Articles
66 Documents
Search results for
, issue
"Vol 23, No 1: July 2021"
:
66 Documents
clear
Sentiment classification of user's reviews on drugs based on global vectors for word representation and bidirectional long short-term memory recurrent neural network
Hadab Khalid Obayed;
Firas Sabah Al-Turaihi;
Khaldoon H. Alhussayni
Indonesian Journal of Electrical Engineering and Computer Science Vol 23, No 1: July 2021
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v23.i1.pp345-353
The process of product development in the health sector, especially pharmaceuticals, goes through a series of precise procedures due to its directrelevance to human life. The opinion of patients or users of a particular drugcan be relied upon in this development process, as the patients convey their experience with the drugs through their opinion. The social media field provides many datasets related to drugs through knowing the user's ratingand opinion on a drug after using it. In this work, a dataset is used that includes the user’s rating and review on the drug, for the purpose of classifying the user’s opinions (reviews) whether they are positive ornegative. The proposed method in this article includes two phases. The first phase is to use the Global vectors for word representation model for converting texts into the vector of embedded words. As for the second stage, the deep neural network (Bidirectional longshort-termmemory) is employedin the classification of reviews. The user's rating is used as a ground truth inevaluating the classification results. The proposed method present sencouraging results, as the classification results are evaluated through threecriteria, namely Precision, Recall and F-score, whose obtained values equal(0.9543, 0.9597and0.9558), respectively. The classification results of theproposed method are compared to a number of classifiers, and it was noticed that the results of the proposed method exceed those of the alternative classifiers.
Monte Carlo analysis for solar PV impact assessment in MV distribution networks
Dilini Almeida;
Jagadeesh Pasupuleti;
Shangari K. Raveendran;
M. Reyasudin Basir Khan
Indonesian Journal of Electrical Engineering and Computer Science Vol 23, No 1: July 2021
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v23.i1.pp23-31
The rapid penetration of solar photovoltaic (PV) systems in distribution networks has imposed various implications on network operations. Therefore, it is imperative to consider the stochastic nature of PV generation and load demand to address the operational challenges in future PV-rich distribution networks. This paper proposes a Monte Carlo based probabilistic framework for assessing the impact of PV penetration on medium voltage (MV) distribution networks. The uncertainties associated with PV installation capacity and its location, as well as the time-varying nature of PV generation and load demand were considered for the implementation of the probabilistic framework. A case study was performed for a typical MV distribution network in Malaysia, demonstrating the effectiveness of Monte Carlo analysis in evaluating the potential PV impacts in the future. A total of 1000 Monte Carlo simulations were conducted to accurately identify the influence of PV penetration on voltage profiles and network losses. Besides, several key metrics were used to quantify the technical performance of the distribution network. The results revealed that the worst repercussion of high solar PV penetration on typical Malaysian MV distribution networks is the violation of the upper voltage statutory limit, which is likely to occur beyond 70% penetration level.
Logistics tracking system based on decentralized IoT and blockchain platform
Marouane El Midaoui;
El Mehdi Ben Laoula;
Mohammed Qbadou;
Khalifa Mansouri
Indonesian Journal of Electrical Engineering and Computer Science Vol 23, No 1: July 2021
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v23.i1.pp421-430
Most of supply chain networks have encountered difficulties when trying to integrate all components and stakeholders (Customers, warehouse, transportation, and raw material production. Etc...), which make supply chain management system suffering from a lack of efficiency and transparency that make a steady increase in good’s falsification and consumer’s disappointment. All information about good’s production, storage and transportation should flow clearly during all stages of the supply chain by tracking and authenticating to avoid product’s contamination or fraud in the network. Current tracking IoT-based systems are built on top of centralized architecture and this leaves a gap for tampering and false information especially in urban area, but also the exsiting solutions cannot allow the information to be shared with authority or consumers. To effectively assess and assure traceability and transparency this paper propose an approach using a distributed ledger (blockchain) besides a configuable IoT-based system to take into account all needed data including specific case of urban area, with an opendata platform at the disposal of stockholders, authority and consumers.
Towards using UAV for improving 5G cellular communication systems
Mohamed El Sayed Kotb;
Wagdy R. Anis;
Ahmed A. Abd-Elhafez
Indonesian Journal of Electrical Engineering and Computer Science Vol 23, No 1: July 2021
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v23.i1.pp265-272
Unmanned aerial vehicles (UAVs) have sparked a lot of interest in the wireless networking community as an emerging subject in aerial robotics. The UAV environment can be used to improve UAV communications in various ways. These smart devices cater for a broad variety of wireless technologies and applications because of UAV's inherent features related to versatile mobility in 3D space, autonomous operations as well as intelligent positioning. This study will investigate the convergence synergies between 5G/B5G mobile systems and UAV technologies, with the UAV being integrated into current cellular networks as a modern aerial user equipment (UE). In this integration, UAVs play the function of cellular flying customers, and are hence referred to as cellularly linked UAVs (a.k.a. UAVUE, drone-UE, 5G-connected drone, or aerial user). The major goal of this research is to provide a thorough analysis of the integration task, as well as major technical breakthroughs from 5G/B5G and current work in prototyping architecture and field trials that support cell-based UAVs. This study examines recent 3GPP standards advances as well as socio-economic challenges that must be addressed before this promising technology can be properly implemented. There are already some accessible issues clearing the way for potential study opportunities.
Secured protection of transmission line by distance relay using data mining approach
M. Kiruthika;
Bindu S.
Indonesian Journal of Electrical Engineering and Computer Science Vol 23, No 1: July 2021
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v23.i1.pp1-13
Distance relay is one of the most important protection element of a transmission line used in protection schemes. Relay may malfunction if it is not able to distinguish faults from system stressed conditions. This work mainly focusses on enhancing the performance of the distance relay in a secured manner based on data mining approach which uses two phases of classification. Level 1 classifier identifies the system conditions like normal, fault, and power swing and level 2 classifier gets initiated when there is a power swing and distinguishes between the persistence of power swing condition and a three-phase fault. In both the phases, the protection scheme in the respective zone where the fault occurred gets activated. The proposed methodology is tested for an IEEE 9-bus system wherein the data is collected from phasor measurement units placed in optimal locations. Optimal PMU placement is economical since it overcomes issues like cost, communication infrastructure issues, maintenance and complexity. The results proved that the proposed method is effective with good efficiency and higher accuracy with less number of PMUs.
Efficient multi-keyword similarity search over encrypted cloud documents
Ayad I. Abdulsada;
Dhafer G. Honi;
Salah Al-Darraji
Indonesian Journal of Electrical Engineering and Computer Science Vol 23, No 1: July 2021
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v23.i1.pp510-518
Many organizations and individuals are attracted to outsource their data into remote cloud service providers. To ensure privacy, sensitive data should be encrypted be-fore being hosted. However, encryption disables the direct application of the essential data management operations like searching and indexing. Searchable encryption is acryptographic tool that gives users the ability to search the encrypted data while being encrypted. However, the existing schemes either serve a single exact search that loss the ability to handle the misspelled keywords or multi-keyword search that generate very long trapdoors. In this paper, we address the problem of designing a practical multi-keyword similarity scheme that provides short trapdoors and returns the correct results according to their similarity scores. To do so, each document is translated intoa compressed trapdoor. Trapdoors are generated using key based hash functions to en-sure their privacy. Only authorized users can issue valid trapdoors. Similarity scores of two textual documents are evaluated by computing the Hamming distance between their corresponding trapdoors. A robust security definition is provided together withits proof. Our experimental results illustrate that the proposed scheme improves thesearch efficiency compared to the existing schemes. Further more, it shows a high level of performance.
A novel compact dual band RFID handheld reader antenna for microwave ISM band application
Wahiba Belgacem;
Miloud Bousahla;
Sidi Mohammed Meriah
Indonesian Journal of Electrical Engineering and Computer Science Vol 23, No 1: July 2021
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v23.i1.pp321-329
This paper presents a new design of dual band RFID reader antenna for ISM-band industrial science and medical applications at 2.4 GHz and 5.8 GHz. Theantenna is designed and physically built using FR4 substrate and taking a 1.5 thickness, 4.3 relative permittivity and 0.025 loss tangents. Different slots havebeen introduced to reduce the antenna dimensions and to achieve the dual bandfor microwave ISM band application. The dimension of the proposed antenna is 34 × 34 × 1.5 mm3, which it could be easily integrated into RFID readers.Numerical simulations have been performed usingcomputer simulationtechnology (CST) Microwave Studio software. A parametric study wasinvestigated in order to show the effect of slots variation and to obtain the desiredfunctional characteristics. Experimental results show a good agreement withresults obtained by simulations. A satisfactorily omnidirectional for the radiationpatterns across the antenna operation bands was obtained.
Energy efficient WSN using hybrid modification PEGASIS with ant lion optimization
Ahmed Abdul Azeez Asmael;
Basman Al-Nedawe
Indonesian Journal of Electrical Engineering and Computer Science Vol 23, No 1: July 2021
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v23.i1.pp273-284
Wireless sensor nodes consist of tiny electronic devices that can sense, transmit, and measure data from physical environments such as the field of minter surveillance. These sensor nodes significantly depend on batteries to gain energy which is used to operations associated with communication and computation. Generally, designing communication protocols is feasible to achieve effective usage of these energy resources of the sensor node. Both reported medium access control and routing can achieve energy-saving that supporting real time functionality. This paper emphasizes the use of hybrid modified PEGASIS-Ant lion optimization. Several steps are entailed in this research. First is random distribution of node followed by clustering the map as a circular region. Then, the nodes are connected to the closest node in that region. In consequence, PEGASIS-Ant lion optimization is applied to enhance the connection of the nodes and accomplish the maximum life batter of the sensor. At last, the experiments performed in this work demonstrate that the proposed optimization technique operates well in terms of network latency, power duration and energy’s consumption. Furthermore, the life span of the nodes has improved greatly by 87% over the original algorithm that accomplished a rate of life nodes of 60%.
Development of a model for evaluating the effectiveness of innovative startups based on information cycles and using neural networks
Morozov Viktor;
Kolomiiets Anna;
Mezentseva Olga
Indonesian Journal of Electrical Engineering and Computer Science Vol 23, No 1: July 2021
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v23.i1.pp396-404
An integrated approach to the creation and development of innovative startup projects in the field of information technology is considered. To conduct research, the authors proposed a model of information cycles of startup projects based on the creation of an information model of such projects. At the same time there are dynamic processes of changes in the parameters of the model, which are turbulent in nature and require the use of tools and methods of artificial intelligence for research. The key areas of knowledge of such influence are defined. The mathematical model of processes of management of development of IT startups on the basis of creation and development of a difficult IT product, taking into account influences of environments of the project is constructed, the basic characteristics are allocated and parameters are defined. To do this, the construction of predictive models is proposed to be carried out by modified Demarc trends, the method of self-organization and the neural network. The modeling of the main objective functions of the mathematical model of these processes is performed. The analysis of the received results is carried out and the conclusions are made.
A survey of various intelligent home applications using IoT and intelligent controllers
Mustafa Asaad Omran;
Wasaan Kadhim Saad;
Bashar Jabbar Hamza;
Ahmed Fahem Al-baghdadi
Indonesian Journal of Electrical Engineering and Computer Science Vol 23, No 1: July 2021
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v23.i1.pp490-499
The tremendous development in technology used in our daily life was one of the most important incentives for researchers to add technology that is easy to use and useful in human life, an example internet of things (IoT) and systems of intelligence used in various fields. This article provides an overview of the smart home (SH) study of the Internet of Things as smart homes (SHs) have attracted great interest with communication technology advancements. The intelligent home is an Internet of Things technology that allows the monitoring and control of devices via the Internet using a home automation system (HAS). Followed by the justification for choosing the smart home and smart home engineering, and what are the most used communication protocols for smart homes, whether wired or wireless.