Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,939 Article Results

Partial discharge measurements for investigating defected solid dielectrics

10.12928/telkomnika.v19i6.20362
Ahmed S.; Ain Shams University Haiba , Adel A.; Extra High Voltage Research Center El-Faraskoury , Ahmed D.; Ain Shams University El-Koshairy , Mamdouh M.; National Institute of Standards (NIS) Halawa
Insulation system in high voltage power equipment plays an important role for the reliability of the electric power system. So, it is necessary to assess its performance to prevent any sudden interruption in the power system. Partial discharge (PD) in solid dielectrics could occur due to the presence of a cavity or a crack within the insulating material which could be formed during manufacturing, installing or/and operating conditions. Since internal cavities are the main source of the PD activities, they can lead to causing deterioration of the insulation system and consequently a complete failure may be occurred. In this paper, PD measurement and simulation are performed on a rubber insulating material with variable cylindrical cavity diameters. High-frequency current transformer (HFCT) technique is introduced for PD measurement. Therefore, a PD simulation model is developed using COMSOL Multiphysics program interlinked with Matlab software in order to investigate the influence of cavity geometry on the PD behavior in insulating material. Both measured and simulated results indicate that PD magnitude is strongly depending on changing the cavity size inside the insulating material. The results show a good agreement between experimental and simulated data outputs in terms of maximum PD magnitude.
Volume: 19
Issue: 6
Page: 2000-2008
Publish at: 2021-12-01

Utilizing ultra-wideband with wireless telecommunications applications microstrip

10.11591/ijaas.v10.i4.pp283-287
Abhay Chaudhary
The small aspect, as well as low margins of the microstrip chip amplifier (MPA) is being used in a contact system. For the last few times within the last year's research, the majority of work with MPA has been centered towards designing the portable antenna design. Wireless networking systems may be fitted with a new ultrawideband digital monopoly antenna. Throughout this exponentially changing environment, and dual multi-standard antennas play a crucial role in the implementation of cell towers. This paper presents the nature of an ultra-wideband (UWB)-based antenna array for the shape of a substratum, feeding strategies or openings.
Volume: 10
Issue: 4
Page: 283-287
Publish at: 2021-12-01

Smart information desk system with voice assistant for universities

10.11591/ijece.v11i6.pp5206-5215
Dabiah Alboaneen , Dalia Alsaffar , Amani Alqahtani , Lama Alamri , Amjad Alfahhad , Bashaier Alqahtani , Alyah Alateeq , Rahaf Alamri , Fatimah Almohammedsaleh
This article aims to develop a smart information desk system through a smart mirror for universities. It is a mirror with extra capabilities of displaying answers for academic inquiries such as asking about the lecturers’ office numbers and hours, exams dates and times on the mirror surface. In addition, the voice recognition feature was used to answer spoken inquiries in audio responds to serve all types of users including disabled ones. Furthermore, the system showed general information such as date, weather, time and the university map. The smart mirror was connected to an outdoor camera to monitor the traffics at the university entrance gate. The system was implemented on a Raspberry Pi 4 model B connected to a two-way mirror and an infrared (IR) touch frame. The results of this study helped to overcome the problem of the information desk absence in the university. Therefore, it helped users to save their time and effort in making requests for important academic information.
Volume: 11
Issue: 6
Page: 5206-5215
Publish at: 2021-12-01

The degree of career polarization among educational leaders in the Jordanian Education Directorates

10.11591/ijere.v10i4.20993
Mohammad Hasan Hamadat , Mohammad Omar Al-Momani
The study aimed to identify the degree of career polarization among educational leaders in the Jordanian–education directorates of Ajloun and Jersah. The researchers adopted the descriptive -analytical approach for its suitability for such studies. The researchers used the questionnaire as the study instrument, which comprised 20 items. The researchers distributed the items in two domains, 10 items were for each domain as the study instrument. The sample of the study comprised 250 educational leaders for the first semester of the academic year 2019-2020. The study results showed that the degree of career polarization among educational leaders in the Jordanian Ministry of Education came with an average degree of rating in all its domains and for all items. The results also showed that there were no statistically significant differences at the level of statistical significance (α=0.05) attributed to the two study variables. Gender and the number of years of experience are the two study variables.
Volume: 10
Issue: 4
Page: 1282-1289
Publish at: 2021-12-01

Forensic steganalysis for identification of steganography software tools using multiple format image

10.11591/ijict.v10i3.pp188-197
S. T. Veena , A. Selvaraj
Today many steganographic software tools are freely available on the Internet, which helps even callow users to have covert communication through digital images. Targeted structural image steganalysers identify only a particular steganographic software tool by tracing the unique fingerprint left in the stego images by the steganographic process. Image steganalysis proves to be a tough challenging task if the process is blind and universal, the secret payload is very less and the cover image is in lossless compression format. A payload independent universal steganalyser which identifies the steganographic software tools by exploiting the traces of artefacts left in the image and in its metadata for five different image formats is proposed. First, the artefacts in image metadata are identified and clustered to form distinct groups by extended K-means clustering. The group that is identical to the cover is further processed by extracting the artefacts in the image data. This is done by developing a signature of the steganographic software tool from its stego images. They are then matched for steganographic software tool identification. Thus, the steganalyser successfully identifies the stego images in five different image formats, out of which four are lossless, even for a payload of 1 byte. Its performance is also compared with the existing steganalyser software tool.
Volume: 10
Issue: 3
Page: 188-197
Publish at: 2021-12-01

Cloud computing adoption among state universities and colleges in the Philippines: Issues and challenges

10.11591/ijere.v10i4.21526
Catherine R. Alimboyong , Mardie E. Bucjan
The emergence of cloud computing (CC) adoption in higher education institutions (HEIs) is considered widespread today. Its growth comes with tremendous benefits and potential risks as well. This paper endeavors to investigate some issues and challenges that influence the adoption of cloud computing among state universities and colleges (SUCs) in the Philippines. A qualitative design was used in the study as it employed multiple case studies approach. Based on the results, this paper establishes two strong factors such as slow internet connection and lack of understanding or awareness of cloud computing. The findings revealed the impact of cloud computing to SUCs is found beneficial to the educational system amidst the global pandemic. Professors can easily upload lessons and teaching materials while students can easily access the materials online, though the challenge lies in the connectivity of internet in the country. Administrators can easily collaborate with the entire academic community and even to its stakeholder’s potential for collaboration even if not in face to face. It is a perfect avenue to be productive and efficient which allows all processes be made possible to all members of the entire academic community, may it be students, professors, staff and even other stakeholders.
Volume: 10
Issue: 4
Page: 1455-1461
Publish at: 2021-12-01

Apodization sensor performance for TOPAS fiber Bragg grating

10.12928/telkomnika.v19i6.21669
Toto; Universitas Riau Saktioto , Khaikal; Universitas Riau Ramadhan , Yan; Universitas Riau Soerbakti , Romi Fadli; Universitas Riau Syahputra , Dedi; Universitas Riau Irawan , Okfalisa; Universitas Islam Negeri Sultan Syarif Kasim Okfalisa
Optical sensors have more capabilities than electronic sensors, and therefore provide extraordinary developments, including high sensitivity, non-susceptibility to electromagnetic wave disturbances, small size, and multiplexing. Furthermore, fiber Bragg grating (FBG) is an optical sensor with a periodically changing grating refractive index, susceptible to strain and temperature changes. As a sensor, FBG’s performance required to optimize and improve the numerical apodization function and affect the effective refractive index is considered. The grating fiber’s apodization function can narrow the full width half maximum (FWHM) and reduce the optical signal’s side lobes. In all the apodization functions operated by FBG, Blackman has the highest sensitivity of 15.37143 pm/°C, followed by Hamming and Gaussian, with 13.71429 pm/°C and 13.70857 pm/°C, respectively, and Uniform grating fiber with the lowest sensitivity of 12.40571 pm/°C. Hamming, Uniform, and Blackman discovered the sensitivity for a strain to be 1.17, 1.16, and 1.167 pm/microstrain, respectively. The results obtained indicated that apodization could increase FBG’s sensitivity to temperature and strain sensors. For instance, in terms of other parameters, FWHM width, Hamming had the narrowest value of 0.6 nm, followed by Blackman with 0.612 nm, while Uniform had the widest FWHM of 1.9546 nm.
Volume: 19
Issue: 6
Page: 1982-1991
Publish at: 2021-12-01

Research trend on TPACK through bibliometric analysis (2015-2019)

10.11591/ijere.v10i4.22062
Nadi Suprapto , Sukarmin Sukarmin , Rinie Pratiwi Puspitawati , Erman Erman , Dian Savitri , Chih-Hsiung Ku , Husni Mubarok
This paper aims to analyze the scientific trend of research on Technological Pedagogical Content Knowledge (TPACK) through bibliometric study and explore how the contribution of Indonesian researchers in the Scopus database from 2015 to 2019. The sample was composed of 2075 documents in total. The results revealed that scientific publication on TPACK has been increasing. United States contributed the most documents on TPACK as well as Singapore’s institutions dominated in this area. Meanwhile, Indonesia put its two representative’s institutions: Universitas Sebelas Maret and Universitas Pendidikan Indonesia, among the big ten institutions in the world. All Indonesian documents produced by teacher-producing universities and public universities. United States and Taiwan have also contributed to the most productive authors of TPACK. Then, the visualization of research trend on TPACK resulted in four major clusters: i) TPACK as a system; ii) TPACK in relating to its scale; iii) TPACK in connecting with quantitative parameters; and iv) TPACK under beliefs, intention, and technology acceptance. The research findings could aid related researchers to recognize the trend of TPACK research and recommend directions for further research.
Volume: 10
Issue: 4
Page: 1375-1385
Publish at: 2021-12-01

Metaheuristic optimization in neural network model for seasonal data

10.12928/telkomnika.v19i6.20409
Budi; Diponegoro University Warsito , Rukun; Diponegoro University Santoso , Hasbi; Diponegoro University Yasin
The use of metaheuristic optimization techniques in obtaining the optimal weights of neural network model for the time series was the main part of this research. The three optimization methods used as experiments were genetic algorithm (GA), particle swarm optimization (PSO), and modified bee colony (MBC). Feed forward neural network (FFNN) was the neural network (NN) architecture chosen in this research. The limitations and weaknesses of gradient-based methods for learning algorithm inspired some researchers to use other techniques. A reasonable choice is non-gradient based method. Neural network is inspired by the characteristics of creatures. Therefore, the optimization techniques which are also resemble the patterns of life in nature will be appropriate. In this study, various scenarios on the three metaheuristic optimization methods were applied to get the best one. The proposed procedure was applied to the rainfall data. The experimental study showed that GA and PSO were recommended as optimization methods at FFNN model for the rainfall data.
Volume: 19
Issue: 6
Page: 1892-1901
Publish at: 2021-12-01

A performance evaluation of convolutional neural network architecture for classification of rice leaf disease

10.11591/ijai.v10.i4.pp1069-1078
Afis Julianto , Andi Sunyoto
Plant disease is a challenge in the agricultural sector, especially for rice production. Identifying diseases in rice leaves is the first step to wipe out and treat diseases to reduce crop failure. With the rapid development of the convolutional neural network (CNN), rice leaf disease can be recognized well without the help of an expert. In this research, the performance evaluation of CNN architecture will be carried out to analyze the classification of rice leaf disease images by classifying 5932 image data which are divided into 4 disease classes. The comparison of training data, validation, and testing are 60:20:20. Adam optimization with a learning rate of 0.0009 and softmax activation was used in this study. From the experimental results, the InceptionV3 and InceptionResnetV2 architectures got the best accuracy, namely 100%, ResNet50 and DenseNet201 got 99.83%, MobileNet 99.33%, and EfficientNetB3 90.14% accuracy.
Volume: 10
Issue: 4
Page: 1069-1078
Publish at: 2021-12-01

Proof of concept for lightweight PUF-based authentication protocol using NodeMCU ESP8266

10.11591/ijeecs.v24.i3.pp1392-1398
Mohd Syafiq Mispan , Aiman Zakwan Jidin , Muhammad Raihaan Kamaruddin , Haslinah Mohd Nasir
Wireless sensor node is the foundation for building the next generation of ubiquitous networks or the so-called internet of things (IoT). Each node is equipped with sensing, computing devices, and a radio transceiver. Each node is connected to other nodes via a wireless sensor network (WSN). Examples of WSN applications include health care monitoring, and industrial monitoring. These applications process sensitive data, which if disclosed, may lead to unwanted implications. Therefore, it is crucial to provide fundamental security services such as identification and authentication in WSN. Nevertheless, providing this security on WSN imposes a significant challenge as each node in WSN has a limited area and energy consumption. Therefore, in this study, we provide a proof of concept of a lightweight authentication protocol by using physical unclonable function (PUF) technology for resource-constrained wireless sensor nodes. The authentication protocol has been implemented on NodeMCU ESP8266 devices. A server-client protocol configuration has been used to verify the functionality of the authentication protocol. Our findings indicate that the protocol used approximately 7% of flash memory and 48% of static random-access memory (SRAM) in the sensor node during the authentication process. Hence, the proposed scheme is suitable to be used for resource-constrained IoT devices such as WSN.
Volume: 24
Issue: 3
Page: 1392-1398
Publish at: 2021-12-01

Developed security and privacy algorithms for cyber physical system

10.11591/ijece.v11i6.pp5379-5389
Dhuha Dheyaa Khudhur , Muayad Sadik Croock
Cyber-physical system (CPS) is a modern technology in the cyber world, and it integrates with wireless sensor network (WSN). This system is widely used in many applications such as a smart city, greenhouse, healthcare, and power grid. Therefore, the data security and integrity are necessary to ensure the highest level of protection and performance for such systems. In this paper, two sides security system for cyber-physical level is proposed to obtain security, privacy, and integrity. The first side is applied the secure sockets layer (SSL)/transport layer security (TLS) encryption protocol with the internet of things (IoT) based message queuing telemetry transport (MQTT) protocol to secure the connection and encrypt the data exchange between the system's parties. The second side proposes an algorithm to detect and prevent a denial of service (DoS) attack (hypertext transfer protocol (HTTP) post request) on a Web server. The experiment results show the superior performance of the proposed method to secure the CPS by detecting and preventing the cyber-attacks, which infect the Web servers. They also prove the implementation of security, privacy and integrity aspects on the CPS.
Volume: 11
Issue: 6
Page: 5379-5389
Publish at: 2021-12-01

SAFEA application design on determining the optimal order quantity of chicken eggs based on fuzzy logic

10.11591/ijai.v10.i4.pp858-871
Sesar Husen Santosa , Agung Prayudha Hidayat , Ridwan Siskandar
The availability of stock in the chicken egg supply chain is influenced by the ability of egg Agents to determine the optimal orders to suppliers. The optimal number of orders is very important to manage for the Bogor City Egg Agent Indonesia because the stock capacity reaches 340 crates. The optimal number of orders for eggs at the Egg Agent is influenced by input variables, namely final stock (crate), selling price (crate), and consumer demand (crate) so that the inventory is under control. The three input variables have fuzzy values that must be processed using fuzzy logic to get the optimal number of orders to suppliers so that the egg stock in the warehouse is well maintained. The optimal order model for eggs in the smart application for egg agent (SAFEA) was developed using a fuzzy logic approach with the triangular and trapezoidal membership function. Based on the optimal order model in the SAFEA application, the optimal order to the supplier is 100-104 crates per day.
Volume: 10
Issue: 4
Page: 858-871
Publish at: 2021-12-01

5G NOMA user grouping using discrete particle swarm optimization approach

10.12928/telkomnika.v19i6.18580
Hadhrami Ab.; Universiti Malaysia Kelantan Ghani , Farah Najwa; Multimedia University Roslim , Muhammad Akmal; Universiti Malaysia Kelantan Remli , Eissa Mohammed Mohsen; Universiti Malaysia Kelantan Al-Shari , Nurul Izrin Md; Universiti Malaysia Kelantan Saleh , Azizul; Universiti Teknologi Malaysia Azizan
Non-orthogonal multiple access (NOMA) technology meets the increasing demand for high-seed cellular networks such as 5G by offering more users to be accommodated at once in accessing the cellular and wireless network. Moreover, the current demand of cellular networks for enhanced user fairness, greater spectrum efficiency and improved sum capacity further increase the need for NOMA improvement. However, the incurred interference in implementing NOMA user grouping constitutes one of the major barriers in achieving high throughput in NOMA systems. Therefore, this paper presents a computationally lower user grouping approach based on discrete particle swarm intelligence in finding the best user-pairing for 5G NOMA networks and beyond. A discrete particle swarm optimization (DPSO) algorithm is designed and proposed as a promising scheme in performing the user-grouping mechanism. The performance of this proposed approach is measured and demonstrated to have comparable result against the existing state-of-the art approach.
Volume: 19
Issue: 6
Page: 1803-1810
Publish at: 2021-12-01

A review of various image fusion types and transforms

10.11591/ijeecs.v24.i3.pp1515-1522
Ayodeji Olalekan Salau , Shruti Jain , Joy Nnenna Eneh
Utilizing multiple views of an image is an important approach in digital photography, video editing, and medical image fusion applications. Image fusion (ImF) methods are used to improve an image's quality and remove noise from the image signal, resulting in a higher signal-to-noise ratio. A complete assessment of the literature on the different transform kinds, techniques, and rules utilized in ImF is presented in this paper. To assess the outcomes, a white flower image was fused using discrete wavelet transform (DWT) and discrete cosine transform (DCT) techniques. For validation of results, the red, green, blue (RGB) and intensity hue saturation (IHS) values of individual and fused images were evaluated. The results obtained from the fused images with the spatial IHS transform method give a remarkable performance. Furthermore, the results of the performance evaluation using DWT and DCT fusion techniques show that the same peak signal to noise ratio (PSNR) of 114.04 was achieved for both PSNR 1 and PSNR 2 for DCT, and different results were obtained for DWT. For signal to noise ratio (SNR), SNR 1 and SNR 2 achieved slightly similar values of 114.00 and 114.01 for DCT, while a SNR of 113.28 and 112.26 was achieved for SNR 1 and SNR 2 respectively.
Volume: 24
Issue: 3
Page: 1515-1522
Publish at: 2021-12-01
Show 882 of 1996

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration