Pub Date : 2024-03-05DOI: 10.17529/jre.v20i1.33486
Ervin Masita Dewi, Dini Rahmawati, Nurista Wahyu Kirana
Indications of symptoms of cardiovascular disease can be seen from the level of elasticity of the arteries. The Pulse Wave Velocity (PWV) method using PPG signal analysis is used to determine the level of arterial stiffness based on the time difference between pulse waves of Photoplethysmography (PPG) signal measurements. PWV measurements use a non-invasive technique using pulse sensors on the fingers and toes, the measurement data is sent wirelessly using the ESP-NOW protocol. Analysis of the measured PPG signal is used as an approach to calculating the PWV value. Realization and testing can be used to measure the pulse in BPM and classify the index of arterial stiffness using the PWV method. The results of testing on 15 test volunteers from 3 age groups showed the results of an arterial stiffness index with indications of normal, stiff and very stiff arteries. The PWV value for the 20 year old group was 4.30-6.77 cm/s, normal arterial conditions. The age group of 30-40 years has a PWV value ranging from 5.11-8.77 cm/s, normal arterial conditions. The age group of 50-60 years had PWV values in the range of 10.69-18.43 cm/s, stiff and very stiff arterial conditions. Increasing age linearly affects the increase in PWV value. An increased PWV value may indicate an increase in arterial stiffness.
{"title":"Wireless Photoplethysmography (PPG) Measurement with Pulse Wave Velocity (PWV) Method for Arterial Stiffness Evaluation","authors":"Ervin Masita Dewi, Dini Rahmawati, Nurista Wahyu Kirana","doi":"10.17529/jre.v20i1.33486","DOIUrl":"https://doi.org/10.17529/jre.v20i1.33486","url":null,"abstract":"Indications of symptoms of cardiovascular disease can be seen from the level of elasticity of the arteries. The Pulse Wave Velocity (PWV) method using PPG signal analysis is used to determine the level of arterial stiffness based on the time difference between pulse waves of Photoplethysmography (PPG) signal measurements. PWV measurements use a non-invasive technique using pulse sensors on the fingers and toes, the measurement data is sent wirelessly using the ESP-NOW protocol. Analysis of the measured PPG signal is used as an approach to calculating the PWV value. Realization and testing can be used to measure the pulse in BPM and classify the index of arterial stiffness using the PWV method. The results of testing on 15 test volunteers from 3 age groups showed the results of an arterial stiffness index with indications of normal, stiff and very stiff arteries. The PWV value for the 20 year old group was 4.30-6.77 cm/s, normal arterial conditions. The age group of 30-40 years has a PWV value ranging from 5.11-8.77 cm/s, normal arterial conditions. The age group of 50-60 years had PWV values in the range of 10.69-18.43 cm/s, stiff and very stiff arterial conditions. Increasing age linearly affects the increase in PWV value. An increased PWV value may indicate an increase in arterial stiffness.","PeriodicalId":30766,"journal":{"name":"Jurnal Rekayasa Elektrika","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140264519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-03-05DOI: 10.17529/jre.v20i1.34836
Pujianti Wahyuningsih, Matalangi Matalangi, Muhammad Nur Fadhil Sukiman, Yusril Mahenra
This study aims to build a device as a security system to detect anomalies of children moving in play areas based on the Multiple Line Detection (MLD) method in a streaming image. We developed this device to help parents monitor their children's activities when playing in dangerous areas of the home to protect children from kidnapping. In this study, the MLD method can detect the children's activities when playing in three zones: the safe zone with green lines in the image, the caution zone with yellow lines, and the danger zone with red lines. The hardware used to build the devices in this study consists of three components: a camera to stream the image activities of children, a Raspberry Pi to process the image using OpenCV, and a buzzer for early security systems. The results of this study show that when the device detected the children playing in the safe zone, the system commanded the buzzer to turn off. Furthermore, when the camera detects that the children are playing in the caution and danger zone, the device then commands the buzzer to turn on as an early warning security system for the parents.
本研究旨在基于流媒体图像中的多线检测(MLD)方法,建立一个作为安全系统的设备,以检测儿童在游戏区活动的异常情况。我们开发该设备的目的是帮助家长监控孩子在家中危险区域玩耍时的活动,以保护儿童免遭绑架。在这项研究中,多线检测法可以检测到孩子在三个区域玩耍时的活动情况:图像中的绿线为安全区,黄线为警戒区,红线为危险区。本研究中用于构建设备的硬件由三部分组成:用于流式传输儿童活动图像的摄像头、使用 OpenCV 处理图像的 Raspberry Pi 和用于早期安全系统的蜂鸣器。研究结果表明,当设备检测到儿童在安全区域玩耍时,系统会命令蜂鸣器关闭。此外,当摄像头检测到孩子们在警戒区和危险区玩耍时,设备就会命令蜂鸣器打开,作为向家长发出预警的安全系统。
{"title":"Anomaly Detection for Security in Children's Play Areas Based on Image Using Multiple Lines Detection Method","authors":"Pujianti Wahyuningsih, Matalangi Matalangi, Muhammad Nur Fadhil Sukiman, Yusril Mahenra","doi":"10.17529/jre.v20i1.34836","DOIUrl":"https://doi.org/10.17529/jre.v20i1.34836","url":null,"abstract":"This study aims to build a device as a security system to detect anomalies of children moving in play areas based on the Multiple Line Detection (MLD) method in a streaming image. We developed this device to help parents monitor their children's activities when playing in dangerous areas of the home to protect children from kidnapping. In this study, the MLD method can detect the children's activities when playing in three zones: the safe zone with green lines in the image, the caution zone with yellow lines, and the danger zone with red lines. The hardware used to build the devices in this study consists of three components: a camera to stream the image activities of children, a Raspberry Pi to process the image using OpenCV, and a buzzer for early security systems. The results of this study show that when the device detected the children playing in the safe zone, the system commanded the buzzer to turn off. Furthermore, when the camera detects that the children are playing in the caution and danger zone, the device then commands the buzzer to turn on as an early warning security system for the parents.","PeriodicalId":30766,"journal":{"name":"Jurnal Rekayasa Elektrika","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140264952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This research aims to create an additional dataset containing Arabic characters for writing Jawi script and to train classification models using deep learning architectures such as InceptionV3 and ResNet34. The initial stage of the study involves digital image processing to obtain the additional Arabic character dataset from several sources, including HMBD, AHAWP, and HUCD, encompassing various connected and disconnected forms of Jawi script. Image processing includes steps such as preprocessing to enhance image quality, segmentation to separate Arabic characters from the background, and augmentation to increase dataset variability. Once the dataset is formed, we train the models using appropriate training data for each InceptionV3 and ResNet34 architecture. The classification evaluation results indicate that the model with ResNet34 architecture achieved the best performance with an accuracy of 96%. This model successfully recognizes Jawi script accurately and consistently, even for classes with similar shapes. The main contribution of this research is the availability of the additional Arabic character dataset that can be utilized for Jawi script recognition and performance assessment of various deep learning models. The study also emphasizes the importance of selecting the appropriate architecture for specific character recognition tasks. The research findings affirm that the model with ResNet34 architecture has excellent capability in recognizing the additional Arabic characters for writing Jawi. The results of this research have the potential to support further developments in Jawi character recognition applications and provide valuable insights for researchers in the field of character recognition sourced from Arabic characters. Dataset augmentation results can be accessed at https://singkat.usk.ac.id/g/En0skCKGAR
{"title":"Augmentation of Additional Arabic Dataset for Jawi Writing and Classification Using Deep Learning","authors":"Safrizal Razali, Kahlil Muchtar, Muhammad Hafiz Rinaldi, Yudha Nurdin, Aulia Rahman","doi":"10.17529/jre.v20i1.33722","DOIUrl":"https://doi.org/10.17529/jre.v20i1.33722","url":null,"abstract":"This research aims to create an additional dataset containing Arabic characters for writing Jawi script and to train classification models using deep learning architectures such as InceptionV3 and ResNet34. The initial stage of the study involves digital image processing to obtain the additional Arabic character dataset from several sources, including HMBD, AHAWP, and HUCD, encompassing various connected and disconnected forms of Jawi script. Image processing includes steps such as preprocessing to enhance image quality, segmentation to separate Arabic characters from the background, and augmentation to increase dataset variability. Once the dataset is formed, we train the models using appropriate training data for each InceptionV3 and ResNet34 architecture. The classification evaluation results indicate that the model with ResNet34 architecture achieved the best performance with an accuracy of 96%. This model successfully recognizes Jawi script accurately and consistently, even for classes with similar shapes. The main contribution of this research is the availability of the additional Arabic character dataset that can be utilized for Jawi script recognition and performance assessment of various deep learning models. The study also emphasizes the importance of selecting the appropriate architecture for specific character recognition tasks. The research findings affirm that the model with ResNet34 architecture has excellent capability in recognizing the additional Arabic characters for writing Jawi. The results of this research have the potential to support further developments in Jawi character recognition applications and provide valuable insights for researchers in the field of character recognition sourced from Arabic characters. Dataset augmentation results can be accessed at https://singkat.usk.ac.id/g/En0skCKGAR","PeriodicalId":30766,"journal":{"name":"Jurnal Rekayasa Elektrika","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140264867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-03-05DOI: 10.17529/jre.v20i1.33695
Ahmad Alvi Syahrin, D. O. Anggriawan, Eka Prasetyono, Epyk Sunarno, E. Wahjono, I. Sudiharto, S. Suhariningsih
Power quality disturbances cause equipment damage or financial losses. Therefore, the electric power system needs to identify and distinguish any power quality disturbances to reduce problems. This paper proposes hybrid methods combining FFT and ANFIS algorithm for detection of power quality disturbances. There are 11 types of power quality disturbances that can be detected, such as sag, swell, undervoltage, overvoltage, voltage flicker, voltage harmonic, sag + harmonic, swell + harmonic, undervoltage + harmonic, overvoltage + harmonic, and flicker + harmonic. The parameters used to detect disturbances are Vrms, Duration, THDv (Total Harmonic Distortion voltage), and Fluctuation-Count. The detection process starts by sensing voltage and calculating all the parameters, where THDv was obtained by Fast Fourier Transform. All the parameters such as Vrms, Duration, THDv, and Fluctuation-Count are processed by Adaptive Neuro-Fuzzy Inference System, and the result is the type of disturbance. Matlab simulations show that the suggested method performs outstandingly to identify 11 type of Power Quality Disturbances with 99.3% accuracy.
{"title":"Real-Time Detection of Power Quality Disturbance Using Fast Fourier Transform and Adaptive Neuro-Fuzzy Inference System","authors":"Ahmad Alvi Syahrin, D. O. Anggriawan, Eka Prasetyono, Epyk Sunarno, E. Wahjono, I. Sudiharto, S. Suhariningsih","doi":"10.17529/jre.v20i1.33695","DOIUrl":"https://doi.org/10.17529/jre.v20i1.33695","url":null,"abstract":"Power quality disturbances cause equipment damage or financial losses. Therefore, the electric power system needs to identify and distinguish any power quality disturbances to reduce problems. This paper proposes hybrid methods combining FFT and ANFIS algorithm for detection of power quality disturbances. There are 11 types of power quality disturbances that can be detected, such as sag, swell, undervoltage, overvoltage, voltage flicker, voltage harmonic, sag + harmonic, swell + harmonic, undervoltage + harmonic, overvoltage + harmonic, and flicker + harmonic. The parameters used to detect disturbances are Vrms, Duration, THDv (Total Harmonic Distortion voltage), and Fluctuation-Count. The detection process starts by sensing voltage and calculating all the parameters, where THDv was obtained by Fast Fourier Transform. All the parameters such as Vrms, Duration, THDv, and Fluctuation-Count are processed by Adaptive Neuro-Fuzzy Inference System, and the result is the type of disturbance. Matlab simulations show that the suggested method performs outstandingly to identify 11 type of Power Quality Disturbances with 99.3% accuracy.","PeriodicalId":30766,"journal":{"name":"Jurnal Rekayasa Elektrika","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140264055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-03-05DOI: 10.17529/jre.v20i1.34309
R. Negara, Novan Purba Wasesa, Zaid Muhammad, Ratna Mayasari, Sri Astuti
The data distribution mechanism of internet protocol (IP) technology is inefficient because it necessitates the user to await a response from the server. Named data networking (NDN) is a cutting-edge technology being assessed for enhancing IP networks, primarily because it incorporates a data packet caching technique on every router. However, the effectiveness of this approach is highly dependent on the router's content capacity, thus requiring the use data replacement mechanism when the router capacity is full. The least recently used (LRU) method is employed for cache replacement policy; yet, it is considered ineffective as it neglects the content's popularity. The LRU algorithm replaces the infrequently requested data, leading to inefficient caching of popular data when multiple users constantly request it. To address this problem, we propose a segmented LRU (SLRU) replacement strategy that considers content popularity. The SLRU will evaluate both popular content and content that has previously been popular in two segment categories, namely the probationary and protected segments. Icarus simulator was used to evaluate multiple comprehensive scenarios. Our experimental results show that the SLRU obtains a better cache hit ratio (CHR) and able to minimize latency and link load compared to existing cache replacement policies such as First In, First Out (FIFO), LRU, and Climb.
{"title":"Impact of Segmentation and Popularity-based Cache Replacement Policies on Named Data Networking","authors":"R. Negara, Novan Purba Wasesa, Zaid Muhammad, Ratna Mayasari, Sri Astuti","doi":"10.17529/jre.v20i1.34309","DOIUrl":"https://doi.org/10.17529/jre.v20i1.34309","url":null,"abstract":"The data distribution mechanism of internet protocol (IP) technology is inefficient because it necessitates the user to await a response from the server. Named data networking (NDN) is a cutting-edge technology being assessed for enhancing IP networks, primarily because it incorporates a data packet caching technique on every router. However, the effectiveness of this approach is highly dependent on the router's content capacity, thus requiring the use data replacement mechanism when the router capacity is full. The least recently used (LRU) method is employed for cache replacement policy; yet, it is considered ineffective as it neglects the content's popularity. The LRU algorithm replaces the infrequently requested data, leading to inefficient caching of popular data when multiple users constantly request it. To address this problem, we propose a segmented LRU (SLRU) replacement strategy that considers content popularity. The SLRU will evaluate both popular content and content that has previously been popular in two segment categories, namely the probationary and protected segments. Icarus simulator was used to evaluate multiple comprehensive scenarios. Our experimental results show that the SLRU obtains a better cache hit ratio (CHR) and able to minimize latency and link load compared to existing cache replacement policies such as First In, First Out (FIFO), LRU, and Climb.","PeriodicalId":30766,"journal":{"name":"Jurnal Rekayasa Elektrika","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140263880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Optical fiber can meet the demand for fronthaul on 5G networks that offer high bandwidth, large capacity, high data rate and is free from electromagnetic interference. However, deploying infrastructure faces issues like permits and high costs. Hybrid Radio over Fiber (RoF) technology with Radio over Free Space Optic (RoFSO) can be a solution in urban areas, where the installation requires high costs. This research investigates a hybrid RoF-RoFSO scheme at a frequency of mmWave 26 GHz by considering atmospheric attenuation values arising from meteorological effects, such as rain, smog, and dust, using Optisystem. This research considers QPSK, 16-QAM, and 64-QAM modulation schemes, distance variations on the FSO and the meteorological data from the Indonesian Meteorology, Climatology and Geophysics Agency (BMKG) from March 2022 to May 2022. The results show that attenuation due to high rainfall is the main cause of signal quality degradation and limits the transmission distance on the FSO link. The maximum distance is 600 m using the QPSK and 16-QAM modulation schemes, while for the 64-QAM modulation scheme, the maximum transmission distance is 500 m. Meanwhile, damping values caused by foggy and dusty conditions can reach distances of up to 1000 m for the three modulation schemes.
{"title":"Hybrid Radio over Fiber with Radio over Free Space Optic for 5G Fronthaul Network Implementation in Urban Areas","authors":"Nabila Syadzwina Effendi, Yus Natali, Catur Apriono","doi":"10.17529/jre.v19i3.31842","DOIUrl":"https://doi.org/10.17529/jre.v19i3.31842","url":null,"abstract":"Optical fiber can meet the demand for fronthaul on 5G networks that offer high bandwidth, large capacity, high data rate and is free from electromagnetic interference. However, deploying infrastructure faces issues like permits and high costs. Hybrid Radio over Fiber (RoF) technology with Radio over Free Space Optic (RoFSO) can be a solution in urban areas, where the installation requires high costs. This research investigates a hybrid RoF-RoFSO scheme at a frequency of mmWave 26 GHz by considering atmospheric attenuation values arising from meteorological effects, such as rain, smog, and dust, using Optisystem. This research considers QPSK, 16-QAM, and 64-QAM modulation schemes, distance variations on the FSO and the meteorological data from the Indonesian Meteorology, Climatology and Geophysics Agency (BMKG) from March 2022 to May 2022. The results show that attenuation due to high rainfall is the main cause of signal quality degradation and limits the transmission distance on the FSO link. The maximum distance is 600 m using the QPSK and 16-QAM modulation schemes, while for the 64-QAM modulation scheme, the maximum transmission distance is 500 m. Meanwhile, damping values caused by foggy and dusty conditions can reach distances of up to 1000 m for the three modulation schemes.","PeriodicalId":30766,"journal":{"name":"Jurnal Rekayasa Elektrika","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135865623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-09-25DOI: 10.17529/jre.v19i3.28686
Roslidar Roslidar, Karnaini Karnaini, Teuku Yuliar Arif
Air pollution is a factor that affects the clear skies and breathable air of the city. Humans cannot directly quantify the changes in air quality; hence we need a technological tool to detect the changes in air quality around them. This study proposed a prototype to monitor air quality using embedded system hardware of Arduino Uno-R4 and ESP8266. A Thingspeak database is used as a platform for data communication between smartphones and sensors in real time. The data is retrieved once every 15 seconds. In this prototype, the Arduino Uno-R3 is used as the main brain of the system to connect to WiFi communication via ESP8266 and to four (4) sensors, namely CO (MQ-7), CO2 (MQ-9), dust (PM10), and DHT22 (temperature and humidity). The developed prototype is portable and has low power consumption. Several testing locations have been identified to monitor the air pollution; (1) Simpang Lima Intersection and (2) Jeulingke Bus Stop in Banda Aceh. The system performance shows the connectivity between devices has only a delay of ± 1.1 seconds; therefore, the system is suitable for real-time usage.
空气污染是影响城市晴空和可呼吸空气的一个因素。人类无法直接量化空气质量的变化;因此,我们需要一种技术工具来检测他们周围空气质量的变化。本研究提出了一种基于Arduino Uno-R4和ESP8266嵌入式系统硬件的空气质量监测样机。Thingspeak数据库被用作智能手机和传感器之间实时数据通信的平台。数据每15秒检索一次。在这个原型中,Arduino Uno-R3被用作系统的主要大脑,通过ESP8266连接到WiFi通信,并连接到四个传感器,即CO (MQ-7), CO2 (MQ-9),粉尘(PM10)和DHT22(温度和湿度)。所开发的原型具有便携性和低功耗。已经确定了几个测试地点来监测空气污染;(1)班达亚齐的Simpang Lima十字路口和(2)Jeulingke公交站。系统性能显示,设备之间的连接延迟仅为±1.1秒;因此,该系统适合实时使用。
{"title":"IoT based System for Air Pollution Monitoring in Banda Aceh","authors":"Roslidar Roslidar, Karnaini Karnaini, Teuku Yuliar Arif","doi":"10.17529/jre.v19i3.28686","DOIUrl":"https://doi.org/10.17529/jre.v19i3.28686","url":null,"abstract":"Air pollution is a factor that affects the clear skies and breathable air of the city. Humans cannot directly quantify the changes in air quality; hence we need a technological tool to detect the changes in air quality around them. This study proposed a prototype to monitor air quality using embedded system hardware of Arduino Uno-R4 and ESP8266. A Thingspeak database is used as a platform for data communication between smartphones and sensors in real time. The data is retrieved once every 15 seconds. In this prototype, the Arduino Uno-R3 is used as the main brain of the system to connect to WiFi communication via ESP8266 and to four (4) sensors, namely CO (MQ-7), CO2 (MQ-9), dust (PM10), and DHT22 (temperature and humidity). The developed prototype is portable and has low power consumption. Several testing locations have been identified to monitor the air pollution; (1) Simpang Lima Intersection and (2) Jeulingke Bus Stop in Banda Aceh. The system performance shows the connectivity between devices has only a delay of ± 1.1 seconds; therefore, the system is suitable for real-time usage.","PeriodicalId":30766,"journal":{"name":"Jurnal Rekayasa Elektrika","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135865625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The utilization of other devices as relays in cooperative device-to-device (D2D) communication systems does not fully guarantee the security of confidential information from being intentionally or unintentionally accessed by eavesdroppers. Therefore, the implementation of a method to enhance the security performance of information is highly necessary. This paper proposes the application of relay selection mechanisms in a communication system with three relay protocols: Amplify-and-Forward (AF), Decode-and-Forward (DF), and Quantize-and-Forward (QF). The research method employs a mathematical modeling approach and simulations. The simulation results demonstrate an improvement in the level of information security in cooperative D2D communication systems using the proposed method in multiple relay protocols. The relay selection method has been evaluated and compared based on the Secrecy Outage Probability (SOP), which is one of the parameters for information security in the communication system. The SOP achieved is smaller with the implementation of the Max-Min relay selection technique in multi-relay cooperative communication networks. Considering the presence or absence of eavesdroppers, the SOP of the DF relay is smaller compared to other protocols. The impact of distance on secrecy capacity also indicates that the DF protocol utilizing multiple relays achieves higher results compared to other protocols, and the increased usage of relays also affects the simulation outcomes.
{"title":"Secrecy Capacity of Cooperative D2D Multi-relay Communication System with Multiple Protocols Based on Max-Min Relay Selection","authors":"Nurul Maulida Fitri, Yunida Yunida, Melinda Melinda, Nasaruddin Nasaruddin","doi":"10.17529/jre.v19i3.29486","DOIUrl":"https://doi.org/10.17529/jre.v19i3.29486","url":null,"abstract":"The utilization of other devices as relays in cooperative device-to-device (D2D) communication systems does not fully guarantee the security of confidential information from being intentionally or unintentionally accessed by eavesdroppers. Therefore, the implementation of a method to enhance the security performance of information is highly necessary. This paper proposes the application of relay selection mechanisms in a communication system with three relay protocols: Amplify-and-Forward (AF), Decode-and-Forward (DF), and Quantize-and-Forward (QF). The research method employs a mathematical modeling approach and simulations. The simulation results demonstrate an improvement in the level of information security in cooperative D2D communication systems using the proposed method in multiple relay protocols. The relay selection method has been evaluated and compared based on the Secrecy Outage Probability (SOP), which is one of the parameters for information security in the communication system. The SOP achieved is smaller with the implementation of the Max-Min relay selection technique in multi-relay cooperative communication networks. Considering the presence or absence of eavesdroppers, the SOP of the DF relay is smaller compared to other protocols. The impact of distance on secrecy capacity also indicates that the DF protocol utilizing multiple relays achieves higher results compared to other protocols, and the increased usage of relays also affects the simulation outcomes.","PeriodicalId":30766,"journal":{"name":"Jurnal Rekayasa Elektrika","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135865622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Numerous tools, kits, and other items are utilized daily by many individuals in the college laboratories. Without a proper inventory record, there is a risk of missing and misplacing some items. The system for tracking items using Radio Frequency Identification (RFID) accessed via the website has been designed to track the location of each item in the laboratory using RFID technology. The primary objective of this system is to monitor and record inventory. Information regarding the inventory is stored in a database, which can be accessed to track inventory and review the history of specific items via the Internet. The designed system is capable of tracking and managing laboratory equipment inventory using RFID, accessible through a web-based platform.
{"title":"Web-Based Item Tracking System Using RFID","authors":"Azinurrachman Maulana, Siti Aisyah, Prasaja Wikanta","doi":"10.17529/jre.v19i3.27050","DOIUrl":"https://doi.org/10.17529/jre.v19i3.27050","url":null,"abstract":"Numerous tools, kits, and other items are utilized daily by many individuals in the college laboratories. Without a proper inventory record, there is a risk of missing and misplacing some items. The system for tracking items using Radio Frequency Identification (RFID) accessed via the website has been designed to track the location of each item in the laboratory using RFID technology. The primary objective of this system is to monitor and record inventory. Information regarding the inventory is stored in a database, which can be accessed to track inventory and review the history of specific items via the Internet. The designed system is capable of tracking and managing laboratory equipment inventory using RFID, accessible through a web-based platform.","PeriodicalId":30766,"journal":{"name":"Jurnal Rekayasa Elektrika","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135865624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-09-25DOI: 10.17529/jre.v19i3.33147
Muhammad Thoriq Arkaan Susila, Ilham Nadiyansyah Firdaus, Muhammad Farid Chuzairi, Dien Rahmawati
Floods that come all of a sudden cause many people to be unable to prepare themselves to deal with it, so material losses to health problems cannot be avoided. Therefore, a system is needed to provide early warning to the public before a flood occurs. As technology develops, water levels in an area can be monitored to anticipate flooding using the Internet of Things (IoT). IoT can help to monitor and warn of floods in real-time and continuously. In this research, the system will be placed in areas that often cause flooding. Monitoring results from sensor readings will be stored in the cloud database. The water level category is divided into 4 levels, namely “Safe”, “Standby”, “Careful”, and “Danger”. The system uses IoT and a database to send water level status to users as notifications on applications. The buzzer will sound as a warning sign when the water level enters the “Danger” status. The system test results show that the sensor has a very good level of accuracy with an error percentage of 0.242131%, and IoT connectivity can reach a distance of up to 20 meters.
{"title":"Flood Early Warning System Prototype Based on Ultrasonic Sensor and Internet of Things","authors":"Muhammad Thoriq Arkaan Susila, Ilham Nadiyansyah Firdaus, Muhammad Farid Chuzairi, Dien Rahmawati","doi":"10.17529/jre.v19i3.33147","DOIUrl":"https://doi.org/10.17529/jre.v19i3.33147","url":null,"abstract":"Floods that come all of a sudden cause many people to be unable to prepare themselves to deal with it, so material losses to health problems cannot be avoided. Therefore, a system is needed to provide early warning to the public before a flood occurs. As technology develops, water levels in an area can be monitored to anticipate flooding using the Internet of Things (IoT). IoT can help to monitor and warn of floods in real-time and continuously. In this research, the system will be placed in areas that often cause flooding. Monitoring results from sensor readings will be stored in the cloud database. The water level category is divided into 4 levels, namely “Safe”, “Standby”, “Careful”, and “Danger”. The system uses IoT and a database to send water level status to users as notifications on applications. The buzzer will sound as a warning sign when the water level enters the “Danger” status. The system test results show that the sensor has a very good level of accuracy with an error percentage of 0.242131%, and IoT connectivity can reach a distance of up to 20 meters.","PeriodicalId":30766,"journal":{"name":"Jurnal Rekayasa Elektrika","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135865304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}