Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,939 Article Results

Dynamic power allocation and scheduling for MIMO RF energy harvesting wireless sensor platforms

10.12928/telkomnika.v19i5.20413
Amar; International Islamic University Malaysia Esse , Khaizuran; International Islamic University Malaysia Abdullah , Mohamed Hadi; International Islamic University Malaysia Habaebi , Huda Adibah Mohd; International Islamic University Malaysia Ramli , Ani Liza; International Islamic University Malaysia Asnawi , Md. Rafiqul; International Islamic University Malaysia Islam
Radio frequency (RF) energy harvesting systems are enabling new evolution towards charging low energy wireless devices, especially wireless sensor networks (WSN). This evolution is sparked by the development of low-energy micro-controller units (MCU). This article presents a practical multiple input multiple output (MIMO) RF energy-harvesting platform for WSN. The RF energy is sourced from a dedicated access point (AP). The sensor node is equipped with multiple antennas with diverse frequency responses. Moreover, the platform allows for simultaneous information and energy transfer without sacrificing system duplexity, unlike time-switching RF harvesting systems where data is transmitted only for a portion of the total transmission duty cycle, or power-splitting systems where the power difference between the information signal (IS) and energy signal (ES) is neglected. The proposed platform addresses the gap between those two. Furthermore, system simulation and two energy scheduling methods between AP and sensor node (SN) are presented, namely, Continuous power stream (CPS) and intermittent power stream (IPS).
Volume: 19
Issue: 5
Page: 1466-1474
Publish at: 2021-10-01

Analysis and design of the biasing network for 1 GHz bandwidth RF power amplifier

10.11591/ijeecs.v24.i1.pp308-316
Md. Golam Sadeque , Zubaida Yusoff , Mardeni Roslee , Shaiful Jahari Hashim , Azah Syafiah Mohd Marzuki
The bandwidth of the wireless communication has increased due to the various applications of the wireless devices. A radio frequency power amplifier (RFPA) is one of the crucial components of the transceiver. So, to meet the requirement of the bandwidth, wideband RFPA is needed. The RFPA not only requires a wideband matching network but importantly the biasing network. For the next-generation communication system, a wideband biasing network is needed to operate in the wide GHz bandwidth range. In this paper, a wideband biasing network for the power amplifier is designed using a quarter-wave transmission line and a butterfly stub for the frequency band of 3.3 GHz to 4.3 GHz. Roger’s RO3006 is used as the substrate for the design of the biasing network. The designed network performed well in the required frequency range. The performances of the biasing network have shown 9 dB to 19 dB return loss, the radio frequency (RF) isolation has more than 35 dB, and 0 dB to 1.5 dB insertion loss. This wideband biasing network can be used for the next generation communication system.
Volume: 24
Issue: 1
Page: 308-316
Publish at: 2021-10-01

Improvement on KNN using genetic algorithm and combined feature extraction to identify COVID-19 sufferers based on CT scan image

10.12928/telkomnika.v19i5.18535
Radityo Adi; Lambung Mangkurat University Nugroho , Arie Sapta; Lambung Mangkurat University Nugraha , Aylwin Al; Lambung Mangkurat University Rasyid , Fenny Winda; Lambung Mangkurat University Rahayu
Coronavirus disease 2019 (COVID-19) has spread throughout the world. The detection of this disease is usually carried out using the reverse transcriptase polymerase chain reaction (RT-PCR) swab test. However, limited resources became an obstacle to carrying out the massive test. To solve this problem, computerized tomography (CT) scan images are used as one of the solutions to detect the sufferer. This technique has been used by researchers but mostly using classifiers that required high resources, such as convolutional neural network (CNN). In this study, we proposed a way to classify the CT scan images by using the more efficient classifier, k-nearest neighbors (KNN), for images that are processed using a combination of these feature extraction methods, Haralick, histogram, and local binary pattern. Genetic algorithm is also used for feature selection. The results showed that the proposed method was able to improve KNN performance, with the best accuracy of 93.30% for the combination of Haralick and local binary pattern feature extraction, and the best area under the curve (AUC) for the combination of Haralick, histogram, and local binary pattern with a value of 0.948. The best accuracy of our models also outperforms CNN by a 4.3% margin.
Volume: 19
Issue: 5
Page: 1581-1587
Publish at: 2021-10-01

MQTT-PRESENT: Approach to secure internet of things applications using MQTT protocol

10.11591/ijece.v11i5.pp4577-4586
Imane Sahmi , Abderrahim Abdellaoui , Tomader Mazri , Nabil Hmina
The big challenge to raise for deploying the application's domain of the Internet of Things is security. As one of the popular messaging protocols in the IoT world, the message queue telemetry transport (MQTT) is designed for constrained devices and machine-to-machine communications, based on the publish-subscribe model, it offers a basic authentication using username and password. However, this authentication method might have a problem in terms of security and scalability. In this paper, we provide an analysis of the current research in the literature related to the security for the MQTT protocol, before we give a brief description of each algorithm used on our approach, to finally propose a new approach to secure this protocol based on AugPAKE algorithm and PRESENT encryption. This solution provides mutual authentication between the broker and their clients (publishers and subscribers), the confidentiality of the published message is protected twice, the integrity and non-repudiation of MQTT messages which is protected during the process of transmission.
Volume: 11
Issue: 5
Page: 4577-4586
Publish at: 2021-10-01

Blockchain based voting system for Jordan parliament elections

10.11591/ijece.v11i5.pp4325-4335
Mohammad Malkawi , Muneer Bani Yassein , Asmaa Bataineh
Covid-19 pandemic has stressed more than any-time before the necessity for conducting election processes in an electronic manner, where voters can cast their votes remotely with complete security, privacy, and trust. The different voting schema in different countries makes it very difficult to utilize a one fits all system. This paper presents a blockchain based voting system (BBVS) applied to the Parliamentary elections system in the country of Jordan. The proposed system is a private and centralized blockchain implemented in a simulated environment. The proposed BBVS system implements a hierarchical voting process, where a voter casts votes at two levels, one for a group, and the second for distinct members within the group. This paper provides a novel blockchain based e-Voting system, which proves to be transparent and yet secure. This paper utilizes synthetic voter benchmarks to measure the performance, accuracy and integrity of the election process. This research introduced and implemented new algorithms and methods to maintain acceptable performance both at the time of creating the blockchain(s) for voters and candidates as well as at the time of casting votes by voters.
Volume: 11
Issue: 5
Page: 4325-4335
Publish at: 2021-10-01

Online multiclass EEG feature extraction and recognition using modified convolutional neural network method

10.11591/ijece.v11i5.pp4016-4026
Haider Abdulkarim , Mohammed Z. Al-Faiz
Many techniques have been introduced to improve both brain-computer interface (BCI) steps: feature extraction and classification. One of the emerging trends in this field is the implementation of deep learning algorithms. There is a limited number of studies that investigated the application of deep learning techniques in electroencephalography (EEG) feature extraction and classification. This work is intended to apply deep learning for both stages: feature extraction and classification. This paper proposes a modified convolutional neural network (CNN) feature extractorclassifier algorithm to recognize four different EEG motor imagery (MI). In addition, a four-class linear discriminant analysis (LDR) classifier model was built and compared to the proposed CNN model. The paper showed very good results with 92.8% accuracy for one EEG four-class MI set and 85.7% for another set. The results showed that the proposed CNN model outperforms multi-class linear discriminant analysis with an accuracy increase of 28.6% and 17.9% for both MI sets, respectively. Moreover, it has been shown that majority voting for five repetitions introduced an accuracy advantage of 15% and 17.2% for both EEG sets, compared with single trials. This confirms that increasing the number of trials for the same MI gesture improves the recognition accuracy
Volume: 11
Issue: 5
Page: 4016-4026
Publish at: 2021-10-01

Mixed Hill Cipher methods with triple pass protocol methods

10.11591/ijece.v11i5.pp4449-4457
Liqaa Saadi Mezher , Ayam Mohsen Abbass
Hill Cipher is a reimbursement coding system that converts specific textual content codes into numbers and does no longer exchange the location of fixed symbols. The symbol modifications simplest in step with the English letter table inclusive of (26) characters handiest. An encoded Hill Cipher algorithm was used that multiplication the square matrix of the apparent text with a non-public key and then combined it with the Triple Pass Protocol method used to repeat the encryption three times without relying on a personal key. Also, you could decode the code and go back it to the express textual content. The cause of mixing algorithms is to cozy the message without any key change among the sender and the recipient.
Volume: 11
Issue: 5
Page: 4449-4457
Publish at: 2021-10-01

Spatial information of fuzzy clustering based mean best artificial bee colony algorithm for phantom brain image segmentation

10.11591/ijece.v11i5.pp4050-4058
Waleed Alomoush , Ayat Alrosan , Ammar Almomani , Khalid Alissa , Osama A. Khashan , Ahmad Al-nawasrah
Fuzzy c-means algorithm (FCM) is among the most commonly used in the medical image segmentation process. Nevertheless, the traditional FCM clustering approach has been several weaknesses such as noise sensitivity and stuck in local optimum, due to FCM hasn’t able to consider the information of contextual. To solve FCM problems, this paper presented spatial information of fuzzy clustering-based mean best artificial bee colony algorithm, which is called SFCM-MeanABC. This proposed approach is used contextual information in the spatial fuzzy clustering algorithm to reduce sensitivity to noise and its used MeanABC capability of balancing between exploration and exploitation that is explore the positive and negative directions in search space to find the best solutions, which leads to avoiding stuck in a local optimum. The experiments are carried out on two kinds of brain images the Phantom MRI brain image with a different level of noise and simulated image. The performance of the SFCM-MeanABC approach shows promising results compared with SFCM-ABC and other stats of the arts.
Volume: 11
Issue: 5
Page: 4050-4058
Publish at: 2021-10-01

Artificial neural network technique for improving prediction of credit card default: A stacked sparse autoencoder approach

10.11591/ijece.v11i5.pp4392-4402
Sarah A. Ebiaredoh-Mienye , E. Esenogho , Theo G. Swart
Presently, the use of a credit card has become an integral part of contemporary banking and financial system. Predicting potential credit card defaulters or debtors is a crucial business opportunity for financial institutions. For now, some machine learning methods have been applied to achieve this task. However, with the dynamic and imbalanced nature of credit card default data, it is challenging for classical machine learning algorithms to proffer robust models with optimal performance. Research has shown that the performance of machine learning algorithms can be significantly improved when provided with optimal features. In this paper, we propose an unsupervised feature learning method to improve the performance of various classifiers using a stacked sparse autoencoder (SSAE). The SSAE was optimized to achieve improved performance. The proposed SSAE learned excellent feature representations that were used to train the classifiers. The performance of the proposed approach is compared with an instance where the classifiers were trained using the raw data. Also, a comparison is made with previous scholarly works, and the proposed approach showed superior performance over other methods.
Volume: 11
Issue: 5
Page: 4392-4402
Publish at: 2021-10-01

Efficient hardware prototype of ECDSA modules for blockchain applications

10.12928/telkomnika.v19i5.19416
Devika; Amrita Vishwa Vidyapeetham K N , Ramesh; Amrita Vishwa Vidyapeetham Bhakthavatchalu
This paper concentrates on the hardware implementation of efficient and re- configurable elliptic curve digital signature algorithm (ECDSA) that is suitable for verifying transactions in Blockchain related applications. Despite ECDSA architecture being computationally expensive, the usage of a dedicated stand-alone circuit enables speedy execution of arithmetic operations. The prototype put forth supports N-bit elliptic curve cryptography (ECC) group operations, signature generation and verification over a prime field for any elliptic curve. The research proposes new hardware framework for modular multiplication and modular multiplicative inverse which is adopted for group operations involved in ECDSA. Every hardware design offered are simulated using modelsim register transfer logic (RTL) simulator. Field programmable gate array (FPGA) implementation of var- ious modules within ECDSA circuit is compared with equivalent existing techniques that is both hardware and software based to highlight the superiority of the suggested work. The results showcased prove that the designs implemented are both area and speed efficient with faster execution and less resource utilization while maintaining the same level of security. The suggested ECDSA structure could replace the software equivalent of digital signatures in hardware blockchain to thwart software attacks and to provide better data protection.
Volume: 19
Issue: 5
Page: 1636-1647
Publish at: 2021-10-01

Analysis of IPv6 jumbogram packages transmission using jumbo frame in mikrotik-based tunneling

10.11591/ijeecs.v24.i1.pp329-337
Yahya Hidayatullah , Arief Marwanto , Imam Much Ibnu Subroto
The validation and accuracy of internet protocol version 6 (IPv6) performance using jumbo frames is still not perfect, due to peer-to-peer connections testing within the same operating system and between operating systems. Therefore, inaccurate data test results. To mitigated, testing with a wider platform is recommended, a medium-scale network connection is proposed such as metropolitan area networks. In this works, a connection between computer devices connected by three proxy routers are made, with different IPv6 segments on each port. Then each computer device sends traffic data to each other using a traffic-generator application. The first test through three routers without tunnel connection is carried out as the first scenario to compare performance with tunnel-based testing. Three parameters have been used in this test, such as maximum transfer unit (MTU) 1500 bytes, MTU 400 bytes and MTU 9000 bytes. The results of the tests conducted show that the use of jumbo frames using a proxy is less effective, even though it produces a larger throughput when using the MTU 4000, but there is fragmentation in the packet passing through the proxy because the packet passing through the proxy is split into 1500 byte sizes.
Volume: 24
Issue: 1
Page: 329-337
Publish at: 2021-10-01

Rule-based lip-syncing algorithm for virtual character in voice chatbot

10.12928/telkomnika.v19i5.19824
Felicia Priscilla; Universitas Multimedia Nusantara Lovely , Arya; Universitas Multimedia Nusantara Wicaksana
Virtual characters changed the way we interact with computers. The underlying key for a believable virtual character is accurate synchronization between the visual (lip movements) and the audio (speech) in real-time. This work develops a 3D model for the virtual character and implements the rule-based lip-syncing algorithm for the virtual character's lip movements. We use the Jacob voice chatbot as the platform for the design and implementation of the virtual character. Thus, audio-driven articulation and manual mapping methods are considered suitable for real-time applications such as Jacob. We evaluate the proposed virtual character using hedonic motivation system adoption model (HMSAM) with 70 users. The HMSAM results for the behavioral intention to use is 91.74%, and the immersion is 72.95%. The average score for all aspects of the HMSAM is 85.50%. The rule-based lip-syncing algorithm accurately synchronizes the lip movements with the Jacob voice chatbot's speech in real-time.
Volume: 19
Issue: 5
Page: 1517-1528
Publish at: 2021-10-01

Performance evaluation of a new 3D printed dry-contact electrode for EEG signals measurement

10.11591/ijeecs.v24.i1.pp287-294
Aaisha Diaa-Aldeen Abdullah , Auns Q. Al-Neami
Traditional wet silver/silver chloride electrodes are used to record electroencephalography (EEG) signals mainly because of their potential repeatability, excellent signal to noise ratio and biocompatibility. This type of electrode is only suitable for conductive glue, which can irritate the skin and cause injury. In addition, as time goes the conductive gel will be dehydrated so the quality of the EEG signal will decrease. To overcome these problems, 3D printed dry-contact electrodes with multi-pins are designed in this work to measure brain signals without prior preparation or gel application. 3D printed electrodes are made from polylactic acids polymer and coated with suitable materials to enhance the conductivity. Electrode-scalp impedance on human was also measured. To evaluate the dry-contact electrode, EEG measurement are performed in subjects and compared with EEG signals acquired by wet electrode by using linear correlation coefficient. Experimentally results showed that the average electrode-skin impedance change of dry electrode in frontal site (9.42-7.25KΩ) and in occipital site (9.56-8.66KΩ). The correlation coefficient between dry and wet electrodes in frontal site (91.4%) and in occipital site (80%). To conclude, the 3D printed dry-contact electrode can be will promising applied on hairy site and provide a promising solutions for long-term monitoring EEG.
Volume: 24
Issue: 1
Page: 287-294
Publish at: 2021-10-01

Improvement security in e-business systems using hybrid algorithm

10.12928/telkomnika.v19i5.20403
L.; Universitas Musamus Sumaryanti , Dedy Hidayat; Politeknik Negeri Bayuwangi Kusuma , Rosmala; Universitas Musamus Widijastuti , Muhammad Najibulloh; Universitas Nusantara PGRI Kediri Muzaki
E-business security becomes an important issue in the development of technology, to ensure the safety and comfort of transactions in the exchange of information is privacy. This study aims to improve security in e-business systems using a hybrid algorithm that combines two types of keys, namely symmetric and asymmetric keys. Encryption and decryption of messages or information carried by a symmetric key using the simple symmetric key algorithm and asymmetric keys using the Rivest Shamir Adleman (RSA) algorithm. The proposed hybrid algorithm requires a high running time in the decryption process compared to the application of a single algorithm. The level of security is stronger because it implements the process of message encryption techniques with two types of keys simultaneously.
Volume: 19
Issue: 5
Page: 1535-1543
Publish at: 2021-10-01

The study of convex-dual-layer remote phosphor geometry in upgrading WLEDs color rendering index

10.11591/ijece.v11i5.pp3890-3896
Huu Phuc Dang , Nguyen Thi Phuong Loan , Nguyen Thi Kim Chung , Nguyen Doan Quoc Anh
The white-light light-emitting diode (LED) is a semiconductor light source that usually has one chip and one phosphor layer. Because of that simple structure, the color rendering index (CRI) is really poor. Therefore, structure with double layer of phosphor and multiple chips has been studied with the phosphorus proportions and densities in the silicone are constantly changed to find the best option to improve optical properties. In research, we use red phosphor Ca5B2SiO10:Eu3+ layer to place above the yellow phosphor one, and both of them have a convex design. Then, the experiments and measurements are carried out to figure out the effects of this red phosphor as well as the convex-double-layer remote phosphor design on the LED’s performances. The measured results reveal that the light output is enhanced significantly when using convex-dual-layer structure instead of the single-layer design. Additionally, the Ca5B2SiO10:Eu3+ concentration benefits CRI and CQS at around 6600 K and 7700 K correlated color temperature (CCT). Yet, the lumen output shows a slight decline as this red phosphor concentration surpass 26% wt. Through the experiments, it is found that a double layer of chip and double phosphorus is the best structure which could support the quality of CRI and luminous flux.
Volume: 11
Issue: 5
Page: 3890-3896
Publish at: 2021-10-01
Show 908 of 1996

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration