Articles
66 Documents
Search results for
, issue
"Vol 24, No 1: October 2021"
:
66 Documents
clear
Method for improving ripple reduction during phase shedding in multiphase buck converters for SCADA systems
Mini P. Varghese;
A. Manjunatha;
T. V. Snehaprabha
Indonesian Journal of Electrical Engineering and Computer Science Vol 24, No 1: October 2021
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v24.i1.pp29-36
In the current digital environment, central processing unit (CPUs), field programmable gate array (FPGAs), application-specific integrated circuit (ASICs), as well as peripherals, are growing progressively complex. On motherboards in many areas of computing, from laptops and tablets to servers and Ethernet switches, multiphase phase buck regulators are seen to be more common nowadays, because of the higher power requirements. This study describes a four-stage buck converter with a phase shedding scheme that can be used to power processors in programmable logic controller (PLCs). The proposed power supply is designed to generate a regulated voltage with minimal ripple. Because of the suggested phase shedding method, this power supply also offers better light load efficiency. For this objective, a multiphase system with phase shedding is modeled in MATLAB SIMULINK, and the findings are validated.
Performance evaluation of a new 3D printed dry-contact electrode for EEG signals measurement
Aaisha Diaa-Aldeen Abdullah;
Auns Q. Al-Neami
Indonesian Journal of Electrical Engineering and Computer Science Vol 24, No 1: October 2021
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v24.i1.pp287-294
Traditional wet silver/silver chloride electrodes are used to record electroencephalography (EEG) signals mainly because of their potential repeatability, excellent signal to noise ratio and biocompatibility. This type of electrode is only suitable for conductive glue, which can irritate the skin and cause injury. In addition, as time goes the conductive gel will be dehydrated so the quality of the EEG signal will decrease. To overcome these problems, 3D printed dry-contact electrodes with multi-pins are designed in this work to measure brain signals without prior preparation or gel application. 3D printed electrodes are made from polylactic acids polymer and coated with suitable materials to enhance the conductivity. Electrode-scalp impedance on human was also measured. To evaluate the dry-contact electrode, EEG measurement are performed in subjects and compared with EEG signals acquired by wet electrode by using linear correlation coefficient. Experimentally results showed that the average electrode-skin impedance change of dry electrode in frontal site (9.42-7.25KΩ) and in occipital site (9.56-8.66KΩ). The correlation coefficient between dry and wet electrodes in frontal site (91.4%) and in occipital site (80%). To conclude, the 3D printed dry-contact electrode can be will promising applied on hairy site and provide a promising solutions for long-term monitoring EEG.
Compact dual-band RF rectifier for wireless energy harvesting using CRLH technique
Marwa Jasim Alhily;
Nasr Al-Khafaji;
Salim Wadi
Indonesian Journal of Electrical Engineering and Computer Science Vol 24, No 1: October 2021
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v24.i1.pp338-346
In this paper, a new dual-band radio frequency (RF) rectifier was designed. The proposed design is a low-profile structure with dimensions of 5×5.5 mm2 owing to the use of lumped elements rather than the conventional transmission lines which occupy large footprints. This property can be potentially exploited to use the proposed rectifier in high dense rectenna arrays to generate high output direct current (DC) voltages. Furthermore, the proposed design adopts the composite right/left-handed composite right left-handed (CRLH) technique to realize the dual-band structure at frequencies of 1.8 and 2.4 GHz. Afterward, the matching circuit was optimized to make sure that it offers good matching. The frequency response shows good matching at both bands which are about -22 and -25 dB respectively. Eventually, the simulated circuit has a conversion efficiency of 52% and output voltages of 0.5 V at -5 dBm for the two bands.
Multi-spectral images classification based on intelligent water drops algorithm
Almas Ahmed Khaleel
Indonesian Journal of Electrical Engineering and Computer Science Vol 24, No 1: October 2021
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v24.i1.pp116-125
Mosul's city land covers soil, cultivated land, stony, pastoral land, water, and ploughed agricultural land. We have classified multispectral images captured by the sensor (TM) carried on the Landsat satellite. Integrated approach of intelligent water drops (IWDs) algorithm is used to identify natural terrain. In this research, IWDs have been suggested to find the best results for multispectral image classification. The purpose of using an algorithm, give accurate and fast results by comparing the IWD algorithm with the K-mean algorithm. The IWD algorithm is programmed using the Matlab2017b software environment to demonstrate the proposed methodology's effectiveness. The proposed integrated concept has been applied to satellite images of Mosul city in Iraq. By comparing the IWD with the K-mean, we found clear time superiority of the IWD algorithm, equal 1.4122 with (K-mean) time equal 18.9475. Furthermore, the water drop algorithm's classification accuracy is 95%, while the K-mean classification accuracy is 83.3%. Based on the analysis and results, we conclude the IWD is a robust promising and approach to detecting remote sensing image changes and multispectral image classification.
The security of RC4 algorithm using keys generation depending on user's retina
Huda M. Salih;
Raghda Salam Al Mahdawi
Indonesian Journal of Electrical Engineering and Computer Science Vol 24, No 1: October 2021
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v24.i1.pp452-463
Digital technologies grow more rapidly; information security threats are becoming increasingly dangerous. Advanced and various cyber-attacks and security threats, like targeted emails, and information exploitation, pose a critical threat that basically undermines our trust in the digital society. Rivest cipher 4 (RC4) algorithm is a significant cipher of a stream that could be utilized with protocols of the internet, the advantage of the RC4 algorithm is that it is simple and effective. There are several weak, especially after the pseudo-random generation algorithm (PRGA), PRGA's initially 256 rounds (the amount of the RC4 permutation). Several modified RC4 studies have been published thus far, however, they all face either standard privacy or achievement evaluation issues. This paper proposes a new RC4 algorithm that is based on the user's retina (RC4-Retina), which has solved both of these weak points it was indicated in the standard RC4 algorithm. The novelty of retina key scheduling algorithm (RKSA), which is generated by relying on the user's retina of the algorithm will modify the matrix of permutation used to configure the keys. The efficiency of the improved algorithm was measured by depending on the average security of ciphertext of different keys and different messages, results were good compared to the standard algorithm.
Analysis of IPv6 jumbogram packages transmission using jumbo frame in mikrotik-based tunneling
Yahya Hidayatullah;
Arief Marwanto;
Imam Much Ibnu Subroto
Indonesian Journal of Electrical Engineering and Computer Science Vol 24, No 1: October 2021
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v24.i1.pp329-337
The validation and accuracy of internet protocol version 6 (IPv6) performance using jumbo frames is still not perfect, due to peer-to-peer connections testing within the same operating system and between operating systems. Therefore, inaccurate data test results. To mitigated, testing with a wider platform is recommended, a medium-scale network connection is proposed such as metropolitan area networks. In this works, a connection between computer devices connected by three proxy routers are made, with different IPv6 segments on each port. Then each computer device sends traffic data to each other using a traffic-generator application. The first test through three routers without tunnel connection is carried out as the first scenario to compare performance with tunnel-based testing. Three parameters have been used in this test, such as maximum transfer unit (MTU) 1500 bytes, MTU 400 bytes and MTU 9000 bytes. The results of the tests conducted show that the use of jumbo frames using a proxy is less effective, even though it produces a larger throughput when using the MTU 4000, but there is fragmentation in the packet passing through the proxy because the packet passing through the proxy is split into 1500 byte sizes.
Linear equation for text cryptography using letters' coordinates
Thamir A. Jarjis;
Yahya Q. I. Al-Fadhili
Indonesian Journal of Electrical Engineering and Computer Science Vol 24, No 1: October 2021
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v24.i1.pp548-553
The linear encryption such as Caesar, mono-alphabetic are used to solve the encryption problem in different fields. This module usually encrypts any letter to exact and one corresponding letter. With advanced technologies in computers, these algorithms seem not to be high level secure. This paper proposed a secure encryption algorithm using modified linear encryption by considering the letters’ positions of the plaintext body. Two advantages the proposed algorithm has against traditional ones. First, the cryptography procedures are simple and secure. Secondly, it has higher security because of the non- ingrained nature of poly-alphabetic for substitution. Consequently, the plaintext body is considered as a 2-D matrix, such that, each letter has two coordinates, the ith and jth. These procedures depend on substituting the coordinates of the letter into a linear equation to provide a different substitution letter. The performance of these procedures showed better and robust results by applying the frequency analysis test for this proposed algorithm evaluating.
Density-based classification with the DENCLUE algorithm
Mouhcine El Hassani;
Noureddine Falih;
Belaid Bouikhalene
Indonesian Journal of Electrical Engineering and Computer Science Vol 24, No 1: October 2021
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v24.i1.pp269-278
Classification of information is a vague and difficult to explore area of research, hence the emergence of grouping techniques, often referred to Clustering. It is necessary to differentiate between an unsupervised and a supervised classification. Clustering methods are numerous. Data partitioning and hierarchization push to use them in parametric form or not. Also, their use is influenced by algorithms of a probabilistic nature during the partitioning of data. The choice of a method depends on the result of the Clustering that we want to have. This work focuses on classification using the density-based spatial clustering of applications with noise (DBSCAN) and DENsity-based CLUstEring (DENCLUE) algorithm through an application made in csharp. Through the use of three databases which are the IRIS database, breast cancer wisconsin (diagnostic) data set and bank marketing data set, we show experimentally that the choice of the initial data parameters is important to accelerate the processing and can minimize the number of iterations to reduce the execution time of the application.
Active tremor control in human-like hand tremor using fuzzy logic
Hafiz Bin Jamaludin;
Azizan As'arry;
R. Musab;
Khairil Anas Md Rezali;
Raja Mohd Kamil Bin Raja Ahmad;
Mohd Zarhamdy Bin Md. Zain
Indonesian Journal of Electrical Engineering and Computer Science Vol 24, No 1: October 2021
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v24.i1.pp108-115
Tremoris the vibration in sinusoidal orientation that is experienced regularly by a person with Parkinson’s disease (PD), which disturbs their daily activities. One solution that may be used to counter this tremor effect is by developing an active tremor control system in LabVIEW for linear voice coil actuator (LVCA), where the system uses proportional (P) controller and various types of fuzzy logic controller (FLC) as a hybrid controller to reduce tremor vibration. From this research, it can be concluded that the best controller for tremor reduction is the P+FLC 1st set of rules, compared to P+FLC 2nd set of rules, and P controller only, with the highest percentage of 88.39% of tremor reduction with the actual tremor vibration of PD patients as the reference result. The P+FLC 2nd set of rules has the highest percentage of tremor reduction with a value of 86.81%, whereas P controller only has the highest tremor reduction percentage of 67.10%. This percentage of tremor reduction is based on the power spectral density (PSD) values, in which it represents the intensity of the tremor vibration. This experimental study can be used as an initial step for researchers and engineers to design and develop an anti-tremor device in the future.
Formal security analysis of lightweight authenticated key agreement protocol for IoT in cloud computing
Ahmed H. Aly;
Atef Ghalwash;
Mona M. Nasr;
Ahmed A. Abd-El Hafez
Indonesian Journal of Electrical Engineering and Computer Science Vol 24, No 1: October 2021
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v24.i1.pp621-636
The internet of things (IoT) and cloud computing are evolving technologies in the information technology field. Merging the pervasive IoT technology with cloud computing is an innovative solution for better analytics and decision-making. Deployed IoT devices offload different types of data to the cloud, while cloud computing converges the infrastructure, links up the servers, analyzes information obtained from the IoT devices, reinforces processing power, and offers huge storage capacity. However, this merging is prone to various cyber threats that affect the IoT-Cloud environment. Mutual authentication is considered as the forefront mechanism for cyber-attacks as the IoT-Cloud participants have to ensure the authenticity of each other and generate a session key for securing the exchanged traffic. While designing these mechanisms, the constrained nature of the IoT devices must be taken into consideration. We proposed a novel lightweight protocol (Light-AHAKA) for authenticating IoT-Cloud elements and establishing a key agreement for encrypting the exchanged sensitive data was proposed. In this paper, the formal verification of (Light-AHAKA) was presented to prove and verify the correctness of our proposed protocol to ensure that the protocol is free from design flaws before the deployment phase. The verification is performed based on two different approaches, the strand space model and the automated validation of internet security protocols and applications (AVISPA) tool.