Articles
9,174 Documents
Best neural simultaneous approximation
Hawraa Abbas Almurieb;
Eman S. Bhaya
Indonesian Journal of Electrical Engineering and Computer Science Vol 20, No 3: December 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v20.i3.pp1584-1590
For many years, approximation concepts has been investigated in view of neural networks for the several applications of the two topics. Researchers studied simultaneous approximation in the 2-normed space and proved essential theorems concern with existence, uniqueness and degree of best approximation. Here, we define a new 2-norm in Lp-space, with p<1, so we call it Lp quasi 2- normed space (Lp,2). The set of approximations is a space of feedforward neural networks that is constructed in this paper. Existence and uniqueness of best neural approximation for a function from is proved, describing the rate of best approximation in terms of modulus of smoothness.
The necessity of a lead person to monitor development stages of the DevOps pipeline
Betool Alnamlah;
Sara Alshathry;
Norah Alkassim;
Nor Shahida Mohd Jamail
Indonesian Journal of Electrical Engineering and Computer Science Vol 21, No 1: January 2021
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v21.i1.pp348-353
The Development-to-Operations model, known as DevOps, refers to a framework that integrates the development and operation phases of organizational applications. DevOps bridges the gap between these two processes that traditionally prolonged the implementation of these applications. This framework aims at enhancing service delivery and releasing subsequent updates based on real-time customer feedback. Consumers in this modern era prefer tailor-made services, and a slight downtime from one supplier can quickly shift their preference to the company’s competitors. However, DevOps involves sophisticated coding activities, and there is a need for someone to oversee these processes to ensure developers are not overwhelmed. The objective of this survey is to clarify the significance of a lead person to monitor the DevOps pipeline and report any failure detected in each development stage. The study utilized meta-analysis of verified tertiary resources from other researchers that took a deep dive into the DevOps model and how it works towards organizational goals in various firms. All institutions involved in multiple business platforms should take advantage of new technologies to scale up their service delivery and net profit. If adopted and appropriately monitored, DevOps can revolutionize the capabilities of most business applications by minimizing downtimes and providing uninterrupted services.
A modified fractal texture image analysis based on grayscale morphology for multi-model views in MR Brain
Usha R;
Perumal K
Indonesian Journal of Electrical Engineering and Computer Science Vol 21, No 1: January 2021
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v21.i1.pp154-163
This paper presents a modified fractal texture feature analysis with the use of grayscale image morphology for automatic image classification of different views in MR brain images into normal and abnormal. This main contribution of this approach is a reduction of the total number of a threshold value, and the number of image decomposition, in which only the number of extract threshold value two or three are enough for tumor region extraction - compared to four or more is required in the previous method of SFTA (segmentation based fractal texture analysis). This is achieved by pre-processing of hierarchical transformation technique (HTT), which make use of morphological image transformations with the desired structural element. From this decomposed images, mean, area, fractal dimension and selective shape features are extracted and fed into KNN and ensemble bagged tree classifiers. Finally, some of the post-processing is handled for tumor region extraction and tumor cells computation. It is found that this proposed approach has superior results in the segmentation of diseased tissue from normal tissue and the prediction of image classes in terms of accuracy with the less number of threshold extraction and image decomposition rather than the SFTA algorithm.
Conventional doped silica/fluoride glass fibers for low loss and minimum dispersion effects
Aadel M. Alatwi;
Ahmed Nabih Zaki Rashed
Indonesian Journal of Electrical Engineering and Computer Science Vol 21, No 1: January 2021
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v21.i1.pp287-295
This paper has clarified the conventional silica doped (SiGeO2) and aluminum fluoride (AlF3) fibers for low loss and minimum dispersion effects for upgrading fiber-optic communication systems. The total dispersion with the total losses are modeled for both fibers. Fiber bandwidth and the power received are estimated based on different dopant ratios. The spectral and thermal effects are applied on both fibers. The study assured the negative effects of increasing ambient temperatures and the positive effects of increasing dopant ratios on the performance of the fibers.
Real time modified programmable universal machine for assembly (PUMA) 560 with intelligent controller
Yousif I. Al Mashhadany;
Wesam M. Jasim
Indonesian Journal of Electrical Engineering and Computer Science Vol 20, No 3: December 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v20.i3.pp1194-1202
In this work, the design of an integrated industrial application for use on a modified PUMA 560 robot arm was presented. The modified PUMA 560 robot has three joints; two of them are free-moving and the third one is at constant 90 degree angle. It has three links and two extra Griper links. Each joint was controlled via a DC motor through a PIC microcontroller. The design and implementation of modified PUMA 560 with electronic circuits to derive the motor were used with the robot and the working platform. These electronic circuits were also used to interface with the computer to control the DC motor based on the computer orders. The control signals used to control the application control system and to perform the defined tasks were received from a remote computer connected via internet. This design has been implemented in two phases; the first phase was the simulation of the complete control system, while, the second phase was the practical implementation. The obtained results were ensured the ability of the proposed system to perform the tasks of many industrial applications.
Disturbance rejection using IMC tuned PID controller with improved filter
B. Mabu Sarif;
D. V. Ashok Kumar;
M. Venu Gopala Rao
Indonesian Journal of Electrical Engineering and Computer Science Vol 20, No 3: December 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v20.i3.pp1261-1270
IMC-PID controllers supply exceptional set point tracking but slow disturbance refutation, because of introduction of slow process pole introduced by the conventional filter. Disturbance rejection is important in many industrial applications over set point tracking. An enhanced IMC filter cascaded with PID controller with internal model control tuning system (IMC-PID) is presented right now for efficient disruption rejection and reliable first order process operation with time delay (FOPTD). The optional filter does away with the sluggish dominant pole. The present learning shows that the recommended IMC filter provide excellent trouble rejection irrespective of where the trouble enters the procedure and provide high-quality robustness to duplicate deviation in surroundings of accepting in difference with other method cited in the text. Reenactment study was led to show the feasibility of the suggested approach on processes with different 0/r ratios by measuring the controller parameters while retaining the same robustness as regards maximal sensitivity. His efficiency of the closed loops was assessed utilizing integral error parameters. Viz. ISE, ITAE, IAE. The recommended filter provides excellent response pro lag dominant processes.
Laser measured rate equations with various transmission coders for optimum of data transmission error rates
Hazem M. El-Hageen;
Aadel M. Alatwi;
Ahmed Nabih Zaki Rashed
Indonesian Journal of Electrical Engineering and Computer Science Vol 20, No 3: December 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v20.i3.pp1406-1412
The present study has outlined laser-measured rate equations with various transmission coders for optimum data transmission error rates. Various modulation transmission coders are employed, such as a pulse position modulation coder, a differential pulse intensity modulation coder, and a four band/five band modulation transmission coder, in order to create optimized data rates of up to 40 GB/s for a fiber extension length of up to 100 km. This study has emphasized the important role of pulse position modulation transmission coders, which exhibit superior performance in max. Q parameter and min. data error rates, even for high data rate transmission.
TYPES AND PROCESS OF RISK MANAGEMENT
alsaadat, khalil
Indonesian Journal of Electrical Engineering and Computer Science Vol 21, No 1: January 2021
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v21.i1.pp%p
The main objective of risk management is not to dampen swings in corporate cash flows or value, but rather to ensure protection against the possibility of "costly lower-tail outcomes"-situations that would create financial difficulties or make an organization unable to achieve its investment plan .This paper discusses types and process of risk management and sheds some lights on the importance of this process on various aspects of human lives ,environment and society organizations .Up on the discussion a risk management model is presented .
Stamps extraction using local adaptive k- means and ISODATA algorithms
Maha A. Rajab;
Loay E. George
Indonesian Journal of Electrical Engineering and Computer Science Vol 21, No 1: January 2021
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v21.i1.pp137-145
One of the main difficulties facing the certified documents documentary archiving system is checking the stamps system, but, that stamps may be contains complex background and surrounded by unwanted data. Therefore, the main objective of this paper is to isolate background and to remove noise that may be surrounded stamp. Our proposed method comprises of four phases, firstly, we apply k-means algorithm for clustering stamp image into a number of clusters and merged them using ISODATA algorithm. Secondly, we compute mean and standard deviation for each remaining cluster to isolate background cluster from stamp cluster. Thirdly, a region growing algorithm is applied to segment the image and then choosing the connected region to produce a binary mask for the stamp area. Finally, the binary mask is combined with the original image to extract the stamp regions. The results indicate that the number of clusters can be determined dynamically and the largest cluster that has minimum standard deviation (i.e., always the largest cluster is the background cluster). Also, show that the binary mask can be established from more than one segment to cover are all stamp’s disconnected pieces and it can be useful to remove the noise appear with stamp region.
Web application authentication using ZKP and novel 6D chaotic system
Shatha J. Mohammed;
Sadiq A. Mehdi
Indonesian Journal of Electrical Engineering and Computer Science Vol 20, No 3: December 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v20.i3.pp1522-1529
Text password has long been a dominant approach to user authentication used by a huge quantity of Internet services. Web applications are now widely used for the implementation of a range of significant services. The securing of such applications has thus become a significant process. Currently the frequent use of passwords and the need for them make them more vulnerable to theft or guesswork. In the proposed research, the researcher designed an algorithm that has the ability to perform registration or to access web applications safely. The researcher designed an algorithm in the proposed research, which has the ability to securely perform registration or access web applications. The proposed idea based on the notion of Zero-knowledge proof. A complex generation of random number initiated by proposed novel 6D-Hyper chaotic system. The bottom line is that both parties (web application, user), have a secret number. These two numbers used to do the process of registration without requiring a password. Results from the research showed the importance of the proposed method by which the keys were managed and distributed in a safe and effective way.