Articles
45 Documents
Search results for
, issue
" Vol 8, No 2: June 2019"
:
45 Documents
clear
A Novel approach for Asynchronous Microprocessor Design and its Implementation on FPGA
Rani, Archana;
Grover, Naresh
Bulletin of Electrical Engineering and Informatics Vol 8, No 2: June 2019
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/eei.v8i2.1246
The asynchronous processors have a number of advantages, especially in SoC (System on chip) including reduced crosstalk between analog and digital circuits, ease of integrating multi-rate circuits, ease of component reuse and less power consumption as well. This paper presents processor architecture design, its implementation followed by processor instruction set, data path flow for fetching unit, Register type, I-type and load /store type instruction flow. Thereafter this paper illustrates control unit design of processor that shows the controlling of signals for different units in processor design. Further, a complete internal structure is shown followed by features of novel processor architecture. It has capability of handling even I-Type, R-Type and Jump instructions with multiplier instruction packet. Moreover, it uses separate memory for instructions and data read-write that can be changed at any time.In the end, results have been shown using implementation windows. The complete design has been written using VHDL and then simulated and synthesized by XILINX ISE tool.
A Game Theoretic Approach for Competition over Visibility in Social Networks
Touya, Khadija;
Baslam, Mohamed;
El Ayachi, Rachid;
Jourhmane, Mostafa
Bulletin of Electrical Engineering and Informatics Vol 8, No 2: June 2019
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/eei.v8i2.728
Social Networks have known an important evolution in the last few years. These structures, made up of individuals who are tied by one or more specific types of interdependency, constitute the window for members to express their opinions and thoughts by sending posts to their own walls or others timelines. Actually, when a content arrives, its located on the top of the timeline pushing away older messages. This situation causes a permanent competition over visibility among subscribers who jump on opponents to promote conflict. Our study presents this competition as a non-cooperative game; each source has to choose frequencies which assure its visibility. We model it, exploring the theory of concave games, to reach a situation of equilibrium; a situation where no player has the ultimate ability to deviate from its current strategy. We formulate the named game, then we analyze it and prove that there is exactly one Nash equilibrium which is the convergence of all players best responses. We finally provide some numerical results, taking into consideration a system of two sources with a specific frequency space, and analyze the effect of different parameters on sources visibility on the walls of social networks.
Task Mapping and Routing Optimization for Hard Real-Time Networks-On-Chip
Norazizi Sham Mohd Sayuti, M.;
Hazwani Mohd Ridzuan, Farida;
Hilmi Abdullah, Zul
Bulletin of Electrical Engineering and Informatics Vol 8, No 2: June 2019
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/eei.v8i1.1395
Interference from high priority tasks and messages in a hard real-time Networks-On-Chip (NoC) create computation and communication delays. As the delays increase in number, maintaining the system’s schedulability become difficult. In order to overcome the problem, one way is to reduce interference in the NoC by changing task mapping and network routing. Some population-based heuristics evaluate the worst-case response times of tasks and messages based on the schedulability analysis, but requires a significant amount of optimization time to complete due to the complexity of the evaluation function. In this paper, we propose an optimization technique that explore both parameters simultaneously with the aim to meet the schedulability of the system, hence reducing the optimization time. One of the advantages from our approach is the unrepeated call to the evaluation function, which is unaddressed in the heuristics that configure design parameters in stages. The results show that a schedulable configuration can be found from the large design space.
Analysis of Wavelet-Based Full Reference Image Quality Assessment Algorithm
Mokhtar, Faizah;
Ngadiran, Ruzelita;
Basheer, Taha;
Nazren Abdul Rahim, Amir
Bulletin of Electrical Engineering and Informatics Vol 8, No 2: June 2019
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/eei.v8i1.1404
Measurement of Image Quality plays an important role in numerous image processing applications such as forensic science, image enhancement, medical imaging, etc. In recent years, there is a growing interest among researchers in creating objective image quality assessment (IQA) algorithms that can correlate well with perceived quality. A significant progress has been made for full reference (FR) IQA problem in the past decade. In this paper, we are comparing 5 selected FR IQA algorithms on TID2008 image datasets. The performance and evaluation results are shown in graphs and tables. The results of quantitative assessment showed wavelet-based IQA algorithm outperformed over the non-wavelet based IQA method except for WASH algorithm which the prediction value only outperformed for certain distortion types since it takes into account the essential structural data content of the image.
Routing Performance of Structured Overlay in Distributed Hash Tables (DHT) for P2P
Ruslan, Rafiza;
Shaqirra Mohd Zailani, Ayu;
Hidayah Mohd Zukri, Nurul;
Khairani Kamarudin, Nur;
Jamel Elias, Shamsul;
Badlishah Ahmad, R.
Bulletin of Electrical Engineering and Informatics Vol 8, No 2: June 2019
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/eei.v8i2.1449
This paper presents a routing performance analysis of structured P2P overlay network. Due to the rapid development and hectic life, sharing data wirelessly is essential. P2P allows participating peers move freely by joining and leaving the network at any convenience time. Therefore, it exists constraint when one measuring the network performance. Moreover, the design of structured overlay networks is fragmented and with various design. P2P networks need to have a reliable routing protocol. In order to analyse the routing performance, this work simulates three structured overlay protocols – Chord, Pastry and Kademlia using OMNeT++ with INET and OverSim module. The result shows that Pastry is the best among others with 100% routing efficiency. However, Kademlia leads with 12.76% and 18.78% better than Chord and Pastry in lookup hop count and lookup success latency respectively. Hence, Pastry and Kamelia architectures will have a better choice for implementing structured overlay P2P network.
Analysis of Near-Infrared (NIR) Spectroscopy for Chlorophyll Prediction in Oil Palm Leaves
Shafiq Amirul Sabri, Mohd.;
Endut, R.;
B.M. Rashidi, C.;
R. Laili, A.;
A. Aljunid, S.;
Ali, N.
Bulletin of Electrical Engineering and Informatics Vol 8, No 2: June 2019
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/eei.v8i2.1412
Oil palm nutrient content is investigated with using chlorophyll as a representative factor correlated with NIR spectroscopy spectral absorbance. NIR spectroscopy method of sampling have been tested to overcome time consuming, complex chemical analysis procedure and invasive sampling method in order to identify chlorophyll content in an oil palm tree. Spectral absorbance data from range 900 nm to 1700 nm and chlorophyll data, then tested through five pre-processing methods which is Savitzky-Golay Smoothing (SGS), Multiplicative Scatter Correction (MSC), Single Normal Variation (SNV), First Derivative (1D) and also Second Derivative (2D) using Partial Least Square (PLS) regression prediction model to evaluate the correlation between both data. The overall results show, SGS has the best performance for preprocessing method with the results, the coefficient of determination (R2) values of 0.9998 and root mean square error (RMSE) values of 0.0639. In summary, correlation of NIR spectral absorbance data and chlorophyll can be achieved using a PLS regression model with SGS pre-processing technique. Thus, we can conclude that NIR spectroscopy method can be used to identify chlorophyll content in oil palm with using time saving, simple sampling and non-invasive method.
Self-switching Diodes as RF Rectifiers: Evaluation Methods and Current Progress
Farhani Zakaria, Nor;
Rizal Kasjoo, Shahrir;
Mohamad Isa, Muammar;
Zailan, Zarimawaty;
Khairuddin Md Arshad, Mohd;
Taking, Sanna
Bulletin of Electrical Engineering and Informatics Vol 8, No 2: June 2019
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/eei.v8i2.1413
In the advancement of the Internet of Things (IoT) applications, widespread uses and applications of devices require higher frequency connectivity to be explored and exploited. Furthermore, the size, weight, power and cost demands for the IoT ecosystems also creates a new paradigm for the hardware where improved power efficiency and efficient wireless transmission needed to be investigated and made feasible. As such, functional microwave detectors to detect and rectify the signals transmitted in higher frequency regions are crucial. This paper reviewed the practicability of self switching diodes as Radio Frequency (RF) rectifiers. The existing methods used in the evaluation of the rectification performance and cut-off frequency are reviewed, and current achievements are then concluded. The works reviewed in this paper highlights the functionality of SSD as a RF rectifier with design simplicity, which may offer cheaper alternatives in current high frequency rectifying devices for application in low-power devices.
High Availability of Data using Automatic Selection Algorithm (ASA) in Distributed Stream Processing Systems
Alshamrani, Sultan;
Alhumyani, Hesham;
Waseem, Quadri;
Noor Mohamed, Isbudeen
Bulletin of Electrical Engineering and Informatics Vol 8, No 2: June 2019
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/eei.v8i2.1414
High Availability of data is one of the most critical requirements of a distributed stream processing systems (DSPS). We can achieve high availability using available recovering techniques, which include (active backup, passive backup and upstream backup). Each recovery technique has its own advantages and disadvantages. They are used for different type of failures based on the type and the nature of the failures. This paper presents an Automatic selection algorithm (ASA) which will help in selecting the best recovery techniques based on the type of failures. We intend to use together all different recovery approaches available (i.e., active standby, passive standby, and upstream standby) at nodes in a distributed stream-processing system (DSPS) based upon the system requirements and a failure type). By doing this, we will achieve all benefits of fastest recovery, precise recovery and a lower runtime overhead in a single solution. We evaluate our automatic selection algorithm (ASA) approach as an algorithm selector during the runtime of stream processing. Moreover, we also evaluated its efficiency in comparison with the time factor. The experimental results show that our approach is 95% efficient and fast than other conventional manual failure recovery approaches and is hence totally automatic in nature.
Hand Motion Pattern Recognition Analysis of Forearm Muscle using MMG Signals
R. Mohamad Ismail, M.;
K. Lam, C.;
Sundaraj, K.;
H. F. Rahiman, M.
Bulletin of Electrical Engineering and Informatics Vol 8, No 2: June 2019
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/eei.v8i2.1415
Surface Mechanomyography (MMG) is the recording of mechanical activity of muscle tissue. MMG measures the mechanical signal (vibration of muscle) that generated from the muscles during contraction or relaxation action. It is widely used in various fields such as medical diagnosis, rehabilitation purpose and engineering applications. The main purpose of this research is to identify the hand gesture movement via VMG sensor (TSD250A) and classify them using Linear Discriminant Analysis (LDA). There are four channels MMG signal placed into adjacent muscles which PL-FCU and ED-ECU. The features used to feed the classifier to determine accuracy are mean absolute value, standard deviation, variance and root mean square. Most of subjects gave similar range of MMG signal of extraction values because of the adjacent muscle. The average accuracy of LDA is approximately 87.50% for the eight subjects. The finding of the result shows, MMG signal of adjacent muscle can affect the classification accuracy of the classifier.
An Efficient Algorithm for Monitoring Virtual Machines in Clouds
Alshamrani, Sultan
Bulletin of Electrical Engineering and Informatics Vol 8, No 2: June 2019
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/eei.v8i2.1416
Cloud computing systems consist of a pool of Virtual Machines (VMs), which are installed physically on the providers set up. The main aim of the VMs is to offer the service to the end users. With the current increasing demand for the cloud VMs, there is always a huge requirement to secure the cloud systems. To keep these cloud systems secured, they need a continuous and a proper monitoring. For the purpose of monitoring, several algorithms are available with FVMs. FVM is a forensic virtual machine which monitors the threats among the VMs. Our formulated algorithm runs on FVM. In this paper, we formulate the Random-Start-Round-Robin algorithm for monitoring inside FVM.