Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,922 Article Results

Design, simulation and testing of an array of nano electro mechanical switches (NEMS)

10.11591/ijeecs.v22.i1.pp113-120
Luay Mahdi , Qais Al-Gayem
Electro mechanical switches used for multi-purposs applications with ultra small size in nano meter scale, operating in very small voltage in millivolts, approximately zero leakage current due to air gap separation between electrodes with three terminals that easy to control it. Nano electro mechanical switches are electronic switches similar to those used by conventional semiconductor switches in application as they can be used as relays, logic devices. The basic principle of nano electro mechanical switches is electronic switches operation is fundamentally different from semiconductor switches. They have many advantages over conventional semiconductor switches such as low-power digital logic applications, ability to work with very small voltage signals for low dynamic energy consumption, and durability against hostile environments such as high temperatures and radiation contaminated spaces. In this article, we will design, implement, and test a matrix of nano electro mechanical switches by on line test using the superposition theory. The simulations of these switches were implemented using the MATLAB-Simulink and ORCAD Pspice environments. Also, controlling the flow of current was achieved by means of a nanometer movement to make or break the physical contact between the electrodes.
Volume: 22
Issue: 1
Page: 113-120
Publish at: 2021-04-01

Inactive power detection in AC network

10.11591/ijece.v11i2.pp966-974
Nickolay I. Schurov , Sergey V. Myatezh , Alexandr V. Myatezh , Boris V. Malozyomov , Alexandr A. Shtang
Using the examples of wave and vector diagrams, we study the conditions for the appearance of components of inactive power in an AC network, which are known as reactive power and distortion power. It is shown that the components of the active, reactive power and distortion power are mutually orthogonal and form a power balance, which can be violated mainly due to methodological errors in calculating these components under conditions of non-stationary mode parameters. It is established that the interaction of reactive power and distortion power occurs at the instantaneous power level, and changing their phase shifts allows you to adjust the shape of the resulting power without involving additional active power in the AC network. The results obtained will allow not only to correctly determine the proportion and nature of the components of inactive capacities, which is valuable for solving the problems of optimizing modes in AC networks, but also to create effective technical means of compensating for the identified inactive capacities in the future.
Volume: 11
Issue: 2
Page: 966-974
Publish at: 2021-04-01

The effect of silica content to partial discharge characteristic of low-density polyethene and natural rubber blend as the electrical insulator

10.12928/telkomnika.v19i2.16417
Aulia; Universitas Andalas Aulia , Eka Putra; Universitas Andalas Waldi , Darwison; Universitas Andalas Darwison , Dwi; Balai Teknologi Polimer BPPT Serpong Gustiono , Novizon; Universitas Andalas Novizon , M. Heru; Universitas Andalas Setiawan , M. A.; Universiti Teknologi Malaysia Hafizi
The dielectric properties of low-density polyethylene natural rubber (LDPE-NR) biopolymeric insulating materials can be improved by adding the silica nanoparticles in a certain percentage of weight (w%). In the present study, four types of bio-nano polymeric samples were prepared. To each sample, the nanosilica particles with wt% 1.5%, 3%, 4.5% and 6%. As one characteristic of dielectric, the partial discharge (PD) characteristics, each sample has been tested for 1 hour under AC high voltage field, and the pulses were counted for each sample and grouped into positive and negative pulses. The PD pattern was also plotted based on X-Y axes, namely Φ-q-n pattern. It was found that the number of positive and negative partial discharge (PD) pulses for each silica sample after 60 minutes of testing varied for all samples. It is also found that samples with a higher percentage of nanosilica had fewer PD pulses. The PD pattern in lower w% of silica was identified in the 90 degrees mostly in containing This indicates that w% of nanosilica particles can improve the PD resistance or the insulation quality of LDPE-NR insulation materials.
Volume: 19
Issue: 2
Page: 631-637
Publish at: 2021-04-01

Adopting explicit and implicit social relations by SVD++ for recommendation system improvement

10.12928/telkomnika.v19i2.18149
Mohsin Hasan; University of Kerbala Hussein , Akeel Abdulkareem; University of Kerbala Alsakaa , Haydar A.; University of Kerbala Marhoon
Recommender systems suffer a set of drawbacks such as sparsity. Social relations provide a useful source to overcome the sparsity problem. Previous studies have utilized social relations or rating feedback sources. However, they ignored integrating these sources. In this paper, the limitations of previous studies are overcome by exploiting four sources of information, namely: explicit social relationships, implicit social relationships, users’ ratings, and implicit feedback information. Firstly, implicit social relationships are extracted through the source allocation index algorithm to establish new relations among users. Secondly, the similarity method is applied to find the similarity between each pair of users who have explicit or implicit social relations. Then, users’ ratings and implicit rating feedback sources are extracted via a user-item matrix. Furthermore, all sources are integrated into the singular value decomposition plus (SVD++) method. Finally, missing predictions are computed. The proposed method is implemented on three real-world datasets: Last.Fm, FilmTrust, and Ciao. Experimental results reveal that the proposed model is superior to other studies such as SVD, SVD++, EU-SVD++, SocReg, and EISR in terms of accuracy, where the improvement of the proposed method is about 0.03% for MAE and 0.01% for RMSE when dimension value (d) = 10.
Volume: 19
Issue: 2
Page: 471-478
Publish at: 2021-04-01

Monitoring of solenoid parameters based on neural networks and optical fiber squeezer for solenoid valves diagnosis

10.11591/ijece.v11i2.pp1697-1708
Abdallah Zahidi , Said Amrane , Nawfel Azami , Naoual Nasser
As crucial parts of various engineering systems, solenoid valves (SVs) operated by electromagnetic solenoid (EMS) are of great importance and their failure may lead to cause unexpected casualties. This failure, characterized by a degradation of the performances of the SVs, could be due to a fluctuations in the EMS parameters. These fluctuations are essentially attributed to the changes in the spring constant, coefficient of friction, inductance, and the resistance of the coil. Preventive maintenance by controlling and monitoring these parameters is necessary to avoid eventual failure of these actuators. The authors propose a new methodology for the functional diagnosis of electromagnetic solenoids (EMS) used in hydraulic systems. The proposed method monitors online the electrical and mechanical parameters varying over time by using artificial neural networks algorithm coupled with an optical fiber polarization squeezer based on EMS for polarization scrambling. First, the MATLAB/Simulink model is proposed to analyze the effect of the parameters on the dynamic EMS model. The result of this simulation is used for training the neural network, then a simulation is proposed using the neural net fitting toolbox to determine the solenoid parameters (Resistance of the coil R, stiffness K and coefficient of friction B of the spring) from the coefficients of the transfer function, established from the model step response. Future work will include not only diagnosing failure modes, but also predicting the remaining life based on the results of monitoring.
Volume: 11
Issue: 2
Page: 1697-1708
Publish at: 2021-04-01

Designing consensus algorithm for collaborative signature-based intrusion detection system

10.11591/ijeecs.v22.i1.pp485-496
Eko Arip Winanto , Mohd Yazid Idris , Deris Stiawan , Mohammad Sulkhan Nurfatih
Signature-based collaborative intrusion detection system (CIDS) is highly depends on the reliability of nodes to provide IDS attack signatures. Each node in the network is responsible to provide new attack signature to be shared with other node. There are two problems exist in CIDS highlighted in this paper, first is to provide data consistency and second is to maintain trust among the nodes while sharing the attack signatures. Recently, researcher find that blockchain has a great potential to solve those problems. Consensus algorithm in blockchain is able to increase trusts among the node and allows data to be inserted from a single source of truth. In this paper, we are investigating three blockchain consensus algorithms: proof of work (PoW), proof of stake (PoS), and hybrid PoW-PoS chain-based consensus algorithm which are possibly to be implemented in CIDS. Finally, we design an extension of hybrid PoW-PoS chain-based consensus algorithm to fulfill the requirement. This extension we name it as proof of attack signature (PoAS).
Volume: 22
Issue: 1
Page: 485-496
Publish at: 2021-04-01

The convolutional neural networks for Amazigh speech recognition system

10.12928/telkomnika.v19i2.16793
Meryam; Moulay Ismail University Telmem , Youssef; Moulay Ismail University Ghanou
In this paper, we present an approach based on convolutional neural networks to build an automatic speech recognition system for the Amazigh language. This system is built with TensorFlow and uses mel frequency cepstral coefficient (MFCC) to extract features. In order to test the effect of the speaker's gender and age on the accuracy of the model, the system was trained and tested on several datasets. The first experiment the dataset consists of 9240 audio files. The second experiment the dataset consists of 9240 audio files distributed between females and males’ speakers. The last experiment 3 the dataset consists of 13860 audio files distributed between age 9-15, age 16-30, and age 30+. The result shows that the model trained on a dataset of adult speaker’s age +30 categories generates the best accuracy with 93.9%.
Volume: 19
Issue: 2
Page: 515-522
Publish at: 2021-04-01

DEDA: An algorithm for early detection of topology attacks in the internet of things

10.11591/ijece.v11i2.pp1761-1770
Jalindar Karande , Sarang Joshi
The internet of things (IoT) is used in domestic, industrial as well as mission-critical systems including homes, transports, power plants, industrial manufacturing and health-care applications. Security of data generated by such systems and IoT systems itself is very critical in such applications. Early detection of any attack targeting IoT system is necessary to minimize the damage. This paper reviews security attack detection methods for IoT Infrastructure presented in the state-of-the-art. One of the major entry points for attacks in IoT system is topology exploitation. This paper proposes a distributed algorithm for early detection of such attacks with the help of predictive descriptor tables. This paper also presents feature selection from topology control packet fields. The performance of the proposed algorithm is evaluated using an extensive simulation carried out in OMNeT++. Performance parameter includes accuracy and time required for detection. Simulation results presented in this paper show that the proposed algorithm is effective in detecting attacks ahead in time.
Volume: 11
Issue: 2
Page: 1761-1770
Publish at: 2021-04-01

Distributed optimal congestion control and channel assignment in wireless mesh networks

10.12928/telkomnika.v19i2.16135
D. Jasmine; Karunya Institute of Technology and Sciences David , V.; Karunya Institute of Technology and Sciences Jegathesan , T. Jemima; Karunya Institute of Technology and Sciences Jebaseeli
Wireless mesh networks have numerous advantages in terms of connectivity as well as reliability. Traditionally the nodes in wireless mesh networks are equipped with single radio, but the limitations are lower throughput and limited use of the available wireless channel. In order to overcome this, the recent advances in wireless mesh networks are based on multi-channel multi-radio approach. Channel assignment is a technique that selects the best channel for a node or to the entire network just to increase the network capacity. To maximize the throughput and the capacity of the network, multiple channels with multiple radios were introduced in these networks. In the proposed system, algorithms are developed to improve throughput, minimise delay, reduce average energy consumption and increase the residual energy for multi radio multi-channel wireless mesh networks. In literature, the existing channel assignment algorithms fail to consider both interflow and intra flow interferences. The limitations are inaccurate bandwidth estimation, throughput degradation under heavy traffic and unwanted energy consumption during low traffic and increase in delay. In order to improve the performance of the network distributed optimal congestion control and channel assignment algorithm (DOCCA) is proposed. In this algorithm, if congestion is identified, the information is given to previous node. According to the congestion level, the node adjusts itself to minimise congestion.
Volume: 19
Issue: 2
Page: 414-420
Publish at: 2021-04-01

Adaptive gender-based thermal control system

10.11591/ijece.v11i2.pp1200-1207
Jamal I. Al-Nabulsi , Bashar E. A. Badr
A closed loop adaptive gender-based thermal control system (AG-TCS) is designed, modelled, analysed and tested. The system has the unique feature of adapting to the surrounding environment as a function of the number of humans present and the gender ratio. The operation of the system depends on a unique interface between a radio frequency identification (RFID) device and an imaging device, both of which are correlated and interfaced to a controller. Testing of the system resulted in smooth transition and shape conversion of the response curve, which proved its adaptability. Three mathematical equations describing the internal mechanisms of the AG-TCS are presented and have been proven to optimally reflect the original statistical data covering both genders.
Volume: 11
Issue: 2
Page: 1200-1207
Publish at: 2021-04-01

Evaluation comparison of wave amount measurement results in brass-plated tire steel cord using RMSE and cosine similarity

10.11591/ijeecs.v22.i1.pp207-214
April Lia Hananto , Sarina Sulaiman , Sigit Widiyanto , Aviv Yuniar Rahman
In the production process, quality checking is very important, one of which is on the wire. In the process of making brass-coated steel tire straps sometimes produce quality goods not in accordance with the desired standard values. Checks that are carried out manually have low efficiency and quite high errors occur. So it is necessary to check by measuring the wavelength on the brass plated steel cord automatically. In this study, used 3 automatic measurement methods using 2 evaluations, namely RMSE and Cosine Similarity. The results showed the best measurement using RMSE with method 2. Whereas the worst method uses RMSE with method 1. The smallest RMSE value is 0.0098 and the largest RMSE is 0.0966. The lowest Cosine Similarity value is 0.1253, while the highest Cosine Similarity value is 0.2079.
Volume: 22
Issue: 1
Page: 207-214
Publish at: 2021-04-01

An ensemble based approach for effective intrusion detection using majority voting

10.12928/telkomnika.v19i2.18325
Alwi M.; Umm Al-Qura University Bamhdi , Iram; University of Kashmir Abrar , Faheem; University of Kashmir Masoodi
Of late, Network Security Research is taking center stage given the vulnerability of computing ecosystem with networking systems increasingly falling to hackers. On the network security canvas, Intrusion detection system (IDS) is an essential tool used for timely detection of cyber-attacks. A designated set of reliable safety has been put in place to check any severe damage to the network and the user base. Machine learning (ML) is being frequently used to detect intrusion owing to their understanding of intrusion detection systems in minimizing security threats. However, several single classifiers have their limitation and pose challenges to the development of effective IDS. In this backdrop, an ensemble approach has been proposed in current work to tackle the issues of single classifiers and accordingly, a highly scalable and constructive majority voting-based ensemble model was proposed which can be employed in real-time for successfully scrutinizing the network traffic to proactively warn about the possibility of attacks. By taking into consideration the properties of existing machine learning algorithms, an effective model was developed and accordingly, an accuracy of 99%, 97.2%, 97.2%, and 93.2% were obtained for DoS, Probe, R2L, and U2R attacks and thus, the proposed model is effective for identifying intrusion.
Volume: 19
Issue: 2
Page: 664-671
Publish at: 2021-04-01

Comparative analysis on different software piracy prevention techniques

10.11591/ijict.v10i1.pp1-8
Ahmad Mohammad Hassan , Ayuba John
Numerous type of software piracy known today, have several prevention techniques which has been established against them. Although, different software piracy techniques have been established, but the choice of which one should be the best to develop any software is the challenge for most software developers. Consequently, example of the types of piracy in software development can be categorise as follows: cracks and serials, softlifting and hard disk loading, internet piracy and software forging, mischaneling, reverse engineering, and tampering. We have several types of prevention techniques which aimed to resolved piracy in software development, although the methods have been wrecked. In this work a critical analysis has been carryout on different software piracy techniques and a simple model software was designed using the best technique to validate the results of the analysis.
Volume: 10
Issue: 1
Page: 1-8
Publish at: 2021-04-01

Earprint recognition using deep learning technique

10.12928/telkomnika.v19i2.16572
Arwa H. Salih; Northern Technical University Mosul Hamdany , Aseel Thamar; Northern Technical University Mosul Ebrahem , Ahmed M.; University of Mosul Alkababji
Earprint has interestingly been considered for recognition systems. It refers to the shape of ear, where each person has a unique shape of earprint. It is a strong biometric pattern and it can effectively be used for authentications. In this paper, an efficient deep learning (DL) model for earprint recognition is designed. This model is named the deep earprint learning (DEL). It is a deep network that carefully designed for segmented and normalized ear patterns. IIT Delhi ear database (IITDED) version 1.0 has been exploited in this study. The best obtaining accuracy of 94% is recorded for the proposed DEL.
Volume: 19
Issue: 2
Page: 432-437
Publish at: 2021-04-01

Detection of citrus leaf diseases using a deep learning technique

10.11591/ijece.v11i2.pp1719-1727
Ahmed R. Luaibi , Tariq M. Salman , Abbas Hussein Miry
The food security major threats are the diseases affected in plants such as citrus so that the identification in an earlier time is very important. Convenient malady recognition can assist the client with responding immediately and sketch for some guarded activities. This recognition can be completed without a human by utilizing plant leaf pictures. There are many methods employed for the classification and detection in machine learning (ML) models, but the combination of increasing advances in computer vision appears the deep learning (DL) area research to achieve a great potential in terms of increasing accuracy. In this paper, two ways of conventional neural networks are used named Alex Net and Res Net models with and without data augmentation involves the process of creating new data points by manipulating the original data. This process increases the number of training images in DL without the need to add new photos, it will appropriate in the case of small datasets. A self-dataset of 200 images of diseases and healthy citrus leaves are collected. The trained models with data augmentation give the best results with 95.83% and 97.92% for Res Net and Alex Net respectively.
Volume: 11
Issue: 2
Page: 1719-1727
Publish at: 2021-04-01
Show 988 of 1995

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration