Volume 3, Issue 1

Current Issue features key papers related to multidisciplinary domains involving complex system stemming from numerous disciplines; this is exactly how this journal differs from other interdisciplinary and multidisciplinary engineering journals. This issue contains 62 accepted papers in Computer Science and Electronics Engineering domains.
Download Complete IssueFront Cover
Editorial Board
Editorial
Table of Contents
Machine Learning framework for image classification
Hereby in this paper, we are going to refer image classification. The main issue in image classification is features extraction and image vector representation. We expose the Bag of Features method used to find image representation. Class prediction accuracy of varying classifiers algorithms is measured on Caltech 101 images. For feature extraction functions we evaluate…
Read MoreImpact of Line Resistance Combined with Device Variability on Resistive RAM Memories
In this paper, the performance and reliability of oxide-based Resistive RAM (ReRAM) memory is investigated in a 28nm FDSOI technology versus interconnects resistivity combined with device variability. Indeed, common problems with ReRAM are related to high variability in operating conditions and low yield. At a cell level ReRAMs suffer from variability. At an array level,…
Read MoreBuilding an Efficient Alert Management Model for Intrusion Detection Systems
This paper is an extension of work originally presented in WITS-2017 CONF. We extend our previous works by improving the Risk calculation formula, and risk assessment of an alert cluster instead of every single alert. Also, we presented the initial results of the implementation of our model based on risk assessment and alerts prioritization. The…
Read MoreVirtual Memory Introspection Framework for Cyber Threat Detection in Virtual Environment
In today’s information based world, it is increasingly important to safeguard the data owned by any organization, be it intellectual property or personal information. With ever increasing sophistication of malware, it is imperative to come up with an automated and advanced methods of attack vector recognition and isolation. Existing methods are not dynamic enough to…
Read MoreA Test Code Generation Method for Coding Standard Input/Output with Exception Handling in Java Programming Learning Assistant System
To advance Java programming educations, we have developed the Java Programming Learning Assistant System (JPLAS) that provides the code writing problem. This problem asks a student to write a source code to satisfy the specification of a given assignment, where the correctness is verified by running test code on JUnit. For a novice student, a…
Read MoreFramework for the Formal Specification and Verification of Security Guidelines
Ensuring the compliance of developed software with general and application-specific security requirements is a challenging task due to the lack of automatic and formal means to lead this verification. In this paper, we present our approach that aims at integrating the formal specification and verification of security guidelines in early stages of the development lifecycle…
Read MoreImproving System Reliability Assessment of Safety-Critical Systems using Machine Learning Optimization Techniques
Quality assurance of modern-day safety-critical systems is continually facing new challenges with the increase in both the level of functionality they provide and their degree of interaction with their environment. We propose a novel selection method for black-box regression testing on the basis of machine learning techniques for increasing testing efficiency. Risk-aware selection decisions are…
Read MoreNumerical Solution of Fuzzy Differential Equations with Z-numbers using Fuzzy Sumudu Transforms
The uncertain nonlinear systems can be modeled with fuzzy differential equations (FDEs) and the solutions of these equations are applied to analyze many engineering problems. However, it is very difficult to obtain solutions of FDEs. In this paper, the solutions of FDEs are approximated by utilizing the fuzzy Sumudu transform (FST) method. Here, the uncertainties…
Read MoreDesign and Simulation of an RF-MEMS Switch and analysis of its Electromagnetic aspect in realtion to stress
Microelectromechanical Systems (MEMS) are devices made up of several electrical and mechanical components. They consist of mechanical functions (sensing, thermal, inertial) and electrical functions (switching, decision making) on a single chip made by microfabrication methods. These chips exhibit combined properties of the two functions. The size of system has characteristic dimensions less than 1mm but…
Read MoreA Perfect Ecosystem for Learning? Modern Thoughts for Organizing Higher Education
The background of the article lies in South Eastern Finland, in Lappeenranta, where an active University campus has attracted a group of ICT startups as well as SME’s in the field to collaboration. The novel education approach also has another remarkable role as a developer and source of innovation. An experimental development ecosystem (EDE), where…
Read MoreAuto-Encoder based Deep Learning for Surface Electromyography Signal Processing
Feature extraction is taking a very vital and essential part of bio-signal processing. We need to choose one of two paths to identify and select features in any system. The most popular track is engineering handcrafted, which mainly depends on the user experience and the field of application. While the other path is feature learning,…
Read MoreA Statistical Approach for Gain Bandwidth Prediction of Phoenix-Cell Based Reflect arrays
A new statistical approach to predict the gain bandwidth of Phoenix-cell based reflectarrays is proposed. It combines the effects of both main factors that limit the bandwidth of reflectarrays: spatial phase delays and intrinsic bandwidth of radiating cells. As an illustration, the proposed approach is successfully applied to two reflectarrays based on new Phoenix cells.
Read MoreImpact of Crosstalk on Signal Integrity of TSVs in 3D Integrated Circuits
Through-Silicon-Vias (TSVs) are utilized for high density 3D integration, which induce crosstalk problems and impact signal integrity. This paper focuses on TSV crosstalk characterization in 3D integrated circuits, where several TSV physical and environmental configurations are investigated. In particular, this work shows a detailed study on the influence of signal-ground TSV locations, distances and their…
Read MoreConstructing Learning-by-Doing Pedagogical Model for Delivering 21st Century Engineering Education
The United Arab Emirates (UAE) is dedicated to establishing the best teaching and learning environment for students and staff across all higher education institutions. To heed this call, the engineering division adopted the Learning-by-Doing (LBD) pedagogical philosophy for 21st Century education at the heart of its strategic directions. This study intends to explore how LBD…
Read MoreA 3D Full Wave Inversion (FWI) Analysis for Handheld Ground Penetrating Radar (GPR)
This paper reports the results of an empirical, 3D full wave inversion (FWI) numerical analysis which provides an estimation of the performance of multi-static handheld ground penetrating radar (GPR,) compared to a bi-static system, for landmine detection using FWI imaging. The experiments are based on simulated data and provide a more realistic evaluation of the…
Read MoreModelling of the resistance heating of the moving molybdenum sheet
This article describes the modeling procedure of a direct resistive heat model of the molybdenum sheet and its simulation with electrodes made from various materials. The main characteristic of the proposed model is its dynamic behavior, because model considers the movement of the molybdenum sheet. The simulation results are mutually compared and the optimal material…
Read MoreAlgorithms for Technical Integration of Virtual Power Plants into German System Operation
This paper critically evaluates the operational perspective of Virtual Power Plants (VPP) in Germany by analyzing key factors to replace conventional power plants in the future power system. Therefore, its necessity for the secure operation as well as the technical and economic benefits for the German power system are pointed out. The single sections describe…
Read MoreDevelopment of Indicators for Technical Condition Indexing of Power Transformers
Reliable operation of a power transformer with a certain load depends on the technical condition of individual construction parts and the ability to prevent defects that can cause a failure. During the lifecycle of a transformer, valuable data is constantly accumulated, which forms the basis for technical or risk assessment of the equipment. Therefore it…
Read MoreInfluence of supply frequency on dissipation factor measurement and stator insulation diagnosis
This paper is an extension of work originally presented in EIC-2017. It deals with influence of the supply frequency for dissipation factor measurements, mainly for tests under power frequency and low frequency. After a theoretical reminder, we present some experiments on single coils and stators of high voltage motors. Finally, we discuss the results and…
Read MoreAnalysis of Outdoor and Indoor Propagation at 15 GHz and Millimeter Wave Frequencies in Microcellular Environment
The main target of this article is to perform the multidimensional analysis of multipath propagation in an indoor and outdoor environment at higher frequencies i.e. 15 GHz, 28 GHz and 60 GHz, using “sAGA” a 3D ray tracing tool. A real world outdoor Line of Sight (LOS) microcellular environment from the Yokusuka city of Japan…
Read MoreLinear algebra as an alternative approach to the synthesis of digital devices of automation and control systems
The article considers linear algebra as an alternative mathematical tool of logic synthesis of digital structures to Boolean algebra and synthesis methods of digital electronic component base (ECB) on its ground. The methods of solving the applied problems of logic synthesis are shown, including the expansion of an arbitrary logic function by means of monotonic…
Read MoreEffective Thermal Analysis of Using Peltier Module for Desalination Process
The key objective of this study is to analyse the heat transfer processes involved in the evaporation and condensation of water in a water distillation system employing a thermoelectric module. This analysis can help to increase the water production and to enhance the system performance. For the analysis, a water distillation unit prototype integrated with…
Read MoreEstimation of digital protection devices applicability on basis of multiple characterizing parameters
The contemporary electrical power systems (EPS) impose increased requirements for the functionality of the protection systems. The necessity of improved EPS stability is in some extent resulting of the increased integration of renewable sources of electrical energy. The future grid development gives perspective for connection of more converter based generations. The power electronic schemes and…
Read MoreDesign of an Automatic Forward and Back Collision Avoidance System for Automobiles
This paper is the extended reflection of work originally presented in conference of Electrical, Computer and Communication Engineering (ECCE)-CUET 2017, entitled “Automated Anti Collision System for Automobiles”. Automated collision avoidance system is a trending technology of science in automobile engineering. The aim of this paper is to design a system which will prevent collision from…
Read MoreA High Efficiency Ultra Thin (1.8 um) CdS/CdTe p-i-n Solar Cell with CdTe and Si as BSF layer
CdTe-based photovoltaic (PV) cells provide the lowest EBPT (energy payback time) and emit less amount of GHG (green house gases) among different types of PV cells. Thus, it is very essential to enhance the efficiency of CdTe-based solar cells. A high efficiency CdTe/CdS p-i-n heterostructure solar cell is designed and the performance of the cell…
Read MoreDomain Independent Feature Extraction using Rule Based Approach
Sentiment analysis is one of the most popular information extraction tasks both from business and research prospective. From the standpoint of research, sentiment analysis relies on the methods developed for natural language processing and information extraction. One of the key aspects of it is the opinion word lexicon. Product’s feature from online reviews is an…
Read MoreVelocity obstacles for car-like mobile robots: Determination of colliding velocity and curvature pairs
This paper addresses the motion planning problem of Reeds-Shepp-type car-like mobile robots moving among static and dynamic obstacles. If the positions and the velocity vectors of the obstacles are known or well estimated, the Velocity Obstacles (VO) method and its non-linear version (NLVO) can be used to plan a collision-free trajectory for a robot in…
Read MoreMedium Voltage Microgrid Test Setup and Procedures Implemented on a Real Pilot Project
This paper presents various concepts related to the application of a microgrid pilot project in a residential condominium at Fortaleza / CE – Brazil, such as battery energy system, renewable and distributed generation, islanding recloser and all different units using interface based on power electronics. This papers main objective is to create information about microgrid…
Read MoreApproximate method of analysis of log-periodic antennas with in-phase currents
Log-periodic antennas have high electrical characteristics over a wide frequency range. The large length of the antennas is their significant disadvantage caused by the fact that each active region consisting of several radiators operates in a narrow frequency range. To extend this range, it is proposed to use radiators with concentrated capacitive loads, providing in-phase…
Read MoreMeasuring modifiability in model driven development using object oriented metrics
Model driven development is an important role in software engineering. It consists of multiple transformation functions. This development is a paradigm for writing and implementing computer program quickly, effectively, at minimum cost and reducing development efforts because it transforms design model to object-oriented code. Our approach is rule-based model driven development in which textual Umple…
Read MoreConstant Envelope DCT based OFDM System with M-ary PAM Mapper over Fading Channels
Constant Envelope Discrete Cosine Transform based Orthogonal Frequency Division Multiplexing (CE-DCT-OFDM) system with M-ary Pulse Amplitude Modulation (PAM) mapper is considered. In the system phase modulation is used to achieve constant envelope signals that have 0 dB Peak-to-Average-Power Ratio (PAPR). Transmission of such signals permit high power amplifiers in the system to operate with maximum…
Read MoreShort CCA-Secure Attribute-Based Encryption
Chosen-ciphertext attacks (CCA) are typical threat on public-key encryption schemes. We show direct chosen-ciphertext security modification in the case of attribute-based encryption (ABE), where an ABE scheme secure against chosen-plaintext attacks (CPA) is converted into an ABE scheme secure against CCA by individual techniques. Our modification works in the setting that the Diffie-Hellman tuple to…
Read MoreA Survey of Security Challenges in Internet of Things
Internet of things (IoT) is an innovative technology subject to all kind of imaginary and science fictional solutions. Dreams and speculations are still possible about it. A technology combining real life objects and virtual life (Internet) is indeed a fertile pitch of fantasy and original ideas. However, IoT has in practice to face several challenges…
Read MoreStabilization of constrained uncertain systems by an off-line approach using zonotopes
In this paper, stabilization of uncertain systems was established using zonotopic sets. The obtained state feedback control laws are computed by an off-line approach reducing computational burdens. The resolution of a robust model predictive control (MPC) allows computing a sequence of state feedback control laws corresponding to a sequence of zonotopic invariant sets. The implemented…
Read MoreThe Use of LMS AMESim in the Fault Diagnosis of a Commercial PEM Fuel Cell System
The world’s pollution rates have been increasing exponentially due to the many reckless lifestyle practices of human beings as well as their choices of contaminating power sources. Eventually, this lead to a worldwide awareness on the risks of those power sources, and in turn, a movement towards the exploration and deployment of several green technologies…
Read MoreParametric Study of Micro Strip Patch Antenna Using Different Feeding Techniques for Wireless and Medical Applications
Due to the increasing bandwidth requirement of modern wireless communication systems, developing antenna having wider bandwidth have been receiving significant attention in the recent years. In this paper, a comparative analysis of the contacting feed (micro strip line and coaxial probe) and non-contacting feed mechanism (both Aperture Coupling and Proximity Coupling) in micro strip patch…
Read MoreSimulation and FPGA Implementation of a Ring Oscillator Sensor for Complex System Design
This paper, presents the design of a temperature sensor based on RO (Ring Oscillator) in order to make a thermal study for the detection and localization of thermal peaks in a complex system. In this work, a simulation and FPGA implementation of a fully digital temperature sensor features a number of exact inverters that can…
Read MoreA Dynamic Reallocation Based Window Access Scheme for Enhancing QoS of Vehicular Ad-hoc Networks (VANETs)
This article proposes a new MAC scheme for Vehicle-to-Infrastructure (V2I) communications that dynamically reallocates unused TDMA slots. By maintaining a balanced waiting time, the proposed TDMA based scheduling scheme allocates TDMA slots in a rational way to minimize merging and one-hop neighboring collision. The proposed scheme ensures dynamic reallocation of unused slots by using “time…
Read MoreMission Profile Analysis of a SiC Hybrid Module for Automotive Traction Inverters and its Experimental Power-loss Validation with Electrical and Calorimetric Methods
This paper investigates the efficiency benefits of replacing the Silicon diodes of a commercial IGBT module for the main inverter application of an electric vehicle with Silicon Carbide diodes, leaving the package, operating conditions and the system unchanged. This ensures that the comparison is directly between the chip technologies without any scope for discrepancies arising…
Read MoreSignal-Based Metamodels for Predictive Reliability Analysis and Virtual Testing
In the current industrial development, an increasing number of sensors is applied for monitoring of any kind of appliances and machines. A predictive mathematical model allows for realistic assessment of the health state of the appliance, indication of service requirements, as well as control of the appliance, serving as so-called digital twin on a control…
Read MoreLabVIEW-based data acquisition system for Diode I-V Characterization
This work describes computerized data acquisition system for current-voltage (I-V) characteristics of diodes. The proposed system consist of a personal computer pre-installed with LabVIEW, two units of power supply, an interface board, current and voltage sensors. Two devices under test (DUTs) are selected namely 1N4007 silicon and 1N34 germanium diodes. The current flow through the…
Read MoreInnovative design with learning reflexiveness for developing the Hamiltonian circuit learning games
In this study, we use a new proposed framework to develop the Hamiltonian circuit learning games for college students. The framework is for enhancing learners’ activities with learning reflexiveness. The design of these games is based on this framework to achieve the targeted learning outcomes. In recent years, the game-based learning is a very popular…
Read MoreTheoretical Investigation of Combined Use of PSO, Tabu Search and Lagrangian Relaxation methods to solve the Unit Commitment Problem
Solving the Unit Commitment problem (UCP) optimizes the combination of production units operations and determines the appropriate operational scheduling of each production units to satisfy the expected consumption which varies from one day to one month. Besides, each production unit is conducted to constraints that render this problem complex, combinatorial and nonlinear. In this paper,…
Read MoreNon-rigid Registration for 3D Active Shape Liver Modeling
To avoid biopsies, doctors use non invasive medical techniques such as the computed tomography. Even that, the detection of the liver remains a big challenge because of the gray level and shape variations which depend on patients and acquisition modalites. In this work, we propose to create a 3D liver model in the training phase…
Read MoreAdaptive observer design for a class of nonlinear systems with time delays
This paper deals with the design of adaptive observer for a class of nonlinear systems with time delays. Within this work, we develop an adaptive observer for a bilinear time delay system, then we extend those results in the presence of Lipschitz nonlinear functions in the system’s dynamics. In the stability analysis of the estimation…
Read MoreA Joint Safety and Security Analysis of message protection for CAN bus protocol
One of the prominent challenges of the automotive-transportation system is represented by the integration of security and safety properties within protocols, applications and connectivity mechanisms. A joint safety/security design can sometimes expose to trade-offs, since their requirements may not match perfectly or even be incompatible. This paper analyses an example of security and safety design,…
Read MoreDecentralized Control Approaches of Large-Scale Interconnected Systems
In this paper, we investigate the decentralized control problem for largescale interconnected systems. The synthesis of the decentralized controller consists in determining gains which ensure the stability of the global system. To calculate these gains, three approaches are presented. Our main contribution is to develop a new decentralized stabilization approach which the decentralized local gains…
Read MoreSecurity Analysis and the Contribution of UPFC for Improving Voltage Stability
The occurrence of many failures in the power system can lead to power instability and affects the system parameters to go beyond its operating limits. It may lead to obstructing the secure operations and reliability of power systems. Ensuring power system security needs proper actions to be taken for the undesirable contingency. Thus, security analysis…
Read MoreThe method of correlation investigation of acoustic signals with priority placement of microphones
Examples of analytical calculations of the system characteristics of the hardware and time complexity of the correlation system based on a certain number of microphones and the corresponding number of interrelations are presented. The structural solutions of the hardware special processor implementation of such class of multichannel devices for recognition and identification of types and…
Read MoreSystematic Tool Support of Engineering Education Performance Management
Engineering schools must adopt or develop their own systems and processes for graduate attribute assessment. In this paper, we take a systems engineering approach to graduate attribute assessment and propose a system architecture and tool-supported continuous improvement process with key algorithms and mathematical analysis to process the data and provide performance management reporting. Over several…
Read MoreCo-designed accelerator for homomorphic encryption applications
Fully Homomorphic Encryption (FHE) is considered as a key cryptographic tool in building a secure cloud computing environment since it allows computing arbitrary functions directly on encrypted data. However, existing FHE implementations remain impractical due to very high time and resource costs. These costs are essentially due to the computationally intensive modular polynomial multiplication. In…
Read MoreA Smart Mobile Application for Assisting Parents in Anti-Drug Support
Drug abuse problem is not a new problem, but it is still serious in Hong Kong. The emergence of hidden drug abuse youth has brought more difficulties to them and their parents. The usual ways of providing anti-drug abuse assistance are not sufficient to these types of young people. Intelligent methods have been developed to…
Read MoreActuator Fault Reconstruction based Adaptive Polytopic Observer for a Class of Continuous-Time LPV Systems
This paper is an extension of work originally presented in conference name. The goal is to propose new fault detection and fault isolation techniques for a polytypic linear parameter-varying system (LPV). In this work, an adaptive observer design is formulated for a given polyquadratic Lyapunov function. Subsequently, new sufficient conditions are given in terms of…
Read MoreInnovative Research on the Development of Game-based Tourism Information Services Using Component-based Software Engineering
In recent years, a number of studies have been conducted exploring the potential of digital tour guides, that is, multimedia components (e.g., 2D graphic, 3D models, and sound effects) that can be integrated into digital storytelling with location-based services. This study uses component-based software engineering to develop the content of game-based tourism information services. The…
Read MorePerformance Analysis of Regenerative Braking in Permanent Magnet Synchronous Motor Drives
This paper describes the design and analysis of a regenerative braking system for a permanent magnet synchronous motor (PMSM) drive for electric vehicle (EV) applications. First studied is the principle for electric braking control of a PMSM motor under field-oriented control (FOC). Next, the maximum braking torque in the regeneration mode as well as the…
Read MoreTracking and Detecting moving weak Targets
Detect and tracking of moving weak targets is a complicated dynamic state estimation problem whose difficulty is increased in case of high clutter conditions or low signal to noise ratio (SNR). In this case, the track-before-detect filter (TBDF) that uses unthresholded measurements considers as an effective method for detecting and tracking a single target under…
Read MoreStructure-Preserving Modeling of Safety-Critical Combinational Circuits
In this work, a representative combinational circuit is visualized in various ways. It is abstracted (concretized) from transistor level to gate level and a structure-preserving transition is carried out into a signal flow graph. For creating a signal flow plan it is necessary to swap the nodes and the edges in the signal flow graph.…
Read MoreHardware Acceleration on Cloud Services: The use of Restricted Boltzmann Machines on Handwritten Digits Recognition
Cloud computing allows users and enterprises to process their data in high performance servers, thus reducing the need for advanced hardware at the client side. Although local processing is viable in many cases, collecting data from multiple clients and processing them in a server gives the best possible performance in terms of processing rate. In…
Read MoreAn Analysis of K-means Algorithm Based Network Intrusion Detection System
In this modern age, information technology (IT) plays a role in a number of different fields. And therefore, the role of security is very important to control and assist the flow of activities over the network. Intrusion detection (ID) is a kind of security management system for computers and networks. There are many approaches and…
Read MoreComputation of Viability Kernels on Grid Computers for Aircraft Control in Windshear
This paper is devoted to the analysis of aircraft dynamics in the cruise flight phase under windshear conditions. The study is conducted with reference to a point-mass aircraft model restricted to move in a vertical plane. We formulate the problem as a differential game against the wind disturbances: The first player, autopilot, manages, via additional…
Read MoreAdaptive and Non Adaptive LTE Fractional Frequency Reuse Mechanisms Mobility Performance
Mobile broadband has gained momentum with the growing demand of user data rates. Long Term Evolution (LTE) technology is the step in mobile communications evolution, developed to satisfy high data rate demand, and meet better spectral efficiency requirements. Effective radio resource management and inter cell interferences are the major challenges. Fractional Frequency Reuse (FFR) is…
Read MoreTwo-Stage Performance Engineering of Container-based Virtualization
Cloud computing has become a compelling paradigm built on compute and storage virtualization technologies. The current virtualization solution in the Cloud widely relies on hypervisor-based technologies. Given the recent booming of the container ecosystem, the container-based virtualization starts receiving more attention for being a promising alternative. Although the container technologies are generally considered to be…
Read More
