Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,734 Article Results

A comparison of performance between double-gate and gate-all-around nanowire MOSFET

10.11591/ijeecs.v13.i2.pp801-807
Nor Fareza Kosmani , Fatimah A.Hamid , M. Anas Razali
Due to the rapid scaling of Complementary Metal-Oxide-Semiconductor (CMOS), the structure of the planar MOSFET approaches the scaling limits when the short channel effects (SCEs) become the main problem. The Double-Gate and Gate-all-Around nanowire MOSFETs are said to be the promising candidate to replace the planar MOSFET in order to pursue CMOS scaling. Therefore, this paper present the result of device simulation using Silvaco TCAD tools for Double-Gate and Gate-All-Around nanowire MOSFETs. The purpose of this simulation work is to compare the performance of GAA nanowire and DG MOSFET and then study the effect of physical parameter on electrical behavior for both devices. The result of the simulated model of Gate-All-Around nanowire is compared with published data.  It was found that when the gate length of DG was scaled from 80nm to 10nm, the subthreshold slope is increasing from 62mV/dec to 162.7mV/dec. While for GAA, the subthreshold slope is increasing from 65.8mV/dec to 127mV/dec. The threshold voltage in DG and GAA at Lg=80nm are 0.40646V and -0.17505V respectively. Even though heavy doping was good for suppressing SCE, the lower doping concentration is desirable as the DG and GAA nanowire had higher on-state currents with 1.42x10-3Aand 3.23x10-4A respectively. It also showed that the threshold voltage of DG and GAA nanowire increase from -0.0734V to 0.2312V and -0.0319V to 0.2232V respectively when the channel doping is varies from lower to higher concentration.
Volume: 13
Issue: 2
Page: 801-807
Publish at: 2019-02-01

Radiation pattern control of microstrip antenna in elevation and azimuth planes using EBG and pin diode.

10.11591/ijece.v9i1.pp332-340
M. K Abdulhameed , M. S. Mohamad Isa , Z. Zakaria , I.M. Ibrahim , Mowafak K. Mohsen
An important issue in wireless communication systems, which is related to the antenna gain degradation in case of changing the main direction of the antenna radiation pattern, this variation is not approval in many communications systems. In order to improve antenna radiation performances, Electromagnetic band gap (EBG) - antenna with radiation pattern control capability is presented. Mushroom-like EBG structure for suppressing surface waves has been combined, with the switching diode to produce the radiation pattern control with improving antenna characteristics of gain, directivity and efficiency. EBG of several cells are surrounded the patch antenna and placed symmetrically for the two opposite sides, generating different radiation patterns control ability in both the elevation (E) (-20° < φ < 20°) and azimuth (Z) planes (−18° < θ < 18°). At the ground plane of antenna the diodes have been switched ON and OFF states, the EBG sector properties in stop band (connecting vias) and pass band (disconnecting vias) are altered. Using CST Microwave Studio (CST MWS) the results show the flexibility in radiation pattern control for the Z and E planes using only four diodes. Antenna directivity of 10 dBi, gain 9.86 dB and efficiency 96.5% at the operating frequency of 6 GHz, more results for all direction has been stated in Table1. Significantly, unlike a conventional beam steering, this method does not suffering from gain degradation and the main lobe gain is approximately constant for all steerig angles.
Volume: 9
Issue: 1
Page: 332-340
Publish at: 2019-02-01

User selection protocol in DF cooperative networks with hybrid TSR-PSR protocol based full-duplex energy harvesting over rayleigh fading channel: system performance analysis

10.11591/ijeecs.v13.i2.pp534-542
Phu Tran Tin , Le Anh Vu , Tan N. Nguyen , Thanh-Long Nguyen
Cooperative communication has been recently proposed in wireless communication systems for exploring the inherent spatial diversity in relay channels. In this work, we investigate the system performance of the energy harvesting full-duplex (FD) decode-and-forward (DF) hybrid time switching-power splitting relaying TSR-PSR (TPSR) protocol relaying network. In the selection scheme, the best user selection protocol is proposed and investigated. Mainly we derive the closed-form expression for the outage probability, system throughput and the symbol error rate (SER) of the system. Numerical results are also presented by the Monte Carlo simulation to validate the theoretical analysis in connection with the all possible parameters in the comparison between TSPR, TSR and PSR cases. The research results show that TPSR case is better than the others in term of outage probability and SER.
Volume: 13
Issue: 2
Page: 534-542
Publish at: 2019-02-01

Design and development of RF power detector for microwave application

10.11591/ijeecs.v13.i2.pp713-720
Mohamoud Mouse Ali , Siti Zuraidah Ibrahim , Ismahayati Adam , Nurehansafwanah Khalid
This paper presents the design and development of the RF power detector for microwave applications that is operating at 2.4GHz using microstrip. The design of diode detector circuit is simulated using Keysight ADS software tool. The design of the diode detector includes the matching network, Schottky diode and the low pass filter. The paper also presents the fabrication and measurement of the designed circuit.
Volume: 13
Issue: 2
Page: 713-720
Publish at: 2019-02-01

A comprehensive review of honey encryption scheme

10.11591/ijeecs.v13.i2.pp649-656
Esther Omolara Abiodun , Aman Jantan , Isaac Oludare Abiodun , Howard Eldon Poston
We present a comprehensive survey of the Honey Encryption (HE) scheme. Honey Encryption is an encryption scheme that provides resilience against brute-force attack by serving up plausible-looking but fake plaintext for every invalid key used by an intruder to decrypt a message. Our goal is to furnish researchers with the framework of the scheme not just for implementation purpose but to identify the gaps in the scheme and answer the open questions that remain unanswered by the small set of research carried out since its inception. We identified two major open areas which are the difficulty of creating semantically and contextually plausible-looking and convincing decoy message that is good enough to fool the attacker into believing he has the original message. Secondly, typo problem; where a fake plaintext appears valid to a legitimate user when he mistakenly enters a wrong key. Our findings consolidate the need for further research as state-of-the-art research fails to produce convincing decoys that are good enough to keep the attacker from acquiring the message.
Volume: 13
Issue: 2
Page: 649-656
Publish at: 2019-02-01

Failure prediction of e-banking application system using adaptive neuro fuzzy inference system (ANFIS)

10.11591/ijece.v9i1.pp667-675
Yuwono Abdillah , Suharjito Suharjito
Problems often faced by IT operation unit is the difficulty in determining the cause of the failure of an incident such as slowing access to the internet banking url, non-functioning of some features of m-banking or even the cessation of the entire e-banking service. The proposed method to modify ANFIS with Fuzzy C-Means Clustering (FCM) approach is applied to detect four typical kinds of faults that may happen in the e-banking system, which are application response times, transaction per second, server utilization and network performance. Input data is obtained from the e-banking monitoring results throughout 2017 that become data training and data testing. The study shows that an ANFIS modeling with FCM optimized input has a RMSE 0.006 and  increased accuracy by 1.27% compared to ANFIS without FCM optimization.
Volume: 9
Issue: 1
Page: 667-675
Publish at: 2019-02-01

Convergence analysis of the unpunctured turbo trellis-coded modulation (UTTCM)

10.11591/ijeecs.v13.i2.pp447-452
Ahmed Haffane , Abdelhafid Hasni , Mustapha Khelifi , Boufeldja Kadri
In this paper, the performance of the Unpunctured Turbo Trellis-Coded Modulation (UTTCM) over Additive White Gaussian Noise (AWGN) channel is analyzed using the non-binary extrinsic information transfer (EXIT) chart. The exchange of the extrinsic information between the decoder components is tracked, allowing the generation of an EXIT chart, which is a powerful tool for analyzing the convergence behavior of iterative decoding and prediction of convergence position. The Simulation results are compared with the turbo cliff positions on the BER curves.
Volume: 13
Issue: 2
Page: 447-452
Publish at: 2019-02-01

Handwritten tifinagh character recognition using simple geometric shapes and graphs

10.11591/ijeecs.v13.i2.pp598-605
Youssef Ouadid , Abderrahmane Elbalaoui , Mehdi Boutaounte , Mohamed Fakir , Brahim Minaoui
In this paper, a graph based handwritten Tifinagh character recognition system is presented. In preprocessing Zhang Suen algorithm is enhanced. In features extraction, a novel key point extraction algorithm is presented. Images are then represented by adjacency matrices defining graphs where nodes represent feature points extracted by a novel algorithm. These graphs are classified using a graph matching method. Experimental results are obtained using two databases to test the effectiveness. The system shows good results in terms of recognition rate.
Volume: 13
Issue: 2
Page: 598-605
Publish at: 2019-02-01

Reflection phase analysis of reflectarray antenna based on paper substrate materials

10.11591/ijeecs.v13.i2.pp766-772
H. I Malik , M. Y. Ismail , S. R Masrol , Sharmiza Adnan
This article presents an analysis of reflection loss and reflection phase behavior of a novel microstrip reflectarray antenna, embedded on paper substrate material. Two different paper substrates were first analyzed for dielectric material properties. A detailed analysis of scattering parameters of rectangular patch element with variable substrate heights has been carried out. Rectangular patch elements fabricated using adhesive copper tape over the paper substrate, show that a wide bandwidth is achieved compared to available conventional substrate materials. Fabricated patch elements over paper substrate material show a broadband frequency response of 340 and 290 MHz. It has also been demonstrated that the measured reflection phase ranges for both the substrate cover 310º and 294º at low phase gradients of 0.12 and 0.24 º/MHz respectively.
Volume: 13
Issue: 2
Page: 766-772
Publish at: 2019-02-01

Wind direction sensor based on thermal anemometer for olfactory mobile robot

10.11591/ijeecs.v13.i2.pp475-484
Helmy Widyantara , Muhammad Rivai , Djoko Purwanto
A wind direction sensor has been implemented for many applications, such as navigation, weather, and air pollution monitoring. In an odor tracking system, the wind plays the important role to carry gas from its source. Therefore, the precise, low-cost, and effective wind direction sensor is required to trace the gas source. In this study, a new design of wind direction sensor has been developed using thermal anemometer principle with the main component of the positive temperature coefficient thermistor. Three anemometers each of which has different directions are used as inputs for the neural network to determine the direction of the wind automatically.The experimental results show that the wind sensor system is able to detect twelve wind directions. A mobile robot equipped with this sensor system can navigate to a wind source in the open air with a success rate of 80%.This system is expected to increase the success rate of the mobile robot in searching for dangerous leaking gas in the open air.
Volume: 13
Issue: 2
Page: 475-484
Publish at: 2019-02-01

Quartz crystal microbalance based electronic nose system implemented on Field Programmable Gate Array

10.12928/telkomnika.v17i1.10133
Misbah; Institut Teknologi Sepuluh Nopember Misbah , Muhammad; Institut Teknologi Sepuluh Nopember Rivai , Fredy; Institut Teknologi Sepuluh Nopember Kurniawan
Nowadays, an electronic nose becomes an important tool for detecting gas. The electronic nose consists of gas sensor array combined with neural networks to recognize patterns of the sensor array. Currently, the implementation of the neural network on the electronic nose systems still use personal computer so that less flexible or not portable. This paper discusses the electronic nose system implemented in a Field Programmable Gate Array (FPGA). The sensor array consists of eight Quartz Crystal Microbalance (QCM) coated with chemical materials. The eight channel-frequency counter is used to measure the frequency change of the sensor due to the presence of gas adsorbed to the surfaces. The bipolar sigmoid activation function used in the neuron model is approximated by a second order equation. The experimental result showed that the electronic nose system could recognize all the types of gas with 92% success rate.
Volume: 17
Issue: 1
Page: 370-376
Publish at: 2019-02-01

High secure buffer based physical unclonable functions (PUF’s) for device authentication

10.12928/telkomnika.v17i1.10436
Sadulla; Vignan's Foundation for Science Shaik , Anil Kumar; Vignan's Foundation for Science Kurra , A.; Vignan's Foundation for Science Surendar
Physical Unclonable Function (PUF) is fast growing technology which utilizes the statistical variability of the manufacture variations acts as a finger print to the each device. It can be widely used in security applications such as device authentication, key generation and Intellectual Property (IP) protection. Due to the simplicity and low cost arbiter delay based PUFs have been mostly used as a cryptographic key in Internet of Things (IoT) devices. As conventional arbiter PUFs are suffers from less uniqueness and reliability. This paper provides designing of new buffer based arbiter PUF. It has been demonstrated that experimental results of new buffer based arbiter PUF shows the considerable improvement in the uniqueness and reliability of the proposed design and the Monte-Carlo analysis applied for delay variability of the PUFs.
Volume: 17
Issue: 1
Page: 377-383
Publish at: 2019-02-01

Implementation of an ARM-based system using a Xilinx ZYNQ SoC

10.11591/ijeecs.v13.i2.pp485-491
Omar Salem Baans , Asral Bahari Jambek
ARM processors are widely used in embedded systems. They are often implemented as microcontrollers, field-programmable gate arrays (FPGAs) or systems-on-chip. In this paper, a variety of ARM processor platform implementations are reviewed, such as implementation into a microcontroller, a system-on-chip and a hybrid ARM-FPGA platform. Furthermore, the implementation of a specific ARM processor, the Cortex-A9 processor, into a system-on-chip (SoC) on an FPGA is discussed using Xilinx’s Vivado and SDK software system and execution on a Xilinx Zynq Board.
Volume: 13
Issue: 2
Page: 485-491
Publish at: 2019-02-01

The use of mobile-assisted virtual reality in fear of darkness therapy

10.12928/telkomnika.v17i1.11614
Erick; Universitas Padjadjaran Paulus , Mira; Universitas Padjadjaran Suryani , Puspita Adhi Kusuma; Universitas Padjadjaran Wijayanti , Firdaus Perdana; Universitas Padjadjaran Yusuf , Aulia; Universitas Padjadjaran Iskandarsyah
Fear of darkness is a common psychological problem that may extent to a specific phobia if it is not treated well. Several intervention techniques related to fear and phobia using actual exposure therapy have been studied for decades, however, there were some constraints emerged when the therapist provides a real environment to overcome the patient's reaction to his/her specific fear. Virtual reality (VR) technology is an innovative tool providing a more immersive, secure, personal, and controlled virtual environment. Therefore, we developed a novel framework for treating the fear of darkness named Mobile-assisted Virtual Reality (MAVR). The purpose of this study was to evaluate the use of MAVR to treat fear of darkness based on usability, time consumption and its ability to decrease fear. We used the GOMS model as an interaction guidance between human and computer which aimed to facilitate the process of re-learning in mindset change and individual’s behavioral toward situation of darkness and night. Therefore, a comprehensive evaluation was conducted to measure the efficacy of the MAVR. We developed the usability assessment checklist to assess the feasibility and acceptability of the MAVR, and fear of darkness thermometer to measure the degree of fear. The Wilcoxon Signed Rank Test showed that the fear of darkness was significantly decreased after participants received the MAVR therapy (z=-3.550, p-value<0.001). We found that the MAVR was very useful, easy to be used and acceptable for participants. In conclusion, this study highlights the efficacy of Mobile-assisted Virtual Reality in treating specific fear, and it seems that Virtual Reality technology has a promising benefit to be implemented for other fear or specific phobia and also used in other psychological treatment.
Volume: 17
Issue: 1
Page: 282-290
Publish at: 2019-02-01

Evaluation of network security based on next generation intrusion prevention system

10.12928/telkomnika.v17i1.9191
Gilang Intan Permatasari; Bina Nusantara University Duppa , Nico; Bina Nusantara University Surantha
Next Generation Intrusion Prevention System (NGIPS) is a system that works to monitor network traffic, to detect suspicious activity, and to conduct early prevention toward intrusion that can cause network does not run as it supposed to be, NGIPS provides vulnerability protection broader compared to the traditional IPS, especially in the application layer that has ability to detect and learn vulnerability asset and carried out layering inspection until layer 7 packet. This paper intended to analyze and evaluate the NGIPS to protect network from penetration system that utilize the weakness from firewall, that is exploitation to HTTP port. By the existence of NGIPS, it is expected can improve the network security, also network administrator could monitor and detect the threats rapidly. Research method includes scenario and topology penetration testing plan. The result of this research is the evaluation of penetration testing that utilizes HTTP port to exploit through malicious domain. The evaluation conducted to ensure the NGIPS system can secure the network environment through penetration testing. This study can be concluded that it can become reference to optimize network security with NGIPS as network security layer.
Volume: 17
Issue: 1
Page: 39-48
Publish at: 2019-02-01
Show 1332 of 1983

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration