Volume 4, Issue 2

The current Issue features key papers related to multidisciplinary domains involving complex systems stemming from numerous disciplines; this is exactly how this journal differs from other interdisciplinary and multidisciplinary engineering journals. This issue contains 52 accepted papers in the Software Engineering domain.
Download Complete IssueFront Cover
Editorial Board
Editorial
Table of Contents
The Chimera and the Cyborg
High Performance Computing (HPC) systems offer excellent metrics for speed and efficiency when using bare metal hardware, a high speed interconnects, and massively parallel applications. However, this leaves out a significant portion of scientific computational tasks, namely high throughput computing tasks that can be trivially parallelized and scientific workflows that require their own well-defined software…
Read MoreRobust synchronization of nonfragile control of complex dynamical network with stochastic coupling and time-varying delays
This paper explores the problem of robust synchronization of complex dynamical network with stochastic coupling and time-varying delays through the application of nonfragile control. A well defined Lyapunov Krasovskii functional is established and by employing the widely acknowledged extended Jensen’s integral inequality and the Bernoulli’s distribution sequences, the stochastic nature of network coupling is modeled…
Read MoreHigh-Temperature Optical Characterization of Wide Band Gap Light Emitting Diodes and Photodiodes for Future Power Module Application
A systematic study of wide bandgap (WBG) based light emitting diodes (LEDs) and photodiodes (PDs) were conducted for the assessment of modular integration of optoelectronic devices into power modules. The temperature dependence of the photoluminescence (PL) efficiency of Indium gallium nitride/Gallium nitride (InGaN/GaN) multiple quantum wells (MQWs) material was studied from 10 to 800 K.…
Read MoreDesign of an Additively Manufacturable Multi-Material Light-Weight Gripper with integrated Bellows Actuators
Combining state-of-the-art additive manufacturing technologies with structural optimization has the potential to produce geometrically complex multi-material components with integrated functionalities and desired structural behavior. In this article, the simulation-driven design process of a multi-material light-weight gripper with an integrated pneumatic bellows actuator is described. The design of the bellows structure is based on a previously…
Read MoreTechnical and Economic Merits Resulting from Power Systems Interconnection
In this paper, the impact of interconnection among isolated and dispersed electric power systems have been Investigated and analyzed. Therefore, the methodology proposed in this work is implemented in three real electric power systems in the western part of Saudi Arabia (designated as I, II and III). The outcome of this study revealed positive benefits…
Read MoreCoupling of Local and Global Quantities by A Subproblem Finite Element Method – Application to Thin Region Models
A method for coupling of local and global fields related to currents, voltages and magnetic fields in magnetodynamic problems is developed in the frame of the finite subproblem finite element method. The method allows to correct the errors arising from thin conducting regions, that replace volume thin regions by surfaces but neglect border effects in…
Read MoreW.A.S.T.E. R.E.D.U.C.E.: Waste Auditing Sensor Technology to Enhance the Reduction of Edible Discards in University Cafeterias & Eateries
Food waste disposal and food availability are both problems in the world today. The ability to monitor food waste is currently limited by the use of manual data collection and sparsity of monitoring. Using sensors to automate the process of measuring and collecting data on food waste would allow constant monitoring and provide a better…
Read MoreA Relation Extraction System for Indian Languages
Relation Extraction is an important subtask of Information Extraction that involves extracting significant facts from natural language text. Extracting structured information from the plaintext is the ultimate goal of IE systems. The Indian language content on the internet is increasing day to day. Extracting relevant information from this huge unstructured data is a challenging task…
Read MoreA Spectrum Sharing based Metering Infrastructure for Smart Grid Utilizing LTE and WiFi
In advanced metering infrastructure (AMI) of smart grid, WiFi is an appropriate choice for its bidirectional communication requirement to transmit data to the billing center. But, WiFi functions in the free spectrum bands and LTE also requires to use the same free bands for its network expansion being licensed spectrum is limited and expansive. LTE…
Read MoreNovel CPW-fed UWB antenna for X-band applications
An ultra-wideband (UWB) printed antenna (PMA) powered by a compact coplanar waveguide (CPW) is featured. The propounded antenna is supposed to cover the UWB range from 7 GHz to 10 GHz, with return loss values below -10 dB in the whole frequency range, for X-band applications, often used for dense satellite communications. The 30 x…
Read MoreLabVIEW Development for an Intelligent Management System of the Electrical Energy Free Market
Consumers of electrical energy have looked more closely to the energy consumption in last years due to the successive increase of the electricity bill. Nowadays it is possible to notice that many consumers have been looking for ways to reduce their consumption or the value of their electricity bill. Such a cost reduction is obtained…
Read MoreA Systematic Mapping Study of Cloud, Fog, and Edge/Mobile Devices Management, Hierarchy Models and Business Models
Cloud computing is an exceptional paradigm, which is facilitating the developments and utilization of resources over the internet. Fog computing operates at the edge of the network saving bandwidth, by not sending all information to the cloud, while edge computing does processing of data at the edge of the cloud. Edge computing reduces the distance…
Read MoreDesign and Analysis of 32-bit Parallel Prefix Adders for Low Power VLSI Applications
The basic processes like addition, subtraction can be done using various types of binary adders with dissimilar addition times (delay), area and power consumption in any digital processing applications. To minimize the Power Delay Product (PDP) of Digital Signal Processing (DSP) processors is necessary for high performance in Very Large Scale Integration (VLSI) applications. In…
Read MoreDeep Feature Representation for Face Sketch Recognition
Face sketch recognition aims at matching face sketch images to face photo images. The main challenge lies in modality discrepancy between face photo and sketch images. In this work, we propose a new facial sketch-to-photo recognition approach by adopting VGG-Face deep learning network, with which face images can be represented by compact and highly discriminative…
Read MoreA Fuzzy PID-Based Cascade Control for Continuous Material Weighing Conveyor
This article presents a nonlinear model of the continuous weighing conveyor system as considering the delay time of material transport, and then given a novel two-loop control strategy based on PID combined with fuzzy logic: inner velocity control loop and outer mass flowrate control loop. Then, two designed controllers for the velocity and mass flowrate…
Read MoreAssessment of Coordinated Multipoint Transmission Modes for Indoor and Outdoor Users at 28 GHz in Urban Macrocellular Environment
The aim of this article is to analyze and evaluate the performance of Coordinated Multipoint (CoMP) transmission approach at a frequency of 28 GHz using three dimensional ray tracing simulations in an urban macrocellular environment. The new performance metric introduced in this article is the relative power usage. Other performance metrics examined in this article…
Read MoreAutomatic Stitching of Medical Images Using Feature Based Approach
Image stitching is a process of creating a panoramic image by combining multiple images that have overlapping regions of the same scene. It is a challenging topic in image processing, multimedia, and medical applications. The proposed system can be applied in medical applications for scoliosis operations and other long limb operations. The problem of the…
Read MoreSentiment Analysis of Regional Head Candidate’s Electability from the National Mass Media Perspective Using the Text Mining Algorithm
Mass media plays an important role in leading public opinion, including in the election of regional head candidates. The tendency of mass media coverage can be used as a parameter to measure the strength of each regional head candidate. To analyze the tendency of media opinion, sentiment analysis is needed. In this study, text mining…
Read MoreEducational Domain Management Knowledge Content Identification and Knowledge Updating Method, Based on Enterprise Management Information Interactions
The aim of this paper is to develop the educational domain management knowledge content identification and knowledge updating method, based on formal descriptions of enterprise management information interactions. This is very important because the progress of modern science leads to the emergence of new factual or conceptual knowledge. There is a need for proper methods…
Read MoreFrequency-Based Design of Electric System for Off-shore Wind Power Plant (OWPP)
The paper presents a novel concept of design of electric system for Off-shore Wind Power Plant (OWPP) based on frequency. In the literature, a new transmission system i.e. Fractional Frequency Transmission System (FFTS) has been proposed as an economic alternative to High Voltage AC (HVAC) and High Voltage DC (HVDC) for power transmission from Off-shore…
Read MoreFeature Selection for Musical Genre Classification Using a Genetic Algorithm
Music genre classification is an important multimedia research domain, including aspects of music piece representation, distances between genres, and categorization of music databases. The objective of this study was to develop a model for automatic classification of musical genres from audio data by using features from low-level time and frequency domains. These features can highlight…
Read MoreDevelopment & Implementation of Smart Vehicle Over Speeding Detector using IoT
Nowadays over speeding is one of the most common traffic violations. Generally, over speeding is the result of restless and bad behavior of drivers. As the accident rates are increasing it is important to develop and implement a system which can automatically detect and report over speeding to the traffic control authorities as early as…
Read MoreMultiple Social Metrics Based Routing Protocol in Opportunistic Mobile Social Networks
In Opportunistic Mobile social networks (OMSNs), the social characteristics and behavior of humans carrying mobile devices are exploited to improve information provision and data routing in the network. Social-based routing algorithms attempt to exploit users’ social features such as similarity, centrality and betweenness, singularly or combined, to select a suitable relay node among neighbors. However,…
Read MoreEffects of Educational Support Robots using Sympathy Expression Method with Body Movement and Facial Expression on the Learners in Short and Long-term Experiments
Recently, educational-support robots have been attracting increasing attention as studying-support gadgets. Previous studies used the sympathy expression method in which the robot expressed emotions in sympathy with the learners; however, the robots considered in those studies expressed only facial emotions. Presently, there is no study that uses body movements together with facial expressions in the…
Read MoreNonlinear Analytic Modeling for Novel Linear Variable Reluctance Motors
In this paper, an analytical modeling is proposed to compute the static and dynamic characteristics of linear variable reluctance motors with taking account of the saturation and the non-linearity of the magnetic circuit. The proposed model is based on the Fourier series expression of the phase flux in which the variation of the linkage flux…
Read MoreComputational and Technological Models of Cognitive Monitoring Systems
The approach to the construction of promising cognitive monitoring systems is considered. Based on the analysis of known solutions, the problem of automatic synthesis of computational models of cognitive monitoring is posed. In the synthesis of models, it is proposed to reduce them to relatively finite operational automata. An example of a synthesized model of…
Read MoreParallel Hybrid Testing Tool for Applications Developed by Using MPI + OpenACC Dual-Programming Model
Building massively parallel applications has become increasingly important with coming Exascale related technologies. For building these applications, a combination of programming models is needed to increase the system’s parallelism. One of these combinations is the dual-programming model (MPI+X) which has many structures that increase parallelism in heterogeneous systems that include CPUs and GPUs. MPI +…
Read MoreA Critical Analysis of Topics in Software Architecture and Design
Software architecture and design is an important component in the software engineering field. This aspect of software engineering covers the functional and non-functional requirements of any system being proposed to be developed, while software architecture deals with non-functional requirements, software design entails the functional requirements. The objective of this paper is to critically analyze current…
Read MoreVirtualization in Cloud Environment: Bandwidth Management
Cloud computing recently emerged as an interesting model that enables computing and other related internet activities to take place anywhere, anytime. Cloud service providers centralize all servers, networks, and applications to allow their users’ access at any time and from any location. Cloud computing uses already existing resources like server, CPU and storage memory but…
Read MoreCloud Service Level Agreements and Resource Management
Cloud computing is a technical “as-a-service” usage model utilizing virtualization. Virtual machines are the core of cloud computing that runs as independent machine grouped into different networks within the hypervisor. Practically done by deployment of clouds computing hosts enterprise servers in virtual machines on an array of high-end servers. Managing cloud resources has to do…
Read MoreApplication of The Half-Sweep Egsor Iteration for Two-Point Boundary Value Problems of Fractional Order
The point of this study is to explore and elucidating the performance of the four-point Half-Sweep EGSOR (4HSEGSOR) iterative method to solve fractional two-point boundary value problems by using Caputo’s fractional operator and family of finite differences (FD) schemes. To apply the iterative methods, linear system needs to be constructed via the discretization process with…
Read MoreDesigning IT Blue Print Academic System on Higher Education with Togaf
STIE XYZ is one of the universities of economics that has not been optimal in the use of information technology. IT implementation is applied when there are urgent and sudden needs. So it is not planned carefully according to the development needs of this educational institution. Therefore many patchy applications are created. As the consequence,…
Read MoreA New Model of Supplier’s Selection for Sustainable Supply Chain Management
In the last years, industrial company began to understand the central role that plays sustainable supplier selection (SSS) process for obtaining a sustainable supply chain (SSC). This paper proposes a new multi-criterion decision-making (MCDM) model for managers, which makes it possible to select the best suppliers who respect the sustainable development (SD) concept for a…
Read MoreEffects of Different Activation Functions for Unsupervised Convolutional LSTM Spatiotemporal Learning
Convolutional LSTMs are widely used for spatiotemporal prediction. We study the effect of using different activation functions for two types of units within convolutional LSTM modules, namely gate units and non-gate units. The research provides guidance for choosing the best activation function to use in convolutional LSTMs for video prediction. Moreover, this paper studies the…
Read MoreEnabling the Edge – A method for dynamic virtualizable connections for 5G deployments
The telecommunications industry continues to move forward with plans for 5G service with rates including 6Gb/s followed by upgrade paths promising 20Gb/s. Despite advances in wireless technology associated with 5G roll-outs, there remains the problem of providing sufficient backhaul throughput and efficient handling of hand-off services within the relatively small projected cell boundaries that can…
Read MoreEstimation of Software Development Project Success using Fuzzy Logics
To date, software development is vital since software is a critical element in information technology. Requirements gathering, planning, estimation, estimation, development, collaboration, testing, and deployment. The problem is when it is delivered, so it reduces the risk of the problem which could happen is important. Threat prediction should be made. It will be aimed at…
Read MoreITSM Software Ranking for Small Medium Enterprises Based on ITIL V3 Quick Win Criteria using Fuzzy SIR Method
There are various software related to the implementation of IT Service Management (ITSM) for a company, including those that are open source and commercial. An input is needed for companies in determining what software to choose from various software, especially for small and medium enterprises (SMEs) that have limited human and financial resources. In this…
Read MoreConversion of 2D to 3D Technique for Monocular Images using Papilio One
A 3D image adds realism in viewing experience and can assist in simplifying the graphical displays. A Third dimension supplement to the input can improve pattern recognition, and can be used for 3D scene reconstruction and robot navigation. Recently popularity of 3D hardware is also increased which makes it a hot topic. The production of…
Read MoreNoise Cancellation Algorithm Based on Air- and Bone-Conducted Speech Signals by Considering an Unscented Transformation Method
Noise control is essential when applying speech recognition in noisy environments such as factories. In this study, a signal processing for noise cancellation is proposed by using a noise-insensitive bone-conducted speech signal together with an air-conducted speech signal. The speech signal is generally expressed by a nonlinear model. The extended Kalman filter is very famous…
Read MoreAcquiring Energy from the Harmful Radiation Emitted by Compact Fluorescent Lamps
The purpose of this work is to present new technology in acquiring energy from the compact fluorescent lamp (CFL) and store it in a super-capacitor to operate the emergency exit lights. Many studies show energy-efficient light bulbs may emit harmful radiation. This type of lamp emits high levels of radiation, causing migraine headaches, fatigue, and…
Read MoreAn Innovative EPC Architecture based on Not Only Stack for beyond 5G Mobile Networks
The traditional long-term evolved (LTE) network architecture faces major challenges due to the rapid development of mobile intelligent applications. Evolved packet core (EPC) network, as the core network of the LTE system, faces the same problem as well. In this paper, we propose an innovative EPC architecture, i.e., Not only stack (NOS)-EPC, in which we…
Read MoreOptimization of Statcom in a Nouakchott Power System
STATCOM a shunt connected Flexible Alternative Current Systems (FACTS) device using for fast control of voltage and reactive power control in the power grid. To optimize Nouakchott power system at 2030 year, we anticipate both generation and demand grow. A set of nonlinear equations are solved through Newton Raphson method and programmed in PSS/E and…
Read MoreHybrid Technique for Enhancing Underwater Image in blurry conditions
Enhancing underwater visualization using hybrid technique is generally employed into oceanic production. Through growing oceanic learning, undersea processing has drawn extra importance owing towards necessary task of picture towards attaining data. Although, suitable to reality of dust-like constituent and beam reduction, undersea descriptions continually experience small contrast and color alteration. In this paper, we estimate…
Read MoreLocation Prediction based on Variable-order Markov Model with Time Feature and User’s Spatio-temporal Rule
Location-based service has been widely used in modern life. It brings a lot of convenience to our lives. Improving the accuracy of location prediction can provide better location- based service. We propose a location prediction method based on the variable-order Markov model with time feature and user’s spatio-temporal rule. First, the user’s trajectory data needs…
Read MoreComputer Security as an Engineering Practice: A System Engineering Discussion
We examine design principles from more than 20 years of experience in the implementation and protection of mission critical flight systems used by the Mission Design and Navigation Section at NASA’s Jet Propulsion Laboratory. Spacecraft navigation has rigorous requirements for completeness and accuracy, often under critical and uncompromising time pressure. Fault tolerant and robust design…
Read MoreDistribution of Bit Patterns in Binary Sequence Generated Over Sub Extension Field
The distribution of bit patterns is an important measure to check the randomness of a sequence. The authors of this paper observed this crucial property in a binary sequence which generated by using a primitive polynomial, trace function, and Legendre symbol defined over the sub extension field. The authors create a new dimension in the…
Read MoreEffects of The Low-Resolution 3D Video Clip on Cerebrum Blood Flow Dynamics
We have already succeeded in findings that stereoscopic video clips enhance brain activity. We herein increase the knowledge about the influence of 3D and blurred images on the human body, especially on brain activity. From of old, it has been pointed out that the motion sickness is induced by the blurred images. In this study,…
Read MoreA Formal Ontology-based Framework Towards an Intelligent Temporal Scheduler
Time scheduling as seen in timetabling processes with few and/or competing resources has exposed complex interoperable time scheduling. Attempts to resolving these time scheduling processes has been undertaken, using several classical methods, with difficulty due to inherent complexities, constraints and conflicting issues. The use of ontology-based approaches to resolve time complexity is recently adopted due…
Read MoreRelational Databases Versus HBase: An Experimental Evaluation
Relational database management systems (RDBMS) have been imposed for more than three decades as a facto standard for data storage, management, and analysis. They have a good reputation by supporting ACID properties (Atomicity, Consistency, Isolation, and Durability) and by adopting the SQL language which has become a standardized language. However, despite their power, RDBMS have…
Read MoreBehavioral Analysis of Bitcoin Users on Illegal Transactions
Bitcoin is a popular crypto currency that is used as a mode of investment and a medium for trading goods and services. Anonymity, security and decentralization are significant features of Bitcoin. This creates several opportunities for criminals to involve in illegal and fraudulent activities. This research study aimed to automate the process of gaining the…
Read MoreA Novel Rule Based Technique to Detect Electricity Theft in India
It is high time to control and prevent power theft by manipulating the meter reading and tampering of the meter. It is possible to deal power theft by developing Advanced Metering Infrastructure (AMI) and smart grids. For most of the distribution companies, utility smart meters’ data is serving as wealthy source of information beyond billing.…
Read MoreEvaluation of IEEE 802.11n and IEEE 802.11p based on Vehicle to Vehicle Communications
Wireless communication opens up new avenues in the field of intelligent vehicle systems, including monitoring, guidance and warning applications. In order to determine more precisely the feasibility of using the 802.11n standard in vehicular communication systems, this paper describes a process for evaluating the propagation performance of the 802.11n and 802.11p standards. To do that,…
Read More
