Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

23,540 Article Results

Reconfigurable data intensive service for low latency cyber-physical systems and IoT communication

10.11591/ijres.v13.i3.pp491-501
Prince Gupta , Rajeev Sharma , Sachi Gupta
The fourth industrial revolution is realized through the many developments in cyber-physical systems (CPS) made possible by the widespread use of the internet of things (IoT). CPS sensor networks must enable mobile and wireless CPSs with their specific flexibility and heterogeneity needs without compromising quality of service (QoS). The research article focuses on reconfigurable data communication hardware for numerous IoT-supporting infrastructures and performance estimation using delay, power, throughput, and packet delivery ratio (PDR) for different IoT node configurations. Tree topology-based network configuration from cloud data to sensor fog organizers, sensor network directors, and IoT-embedded sensors is supported. Functional simulation is performed in iFoGSim, Xilinx ISE, and Modelsim 10.0 with a maximum of 64 variable nodes programmed for data communication and interplay verification with a minimum delay of 9.1 ns, maximum frequency of 319 MHz, power of 7.5 mW, throughput of 0.280, and maximum PDR=1. The simulation is applicable for fog computing and CPS processed from different alters in specific topologies.
Volume: 13
Issue: 3
Page: 491-501
Publish at: 2024-11-01

Comparative study of password storing using hash function with MD5, SHA1, SHA2, and SHA3 algorithm

10.11591/ijres.v13.i3.pp502-511
Parinya Natho , Suwit Somsuphaprungyos , Salinun Boonmee , Sangtong Boonying
The main purpose of passwords is to prevent unauthorized people from accessing the system. The rise in internet users has led to an increase in password hacking, which has resulted in a variety of problems. These issues include opponents stealing a company's or nation's private information and harming the economy or the organization's security. Password hacking is a common tool used by hackers for illegal purposes. Password security against hackers is essential. There are several ways to hack passwords, including traffic interception, social engineering, credential stuffing, and password spraying. In an attempt to prevent hacking, hashing algorithms are therefore mostly employed to hash passwords, making password cracking more difficult. In the suggested work, several hashing techniques, including message digest (MD5), secure hash algorithms (SHA1, SHA2, and SHA3) have been used. They have become vulnerable as a result of being used to store passwords. A rainbow table attack is conceivable. Passwords produced with different hash algorithms can have their hash values attacked with the help of the Hashcat program. It is proven that the SHA3 algorithm can help with more secure password storage when compared to other algorithms.
Volume: 13
Issue: 3
Page: 502-511
Publish at: 2024-11-01

Robust embedded access control system based on face and encrypted QR with RPi4

10.11591/ijres.v13.i3.pp586-594
Samir Marwan Hammami , Muhammad Alhammami
Facial-based recognition systems are commonly used for building access control, with the accuracy and computing requirements still being improved. On the other hand, QR codes are gaining rising attention as an input interface to many embedded applications. This paper proposes an embedded access control system that customises both previous techniques to be implemented on the CPU of a low-cost Raspberry Pi 4 computer. The achieved system works smoothly with a frame rate of 8.27 FPS, increasing the accessing control's robustness compared to a system based on face recognition only. It also offers the ability to control the access of unknown faces. In tandem with integration, this strengthens security measures, improves user experience, and outperforms conventional access control approaches, creating an attractive offer for many businesses.
Volume: 13
Issue: 3
Page: 586-594
Publish at: 2024-11-01

Precision medicine in hepatology: harnessing IoT and machine learning for personalized liver disease stage prediction

10.11591/ijres.v13.i3.pp724-734
Satyaprakash Swain , Mihir Narayan Mohanty , Binod Kumar Pattanayak
In this research, we used a dataset from Siksha ‘O’ Anusandhan (S’O’A) University Medical Laboratory containing 6,780 samples collected manually and through internet of things (IoT) sensor sources from 6,780 patients to perform a thorough investigation into liver disease stage prediction. The dataset was carefully cleaned before being sent to the machine learning pipeline. We utilised a range of machine learning models, such as Naïve Bayes (NB), sequential minimal optimisation (SMO), K-STAR, random forest (RF), and multi-class classification (MCC), using Python to predict the stages of liver disease. The results of our simulations demonstrated how well the SMO model performed in comparison to other models. We then expanded our analysis using different machine learning boosting models with SMO as the base model: adaptive boosting (AdaBoost), gradient boost, extreme gradient boosting (XGBoost), CatBoost, and light gradient boosting model (LightGBM). Surprisingly, gradient boost proved to be the most successful, producing an astounding 96% accuracy. A closer look at the data showed that when AdaBoost was combined with the SMO base model, the accuracy results were 94.10%, XGBoost 90%, CatBoost 92%, and LightGBM 94%. These results highlight the effectiveness of proposed model i.e. gradient boosting in improving the prediction of liver disease stage and provide insightful information for improving clinical decision support systems in the field of medical diagnostics.
Volume: 13
Issue: 3
Page: 724-734
Publish at: 2024-11-01

Arowana cultivation water quality monitoring and prediction using autoregressive integrated moving average

10.11591/ijres.v13.i3.pp665-673
April Firman Daru , Susanto Susanto , Whisnumurti Adhiwibowo
Decorative fish is a fish that humans keep for amusement. There are many decorative fish that exist in this world, one of them is known as the Arowana fish (Scleropages Formosus). This fish is known around Asia including in Indonesia. However, to ensure the Arowana is living well is not easy. The water quality inside a farm must follow a strict balance. The pH of the water must not exceed or below 7 pH. Meanwhile, the total dissolved solid (TDS) salt must not exceed 1000 parts per million. If the balance collapsed, the Arowana fish will not grow. Thus, the owner must monitor the water to make sure that the water is ideal. There were many approaches including internet of things (IoT) solutions. However, they have weaknesses with prediction. Because of this reason, this study designed pH and TDS monitoring with autoregressive integrated moving average (ARIMA) as the algorithm. To achieve the solution, this study used experiment methodology as the research fundamental from top to bottom. According to the evaluation, this study found that the accuracy of ARIMA model is 98.12% for pH and 98.86% for TDS. On the contrary, the seasonal autoregressive integrated moving average (SARIMA) model has an accuracy of 98.52% for pH and 99.89% for TDS.
Volume: 13
Issue: 3
Page: 665-673
Publish at: 2024-11-01

A novel smart irrigation framework with timing allocation using solenoid valves and Arduino microcontroller

10.11591/ijres.v13.i3.pp758-766
Vijaya Kumar Hemapura Ramakrishnaiah , Harish Lakshmappa , Bharathi Gururaj , Ramesha Muniyappa , Pavan Godekere Siddaramaiah , Nagesh Hunnigere Bylamurthy
Irrigation in agriculture is the most common way of providing water to agricultural land or fields at normal stretches through channels and embedded platforms with the internet of things (IoT), to upgrade rural development. In this paper, the arrangement of the various types of irrigation systems and embedded platforms for agriculture was studied. The embedded platform can be designed in a suitable framework that can assist the irrigation system in growing more water-required crops. In this work, three relay switches, two solenoid valves, and one water pump source were connected to Arduino ESP32. The free version of Sinric Google Cloud was utilized significantly to control three devices namely, two solenoid valves using two relay switches and a water pump source using one relay switch. The experiment was executed in a prototype manner with timing allocation by considering two agricultural fields where water was supplied either in one field at a time and showed more prominent results to save time, replacement of manual valves, man intervention, power, and suitable quantity of water for more water-required crops namely, arecanut and coconut.
Volume: 13
Issue: 3
Page: 758-766
Publish at: 2024-11-01

Comparing feature usage in IMU-based gesture control for omnidirectional robot via wearable glove

10.11591/ijres.v13.i3.pp542-551
Dahnial Syauqy , Eko Setiawan , Edita Rosana Widasari
To improve the intuitiveness of maneuver control on omniwheeled mobile robot, many hand gesture-based robot controls have been developed. The focus of this research is to develop a wearable system for data acquisition from inertial measurement unit (IMU) sensors and compare its features to be used as gesture recognition using the random forest algorithm. With the need of resource constrained device for wearable system based on microcontrollers, we compared the use of Euler and quaternion-based orientation data as input features. As additional comparison, dimension reduction was also carried out using the principal component analysis (PCA) method. Hand gestures are recognized using data obtained by the IMU sensor embedded in the wearable glove. This study compared the accuracy and size of library files embedded in microcontrollers in several feature usage scenarios. The test evaluation results of all scenarios show that the use of all features provides a balance between high accuracy but small file sizes, respectively 99% and 9.2 KB. However, the use of other fewer features, such as by only using 3 Euler data, 4 quaternion data, or by using PCA algorithm (PC=3) can also be used since the accuracy is still above 90%, with a relatively larger file size.
Volume: 13
Issue: 3
Page: 542-551
Publish at: 2024-11-01

Timing issues on power side-channel leakage of advanced encryption standard circuits designed by high-level synthesis

10.11591/ijres.v13.i3.pp616-624
Yuto Miura , Hiroki Nishikawa , Xiangbo Kong , Hiroyuki Tomiyama
In recent years, field programmable gate array (FPGA) have been used in many internet of things (IoT) devices and are equipped with cryptographic circuits to ensure security. However, they are exposed to the risk of cryptographic keys being stolen by side-channel attacks. Countermeasures against side-channel attacks have been developed, but they are becoming more of a threat to IoT devices due to the diversity of attacks. Therefore, it is necessary to understand the basic characteristics of side-channel attacks. Therefore, this study clarifies the relationship between two timing issues, the clock period of the circuit and the power sampling interval, and the amount of side-channel leakage. We design seven advanced encryption standard (AES) circuits with different clock periods and conduct empirical experiments using logic simulations to clarify the correlation between the two timings and the amount of side-channel leakage. T-test is used to evaluate the leakage amount, which is evaluated based on four metrics. From the results, we argue that the clock period and sampling interval do not interfere with each other in the side-channel leakage amount.
Volume: 13
Issue: 3
Page: 616-624
Publish at: 2024-11-01

Cost-effective circularly polarized MIMO antenna for Wi-Fi applications

10.11591/ijeecs.v36.i2.pp785-792
Raju Thommandru , Rengarasu Saravanakumar
Antenna is a backbone of communication system, and with the advent of technology, numerous innovations have been made to advance antenna development. An antenna, functioning as a smart device, transmits and receives signals while also working as a transducer. Wireless communication requires a useful device for transmitting and receiving electromagnetic waves. Wireless fidelity (Wi-Fi) is a specific type of wireless communication technology used to transmit data over the internet network. The bandwidth and signal coverage of Wi-Fi have significant limitations. Therefore, an antenna is crucial for improving signal reception to address this issue. This article presents the designing and developing of a cost-effective circularly polarized (CP) 2×2 multiple input multiple output (MIMO) antenna customized for Wi-Fi applications. The application of a notched circular patch antenna serves to achieve circular polarization. The radius of the circular patch is 0.26 λ, and the proposed MIMO antenna effectively showcases CP, characterized by an axial ratio (AR) of 1 dB at 5 GHz and an impressive bandwidth spanning 0.2 GHz (4.9-5.1 GHz). Additionally, the antenna is designed to achieve a high-isolation 2×2 MIMO setup, ensuring antenna isolation surpassing 20 dB. By utilizing the flame retardant (FR4) substrate, presented MIMO antenna strikes a balance between cost-effectiveness and operational efficiency for its intended application, and directional radiation patterns are well-aligned within the desired frequency range.
Volume: 36
Issue: 2
Page: 785-792
Publish at: 2024-11-01

RecommendRift: a leap forward in user experience with transfer learning on netflix recommendations

10.11591/ijeecs.v36.i2.pp1218-1225
Surabhi Anuradha , Pothabathula Naga Jyothi , Surabhi Sivakumar , Martha Sheshikala
In today’s fast-paced lifestyle, streaming movies and series on platforms like  Netflix is a valued recreational activity. However, users often spend considerable time searching for the right content and receive irrelevant recommendations, particularly when facing the “cold start problem” for new users. This challenge arises from existing recommender systems relying on factors like casting, title, and genre, using term frequency-inverse document frequency (TF-IDF) for vectorization, which prioritizes word frequency over semantic meaning. To address this, an innovative recommender system considering not only casting, title, and genre but also the short description of movies or shows is proposed in this study. Leveraging Word2Vec embedding for semantic relationships, this system offers recommendations aligning better with user preferences. Evaluation metrics including precision, mean average precision (MAP), discounted cumulative gain (DCG), and ideal cumulative gain (IDCG) demonstrate the system’s effectiveness, achieving a normalized DCG (NDCG)@10 of 0.956. A/B testing shows an improved click-through rate (CTR) of recommendations, showcasing enhanced streaming experience.
Volume: 36
Issue: 2
Page: 1218-1225
Publish at: 2024-11-01

Optimizing network lifetime in wireless sensor networks: a hierarchical fuzzy logic approach with LEACH integration

10.11591/ijeecs.v36.i2.pp1140-1148
Chandrika Dadhirao , Ram Prasad Reddy Sadi , B V A N S S Prabhakar Rao , Panduranga Vital Terlapu
Wireless sensor networks (WSNs) are of significant importance in many applications; nevertheless, their operational efficiency and longevity might be impeded by energy limitations. The low energy adaptive clustering hierarchy (LEACH) protocol has been specifically developed with the objective of achieving energy consumption equilibrium and regularly rotating cluster heads (CHs). This study presents a novel technique, namely the hierarchical fuzzy logic controller (HFLC), which is integrated with the LEACH protocol to enhance the process of CH selection and effectively prolong the network's operational lifespan. The HFLC system employs fuzzy logic as a means to address the challenges posed by uncertainty and imprecision. It assesses many aspects, including residual energy, node proximity, and network density, in order to make informed decisions. The combination of HFLC with LEACH demonstrates superior performance compared to the conventional LEACH protocol in terms of energy efficiency, stability, and network durability. This study emphasizes the potential of intelligent and adaptive mechanisms in improving the performance of WSNs by improving the survivability of nodes by reducing the energy consumption of the nodes during the communication of network process. It also paves the way for future research that integrates soft computing approaches into network protocols.
Volume: 36
Issue: 2
Page: 1140-1148
Publish at: 2024-11-01

Embedded systems as programmable square wave generator in wireless power transfer

10.11591/ijres.v13.i3.pp568-576
Sabriansyah Rizqika Akbar , Eko Setiawan , Achmad Basuki
This study focuses on the design and development of programmable frequency generator using embedded devices that are able to produce square wave signals in the wireless power transfer (WPT) transmitter. We validate the accuracy of the output signal by measuring distance error. We validate that our system can change and sweep the frequency and produce high power by measuring the absorbed power in the load. We conduct the frequency sweep analysis to find optimal frequency and the frequency splitting phenomenon. The experiments show that the system can produce and sweep the square wave signals with less than 1% error. We also find that the frequency splitting occurred when distance among two coils in the range 0.5-6.5 cm and the splitting disappeared when the distance is above 7.5 cm. The frequency splitting shows that the measured optimum frequency differs from the calculation. The difference confirms that the programmable frequency generator is needed to adjust the frequency that can transfer maximum power to the load.
Volume: 13
Issue: 3
Page: 568-576
Publish at: 2024-11-01

Highly selective filtering power divider using substrate integrated waveguide technique for radar applications

10.11591/ijres.v13.i3.pp643-649
Yogeshkumar Bhadreshbhai Patel , Amrutbhai Narshihbhai Patel
This article exhibits a filtering power divider designed with substrate integrated waveguide (SIW) technique, having the power dividing as well as filtering functionalities. In the design band-pass performance is realized by merging SIW structure having high-pass response and complementary split ring resonator (CSRRs) with parallel tank LC resonant response and the dumbbells shape defected ground structure (DGS) with high out of band rejection characteristics. The anticipated structure serves as both a power divider and a filter, it reduces both the cost and the size of the system. Structure is constructed and tested to confirm the design functionality. The measurement result shows the return loss of -25.94 dB with 3-dB fractional bandwidth of 2.85% at 14 GHz.
Volume: 13
Issue: 3
Page: 643-649
Publish at: 2024-11-01

An active two-stage class-J power amplifier design for smart grid’s 5G wireless networks

10.11591/ijres.v13.i3.pp625-642
Nagisetty Sridhar , Chinnaiyan Senthilpari , Mardeni Roslee , Wong Hin Yong
The wireless communication networks in the smart grid’s advanced metering infrastructure (AMI) applications need 5G technology to support large data transmission efficiently. As the 5G wireless communication network’s overall bandwidth (BW) and efficiency depend on its power amplifier (PA), in this work, a two-stage class-J power amplifier’s design methodology that operates at 3.5 GHz centre frequency by utilizing the CGH40010F model gallium nitride (GaN) transistor is presented. The proposed design methodology involves proper designing of input, output, and interstage matching networks to achieve class-J operation with improved power gain over desired BW using the advanced design system (ADS) electronic design automation (EDA) tool and estimating its integration feasibility through active element-based design approach using the Mentor Graphics EDA tool. The proposed PA provides 54% drain efficiency (D.E), 53% power added efficiency (PAE) with a small signal gain of 27 dB at 3.5 GHz and 41 dBm power output with 21 dB of improved power gain across a BW of around 400 MHz using 28 V power supply into 50 Ω load. By replacing the two-stage PA's passive elements with active elements, its layout size is estimated to be (15.5×29.2) μm2 . The results of the proposed PA exhibit its integration feasibility and suitability for the smart grid’s 5G wireless networks.
Volume: 13
Issue: 3
Page: 625-642
Publish at: 2024-11-01

Improving the performance of IoT devices that use Wi-Fi

10.11591/ijres.v13.i3.pp748-757
Ali Ahmed Razzaq , Kunjam Nageswara Rao
Providing quality service to users of the internet of things (IoT) entails addressing two crucial aspects: one related to security and the other concerning the limited resources of IoT devices. We will face a challenge while using timesensitive applications within a network that utilizes a high-performance Wi-Fi technology with exceeding energy consumption. Due to this research challenge, we propose a new algorithm, IoT-quality of service (QoS), designed to achieve a true balance between enhancing the security aspects of IoT devices and improving network-hardware performance. Thus, the algorithm efficiently manages the limited energy resources by monitoring energy levels, communication quality, and queuing delay at access points. This is accomplished by utilizing a streamlined identity management system capable of achieving authentication and access authorization with reduced loading for IoT devices. The research hypothesis underwent validation through a comparative analysis of its performance against the conventional model of a Wi-Fi-based IoT device. This evaluation was conducted utilizing the NS3 simulator and was based on a predetermined set of parameters influencing the examined performance metrics, including power consumption, throughput, delay, and response time. The findings exposed the superiority of the proposed algorithm.
Volume: 13
Issue: 3
Page: 748-757
Publish at: 2024-11-01
Show 7 of 1570

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration