IJENS Publisher Indexed In SCOPUS

Navigation


Title: Modified Ant Colony Optimization for Solving Traveling Salesman Problem
Author(s): Kanar Shukr Mohammed
Pages: 1-5 Paper ID: 131105-9494-IJECS-IJENS Published: October, 2013
Abstract: This paper presents a new algorithm for solving the Traveling Salesman Problem (NP- hard problem) using pheromone of ant colony depends on the pheromone and path between cites. TSP is a problem in theoretical computer science which is very hard to solve a number of real-world problems can be formalized as TSP problems, and ants of the colony are able to generate successively shorter feasible tours by using information accumulated in the form of a pheromone trail deposited on the edges of the TSP and improves ACO by taking under consideration the overall path of cities in candidate list. Sometimes choosing minimum distance isn't a guaranty that’s a best path. The experimental results on large set of samples indicate that the new approach is better than the original one for finding optimal solutions of the (TSP) in less time as compared to results achieved by applying basic idea of ACO algorithm.
Keywords: Modified Ant Colony System, Traveling Sales man Problem
Full Text (.pdf)  International Journals Of Engineering and Sciences | 525 KB
Title: EMI Prevention of CAN-Bus-Based Communication in Battery Management Systems
Author(s): Chin-Long Wey, Chung-Hsien Hsu, Kun-Chun Chang, Ping-Chang Jui, Muh-Tian Shiue
Pages: 6-12 Paper ID: 131805-7070-IJECS-IJENS Published: October, 2013
Abstract: Controller Area Network (CAN) bus has been popularly employed in most of vehicles and it will be heavily involved to the electric vehicle (EV) applications. A vehicle is a noisy system, with electromagnetic interference (EMI) over a wide range of frequencies. EMI generated by the inductive loads is the major cause of performance degradation of CAN bus communications. In order to enhance and protect the reliability and robustness of the CAN bus communication and to maintain safe operation of the battery stack, galvanic isolator is required for the data transmission. This study compares two different galvanic isolators, Optocoupler and Digital Isolator, and three different isolation schemes are evaluated by their protection capability for various EMI affected signals. The best isolation scheme has been recommended for EMI prevention of the CAN-bus-based BMS.
Keywords: Controller Area Network (CAN), Battery Management System (BMS), Electromagnetic Interference (EMI), Galvanic Isolators, Electrical Vehicle.
Full Text (.pdf)  International Journals Of Engineering and Sciences | 1,245 KB
Title: Membership Function Modification in Fuzzy SVM using Combination of Distance Feature, Correlation, and Depth of Data
Author(s): M. Rahmat Widyanto, Rini Wijayanti
Pages: 13-19 Paper ID: 132205-7474-IJECS-IJENS Published: October, 2013
Abstract: In this paper, we proposed the membership function modification in Fuzzy Support Vector Machine (Fuzzy SVM) based on exponential distribution function. This function is expressed as the level of training data contribution to its class model building. It is formed prior to training phase and started with checking and handling the missing values. Afterwards is the formation of fuzzy variables based on the distance feature, correlation, and the depth of data to be formalized into the exponential distribution function. The experiments results show that the proposed method has a higher accuracy about 2% compared to conventional SVM and Fuzzy SVM. This method is expected more contributed in the development of various pattern recognition applications, which more demand on higher accuracy.
Keywords: Fuzzy, svm, feature combination.
Full Text (.pdf)  International Journals Of Engineering and Sciences | 669 KB
Title: Online Impersonation A Case Study in the Hashemite Kingdom of Jordan
Author(s): Hiyam S. Ensour
Pages: 20-25 Paper ID: 132805-4949-IJECS-IJENS Published: October, 2013
Abstract: Impersonation is a type of electronic crimes, whereby it is easy to steal, quote or amend with the availability of free relevant software makes it tempting to the criminal who obtains access to steal information and reuse it again [1]. Therefore, the criminal steals personal information, for example, easily without effort or even planning in some cases, and later impersonates and owns such information and poses online on behalf of the owner without the latter's knowledge or approval, and all this can be done using relevant and smart software that facilitate stealing and impersonation. Impersonation is classified among modern crimes whose prevalence has increased significantly due to the expansions and developments in the use of the Internet technology. Further, this crime cannot be blocked by any type of legal, geographic or ethical borders. This paper addresses a number of questions including: how do we identify an impersonator? Where is the location of impersonation? What are the harms of impersonation? What is the effect of this crime on others? Does it represent a real crime online? What are the far-reaching problems caused by impersonation and what is the solution? And how can we protect ourselves from impersonators?
Keywords: Internet, Ethics, Crime, Online, and Impersonators.
Full Text (.pdf)  International Journals Of Engineering and Sciences | 371 KB
Title: A Programming Approach for the Digital Quran Applications
Author(s): Zameer Ahmed Adhoni, Abdul Ahad Siddiqi
Pages: 26-35 Paper ID: 1310105-9494-IJECS-IJENS Published: October, 2013
Abstract: The advent of online digital Quran and an increase of online Quran learners worldwide, have resulted the invention of number of IT (Information Technology) applications that ease the retrieval of knowledge from the Quran, being the major source of authentic and un-altered Islamic knowledge. In this paper, we describe a cloud-based programming approach, which aims at providing a unifying framework for building Quran related applications. The proposed approach includes design and development of APIs for all necessary components for searching, reading, annotation, building mobile applications and social networks around the central theme of Quran. A salient feature of the proposed API is the ability to retrieve Quranic verses in Arabic using search phrases in languages other than Arabic.. In this paper, we describe the core components and design patterns of the proposed API with emphasis on key design criteria. These criteria aim at providing the necessary scalability and performance on the one hand, and quality assurance of the Quranic text on the other. In addition, a prototype application that leverages the API along with test results is also presented.
Keywords: Digital Quran, Cloud computing, API, Portal.
Full Text (.pdf)  International Journals Of Engineering and Sciences | 1,316 KB
Title: Universal Mobility-Field Curves For Electrons In Polysilicon Inversion Layer
Author(s): M. I. Idris, Faiz Arith, S. A. M. Chachuli, H. H. M. Yusof, M. M. Ismail
Pages: 36-40 Paper ID: 1312703-1305-9494-IJECS-IJENS Published: October, 2013
Abstract: This paper reports the studies on the inversion-layer mobility in n-channel Poly-Si TFT’s with 1016cm-3 substrate impurity concentration. The validity and limitations of the universal relationship between the inversion layer mobility and the effective normal field (Eeff) was examined.
Keywords: TFT, Grain boundaries, carrier mobility, polysilicon.
Full Text (.pdf)  International Journals Of Engineering and Sciences | 698 KB