantee the success of technology-based education. In this context, portfolio assessment emerge as the solution because is an easy way to allow teacher organize and personalize assessment according to students characteristic and need. A portfolio assessment can contain various types of assessment like formative assessment, summative assessment, hetero or self-assessment and use different instruments like multiple choice questions, conceptual maps, and essay among others. So, a portfolio assessment represents a compilation of all assessments must be solved by a student in a course, it documents progress and set targets.
In previous work, it has been proposed a conceptual framework that consist of an ontology network named AOnet which is a semantic tool conceptualizing different types of assessments. Continuing that work, this paper presents a proposal to implement portfolios assessment in e-learning environments. The proposal consists of a semantic model that describes key components and relations of this domain to set the bases to develop a tool to generate, manage and perform portfolios assessment.
Management of Health Information in Malawi: Role of Technology
Patrick Albert Chikumba
Adv. Sci. Technol. Eng. Syst. J. 2(1), 157-166 (2017);
View Description
This paper is an extended version of the conference paper presented at IST Africa Week Conference 2016 and it discusses in detail the existing technology gaps using DHIS2 (District Health Information System 2.0) as an example, and how Geographic Information System (GIS) and mobile application, as specific examples of technology, can enhance health management information system (HMIS) in Malawi. The paper focuses on management of health information. When organisation information is made available, it is expected that the decision-makers use it objectively making rational decisions. This can be achieved by how the information is organized, integrated and presented probably through technology. Along with the increase in strengthening HMIS, questions of how to support the management of information at various organizational levels arise. Research on technologies in health management in developing countries has been on single technologies. Therefore, in this paper, the interest is on multiple technologies and how they support each other to enhance health information management. It has been observed that when it comes to health information management, HMIS employs a mix of paper-based and technology-based practices. Taking into account the infrastructure in Malawi, as in many developing countries, this is probably the most feasible approach. Hence, discussions of existing technology gaps include both paper-based and technology-based practices and how to better support health information management practices through this mixed use of media. The case study confirms that technology plays a role in strengthening HMIS. However, this should be supported by enhancing a culture of information management. It has been noted that DHIS2 is the main information system but it requires the enhancement through inclusions of other technologies. The DHIS2 alone cannot do everything.
Development of a new lines of sight analyzer while playing sport
Shinya Mochiduki, Miyuki Suganuma, Gaito Shoji, Mitsuho Yamada
Adv. Sci. Technol. Eng. Syst. J. 2(1), 167-171 (2017);
View Description
The Olympics will be held in Tokyo in 2020, and the training of the athlete using technology has been gaining attention. In an effort to refine the competitive ability of top athletes by evaluating their performance objectively, we have focused on eye movement and head movement. Since the field of view moves according to the athlete’s head movement, which is a problem for the conventional method of measuring eye movement, we proposed a new method of analysis of lines of sight which can record head movement during a competition and make it easier to analyze by superimposing the lines of sight on an externally recorded fixed image. With the goal of measuring the lines of sight of an athlete during an actual competition, we made a video during a competition and had an athlete observe the video in a laboratory. First we compared the video in which only the eye movement was measured and the field-of-view image moved according to the head movement with another video in which the head movement and eye movement were measured and the image did not move in spite of the occurrence of head movement. The results of the experiment, which involved baseball as the competitive sport, showed the effectiveness of our proposed system. Furthermore, we showed the difference between the lines of sight of an experienced and an inexperienced catcher.
Implementation a Secure Electronic Medical Records Exchange System Based on S/MIME
hien Hua Wu, Ruey Kei Chiu
Adv. Sci. Technol. Eng. Syst. J. 2(1), 172-176 (2017);
View Description
The exchange of electronic medical records can reduce the preservation and the use of papers of medical records for management issues. The sharing of electronic medical records has been effective in Taiwan. Now days, enterprises are sharing their electronic medical records through the Exchange Center of EMR under the Virtual Private Network but slightly less secure. This study aims to propose a security mechanism for the sharing of electronic medical records. The combination of security mechanism of S/MIME message level and RESTFul Service were adopted to build a secure mechanism for the sharing of electronic medical records. Two scenarios were simulated and implemented to verify the feasibility of this mechanism. From the results of the simulation presented, it has been conclude that the use of RESTful and S/MIME can enhance the security exchange of the electronic medical records.
Development of a Motorized Afifia Mowing Machine Design for Controlling Environmental Conservation and Menace for Home Use
Gbasouzor Austin Ikechukwu, Mbunwe Josephine Muncho
Adv. Sci. Technol. Eng. Syst. J. 2(1), 177-185 (2017);
View Description
Technology has become more affordable and penetrates every aspect of daily life, even in developing country like Nigeria. However many of the users in developing countries are still finding difficulty in using the technologies due to lack of experience as they undergo a technology leap. The aim of this research work explores the approach in designing, development of a motorized Afifia (grass) mowing machine. This research was considered because of the unhygienic environmental conservation and its menace. An estimate of 20N was adopted as the required force to cut lawns and based on this design force of 70N was chosen. This design force was the basis of characterizing the selection of materials use, as a result it was found that the machine is 85% efficient based on the area mowed per hour which is 390.6m2.
Theoretical Expression of the Balance Function during Galvanic Vestibular Stimulation in Dual Space
Hiroki Takada
Adv. Sci. Technol. Eng. Syst. J. 2(1), 186-191 (2017);
View Description
A method to construct a stochastic differential equation describing a non-Gaussian process in a stationary state and to obtain a static potential function in terms of the temporal average is proposed. However, it has been suggested that the potential function changes temporally through some analysis of climatic change. In this paper, a mathematical model of body sway is theoretically constructed during galvanic vestibular stimulation. The mathematical model is not regarded as stationary due to perturbation. We discuss a new expression for the temporal variations of the model with the use of a motion process in a dual space composed of coefficients of the temporally averaged potential function and the possibility to estimate the number of unobservable variables.
MIMO Performance and Decoupling Network: Analysis of Uniform Rectangular array Using Correlated-Based Stochastic Models
Obour Agyekum Kwame O-B, Maxwell Oppong Afriyie, Paul Oswald Kwasi Anane, Affum Emmanuel Ampoma, Matthew Seddoh Akatey
Adv. Sci. Technol. Eng. Syst. J. 2(1), 192-196 (2017);
View Description
A method to construct a stochastic differential equation describing a non-Gaussian process in a stationary state and to obtain a static potential function in terms of the temporal average is proposed. However, it has been suggested that the potential function changes temporally through some analysis of climatic change. In this paper, a mathematical model of body sway is theoretically constructed during galvanic vestibular stimulation. The mathematical model is not regarded as stationary due to perturbation. We discuss a new expression for the temporal variations of the model with the use of a motion process in a dual space composed of coefficients of the temporally averaged potential function and the possibility to estimate the number of unobservable variables.
High Voltage Engineering and Insulation Technology
Performance of Surge Arrester Installation to Enhance Protection
Mbunwe Muncho Josephine, Gbasouzor Austin Ikechukwu
Adv. Sci. Technol. Eng. Syst. J. 2(1), 197-205 (2017);
View Description
The effects of abnormal voltages on power system equipment and appliances in the home have raise concern as most of the equipments are very expensive. Each piece of electrical equipment in an electrical system needs to be protected from surges. To prevent damage to electrical equipment, surge protection considerations are paramount to a well designed electrical system. Lightning discharges are able to damage electric and electronic devices that usually have a low protection level and these are influenced by current or voltage pulses with a relatively low energy, which are induced by lightning currents. This calls for proper designed and configuration of surge arresters for protection on the particular appliances. A more efficient non-linear surge arrester, metal oxide varistor (MOV), should be introduced to handle these surges. This paper shows the selection of arresters laying more emphasis on the arresters for residential areas. In addition, application and installation of the arrester will be determined by the selected arrester. This paper selects the lowest rated surge arrester as it provides insulation when the system is under stress. It also selected station class and distribution class of arresters as they act as an open circuit under normal system operation and to bring the system back to its normal operation mode as the transient voltage is suppressed. Thus, reduces the risk of damage, which the protection measures can be characterized, by the reduction value of the economic loss to an acceptable level.
Electrical Machines and Adjustable Speed Drives
Detailed Analysis of Torque Ripple in High Frequency Signal Injection based Sensor less PMSM Drives
Ravikumar Setty A., Kishore Chatterjee
Adv. Sci. Technol. Eng. Syst. J. 2(1), 206-213 (2017);
View Description
High Frequency Signal Injection based techniques are robust and well proven to estimate the rotor position from stand still to low speed. However, Injected high frequency signal introduces, high frequency harmonics in the motor phase currents and results in significant Output Torque ripple. There is no detailed analysis exist in the literature, to study the effect of injected signal frequency on Torque ripple. Objective of this work is to study the Torque Ripple resulting from High Frequency signal injection in PMSM motor drives. Detailed MATLAB/Simulink simulations are carried to quantify the Torque ripple at different Signal frequencies.
Real Time Implementation of an Improved Hybrid Fuzzy Sliding Mode Observer Estimator
Sorin Mihai Radu, Elena-Roxana Tudoroiu, Wilhelm Kecs, Nicolae Ilias, Nicolae Tudoroiu
Adv. Sci. Technol. Eng. Syst. J. 2(1), 214-226 (2017);
View Description
This paper extends some of our research results disseminated in the most recent awarded international conference paper concerning the implementation in real time of a sliding mode observer state estimator. For the same case study developed in the conference paper, more precisely a DC servomotor angular speed control system, we extend the proposed concept of sliding mode observer state estimator to a fuzzy sliding mode observer version, more suitable in control applications field such as fault detection of the possible faults that might take place inside the actuators and sensors. The hybrid architecture implemented in a real time MATLAB/SIMULINK simulation environment consists of an integrated control loop structure with a switching bench of two sliding mode observers, one built by using a new approach that improves slightly the proposed sliding mode observer for the conference paper, and second one is an improved intelligent fuzzy version sliding mode observer estimator. The both estimators are implemented in SIMULINK to work independently by using a manual switch. The simulation results for the experimental setup show the effectiveness of the improved fuzzy version of sliding mode observer compared to the standard one, as well as its high accuracy and robustness.
Signal Processing
How Effective is Using Lip Movement for Japanese Utterance Training
Miyuki Suganuma, Tomoki Yamamura, Yuko Hoshino, Mitsuho Yamada
Adv. Sci. Technol. Eng. Syst. J. 2(1), 227-233 (2017);
View Description
Lip movements have long been the subject of research. There are many methods of lip movement recognition, such as the calculation of the amount of movement compared to a matching face pattern. In a previous study, we investigated utterance recognition based on the power spectrum by focusing on lip movements, which is one aspect of multimodal voice recognition systems. However, we found that the utterance recognition rate varied depending on the participants throughout our research. For this reason, we propose a training method for the purpose of utterance improvement in Japanese.
Power Electronics, Systems and Applications
Wireless Android Based Home Automation System
Muhammad Tanveer Riaz, Eman Manzoor Ahmed, Fariha Durrani, Muhammad Asim Mond
Adv. Sci. Technol. Eng. Syst. J. 2(1), 234-239 (2017);
View Description
This manuscript presents a prototype and design implementation of an advance home automation system that uses Wi-Fi technology as a network infrastructure connecting its parts. The proposed system consists of two main components; the first part is the server, which presents system core that manages and controls user’s home. Users and system administrator can locally (Local Area Network) or remotely (internet) manage and control the system. Second part is the hardware interface module, which provides appropriate interface to sensors and actuator of home automation system. Unlike most of the available home automation system in the market, the proposed system is scalable that one server can manage many hardware interface modules as long as it exists within network coverage. System supports a wide range of home automation devices like appliances, power management components, and security components. The proposed system is better in terms of the flexibility and scalability than the commercially available home automation systems
Advances in Web Technologies, Semantics and Future Internet
Internet of Things: An Evolution of Development and Research area topics
Jorge Oliveira e Sá, João Cacho Sá, José Luís Pereira, Francisco Pimenta, Manuel Monteiro
Adv. Sci. Technol. Eng. Syst. J. 2(1), 240-247 (2017);
View Description
Internet of Things (IoT) is a hot topic in the Europe Union (EU). In the year of 2015 the EU established an Alliance of Internet of Things Innovation (AIOTI) and this alliance included the IoT European Research Cluster (IERC) on the Internet of Things in the work group 01. IERC was established in 2007 and addresses the large potential for Internet of Things-based capabilities in Europe and to coordinate the convergence of ongoing activities. This organization regularly publishes Strategic Research Agendas with short, medium and long term forecasts of development and research topics. The aim of this paper is to study these Strategic Research Agendas published in the years 2010, 2011, 2012, 2014 and 2016 and make an identification of topics, in order to understand its evolution over time in terms of areas that have already been researched (or the research has already started) as well as those not yet explored. This work was performed based on a literature review methodology to identify the evolution in all the Strategic Research Agendas published in the years of 2010, 2011, 2012, 2014 and 2016.
Advances in Software Engineering
Using Naming Patterns for Identifying Architectural Technical Debt
Paul Mendoza del Carpio
Adv. Sci. Technol. Eng. Syst. J. 2(1), 248-254 (2017);
View Description
Hasty software development can produce immediate implementations with source code unnecessarily complex and hardly readable. These small kinds of software decay generate a technical debt that could be big enough to seriously affect future maintenance activities. This work presents an analysis technique for identifying architectural technical debt related to non-uniformity of naming patterns; the technique is based on term frequency over package hierarchies. The proposal has been evaluated on projects of two popular organizations, Apache and Eclipse. The results have shown that most of the projects have frequent occurrences of the proposed naming patterns, and using a graph model and aggregated data could enable the elaboration of simple queries for debt identification. The technique has features that favor its applicability on emergent architectures and agile software development.
Natural Language Processing and Applications
Power-Energy Simulation for Multi-Core Processors in Bench-marking
Mona A. Abou-Of, Amr A. Sedky, Ahmed H. Taha
Adv. Sci. Technol. Eng. Syst. J. 2(1), 255-262 (2017);
View Description
At Microarchitectural level, multi-core processor, as a complex System on Chip, has sophisticated on-chip components including cores, shared caches, interconnects and system controllers such as memory and ethernet controllers. At technological level, architects should consider the device types forecast in the International Technology Roadmap for Semiconductors (ITRS). Energy simulation enables architects to study two important metrics simultaneously. Timing is a key element of the CPU performance that imposes constraints on the CPU target clock frequency. Power and the resulting heat impose more severe design constraints, such as core clustering, while semiconductor industry is providing more transistors in the die area in pace with Moore’s law. Energy simulators provide a solution for such serious challenge. Energy is modelled either by combining performance benchmarking tool with a power simulator or by an integrated framework of both performance simulator and power pro?ling system. This article presents and asses trade-o?s between di?erent architectures using four cores battery-powered mobile systems by running a custom-made and a standard benchmark tools. The experimental results assure the Energy/ Frequency convexity rule over a range of frequency settings on di?erent number of enabled cores. The reported results show that increasing the number of cores has a great e?ect on increasing the power consumption. However, a minimum energy dissipation will occur at a lower frequency which reduces the power consumption. Despite that, increasing the number of cores will also increase the e?ective cores value which will re?ect a better processor performance.
Communication Systems
Efficient Resource Management for Uplink Scheduling in IEEE 802.16e Standard
A.R. Rahiman, Noaman Abduljabbar Ramadhan, Abdullah Muhammed, Zuriati Zulkarnain
Adv. Sci. Technol. Eng. Syst. J. 2(1), 263-268 (2017);
View Description
The IEEE 802.16e standard, known as mobile Worldwide Interoperability for Microwave Access (WiMAX) becomes the most demanding broadband wireless access (BWA) technology recently. Its main advantage is rapid delivery of services in remote areas due to the cost efficiency factor. The base station (BS) supports data rate up to 70 Mbps, mobile stations with 5–15 km length of coverage, and for the fixed stations the wireless access range up to 50 km. To resolve the bandwidth contention issue and guarantee seamless packet transmission from the subscriber stations (SS) to the BS, the uplink (UL) traffic scheduling must be efficient and reliable. This paper studies the work on the UL scheduling algorithm, namely minimum rest time (MRT). The MRT goal is to strengthen the packet transferring time between the SS and the BS by refining the pre-stipulated expired time and the deadline time of the earliest expiry first (EEF) and earliest deadline first (EDF) hybrid algorithms. These legacy algorithms are inadequate to support the multi-class traffic systems due to the shortage of quality of service (QoS) parameters featuring. Moreover, the algorithms are highly static. Using the Omnet++ with the relevant performance metrics the obtained results confirmed the MRT outperforms effectively from the legacy algorithms.
Proposal of a congestion control technique in LAN networks using an econometric model ARIMA
Joaquín F Sánchez, Martha M Cuellar
Adv. Sci. Technol. Eng. Syst. J. 2(1), 269-276 (2017);
View Description
Hasty software development can produce immediate implementations with source code unnecessarily complex and hardly readable. These small kinds of software decay generate a technical debt that could be big enough to seriously affect future maintenance activities. This work presents an analysis technique for identifying architectural technical debt related to non-uniformity of naming patterns; the technique is based on term frequency over package hierarchies. The proposal has been evaluated on projects of two popular organizations, Apache and Eclipse. The results have shown that most of the projects have frequent occurrences of the proposed naming patterns, and using a graph model and aggregated data could enable the elaboration of simple queries for debt identification. The technique has features that favor its applicability on emergent architectures and agile software development.
Spatial Sampling Requirements for Received Signal Level Measurements in Cellular Networks of Suburban Area
Abdlmagid Basere, Ivica Kostanic
Adv. Sci. Technol. Eng. Syst. J. 2(1), 277-287 (2017);
View Description
A process for the determination of a required spatial resolution in the collection of the Received Signal Level (RSL) is discussed. This method considers RSL measurements as a three dimensional surface that is sampled through the data collection process. In addition, it is difficult to collect RSL measurements for an entire coverage area because of many obstacles, for example, buildings, lakes, and vegetation. Thus, the estimation of the coverage area is necessary for locations for which it is hard to collect the RSL. Kriging is a well-known technique for estimation of unknown values at specific locations, and it has shown very good results. The distance factor in Kriging has never been studied before for a coverage area. A drive test is used to collect RSL measurements, and they are gathered in different distance sizes, a procedure is known as binning, to form the coverage area. Kriging is used to estimate the entire RSL surface in bin sizes that are 200×200, 100×100, 50×50, and 25×25 meters of resolution. Using a 2-D Fourier analysis, the cutoff frequency for the Fourier transform of the RSL surface is determined. The spatial sampling resolution and the cutoff frequency are linked through a Nyquist sampling criterion. The approach was experimentally verified in a typical suburban environment. The results show that the spatial resolution requirement is between 50 and 100m.