Articles
68 Documents
Search results for
, issue
"Vol 20, No 1: October 2020"
:
68 Documents
clear
Symmetric-type dispersion maps in dispersion-managed optical link with mid-span spectral inversion
Jea-Pil Chung;
Seong-Real Lee
Indonesian Journal of Electrical Engineering and Computer Science Vol 20, No 1: October 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v20.i1.pp222-230
In long-haul optical communication systems consisting of single-mode fiber spans and fiber amplifiers, such as an erbium-doped fiber amplifier, signal distortion causes performance to deteriorate because of group velocity dispersion and fiber nonlinearity. A combination of dispersion management and optical phase conjugation is an effective technique of compensating for the distortion. In an optical link configured with this combination, the dispersion map mainly affects the compensation for the distorted optical signals. Improvements in system performance have been reported for various types of dispersion maps. In this study, a symmetric type of dispersion map with respect to the midway optical phase conjugator is proposed. The effect of the proposed dispersion maps on the compensation for the distorted 24 channel × 40 Gbps wavelength-division-multiplexed signals was assessed through numerical simulation. It was confirmed that antipodal-type dispersion maps are most appropriate for the compensation, as well as for the flexibility of the link configuration.
A computational forensic framework for detection of hidden applications on android
Tahira Rasul;
Rabia Latif;
Nor Shahida Mohd Jamail
Indonesian Journal of Electrical Engineering and Computer Science Vol 20, No 1: October 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v20.i1.pp353-360
Smartphones, since their emergence has become a significant part of our lives and Android is popular of all. They are successful due to the increasing availability of user applications to answer every possible need, so it is of great importance to ensure security and privacy when handling personal and sensitive information of the user. To secure the data on mobile devices, users use applications available on the Google Play store, which help to hide data on their devices known as Hidden Applications. Hidden applications are categorized as one of the major applications used for data hiding and storing. These applications can be used to hide date from snooping, intrusion and against the data theft. Therefore, the proposed framework in this research helps to find either they store and hide data in efficient manner or not and if they do so either it is encrypted or not. In this paper, main objective is to identify the privacy threats which end users face by using such applications, analyse these application’s behaviour, working, their code to understand how data is hidden and if the information is encrypted, it can be retrieved or not. The work not only focuses on the identification of hidden data/apps; it also provides a mechanism to recover and reconstruct the data from these hidden parts of the memory. In the end, present the results obtained by using the proposed framework in a case file so that it can be used in a criminal court case.
Transient analysis of systems exhibiting inverse response and their control with CSTR as a case study
Rohan Lakhani;
C. R. Srinivasan;
Srividya R
Indonesian Journal of Electrical Engineering and Computer Science Vol 20, No 1: October 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v20.i1.pp89-99
In this paper the phenomenon of inverse response from systems was investigated and its transient response thoroughly analyzed. Inverse response is shown by non-minimum phase systems and some minimum phase systems. Transient analysis of these systems is lacking in literature A case study was done for a non-linear, non-minimum phase CSTR (continuous stirred tank reactor), which was identified and a novel optimized trajectory for temperature feed was synthesized, which is a non-linear dynamic constrained optimization problem solved using ACADO for a particular chemical reaction. Different control schemes were also implemented on other systems as well, which exibhit inverse responses, including model reference adaptive control. The finding shows that PID-ZN goes with the inverse response, is unable to suppress it and requires large control effort which can have serious hardware limitations. Robustness is another area where PID is lacking with these systems. MRAC shemes were able to overcome all these issues. For CSTR also, these findings hold true thus points at using advance stratigies in process control industries for maximzing product yield.
Analysis on the behavior of line differential protective relaying with solar PV penetration
M. E. Yusoff;
H. Hashim
Indonesian Journal of Electrical Engineering and Computer Science Vol 20, No 1: October 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v20.i1.pp46-53
Power System Protection is very important in electrical power system as it minimizes power supply interruption to customers, and also prevents damages to electrical equipment. Lately, renewable energy (RE) penetration in power system helps to support and fulfil the increasing demand of electricity to customers. However, the contribution of power from RE such as solar photovoltaic (PV) will increase the fault level and lead to reverse power flow; thus, it will affect power system protection reliability. This paper focuses on evaluating the reliability of differential protection relay during steady state, internal and external faults conditions when the power system is without and with solar PV penetration. Steady state and three-phase symmetrical line fault will be simulated in IEEE 39 bus test system using power system simulation for engineering (PSS®E) software.
SMC based DTC-SVM control of five-phase permanent magnet synchronous motor drive
Fayçal Mehedi;
Rachid Taleb;
Abdelkadir Belhadj Djilali;
Adil Yahdou
Indonesian Journal of Electrical Engineering and Computer Science Vol 20, No 1: October 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v20.i1.pp100-108
This article presents an improved direct torque control (DTC) technique with space vector modulation (SVM) for a five-phase permanent magnet synchronous motor (PMSM) using a sliding mode speed control (SMC).The proposed control scheme of the five-phase PMSM combines the advantages of SMC control and the SVM algorithm. The SMC method insensitive to uncertainties, in particular external disturbances and parameter variations. In this paper, the SMC controller is used to control the rotor speed of the five-phase PMSM based on DTC-SVM. The rotor speed response, torque and stator flux are determined and compared with traditional control method. The simulations results confirm the validity and effectiveness of the proposed control technique in terms of performance and robustness against machine parameter variations (inertia variation). The efficiency of the proposed method applied on the five-phase PMSM is verified by the MATLAB/Simulink.
Multimodal access control system combining RFID, fingerprint and facial recognition
Mohamed El Beqqal;
Mostafa Azizi;
Jean Louis Lanet
Indonesian Journal of Electrical Engineering and Computer Science Vol 20, No 1: October 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v20.i1.pp405-413
Monomodal biometry does not constitute an effective measure to meet the desired performance requirements for large-scale applications, due to limita-tions such as noisy data, restricted degree of freedom and unacceptable error rates. Some of these problems can be solved through multimodal biometric systems that involve using a combination of two or more biometric modali-ties in a single identification system. Identification based on multiple biomet-rics represents an emerging trend. The reason for combining different modal-ities is to improve the recognition rate. In practice, multi-biometric aims to reduce the false acceptance ratio (FAR) and false rejection ratio (FRR) which are two standard metrics widely used in the accuracy of biometric sys-tems. In this paper, we will examine the different possible scenario in multi-modal biometric systems using RFID, fingerprint and facial recognition, that can be adopted to merge information and improve the overall accuracy of the system.
IMU sensor-based data glove for finger joint measurement
Muhammad Ajwad Wa’ie Hazman;
Ili Najaa Aimi Mohd Nordin;
Faridah Hanim Mohd Noh;
Nurulaqilla Khamis;
M. R. M. Razif;
Ahmad Athif Faudzi;
Asyikin Sasha Mohd Hanif
Indonesian Journal of Electrical Engineering and Computer Science Vol 20, No 1: October 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v20.i1.pp82-88
The methods used to quantify finger range of motion significantly influence how hand disability is reported. To date, the accuracy of sensors being utilized in data gloves from the literature has been ascertained yet need further analysis. This paper presents an inertial measurement unit sensor-based data glove for finger joint measurement developed for collecting a range of motion data of distal interphalangeal, proximal interphalangeal and metacarpophalangeal finger joints of an index finger. In this study, three inertial measurement sensors, MPU-6050 and two flexible bend sensors which are capable to detect angle displacement were attached to the distal interphalangeal, proximal interphalangeal and metacarpophalangeal finger joint points on the glove. The data taken from inertial measurement unit sensors and flexible bend sensors were acquired using Arduino and MATLAB software interface. The data obtained were compared with the reference data measured from goniometer to allow for accurate comparative measurement. The percentage of error resulted from MPU-6050 sensor unit were ranged from 0.81 % to 5.41 % were very low which indicates high accuracy when compared with the measurements obtained using goniometer. On the other hand, flexible bend sensor shows low accuracy (11.11 % to 19.35 % error). In conclusion, the inertial measurement unit sensor-based data glove using MPU-6050 sensors can be a reliable solution for tracking the progress of finger rehabilitation exercises. In order to motivate patients to adhere to the therapy exercises, interactive rehabilitation game will be developed in the future incorporating MPU-6050 sensors on all five fingers.
The impact of firewall on TCP and UDP throughput in an openflow software defined network
Mutaz Hamed Hussien Khairi;
Sharifah H. S. Ariffin;
N. M. Abdul Latiff;
Kamaludin Mohamad Yusof;
M. K. Hassan;
Mohammad Rava
Indonesian Journal of Electrical Engineering and Computer Science Vol 20, No 1: October 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v20.i1.pp256-263
Software defined networking (SDN) is an emerging networking paradigm that provides more flexibility and adaptability in terms of network definition and control. However, SDN is a logically centralized technology. Therefor the control plane (i.e. controller) scalability in SDN in particular, is also one of the problems that needs further focus. OpenFlow is one of the protocol standards in SDN, which allow the separation of the controller from the forwarding plane. The control plane has an SDN embedded firewall and is able to enforce and monitor the network activity. This firewall can be used to control the throughput. However, it may affect SDN performance. In this paper, throughput will be used as a performance metric to evaluate and assess the firewall impact on two protocols; transmission control protocol (TCP) and user datagram protocol (UDP) that passes through the forwarding planes. The evaluations have been verified through simulating the SDN OpenFlow network using MININET. The results show that an implementation of firewall module in SDN creates a significant 36% average drop for TCP and 87% average drop for UDP in the bandwidth which eventually affect the quality of the network and applications.
Factors influencing low intension detection rate in a non-invasive EEG-based brain computer interface system
Clifford Maswanganyi;
Chungling Tu;
Pius Owolawi;
Shengzhi Du
Indonesian Journal of Electrical Engineering and Computer Science Vol 20, No 1: October 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v20.i1.pp167-175
Motor imagery (MI) responses extracted from the brain in the form of EEG signals have been widely utilized for intention detection in brain computer interface (BCI) systems. However, due to the non-linearity and the non-stationarity of EEG signals, BCI systems suffer from low MI prediction rate with both known and unknown influncing factors. This paper investigates the impact of visual stimulus, feature dimensions and artifacts on MI task detection rate, towards improving MI prediction rate. Three EEG datasets were utilized to facilitate the investigation. Three filters (band-pass, notch and common average reference) and the independent component analysis (ICA) were applied on each datasets, to eliminate the impact of artifact. Three sets of features where extracted from artifact free ICA components, from which more relevant features were selected. Moreover, the selected feature subsets were incorporated into three classifiers, NB, Regression Tree and K-NN to predict four MI and hybrid tasks. K-NN classifier outperformed the other two classifies in each dataset. The highest classification accuracy is obtained in hybrid task EEG dataset. Moreover, accurately predicted EEG classes were applied to a robotic arm control.
Filtering and analyzing normal and abnormal electromyogram signals
S. Elouaham;
A. Dliou;
Mostafa Laaboubi;
R. Latif;
N. Elkamoun;
H. Zougagh
Indonesian Journal of Electrical Engineering and Computer Science Vol 20, No 1: October 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v20.i1.pp176-184
The electromyogram (EMG) is an important measurement to assess the health of muscles and the nerve cells that control them. The appearance of noise in electromyography (EMG) signals may unquestionably minimize the efficiency of the analysis of the signal. The denoising techniques are inevitable for minimizing noise affecting the EMG signals; these methods are complete ensemble empirical mode decompositions with adaptive noise (CEEMDAN) and the ensemble empirical mode decomposition (EEMD). After that, we analyze these signals by time-frequency techniques as Adaptive optimal kernel (AOK) and Choi-Williams. Firstly, the obtained results illustrate the effectiveness of the CEEMDAN that permits reducing noise that interferes with normal and abnormal EMG signals with higher resolution than other techniques used as EEMD. Secondly, they show that the AOK technique is adapted to the detection and classification of these types of normal and abnormal EMG signals by the good localization of the motor unit action potentials (MUAPs) in the time-frequency plan. This paper shows the efficiency of the combination of the AOK and CEEMDAN techniques in analyzing the EMG signals.