Pub Date : 2022-01-01DOI: 10.5455/jjee.204-1650482782
Jordan Barrett, A. Shaout
The preferred architecture and the source company for radio frequency identification (RFID) badge access cards can vary over time within the same company, depending on what management may envision for the future of working. Additionally, the preferred badge architecture and the company that makes those badges can vary from company to company, and from original equipment manufacturer (OEM) to their supplier partners. These circumstances create some inefficiencies amongst the workforce. Within the same engineering campus of a large OEM, many employees may still have the old key ring style badge, but some of the new RFID device readers may no longer accept this outdated badge architecture, which means these employees may not have access to certain areas until they get their new smart badge ID card. This makes doing their job much more difficult, potentially forcing them to find new ways to access the room or area that they need. Additionally, due to differences in badge architecture, an OEM’s supplier partners do not have access to areas of the OEM’s testing site or offices, even ones in which the OEM would prefer that they have permission to access in order to increase work efficiency (including test tracks and special laboratories). This paper presents a new open sourced RFID card reader which is designed, tested and implemented to read both of the most popular badge architectures (key ring badges and smart cards). The new proposed system also includes a unique function which shows the employee more information about the occupants inside of the room that they are trying to access. After reflecting on the state-of-the-art, the main selling point of the proposed system is that it recognizes multiple different badge architectures, and it doesn’t require the end user to source their RFID devices from a certain company. It provides other benefits including allowing suppliers and OEMs to seamlessly share collaborative spaces, and ensuring older versions of badges don’t become obsolete.
{"title":"A Multiple Badge Architectures Open Source RFID Reader with Insight Regarding Room Occupants","authors":"Jordan Barrett, A. Shaout","doi":"10.5455/jjee.204-1650482782","DOIUrl":"https://doi.org/10.5455/jjee.204-1650482782","url":null,"abstract":"The preferred architecture and the source company for radio frequency identification (RFID) badge access cards can vary over time within the same company, depending on what management may envision for the future of working. Additionally, the preferred badge architecture and the company that makes those badges can vary from company to company, and from original equipment manufacturer (OEM) to their supplier partners. These circumstances create some inefficiencies amongst the workforce. Within the same engineering campus of a large OEM, many employees may still have the old key ring style badge, but some of the new RFID device readers may no longer accept this outdated badge architecture, which means these employees may not have access to certain areas until they get their new smart badge ID card. This makes doing their job much more difficult, potentially forcing them to find new ways to access the room or area that they need. Additionally, due to differences in badge architecture, an OEM’s supplier partners do not have access to areas of the OEM’s testing site or offices, even ones in which the OEM would prefer that they have permission to access in order to increase work efficiency (including test tracks and special laboratories). This paper presents a new open sourced RFID card reader which is designed, tested and implemented to read both of the most popular badge architectures (key ring badges and smart cards). The new proposed system also includes a unique function which shows the employee more information about the occupants inside of the room that they are trying to access. After reflecting on the state-of-the-art, the main selling point of the proposed system is that it recognizes multiple different badge architectures, and it doesn’t require the end user to source their RFID devices from a certain company. It provides other benefits including allowing suppliers and OEMs to seamlessly share collaborative spaces, and ensuring older versions of badges don’t become obsolete.","PeriodicalId":29729,"journal":{"name":"Jordan Journal of Electrical Engineering","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70822173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-01DOI: 10.5455/jjee.204-1635982606
Agburu O. Adikpe, M. Iyobhebhe, Caleb A. Amlabu, I. Botson, Bankole Omojola, J. Bashayi, C. Ezugwu
As the number of casualties and confirmed cases of the Coronavirus disease 2019 (COVID-19) gradually decreases, several countries across the globe are gradually trying to ease their society to some semblance of normalcy. However, to avoid systems that restrict social interactions in indoor environments, it is necessary to adopt solutions that redefine the ethos of social interactions within indoor environments. To achieve this, technology-based contact tracing (TCT) has been adopted as one of the systems used to mitigate the spread of the outbreak. On this premise, this review discusses co-location technologies suitable for indoor environments, with a specific focus on co-location solutions whose implementation costs are affordable, scalable, and whose access conditions utilize existing infrastructures that are available in off-the-shelf user equipment. This review focuses on wireless fidelity (WiFi) as a co-location technology adopted for TCT. On this premise, the limitations around adoption and recommendations, which highlight improvements, are compactly discussed around WiFi. In this context, a future research direction - on which this review is based - is compactly discussed.
{"title":"A Review on Wireless Fidelity Co-Location Technology Adopted Indoors for Technology-Based Contact Tracing","authors":"Agburu O. Adikpe, M. Iyobhebhe, Caleb A. Amlabu, I. Botson, Bankole Omojola, J. Bashayi, C. Ezugwu","doi":"10.5455/jjee.204-1635982606","DOIUrl":"https://doi.org/10.5455/jjee.204-1635982606","url":null,"abstract":"As the number of casualties and confirmed cases of the Coronavirus disease 2019 (COVID-19) gradually decreases, several countries across the globe are gradually trying to ease their society to some semblance of normalcy. However, to avoid systems that restrict social interactions in indoor environments, it is necessary to adopt solutions that redefine the ethos of social interactions within indoor environments. To achieve this, technology-based contact tracing (TCT) has been adopted as one of the systems used to mitigate the spread of the outbreak. On this premise, this review discusses co-location technologies suitable for indoor environments, with a specific focus on co-location solutions whose implementation costs are affordable, scalable, and whose access conditions utilize existing infrastructures that are available in off-the-shelf user equipment. This review focuses on wireless fidelity (WiFi) as a co-location technology adopted for TCT. On this premise, the limitations around adoption and recommendations, which highlight improvements, are compactly discussed around WiFi. In this context, a future research direction - on which this review is based - is compactly discussed.","PeriodicalId":29729,"journal":{"name":"Jordan Journal of Electrical Engineering","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70821951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-01DOI: 10.5455/jjee.204-1630926826
Agburu O. Adikpe, A. Yaro, A. Tekanyi, M. Almustapha, E. Agbon, O. Ayofe
To mitigate the spread of the Coronavirus disease 2019 (COVID-19) caused by severe acute respiratory syndrome Coronavirus 2 (SARS-CoV-2), a plethora of technology-based contact tracing (CT) applications have been proposed, designed, and deployed by private and government entities in various countries globally in order to return society to some semblance of normalcy. Although most of the modifications done on the underlining protocols mostly focus on the privacy and ethical concerns of these solutions, pragmatic applications within developing countries are not considered, as applications in most cases are considered to be ubiquitous. This disparity leads to a design-reality gap as the involved entities fail to pay attention to the local conditions in which these systems could be deployed. In this work, an in-depth analysis of state-of-the-art technology-based CT protocols is discussed while considering the compatibility of these designs with the reality of lopsided levels of digital divides and other structural inequalities in developing countries. In addition, a number of existing solutions implemented in developing countries are delineated. Furthermore, pragmatic applications that consider social and technological infrastructures to bridge the gaps in these infrastructures are discussed as well as possible recommendations that could be implemented to effectively mitigate the spread of pandemic outbreaks in developing countries.
{"title":"A Review on Technology-Based Contact Tracing Solutions and Its Application in Developing Countries","authors":"Agburu O. Adikpe, A. Yaro, A. Tekanyi, M. Almustapha, E. Agbon, O. Ayofe","doi":"10.5455/jjee.204-1630926826","DOIUrl":"https://doi.org/10.5455/jjee.204-1630926826","url":null,"abstract":"To mitigate the spread of the Coronavirus disease 2019 (COVID-19) caused by severe acute respiratory syndrome Coronavirus 2 (SARS-CoV-2), a plethora of technology-based contact tracing (CT) applications have been proposed, designed, and deployed by private and government entities in various countries globally in order to return society to some semblance of normalcy. Although most of the modifications done on the underlining protocols mostly focus on the privacy and ethical concerns of these solutions, pragmatic applications within developing countries are not considered, as applications in most cases are considered to be ubiquitous. This disparity leads to a design-reality gap as the involved entities fail to pay attention to the local conditions in which these systems could be deployed. In this work, an in-depth analysis of state-of-the-art technology-based CT protocols is discussed while considering the compatibility of these designs with the reality of lopsided levels of digital divides and other structural inequalities in developing countries. In addition, a number of existing solutions implemented in developing countries are delineated. Furthermore, pragmatic applications that consider social and technological infrastructures to bridge the gaps in these infrastructures are discussed as well as possible recommendations that could be implemented to effectively mitigate the spread of pandemic outbreaks in developing countries.","PeriodicalId":29729,"journal":{"name":"Jordan Journal of Electrical Engineering","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70822215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-01DOI: 10.5455/jjee.204-1658696772
A. Abdalrazzaq, Salah Alabady
Cryptographic algorithms are gaining importance due to their relevance and importance in the areas of privacy and security experienced by the Internet of Things (IoT) devices. They improve data privacy and confidentiality by limiting who can decrypt the data to the person who has the key. Advanced encryption standard (AES) is one of the most important encryption algorithms in use. This algorithm uses 10 rounds for each encryption and decryption process and encrypts data starting with 16 bytes, which increases the time needed for encryption and decryption. In order to speed up encryption and decryption while maintaining security levels more than or equal to those offered by the AES algorithm, this paper proposes an algorithm called tiny advanced encryption standard (TAES) with two different scenarios. As the encryption process starts with 4 bytes and goes up to an unlimited number of bytes, TAES features are less complex and more flexible than those of AES and can be quickly implemented, and are characterized by high encryption of images, texts, and sounds. The proposed TAES algorithm is tested on text and images using the MATLAB software. The result is completely distorted images and text. The test results also unveil that the encryption and decryption speeds as well as the throughput of the proposed TAES is much better than those of the original AES algorithm. Moreover, a low signal-to-noise ratio (SNR) values are obtained, indicating a greater degree of image distortion as a consequence of utilizing the proposed TAES algorithm.
{"title":"Design and Implementation of a Lightweight and Fast Tiny Advanced Encryption Standard Algorithm","authors":"A. Abdalrazzaq, Salah Alabady","doi":"10.5455/jjee.204-1658696772","DOIUrl":"https://doi.org/10.5455/jjee.204-1658696772","url":null,"abstract":"Cryptographic algorithms are gaining importance due to their relevance and importance in the areas of privacy and security experienced by the Internet of Things (IoT) devices. They improve data privacy and confidentiality by limiting who can decrypt the data to the person who has the key. Advanced encryption standard (AES) is one of the most important encryption algorithms in use. This algorithm uses 10 rounds for each encryption and decryption process and encrypts data starting with 16 bytes, which increases the time needed for encryption and decryption. In order to speed up encryption and decryption while maintaining security levels more than or equal to those offered by the AES algorithm, this paper proposes an algorithm called tiny advanced encryption standard (TAES) with two different scenarios. As the encryption process starts with 4 bytes and goes up to an unlimited number of bytes, TAES features are less complex and more flexible than those of AES and can be quickly implemented, and are characterized by high encryption of images, texts, and sounds. The proposed TAES algorithm is tested on text and images using the MATLAB software. The result is completely distorted images and text. The test results also unveil that the encryption and decryption speeds as well as the throughput of the proposed TAES is much better than those of the original AES algorithm. Moreover, a low signal-to-noise ratio (SNR) values are obtained, indicating a greater degree of image distortion as a consequence of utilizing the proposed TAES algorithm.","PeriodicalId":29729,"journal":{"name":"Jordan Journal of Electrical Engineering","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70822661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-01DOI: 10.5455/jjee.204-1624302314
R. Sundararajan, M. Iqbal
— The hardware implementation of a solar energy system with vehicle-to-home (V2H) and vehicle-to-grid (V2G) options for Newfoundland conditions through Mozilla IoT is discussed in this paper. To illustrate IoT, remote monitoring and control concepts, a prototype - is entirely a 12 V system - is created in the lab. To operate in multiple modes, the system checks the current and voltage parameters. The data is transmitted to the gateway using an ESP 32 microcontroller and the internet of things (IoT). Mozilla IoT is the platform that hosts the Raspberry Pi Things Gateway and serves as a dashboard to remotely control and monitor the system. The data that is transmitted is logged, and the logged data is shown as a graph. This paper presents the system design, details of demo experimental setup in addition to the test results which reveal that the successful implementation of proposed system - with V2H and V2G options - for Newfoundland/ Canada conditions.
-本文通过Mozilla IoT讨论了针对纽芬兰条件的具有车到户(V2H)和车到电网(V2G)选项的太阳能系统的硬件实现。为了说明物联网,远程监控和控制概念,在实验室中创建了一个原型-完全是一个12 V系统。为了在多种模式下运行,系统检查电流和电压参数。数据通过ESP 32微控制器和物联网(IoT)传输到网关。Mozilla IoT是托管Raspberry Pi Things Gateway的平台,并充当远程控制和监控系统的仪表板。传输的数据被记录下来,记录下来的数据以图形的形式显示。本文介绍了系统设计,演示实验设置的细节以及测试结果,这些结果表明所提出的系统-具有V2H和V2G选项-在纽芬兰/加拿大的条件下成功实现。
{"title":"A Solar Energy System with Vehicle-to-Home and Vehicle-to-Grid Option for Newfoundland/Canada Conditions through Mozilla IoT","authors":"R. Sundararajan, M. Iqbal","doi":"10.5455/jjee.204-1624302314","DOIUrl":"https://doi.org/10.5455/jjee.204-1624302314","url":null,"abstract":"— The hardware implementation of a solar energy system with vehicle-to-home (V2H) and vehicle-to-grid (V2G) options for Newfoundland conditions through Mozilla IoT is discussed in this paper. To illustrate IoT, remote monitoring and control concepts, a prototype - is entirely a 12 V system - is created in the lab. To operate in multiple modes, the system checks the current and voltage parameters. The data is transmitted to the gateway using an ESP 32 microcontroller and the internet of things (IoT). Mozilla IoT is the platform that hosts the Raspberry Pi Things Gateway and serves as a dashboard to remotely control and monitor the system. The data that is transmitted is logged, and the logged data is shown as a graph. This paper presents the system design, details of demo experimental setup in addition to the test results which reveal that the successful implementation of proposed system - with V2H and V2G options - for Newfoundland/ Canada conditions.","PeriodicalId":29729,"journal":{"name":"Jordan Journal of Electrical Engineering","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70821453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-01DOI: 10.5455/jjee.204-1653940509
S. Ogbikaya, M. Iqbal
This paper presents a reduced order model of a microgrid system for a university community in Nigeria. The designed microgrid system is simulated in MATLAB/Simulink environment to determine the system dynamics. The obtained dynamic system is then reduced to a single block subsystem with multiple inputs and a single output using system linearization. The microgrid model is then linearized with the aid of linearization tool in MATLAB/Simulink using linearized perturbation method. The transfer function of the multiple inputs with respect to the single output of the microgrid system is determined in MATLAB environment. The transfer functions obtained for both inputs are then incorporated to the subsystem to linearize the entire system. The obtained linearized system is reduced with the aid of model reducer using the balanced truncation method in Simulink. The achieved results indicate that the system response of the obtained linearized model is linear compared to the step response of the nonlinear microgrid model of the campus. The results also reveal that the obtained reduced order model - compared to the nonlinear microgrid model - has lesser states with more than 4 times faster simulation response time.
{"title":"Reduced Order Model of A Microgrid System for A University Community in Nigeria","authors":"S. Ogbikaya, M. Iqbal","doi":"10.5455/jjee.204-1653940509","DOIUrl":"https://doi.org/10.5455/jjee.204-1653940509","url":null,"abstract":"This paper presents a reduced order model of a microgrid system for a university community in Nigeria. The designed microgrid system is simulated in MATLAB/Simulink environment to determine the system dynamics. The obtained dynamic system is then reduced to a single block subsystem with multiple inputs and a single output using system linearization. The microgrid model is then linearized with the aid of linearization tool in MATLAB/Simulink using linearized perturbation method. The transfer function of the multiple inputs with respect to the single output of the microgrid system is determined in MATLAB environment. The transfer functions obtained for both inputs are then incorporated to the subsystem to linearize the entire system. The obtained linearized system is reduced with the aid of model reducer using the balanced truncation method in Simulink. The achieved results indicate that the system response of the obtained linearized model is linear compared to the step response of the nonlinear microgrid model of the campus. The results also reveal that the obtained reduced order model - compared to the nonlinear microgrid model - has lesser states with more than 4 times faster simulation response time.","PeriodicalId":29729,"journal":{"name":"Jordan Journal of Electrical Engineering","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70822377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-01DOI: 10.5455/jjee.204-1642708977
J. Ababneh, M. Khodier
In this paper, the design and optimization of infinite impulse response full-band digital differentiator (DD) using evolutionary and swarm intelligence algorithms is investigated. Different objective functions based on the absolute error, the squared absolute error and the min-max optimality criterion are investigated. The optimal DD parameters that result in the best minimum value of the investigated objective functions are obtained using differential evolution, particle swarm optimization, genetic algorithm and cuckoo search optimization methods. These algorithms are used due to their simplicity, efficiency and robustness in solving general multidimensional optimization problems. The investigation outcomes show that minimizing the absolute error gives the most flat magnitude response, and minimizing the squared absolute error gives almost the lowest mean error of the designed DD. In addition, a new objective function is proposed to improve the linearity of the phase response of the designed infinite impulse response full-band DD. It is found that the design of the DD using the differential evolution outperforms or at least is comparable to similar designs reported in the literature using other optimization methods.
{"title":"Design and Optimization of Infinite Impulse Response Full-Band Digital Differentiator Using Evolutionary and Swarm Intelligence Algorithms","authors":"J. Ababneh, M. Khodier","doi":"10.5455/jjee.204-1642708977","DOIUrl":"https://doi.org/10.5455/jjee.204-1642708977","url":null,"abstract":"In this paper, the design and optimization of infinite impulse response full-band digital differentiator (DD) using evolutionary and swarm intelligence algorithms is investigated. Different objective functions based on the absolute error, the squared absolute error and the min-max optimality criterion are investigated. The optimal DD parameters that result in the best minimum value of the investigated objective functions are obtained using differential evolution, particle swarm optimization, genetic algorithm and cuckoo search optimization methods. These algorithms are used due to their simplicity, efficiency and robustness in solving general multidimensional optimization problems. The investigation outcomes show that minimizing the absolute error gives the most flat magnitude response, and minimizing the squared absolute error gives almost the lowest mean error of the designed DD. In addition, a new objective function is proposed to improve the linearity of the phase response of the designed infinite impulse response full-band DD. It is found that the design of the DD using the differential evolution outperforms or at least is comparable to similar designs reported in the literature using other optimization methods.","PeriodicalId":29729,"journal":{"name":"Jordan Journal of Electrical Engineering","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70822060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-01DOI: 10.5455/jjee.204-1658669063
A. Davami, M. Abadi
This paper investigates the influence of various configurations and flakes of: i) graphene, ii) graphene/MoS2/graphene and iii) MoS2/graphene/MoS2 over a thin layer of gold on the performance of a surface plasmon resonance (SPR) biosensor. The reflectance curves of the proposed SPR biosensor are obtained, analyzed and compared for different combinations and thicknesses of the biosensors’ layers in refractive indices (RI) of 1 and 1.02, resembling an air and a bacterial medium, respectively. An in-depth analysis based on finite difference time domain method is performed to describe the sensor response considering sensitivity, full width at half maximum and minimum reflectance. The obtained results show that the sensitivity of the biosensor with a 50 nm Au and a 5 nm TiO2 (as the adhesive layer between the Au- layer and the prism) is equal to 61°/RIU. In order to increase further the sensitivity, different stacks and thicknesses of MoS2/graphene/MoS2 and graphene/MoS2/graphene configurations on the Au layer are added. The achieved outcomes reveal that the sensitivity is improved for a monolayer of MoS2 (1L_MoS2) sandwiched between double layers of graphene (2L_G) on 50 nm Au and 5 nm TiO2 (1L_MoS2/2L_G/1L_MoS2/50nmAu/5nmTiO2/Prism-BK7). This combination yields a sensitivity of 71.5 °/RIU for RI changes in the sensing medium (Δn) of 0.02 with a great detection accuracy of 0.33. We hope that – based on the outcomes of this investigation - the proposed structures can open new windows to improve the SPR biosensor detection of biological species.
{"title":"Influence of Stack Hybrid Configuration of MoS2 and Graphene on the Performance of Surface Plasmon Resonance Biosensor","authors":"A. Davami, M. Abadi","doi":"10.5455/jjee.204-1658669063","DOIUrl":"https://doi.org/10.5455/jjee.204-1658669063","url":null,"abstract":"This paper investigates the influence of various configurations and flakes of: i) graphene, ii) graphene/MoS2/graphene and iii) MoS2/graphene/MoS2 over a thin layer of gold on the performance of a surface plasmon resonance (SPR) biosensor. The reflectance curves of the proposed SPR biosensor are obtained, analyzed and compared for different combinations and thicknesses of the biosensors’ layers in refractive indices (RI) of 1 and 1.02, resembling an air and a bacterial medium, respectively. An in-depth analysis based on finite difference time domain method is performed to describe the sensor response considering sensitivity, full width at half maximum and minimum reflectance. The obtained results show that the sensitivity of the biosensor with a 50 nm Au and a 5 nm TiO2 (as the adhesive layer between the Au- layer and the prism) is equal to 61°/RIU. In order to increase further the sensitivity, different stacks and thicknesses of MoS2/graphene/MoS2 and graphene/MoS2/graphene configurations on the Au layer are added. The achieved outcomes reveal that the sensitivity is improved for a monolayer of MoS2 (1L_MoS2) sandwiched between double layers of graphene (2L_G) on 50 nm Au and 5 nm TiO2 (1L_MoS2/2L_G/1L_MoS2/50nmAu/5nmTiO2/Prism-BK7). This combination yields a sensitivity of 71.5 °/RIU for RI changes in the sensing medium (Δn) of 0.02 with a great detection accuracy of 0.33. We hope that – based on the outcomes of this investigation - the proposed structures can open new windows to improve the SPR biosensor detection of biological species.","PeriodicalId":29729,"journal":{"name":"Jordan Journal of Electrical Engineering","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70822106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-01DOI: 10.5455/jjee.204-1630865748
Mahmoud Alnaanah, Moath Alsafasfeh, A. Aljaafreh, A. Aish
{"title":"An Optimized Fragile Image Watermarking Method for Tamper Detection and Recovery Using SPIHT and Reed-Solomon Coding","authors":"Mahmoud Alnaanah, Moath Alsafasfeh, A. Aljaafreh, A. Aish","doi":"10.5455/jjee.204-1630865748","DOIUrl":"https://doi.org/10.5455/jjee.204-1630865748","url":null,"abstract":"","PeriodicalId":29729,"journal":{"name":"Jordan Journal of Electrical Engineering","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70822341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-01DOI: 10.5455/jjee.204-1654826074
S. Nakamori
This paper proposes a new H-infinity quadratic tracking control (QTC) algorithm in linear discrete-time systems. This algorithm is a counterpart of the H-infinity QTC algorithm in linear continuous-time systems based on the integral equation approach. The discrete-time state equation in this paper has the control and exogenous inputs. Theorem 1 shows that the control and exogenous inputs in the H-infinity linear QTC problem are given by solving the two-point boundary value problem (TPBVP). Based on the TPBVP, Theorem 2 presents the H-infinity linear QTC algorithm for the control and exogenous inputs. The inputs use the information of two functions, which are calculated in the reverse direction of time from their terminal conditions. The control and exogenous inputs use the information of the state. The state observer uses the output of the system to estimate the state. A numerical simulation example shows the tracking control characteristics of the output estimate to the desired value and the characteristics of the estimates of the control and exogenous inputs. For the infinite value of the constant disturbance attenuation level γ, the proposed H-infinity linear QTC algorithm reduces to the linear QTC algorithm. The problem that can be solved for the minimum value of γ is the H-infinity linear QTC problem. For smaller value than the minimum value of γ, the H-infinity linear QTC algorithm diverges.
{"title":"New H-Infinity Tracking Control Algorithm in Linear Discrete-Time Systems","authors":"S. Nakamori","doi":"10.5455/jjee.204-1654826074","DOIUrl":"https://doi.org/10.5455/jjee.204-1654826074","url":null,"abstract":"This paper proposes a new H-infinity quadratic tracking control (QTC) algorithm in linear discrete-time systems. This algorithm is a counterpart of the H-infinity QTC algorithm in linear continuous-time systems based on the integral equation approach. The discrete-time state equation in this paper has the control and exogenous inputs. Theorem 1 shows that the control and exogenous inputs in the H-infinity linear QTC problem are given by solving the two-point boundary value problem (TPBVP). Based on the TPBVP, Theorem 2 presents the H-infinity linear QTC algorithm for the control and exogenous inputs. The inputs use the information of two functions, which are calculated in the reverse direction of time from their terminal conditions. The control and exogenous inputs use the information of the state. The state observer uses the output of the system to estimate the state. A numerical simulation example shows the tracking control characteristics of the output estimate to the desired value and the characteristics of the estimates of the control and exogenous inputs. For the infinite value of the constant disturbance attenuation level γ, the proposed H-infinity linear QTC algorithm reduces to the linear QTC algorithm. The problem that can be solved for the minimum value of γ is the H-infinity linear QTC problem. For smaller value than the minimum value of γ, the H-infinity linear QTC algorithm diverges.","PeriodicalId":29729,"journal":{"name":"Jordan Journal of Electrical Engineering","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70822026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}