Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,922 Article Results

A new algorithm for implementing message authentication and integrity in software implementations

10.12928/telkomnika.v18i5.15276
Alaa Wagih Abdul; Baghdad College of Economic Sciences University Qader , Israa Ezzat; Baghdad College of Economic Sciences University Salem , Haider Rasheed; Baghdad College of Economic Sciences University Abdulshaheed
IT systems and data that you store, and process are valuable resources that need protection. Validation and reliability of information are essential in networks and computer systems. The communicating is done by two parties via an unsafe channel require a way to validate the data spent by one party as valid (or unaltered) by the other party. In our study, we suggest new one-way defragmentation algorithm to implement message authentication and integration in program execution. These software applications are readily available and freely available because most of the hash functions are faster than their existing radioactive blocks.
Volume: 18
Issue: 5
Page: 2543-2548
Publish at: 2020-10-01

Comparative analysis of feeding techniques for cylindrical surrounding patch antenna

10.11591/ijece.v10i5.pp5377-5384
Erhiega N. Umayah , Viranjay M. Srivastava
In this research work, a Cylindrical Surrounding Patch Antenna (CSPA) with improved performance parameters based on inset feed method compared to other feed techniques has been proposed for 1.8 GHz applications. The designed and simulated CSPA is a rotary version of an initially designed Rectangular Planar Patch Antenna (RPPA). The RPPA is mounted on a cylindrical surface with radius (r) 10 mm which is an increased curvature for better -10 dB S-parameter (S11), impedance Band Width (BW), Voltage Standing Wave Ratio (VSWR), radiation pattern, and gain. The copper radiating patch has been conformed on the surface of the grounded flexible polyimide substrate with relative permittivity (εr) 3.5 and thickness (h) 1.6 mm at normalized input impedance of 50 Ω. Results for the RPPA and the proposed CSPA have been compared with existing designs in terms of antenna size, resonant frequency (fr), return loss (S11), and gain while taking cognizance of the feeding techniques. The S11, BW, VSWR, and gain are -12.784 dB, 28 MHz, 1.8, and 4.81 dBi respectively for the rectangular planar patch antenna and -35.571 dB, 66 MHz, 1.5, and 3.74 dBi, respectively for the cylindrical surrounding patch antenna.
Volume: 10
Issue: 5
Page: 5377-5384
Publish at: 2020-10-01

28 GHz balanced pHEMT VCO with low phase noise and high output power performance for 5G mm-Wave systems

10.11591/ijece.v10i5.pp4623-4630
Abdelhafid Es-saqy , Maryam Abata , Mahmoud Mehdi , Said Mazer , Mohammed Fattah , Moulhime El Bekkali , Catherine Algani
This paper presents the study and design of a balanced voltage controlled oscillator VCO for 5G wireless communication systems. This circuit is designed in monolithic microwave integrated circuit (MMIC) technology using PH15 process from UMS foundry. The VCO ensures an adequate tuning range by a single-ended pHEMT varactors configuration. The simulation results show that this circuit delivers a sinusoidal signal of output power around 9 dBm with a second harmonic rejection between 25.87 and 33.83 dB, the oscillation frequency varies between 26.46 and 28.90 GHz, the phase noise is -113.155 and -133.167 dBc/Hz respectively at 1 MHz and 10 MHz offset and the Figure of Merit is -181.06 dBc/Hz. The power consumed by the VCO is 122 mW. The oscillator layout with bias and RF output pads occupies an area of 0.515 mm2.
Volume: 10
Issue: 5
Page: 4623-4630
Publish at: 2020-10-01

Modifying Hamming code and using the replication method to protect memory against triple soft errors

10.12928/telkomnika.v18i5.13345
Wael; Al-Ahliyya Amman University Toghuj
As technology scaling increases computer memory’s bit-cell density and reduces the voltage of semiconductors, the number of soft errors due to radiation induced single event upsets (SEU) and multi-bit upsets (MBU) also increases. To address this, error-correcting codes (ECC) can be used to detect and correct soft errors, while x-modular-redundancy improves fault tolerance. This paper presents a technique that provides high error-correction performance, high speed, and low complexity. The proposed technique ensures that only correct values get passed to the system output or are processed in spite of the presence of up to three-bit errors. The Hamming code is modified in order to provide a high probability of MBU detection. In addition, the paper describes the new technique and associated analysis scheme for its implementation. The new technique has been simulated, evaluated, and compared to error correction codes with similar decoding complexity to better understand the overheads required, the gained capabilities to protect data against three-bit errors, and to reduce the misdetection probability and false-detection probability of four-bit errors.
Volume: 18
Issue: 5
Page: 2533-2542
Publish at: 2020-10-01

Enhancing light sources color homogeneity in high-power phosphor-based white LED using ZnO particles

10.12928/telkomnika.v18i5.14198
Anh-Minh D.; Ton Duc Thang University Tran , Nguyen Doan Quoc; Ton Duc Thang University Anh , Nguyen; Posts and Telecommunications Institute of Technology Thi Phuong Loan
Color uniformity is one of the essentials for the on-going development of WLED. To achieve a high color uniformity index, increasing the scattering events within the phosphor layers was reported to be the most efficient method and in this article, ZnO is the chosen material to apply in this method. After analyzing the scattering properties through the scattering cross-section , scattering coefficient  and scattering phase function , the which outcomes comfirm that ZnO can enhance the scattered light in the phosphor layers. Moreover, the findings from the study of ZnO concentration from 2% to 26% suggest that color uniformity also depends on the fluctuation of ZnO concentration, therefore, to control color uniformity the focus should be implied on both size and concentration of ZnO. The experimental results from this research show that the luminous flux of WLED is at the peak if the concentration of ZnO is at 6%, and when the concentration of ZnO is at 18% and has 100 nm particles size, the ΔCCT reaches the lowest level. The final choice should be based on the desired characteristic of WLEDs, however, if the WLED need to excel in both luminous flux and ΔCCT then 6% ZnO concentration with particles size from 100 nm-300 nm is the optimal choice.
Volume: 18
Issue: 5
Page: 2628-2634
Publish at: 2020-10-01

Optimal tuning of proportional integral controller for fixed-speed wind turbine using grey wolf optimizer

10.11591/ijece.v10i5.pp5251-5261
Aliyu Hamza Sule , Ahmad Safawi Mokhtar , Jasrul Jamani Bin Jamian , Attaullah Khidrani , Raja Masood Larik
The need for tuning the PI controller is to improve its performance metrics such as rise time, settling time and overshoot. This paper proposed the Grey Wolf Optimizer (GWO) tuning method of a Proportional Integral (PI) controller for fixed speed Wind Turbine. The objective is to overcome the limitations in using the PSO and GA tuning methods for tuning the PI controller, such as quick convergence occurring too soon into a local optimum, and the controller step input response. The GWO, the Particle Swarm Optimization (PSO), and the Genetic Algorithm (GA) tuning methods were implemented in the Matlab 2016b to search the optimal gains of the Proportional and Integral controller through minimization of the objective function. A comparison was made between the results obtained from the GWO tuning method against PSO and GA tuning techniques. The GWO computed the smallest value of the objective function minimized. It exhibited faster convergence and better time response specification compared to other methods. These and more performance indicators show the superiority of the GWO tuning method.
Volume: 10
Issue: 5
Page: 5251-5261
Publish at: 2020-10-01

An overview of internet of things

10.12928/telkomnika.v18i5.15911
Sebastian; Universidad Distrital Francisco Jose de Caldas Villamil , Cesar; Universidad Distrital Francisco José de Caldas Hernandez , Giovanny; Universidad Distrital Francisco Jose de Caldas Tarazona
The internet of things is an emerging technology that is currently present in most processes and devices, allowing to improve the quality of life of people and facilitating the access to specific information and services. The main purpose of the present article is to offer a general overview of internet of things, based on the analysis of recently published work. The added value of this article lies in the analysis of the main recent publications and the diversity of applications of internet of things technology. As a result of the analysis of the current literature, internet of things technology stands out as a facilitator in business and industrial performance but above all in improving the quality of life. As a conclusion to this document, the internet of things is a technology that can overcome the challenges in terms of security, processing capacity and data mobility, as long as the development related to other technologies follows its expected course.
Volume: 18
Issue: 5
Page: 2320-2327
Publish at: 2020-10-01

E-wallet: factors influencing user acceptance towards cashless society in Malaysia among public universities

10.11591/ijeecs.v20.i1.pp67-74
Norulhuda Abdullah , Fauziah Redzuan , Nor Aziah Daud
The evolution of financial technology into digital payment has led to a new era of cashless society. In line with the global trend, the Malaysian Government has been committed to strengthen the agenda of a cashless society by actively promoting the use of e-Wallet through the establishment of the interoperable credit transfer framework (ICTF) policy in 2018. Although e-Wallet has been implemented since 2016, several previous studies have found that the level of acceptance is still relatively low while the main factors that influence the acceptance of e-Wallet in Malaysia still remain unclear. This study aims to identify the factors that influence the acceptance of e-Wallet towards establishing cashless society in Malaysia. Online survey using closed-ended questionnaires have been conducted among 400 respondents from students and employees of Malaysian public universities in Klang Valley. Collected data have been analyzed using descriptive statistics and inferential statistics which consist of Factor Analysis, Pearson Correlation and Multiple Linear Regression in statistical package for the social sciences (SPSS). Based on the findings, four factors are found to significantly influence e-Wallet acceptance, which consist of performance expectancy (PE), social influence (SI), facilitating conditions (FC) and trust (T). facilitating conditions (FC) is the most influential significant factor behind the acceptance of e-Wallet among Malaysians.
Volume: 20
Issue: 1
Page: 67-74
Publish at: 2020-10-01

Performance assessment of an optimization strategy proposed for power systems

10.12928/telkomnika.v18i5.14396
Harold; Universidad Distrital Franciso José de Caldas Puin , Cesar; Universidad Distrital Franciso José de Caldas Hernandez
In the present article, the selection process of the topology of an artificial neural network (ANN) as well as its configuration are exposed. The ANN was adapted to work with the Newton Raphson (NR) method for the calculation of power flow and voltage optimization in the PQ nodes of a 10-node power system represented by the IEEE 1250 standard system. The purpose is to assess and compare its results with the ones obtained by implementing ant colony and genetic algorithms in the optimization of the same system. As a result, it is stated that the voltages in all system nodes surpass 0,99 p.u., thus representing a 20% increase in the optimal scenario, where the algorithm took 30 seconds, of which 9 seconds were used in the training and validation processes of the ANN.
Volume: 18
Issue: 5
Page: 2729-2736
Publish at: 2020-10-01

Multimodal access control system combining RFID, fingerprint and facial recognition

10.11591/ijeecs.v20.i1.pp405-413
Mohamed El Beqqal , Mostafa Azizi , Jean Louis Lanet
Monomodal biometry does not constitute an effective measure to meet the desired performance requirements for large-scale applications, due to limita-tions such as noisy data, restricted degree of freedom and unacceptable error rates. Some of these problems can be solved through multimodal biometric systems that involve using a combination of two or more biometric modali-ties in a single identification system. Identification based on multiple biomet-rics represents an emerging trend. The reason for combining different modal-ities is to improve the recognition rate. In practice, multi-biometric aims to reduce the false acceptance ratio (FAR) and false rejection ratio (FRR) which are two standard metrics widely used in the accuracy of biometric sys-tems. In this paper, we will examine the different possible scenario in multi-modal biometric systems using RFID, fingerprint and facial recognition, that can be adopted to merge information and improve the overall accuracy of the system.
Volume: 20
Issue: 1
Page: 405-413
Publish at: 2020-10-01

Development of control system for quadrotor unmanned aerial vehicle using LoRa wireless and GPS tracking

10.12928/telkomnika.v18i5.16716
Teddy Surya; International Islamic University Malaysia Gunawan , Wan Athereah; International Islamic University Malaysia Yahya , Erwin; International Islamic University Malaysia Sulaemen , Mira; International Islamic University Malaysia Kartiwi , Zuriati; Universiti Teknologi MARA Janin
In the past decades, there has been a growing interest in unmanned aerial vehicles (UAVs) for educational, research, business, and military purposes. The most critical data for a flight system is the telemetry data from the GPS and wireless transmitter and also from the gyroscope and accelerometer.  The objective of this paper is to develop a control system for UAV using long-range wireless communication and GPS. First, Matlab simulation was conducted to obtain an optimum PID gains controller. Then LoRa wireless was evaluated during clear and rainy days. Static and dynamic points measurement was conducted to validate and optimize GPS accuracy. GeoMapping in Matlab and Google GPS GeoPlanner were then used to analyze the traveled UAV flight path.
Volume: 18
Issue: 5
Page: 2674-2681
Publish at: 2020-10-01

An innovative IoT service for medical diagnosis

10.11591/ijece.v10i5.pp4918-4927
Safia Abbas
Due to the misdiagnose of diseases that increased recently in a scarily manner, many researchers devoted their efforts and deployed technologies to improve the medical diagnosis process and reducing the resulted risk. Accordingly, this paper proposed architecture of a cyber-medicine service for medical diagnosis, based internet of things (IoT) and cloud infrastructure (IaaS). This service offers a shared environment for medical data, and extracted knowledge and findings between patients and doctors in an interactive, secured, elastic and reliable way. It predicts the medical diagnosis and provides an appropriate treatment for the given symptoms and medical conditions based on multiple classifiers to assure high accuracy. Moreover, it entails different functionalities such as on-demand searching for scientific papers and diseases description for unrecognized combination of symptoms using web crawler to enrich the results. Where such searching results from crawler, are processed, analyzed and added to the resident knowledge base (KB) to achieve adaptability and subsidize the service predictive ability.
Volume: 10
Issue: 5
Page: 4918-4927
Publish at: 2020-10-01

Low-cost and portable automatic sheet cutter

10.11591/ijece.v10i5.pp5139-5146
Mohd Syafiq Mispan , Ahmad Hafizzudin Mustafa , Hafez Sarkawi , Aiman Zakwan Jidin
Process automation is crucial to increase productivity, more efficient use of materials, better product quality, improved safety, etc. In small-medium enterprise (SME) businesses related to household retailing, one of the process automation needed is the measurement and cutting of the mat or sheet, made of rubber or polyvinyl chloride (PVC) materials. Most of the household retailers that selling the sheet, the process of measuring and cutting according to the customer’s requirements are manually performed using a measuring tape and scissors. These manual processes can cause inaccuracy in length, inefficient use of material, low productivity and reduce product quality. This paper presents a low cost and portable automatic sheet cutter using the Arduino development board, which is used to control the process of measuring and cutting the materials. The system uses a push-button where the user can set the required length and quantity of the sheet. Once the required information is set, the stepper motor rolls the sheet until the required length is satisfied. Subsequently, another stepper motor moves the cutter horizontally and cut the sheet. With the automatic sheet cutter, the material is cut with acceptable precision. The design of the automatic sheet cutter is low cost and portable which significantly suitable to be used by SME household retailers.
Volume: 10
Issue: 5
Page: 5139-5146
Publish at: 2020-10-01

Design of computerized monitoring and processing system for magnetic field controlling against the phenomenon of black powder in crude oil pipelines

10.11591/ijece.v10i5.pp4639-4644
Hussain Attia , Saad Balhassan
Black power represents the main difficulty faced by the oil flow in pipelines. The negative effect of this powder reaches to stop the oil flow due to clogging the pipelines, in addition to the damaging of the crude oil pumps. Many solutions have been proposed in literature based on chemical or physical processes. On the other side, applying the fixed magnetic field has been presented in separation and extraction process of metal impurities in water pipelines applications. From these facts, this paper proposes an alternative solution (idea, design, and methodology for future implementation) for the black power removing from oil pipelines. The proposed system works on firstly sensing the resistivity parameter in the crude oil as an indication about the oil status with respect to the quantity of the black powder particles, then works on monitoring and controlling the level, location, and polarity of the required magnetic field that to work on cracking particles cracking function that in order to facilitate the crude oil motion in the pipelines. In addition, the proposed solution presents a new design of electrical resistivity sensor as an important indication in terms of evaluating the proposed system performance
Volume: 10
Issue: 5
Page: 4639-4644
Publish at: 2020-10-01

Cryptosystems using an improving hiding technique based on latin square and magic square

10.11591/ijeecs.v20.i1.pp510-520
Sahab Dheyaa Mohammed , Taha Mohammed Hasan
Hackers should be prevented from disclosing sensitive data when sent from one device to another over the network. Therefore, the proposed method was established to prevent the attackers from exploiting the vulnerabilities of the redundancy in the ciphertext and enhances the substitution and permutation operations of the encryption process .the solution was performed by eliminates these duplicates by hiding the ciphertext into a submatrix 4 x4 that chooses randomly from magic square 16x16 in each ciphering process. Two techniques of encrypted and hiding were executed in the encryption stage by using a magic square size 3 × 3   and Latin square size 3 × 3 to providing more permutation and also to ensure an inverse matrix of decryption operation be available. In the hiding stage, the ciphertext was hidden into a 16×16 matrix that includes 16 sub-magic squares to eliminate the duplicates in the ciphertext. Where all elements that uses were polynomial numbers of a finite field of degree Galois Fields GF ( ).  The proposed technique is robust against disclosing the repetition encrypted data based on the result of Avalanche Effect in an accepted ratio (62%) and the results of the output of the proposed encryption method have acceptable randomness based on the results of the p-values (0.629515) of the National Institute of Standards and Technology (NIST) randomness tests. The work can be considered significant in the field of encrypting databases because the repetition of encrypted data inside databases is considered an important vulnerability that helps to guess the plaintext from the encrypted text.
Volume: 20
Issue: 1
Page: 510-520
Publish at: 2020-10-01
Show 1076 of 1995

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration