Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,922 Article Results

Comparative performance of optical amplifiers: Raman and EDFA

10.12928/telkomnika.v18i4.15706
Khalis A.; Northern Technical University Mohammed , Basma M. K.; Northern Technical University Younis
The in-line optical signal amplification is often used in optical communication systems to accomplish longer transmission distances and larger capacity. In this proposed paper, the operation of two types of optical amplifiers for 16×10 Gbps wavelength division multiplexing system had been examined by changing transmission distance from 10 to 200 km with a dispersion equals to 16.75 ps/nm/km. The analysis and design of such systems ordinarily includes many signal channels, nonlinear devices, several topologies with many noise sources, is extremely complex and effort-exhaustive. Therefore, theoretical studies with simulation CAD software of systems are become necessity to predict and optimize system performance. The comparison between EDFA and Raman has already explored by many researchers in varying ways in this work and to achieve obove objectives, the OptiSystem software was used to design the proposed fiber optic communications system and to simulate results. Performance for the present system was evaluated for parameters like bit error rate (BER), quality factor (QF), total gain with eye opening factor. It was saw that EDFA provides better results, in the maximal transmission distance 64% better than Raman amplifier, 57.5% for gain and 26.7% for maximum quality factor. As a future study a hybrid amplifier can produce better quality of amplification.
Volume: 18
Issue: 4
Page: 1701-1707
Publish at: 2020-08-01

Rice seed image classification based on HOG descriptor with missing values imputation

10.12928/telkomnika.v18i4.14069
Huy; Ho Chi Minh City Open University Nguyen-Quoc , Vinh; Ho Chi Minh City Open University Truong Hoang
Rice is a primary source of food consumed by almost half of world population. Rice quality mainly depends on the purity of the rice seed. In order to ensure the purity of rice variety, the recognition process is an essential stage. In this paper, we firstly propose to use histogram of oriented gradient (HOG) descriptor to characterize rice seed images. Since the size of image is totally random and the features extracted by HOG can not be used directly by classifier due to the different dimensions. We apply several imputation methods to fill the missing data for HOG descriptor. The experiment is applied on the VNRICE benchmark dataset to evaluate the proposed approach.
Volume: 18
Issue: 4
Page: 1897-1903
Publish at: 2020-08-01

Role of gamification in classroom teaching: Pre-service teachers’ view

10.11591/ijere.v9i3.20622
Rita Wong Mee Mee , Tengku Shahrom Tengku Shahdan , Md Rosli Ismail , Khatipah Abd Ghani , Lim Seong Pek , Wong Yee Von , Adelaide Woo , Yugeshineey Subba Rao
Planning a creative learning environment is not an easy task. Teachers prefer to teach traditionally in chalk-and-talk approach during language teaching. However, this does not fit learners of the 21st Century as they prefer game-like activities instead of pen-and-paper lessons. Hence, the introduction of gamification in classroom would result in immediate enthusiasm and curiosity, which leads to the learners’ willingness to learn. Gamification prepares learners to be active and take responsibility upon their own learning. Lessons filled with fun games are believed to be more effective in producing a positive outcome as learners are motivated to play more although they do not realise the fact that they are learning subconsciously. This study aimed to explore views of 33 pre-service teachers in using gamification in language teaching during their 16-week internship at local primary schools around Selangor, Malaysia. A quantitative survey research method was used by administering a set of questionnaires at the end of their internship. The data collected was then analysed and presented in the form of tables. The results showed that integrating gamification into language learning improved learners’ creative, critical and problem-solving skills. Thus, interesting and engaging activities spark learners’ interest in language learning subconsciously.
Volume: 9
Issue: 3
Page: 684-690
Publish at: 2020-08-01

The effect of recovery satisfaction on citizens loyalty perception: a case study of mobile government services

10.11591/ijece.v10i4.pp4279-4295
Ibrahim Almarashdeh
Use of mobile services is an integral part of today’s life. Organizations, government agencies as well as service providers in the market employ mobile services or application in reaching their citizens or users worldwide. Notably, service failure issues might frustrate users in using mobile service, but usually, service providers would employ the strategy of recovery as solution. Recovery strategy aims to sustain the relationship with users following service failure. Somehow, the factors that might impact recovery process are unclear. It is also unclear if users will use the service again following the completion of recovery process. Hence, in this study, a survey on 743 adults was carried out, and the data were analyzed using SEM to determine the factors that impact users’ recovery satisfaction the most and the impact of recovery satisfaction on citizens loyalty to use mobile government in the future. The finding of this study illustrated that expect of self-efficacy, all factors proposed in the research model found to has a significant impact on recovery satisfaction. Among all the supported hypothesis, the highest impact on recovery satisfaction comes from perceived trust in government as the initial predictor to use the service
Volume: 10
Issue: 4
Page: 4279-4295
Publish at: 2020-08-01

A smart gas leakage monitoring system for use in hospitals

10.11591/ijeecs.v19.i2.pp1048-1054
Nadia Mahmood Hussien , Yasmin Makki Mohialden , Nada Thanoon Ahmed , Mostafa Abdulghafoor Mohammed , Tole Sutikno
A gas leaks lead to personal and financial damage. Much effort has been dedicated to preventing such leaks and developing reliable techniques for leak detection and leakage localization using sensors. These sensors usually sound an alarm after detecting a dangerous gas in its vicinity. This paper describes a system for detecting a gas leakage from cylinders which notifies the user via the GSM network. The system consists of an LPG gas leakage detector which sends a warning signal to Arduino Uno Microcontroller. The system uses the GSM network to send notifications, a liquid crystal display (LCD) monitor to display the warning message and buzzer to sound the alert.
Volume: 19
Issue: 2
Page: 1048-1054
Publish at: 2020-08-01

∈φ-contraction and some fixed point results via modified ω-distance mappings in the frame of complete quasi metric spaces and applications

10.11591/ijece.v10i4.pp3839-3853
Kamaleldin Abodayeh , T. Qawasmeh , W. Shatanawi , A. Tallafha
In this Article, we introduce the notion of an ∈φ-contraction which based on modified ω-distance mappings and employ this new definition to prove some fixed point result. Moreover, we introduced an interesting example and an application to highlight the importance of our work.
Volume: 10
Issue: 4
Page: 3839-3853
Publish at: 2020-08-01

A new structure of a wide band bridge power limiter

10.11591/ijece.v10i4.pp4035-4042
Khalifa Echchakhaoui , Elhassane Abdelmounim , Jamal Zbitou , Hamid Bennis
In this work, new design and simulation of a microstrip power limiter based on Schottky diode is presented. The proposed circuit is a zero bias power limiter built by associating a transmission line in parallel to a four Schottky rectifier bridge circuit. The first circuit using a single stage rectifier is analyzed and simulated. To improve this single stage, a second and final limiter is designed with two stages rectifier. Simulation results for the final circuit show an ideal limiter behavior and good performance of limiting rate up to 20dB for a threshold input power varying from 5 dBm to 30 dBm. While insertion loss remains low at small signal.
Volume: 10
Issue: 4
Page: 4035-4042
Publish at: 2020-08-01

Detection of uveal melanoma using fuzzy and neural networks classifiers

10.12928/telkomnika.v18i4.14228
Daniel F.; Universidad Distrital Francisco José de Caldas Santos , Helbert Eduardo; Universidad Distrital Francisco José de Caldas Espitia
The use of image processing is increasingly utilized for disease detection. In this article, an algorithm is proposed to detect uveal melanoma (UM) which is a type of intraocular cancer. The proposed method integrates algorithms related to iris segmentation and proposes a novel algorithm for the detection of UM from the approach of fuzzy logic and neural networks. The study case results show 76% correct classification in the fuzzy logic system and 96.04% for the artificial neural networks.
Volume: 18
Issue: 4
Page: 2213-2223
Publish at: 2020-08-01

A comprehensive study of distributed Denial-of-Service attack with the detection techniques

10.11591/ijece.v10i4.pp3685-3694
H. H. Ibrahim , A. E. Hamzah , H. A. Saeed , H. H. Qasim , O. S. Hamed , Hussein Yahya Alkhalaf , M. I. Hamza
With the dramatic evolution in networks nowadays, an equivalent growth of challenges has been depicted toward implementing and deployment of such networks. One of the serious challenges is the security where wide range of attacks would threat these networks. Denial-of-Service (DoS) is one of the common attacks that targets several types of networks in which a huge amount of information is being flooded into a specific server for the purpose of turning of such server. Many research studies have examined the simulation of networks in order to observe the behavior of DoS. However, the variety of its types hinders the process of configuring the DoS attacks. In particular, the Distributed DoS (DDoS) is considered to be the most challenging threat to various networks. Hence, this paper aims to accommodate a comprehensive simulation in order to figure out and detect DDoS attacks. Using the well-known simulator technique of NS-2, the experiments showed that different types of DDoS have been characterized, examined and detected. This implies the efficacy of the comprehensive simulation proposed by this study.
Volume: 10
Issue: 4
Page: 3685-3694
Publish at: 2020-08-01

Simulation and optimization of a tuneable rectangular microstrip patch antenna based on hybrid metal-graphene and FSS superstrate for fifth-generation applications

10.12928/telkomnika.v18i4.14988
Nidal; Al-Ahliyya Amman University Qasem , Hamzah M.; Al-Esraa University College Marhoon
In this paper, a tuneable rectangular microstrip patch antenna (MPA) is simulated and optimized to operate in four frequency bands of the next generation of wireless communication systems. The proposed design incorporates a copper radiating patch with four implanted graphene strips for tuning purposes. The reconfigurable surface impedance of graphene can easily be altered by applying a DC voltage bias directly to the graphene strips, allowing the operating frequency of the antenna to be tuned as desired. The capability of the applied voltage to tune the operating frequency band of the proposed antenna is studied via computer simulation technology (CST) microwave studio (MWS). Frequency selective surfaces (FSSs) are introduced in order to improve the radiation parameters of the antenna. The operating frequency band of the tuneable rectangular MPA increases directly as the applied DC voltage bias is increased. Based on the simulation results, a tuneable rectangular MPA placed between two FSSs is proposed for fifth-generation applications.
Volume: 18
Issue: 4
Page: 1719-1730
Publish at: 2020-08-01

Real power loss diminution by predestination of particles wavering search algorithm

10.11591/ijict.v9i2.pp92-99
Kanagasabai Lenin
In this work Predestination of Particles Wavering Search (PPS) algorithm has been applied to solve optimal reactive power problem. PPS algorithm has been modeled based on the motion of the particles in the exploration space. Normally the movement of the particle is based on gradient and swarming motion.  Particles are permitted to progress in steady velocity in gradient-based progress, but when the outcome is poor when compared to previous upshot, immediately particle rapidity will be upturned with semi of the magnitude and it will help to reach local optimal solution and it is expressed as wavering movement. In standard IEEE 14, 30, 57,118,300 bus systems Proposed Predestination of Particles Wavering Search (PPS) algorithm is evaluated and simulation results show the PPS reduced the power loss efficiently.
Volume: 9
Issue: 2
Page: 92-99
Publish at: 2020-08-01

Source current harmonic mitigation of distorted voltage source by using shunt active power filter

10.11591/ijece.v10i4.pp3967-3977
Muhammad Ossama Mahmoud , Wael Mamdouh , Hamdy Khalil
In this paper, three-phase, four-wire shunt active power filter (SAPF) is utilized to mitigate system harmonics of distorted voltage source for unbalanced and nonlinear loads. Basically, the source voltage should be pure sinusoidal waveform to get a good mitigation of source current harmonics. In this under study system, the source voltage is assumed to be harmonic distortion non-sinusoidal voltage source. The phase locked loop (PLL) control circuit is wielded for extracting the fundamental component of the distorted source voltage to use it as an input signal to the SAPF control. Another input signal to the SAPF is the distorted load current. The SAPF control system uses (p-q) theory to calculate the optimum instantaneous current to be injected by the SAPF to mitigate the source current harmonics even the source voltage is harmonic distorted. MATLAB/SIMULINK software package is utilized to simulate the system under study. The effect of SAPF is tested when it’s used with and without the PLL control circuit. The simulation results show that, the THD of source current when using the PLL control circuit is improved to comply with the harmonic limits given in the IEEE 519-1992 and IEC 61000-4-7 standards.
Volume: 10
Issue: 4
Page: 3967-3977
Publish at: 2020-08-01

The mediating role of perceived administrative support for the effect of job motivation on organizational identification

10.11591/ijere.v9i3.20440
Gökçe Özdemir
In this study, the mediating role of perceived administrative support for the effect of teachers’ job motivation on their organizational identification perceptions was investigated. For this purpose, in mind, the opinions of 320 kindergarten teachers in 304 schools from 13 different school districts of Şahinbey/Gaziantep were received. However, 233 scales were taken into consideration. The research data were collected through Job Motivation Scale (JMS), Organizational Identification Scale (OIS) and Perceived Administrative Support Scale (PASS). Descriptive statistics, correlation analysis, multiple regression analysis, and path analysis were used in data analysis. Analysis results revealed that the job motivation perceptions of teachers were high. In addition, it was revealed that the participants also had high scores for organizational identification and perceived administrative support. Correlation analyses yielded positive, moderate and significant relationships between the research variables. Path analysis uncovered that perceived administrative support had a “partial mediating” role for the relationship between job motivation and organizational identification. Based on research findings, it was concluded that the effect of job motivation on teachers’ identification with their organizations was realized through perceived administrative support, albeit partially.
Volume: 9
Issue: 3
Page: 539-547
Publish at: 2020-08-01

The usage of thermoelectric generator as a renewable energy source

10.12928/telkomnika.v18i4.13072
Cekmas; University of Sriwijaya Cekdin , Zainuddin; Sriwijaya University Nawawi , Muhammad; Sriwijaya University Faizal
Currently thermoelectric generators (TEG) are widely used in biomedical, military and space satellite power applications. TEG of high power plants are mostly used in automobile and industrial engines. This paper discusses TEG as a renewable energy source. Here the TEG in the application is used in the thermoelectric generator power plant. The working principle of this thermoelectric generator is on the heat side of the TEG peltier which is coated in metal in the form of aluminum, which is heated by a heater. And the cold side of the TEG Peltier is placed on the heat sink (as a heat dissipation metal). Heatsinks are submerged in water which are submerged about half or more. If the temperature of the metal being heated and the temperature of heat dissipation metal have a certain difference, then the temperature difference causes TEG to start working. The greater the temperature difference, the greater the electrical energy produced will be. However, if the temperature difference is too large it will damage the bismuth semiconductor material used. After TEG starts working it will produce voltage and current.
Volume: 18
Issue: 4
Page: 2186-2192
Publish at: 2020-08-01

QR code based authentication method for IoT applications using three security layers

10.12928/telkomnika.v18i4.14748
Abbas M.; Universiti Tenaga Nasional (UNITEN) Al-Ghaili , Hairoladenan; Universiti Tenaga Nasional (UNITEN) Kasim , Marini; Universiti Tenaga Nasional (UNITEN) Othman , Wahidah; Universiti Tenaga Nasional (UNITEN) Hashim
A quick response code-based authentication method (QRAM) is proposed. QRAM is applicable for lots of internet of things (IoT) applications. QRAM aims to verify requests of such an access to IoT applications. Requests are made using a quick response code (QRC). To authenticate contents of QRC, users will scan QRC to access IoT applications. To authenticate contents of QRC, three procedures are applied. QRAM contributes to IoT automatic access systems or smart applications in terms of authentication and safety of access. QRAM is evaluated in term of security factors (e.g., authentication). Computation time of authentication procedures for several IoT applications has become a considerable issue. QRAM aims to reduce computation time consumed to authenticate each QRC. Some authentication techniques still face difficulties when an IoT application requires fast response to users; therefore, QRAM aims to enhance so to meet real-time applications. Thus, QRAM is compared to several competitive methods used to verify QRC in term of computation time. Results confirmed that QRAM is faster than other competitive techniques. Besides, results have shown a high level of complexity in term of decryption time needed to deduce private contents of QRC. QRAM also is robust against unauthorized requests of access.
Volume: 18
Issue: 4
Page: 2004-2011
Publish at: 2020-08-01
Show 1103 of 1995

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration