Pub Date : 2020-10-31DOI: 10.5614/10.5614/ITBJ.ICT.RES.APPL.2020.14.2.1
K. Almotairi
Digital image histogram equalization is an important technique in image processing to improve the quality of the visual appearance of images. However, the available methods suffer from several problems such as side effects and noise, brightness and contrast problems, loss of information and details, and failure in enhancement and in achieving the desired results. Therefore, the Adaptive Global Two-Stage Histogram Equalization (GTSHE) method for visual property enhancement of gray-level images is proposed. The first stage aims to clip the histogram and equalize the clipped histogram based on the number of occurrences of gray-level values. The second stage adaptively adjusts the space between occurrences by using a probability density function and different cumulative distribution functions that depend on the available and missing gray-level occurrences. Experiments were conducted using a number of benchmark datasets of images such as the Galaxies, Biomedical, Miscellaneous, Aerials, and Texture datasets. The results of the experiments were compared with a number of well-known methods, i.e. HE, AHEA, ESIHE, and MVSIHE, to evaluate the performance of the proposed method. The evaluation analysis showed that the proposed GTSHE method achieved a higher accuracy rate compared to the other methods.
{"title":"A Global Two-Stage Histogram Equalization Method for Gray-Level Images","authors":"K. Almotairi","doi":"10.5614/10.5614/ITBJ.ICT.RES.APPL.2020.14.2.1","DOIUrl":"https://doi.org/10.5614/10.5614/ITBJ.ICT.RES.APPL.2020.14.2.1","url":null,"abstract":"Digital image histogram equalization is an important technique in image processing to improve the quality of the visual appearance of images. However, the available methods suffer from several problems such as side effects and noise, brightness and contrast problems, loss of information and details, and failure in enhancement and in achieving the desired results. Therefore, the Adaptive Global Two-Stage Histogram Equalization (GTSHE) method for visual property enhancement of gray-level images is proposed. The first stage aims to clip the histogram and equalize the clipped histogram based on the number of occurrences of gray-level values. The second stage adaptively adjusts the space between occurrences by using a probability density function and different cumulative distribution functions that depend on the available and missing gray-level occurrences. Experiments were conducted using a number of benchmark datasets of images such as the Galaxies, Biomedical, Miscellaneous, Aerials, and Texture datasets. The results of the experiments were compared with a number of well-known methods, i.e. HE, AHEA, ESIHE, and MVSIHE, to evaluate the performance of the proposed method. The evaluation analysis showed that the proposed GTSHE method achieved a higher accuracy rate compared to the other methods.","PeriodicalId":42785,"journal":{"name":"Journal of ICT Research and Applications","volume":"1 1","pages":""},"PeriodicalIF":0.6,"publicationDate":"2020-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42910753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-10-31DOI: 10.5614/10.5614/ITBJ.ICT.RES.APPL.2020.14.2.2
A. Khaytbaev
This article proposes a solution for the routing problem in wireless sensor networks (WSN) based on a neural mechanism. The basic concepts of wireless sensor networks, artificial neural networks (ANNs), and WSN routing protocols are presented. The Kohonen ANN was selected to solve the problem of routing in wireless sensor networks based on a neural mechanism. A radio visibility matrix is proposed, which is a mathematical description of the connectivity of network nodes and the radio visibility of each node with respect to all other network nodes. Based on the Kohonen ANN trained by the constructive method, a method for WSN neural network clustering was developed. Two software-modeling environments are presented that were created to confirm the theory with respect to the logic of the developed methods for WSN clustering, their correction and the verification of their adequacy. Numerical results of modeling the solution of the routing problem in a wireless sensor network based on a neural mechanism by neural network clustering, the WSN matrix clustering method and the energy distance neural clustering protocol (EDNCP) are presented. It was found that the developed EDNCP protocol was 29% more efficient than known analogs.
{"title":"Decision Routing Problems in A Wireless Sensor Network Based on A Neural Mechanism","authors":"A. Khaytbaev","doi":"10.5614/10.5614/ITBJ.ICT.RES.APPL.2020.14.2.2","DOIUrl":"https://doi.org/10.5614/10.5614/ITBJ.ICT.RES.APPL.2020.14.2.2","url":null,"abstract":"This article proposes a solution for the routing problem in wireless sensor networks (WSN) based on a neural mechanism. The basic concepts of wireless sensor networks, artificial neural networks (ANNs), and WSN routing protocols are presented. The Kohonen ANN was selected to solve the problem of routing in wireless sensor networks based on a neural mechanism. A radio visibility matrix is proposed, which is a mathematical description of the connectivity of network nodes and the radio visibility of each node with respect to all other network nodes. Based on the Kohonen ANN trained by the constructive method, a method for WSN neural network clustering was developed. Two software-modeling environments are presented that were created to confirm the theory with respect to the logic of the developed methods for WSN clustering, their correction and the verification of their adequacy. Numerical results of modeling the solution of the routing problem in a wireless sensor network based on a neural mechanism by neural network clustering, the WSN matrix clustering method and the energy distance neural clustering protocol (EDNCP) are presented. It was found that the developed EDNCP protocol was 29% more efficient than known analogs.","PeriodicalId":42785,"journal":{"name":"Journal of ICT Research and Applications","volume":"14 1","pages":"115-133"},"PeriodicalIF":0.6,"publicationDate":"2020-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48981008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-07-28DOI: 10.5614/itbj.ict.res.appl.2020.14.1.5
M. Jalil, Jenan Ayad, Hanan j. Abdulkareem
Higher-order modulation schemes in optical communication systems that suffer from several impairments can use artificial intelligence (AI) algorithms, among other possible techniques, to mitigate these issues. In this paper, several techniques for optical communication systems have been proposed to enhance the performance of dual-polarization (DP) M-ary Quadrature Amplitude Modulation (M-QAM) as DP-16-QAM, DP-64-QAM, DP-128-QAM, and DP-256-QAM with 240Gbps data rate. Artificial neural networks (ANNs) with seven different training algorithms have been applied to optimize the optical communication system. A high optimization of modulation format identification (MFI) with accuracy up to 100% was obtained at about 13 dB OSNR and at 22 dB OSNR for the DP-265-QAM format.
{"title":"Modulation Scheme Identification Based on Artificial Neural Network Algorithms for Optical Communication System","authors":"M. Jalil, Jenan Ayad, Hanan j. Abdulkareem","doi":"10.5614/itbj.ict.res.appl.2020.14.1.5","DOIUrl":"https://doi.org/10.5614/itbj.ict.res.appl.2020.14.1.5","url":null,"abstract":"Higher-order modulation schemes in optical communication systems that suffer from several impairments can use artificial intelligence (AI) algorithms, among other possible techniques, to mitigate these issues. In this paper, several techniques for optical communication systems have been proposed to enhance the performance of dual-polarization (DP) M-ary Quadrature Amplitude Modulation (M-QAM) as DP-16-QAM, DP-64-QAM, DP-128-QAM, and DP-256-QAM with 240Gbps data rate. Artificial neural networks (ANNs) with seven different training algorithms have been applied to optimize the optical communication system. A high optimization of modulation format identification (MFI) with accuracy up to 100% was obtained at about 13 dB OSNR and at 22 dB OSNR for the DP-265-QAM format.","PeriodicalId":42785,"journal":{"name":"Journal of ICT Research and Applications","volume":"14 1","pages":"69-77"},"PeriodicalIF":0.6,"publicationDate":"2020-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45283403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-07-28DOI: 10.5614/itbj.ict.res.appl.2020.14.1.1
P. Adi, Pramudi Arsiwi
One of the most used watermarking algorithms is Singular Value Decomposition (SVD), which has a balanced level of imperceptibility and robustness. However, SVD uses a singular matrix for embedding and two orthogonal matrices for reconstruction, which is inefficient. In this paper, a Hadamard matrix is used to get a singular matrix for the reconstruction process. Moreover, SVD works with a floating-point value, which takes long processing time, while the Hadamard matrix works with an integer range, which is more efficient. Visual measurement showed that SVD and the new method had average NC values of 0.8321 and 0.8293, whereas the average SSIM values resulted in the same value (0.9925). In terms of processing time, the proposed method ran faster than SVD with an embedding and extraction time of 0.6308 and 0.2163 seconds against 0.8419 and 0.2935 seconds. The proposed method successfully reduced the running time while maintaining imperceptibility and robustness.
{"title":"A Novel Watermarking Method using Hadamard Matrix Quantization","authors":"P. Adi, Pramudi Arsiwi","doi":"10.5614/itbj.ict.res.appl.2020.14.1.1","DOIUrl":"https://doi.org/10.5614/itbj.ict.res.appl.2020.14.1.1","url":null,"abstract":"One of the most used watermarking algorithms is Singular Value Decomposition (SVD), which has a balanced level of imperceptibility and robustness. However, SVD uses a singular matrix for embedding and two orthogonal matrices for reconstruction, which is inefficient. In this paper, a Hadamard matrix is used to get a singular matrix for the reconstruction process. Moreover, SVD works with a floating-point value, which takes long processing time, while the Hadamard matrix works with an integer range, which is more efficient. Visual measurement showed that SVD and the new method had average NC values of 0.8321 and 0.8293, whereas the average SSIM values resulted in the same value (0.9925). In terms of processing time, the proposed method ran faster than SVD with an embedding and extraction time of 0.6308 and 0.2163 seconds against 0.8419 and 0.2935 seconds. The proposed method successfully reduced the running time while maintaining imperceptibility and robustness.","PeriodicalId":42785,"journal":{"name":"Journal of ICT Research and Applications","volume":"14 1","pages":"1-15"},"PeriodicalIF":0.6,"publicationDate":"2020-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45795606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-07-28DOI: 10.5614/itbj.ict.res.appl.2020.14.1.3
Santo Wijaya, S. Hariyadi, Fransisca Debora, Galih Supriadi
This paper presents the design and implementation of a poka-yoke system in a stationary spot welding (SSW) production line. The human-based SSW production process in a local automotive component company was considered in this study. Due to the repetitive and fast cycle-time of the production process, human errors are inevitable. Such errors lead to customer claims with the subject company. Based on the data of customer claims, there were three major quality issues (missing nuts, wrong-size nuts, asymmetrical spot weld marks). Due to the production line being manual, control of planned production and actual production was poor, leading to delivery issues (delayed delivery). Together these major issues contributed to 34.7% of customer claims on average from May to December 2018. The objective of this study was to solve the issues in the subject company through design and implementing a poka-yoke system utilizing the internet-of-things (IoT) platform to ensure data acquisition and information storage, and production progress monitoring and data analysis to meet user requirements. The combined approach of the poka-yoke system utilizing IoT in the SSW production line yielded satisfactory results with reduced customer claims to 5.3% for the stated problems from February to May 2019. Hence, the design objective was achieved.
{"title":"Design and Implementation of Poka-Yoke System in Stationary Spot-Welding Production Line Utilizing Internet-of-Things Platform","authors":"Santo Wijaya, S. Hariyadi, Fransisca Debora, Galih Supriadi","doi":"10.5614/itbj.ict.res.appl.2020.14.1.3","DOIUrl":"https://doi.org/10.5614/itbj.ict.res.appl.2020.14.1.3","url":null,"abstract":"This paper presents the design and implementation of a poka-yoke system in a stationary spot welding (SSW) production line. The human-based SSW production process in a local automotive component company was considered in this study. Due to the repetitive and fast cycle-time of the production process, human errors are inevitable. Such errors lead to customer claims with the subject company. Based on the data of customer claims, there were three major quality issues (missing nuts, wrong-size nuts, asymmetrical spot weld marks). Due to the production line being manual, control of planned production and actual production was poor, leading to delivery issues (delayed delivery). Together these major issues contributed to 34.7% of customer claims on average from May to December 2018. The objective of this study was to solve the issues in the subject company through design and implementing a poka-yoke system utilizing the internet-of-things (IoT) platform to ensure data acquisition and information storage, and production progress monitoring and data analysis to meet user requirements. The combined approach of the poka-yoke system utilizing IoT in the SSW production line yielded satisfactory results with reduced customer claims to 5.3% for the stated problems from February to May 2019. Hence, the design objective was achieved.","PeriodicalId":42785,"journal":{"name":"Journal of ICT Research and Applications","volume":"14 1","pages":"34-50"},"PeriodicalIF":0.6,"publicationDate":"2020-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44780513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-07-28DOI: 10.5614/itbj.ict.res.appl.2020.14.1.4
F. Z. Ruskanda, D. H. Widyantoro, A. Purwarianti
The use of dependency rules for aspect extraction tasks in aspect-based sentiment analysis is a promising approach. One problem with this approach is incomplete rules. This paper presents an aspect extraction rule learning method that combines dependency rules with the Sequential Covering algorithm. Sequential Covering is known for its characteristics in constructing rules that increase positive examples covered and decrease negative ones. This property is vital to make sure that the rule set used has high performance, but not inevitably high coverage, which is a characteristic of the aspect extraction task. To test the new method, four datasets were used from four product domains and three baselines: Double Propagation, Aspectator, and a previous work by the authors. The results show that the proposed approach performed better than the three baseline methods for the F-measure metric, with the highest F-measure value at 0.633.
{"title":"Efficient Utilization of Dependency Pattern and Sequential Covering for Aspect Extraction Rule Learning","authors":"F. Z. Ruskanda, D. H. Widyantoro, A. Purwarianti","doi":"10.5614/itbj.ict.res.appl.2020.14.1.4","DOIUrl":"https://doi.org/10.5614/itbj.ict.res.appl.2020.14.1.4","url":null,"abstract":"The use of dependency rules for aspect extraction tasks in aspect-based sentiment analysis is a promising approach. One problem with this approach is incomplete rules. This paper presents an aspect extraction rule learning method that combines dependency rules with the Sequential Covering algorithm. Sequential Covering is known for its characteristics in constructing rules that increase positive examples covered and decrease negative ones. This property is vital to make sure that the rule set used has high performance, but not inevitably high coverage, which is a characteristic of the aspect extraction task. To test the new method, four datasets were used from four product domains and three baselines: Double Propagation, Aspectator, and a previous work by the authors. The results show that the proposed approach performed better than the three baseline methods for the F-measure metric, with the highest F-measure value at 0.633.","PeriodicalId":42785,"journal":{"name":"Journal of ICT Research and Applications","volume":" ","pages":""},"PeriodicalIF":0.6,"publicationDate":"2020-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44860233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-07-28DOI: 10.5614/itbj.ict.res.appl.2020.14.1.2
Gladina Desideria, Y. Bandung
Designers are often confronted with challenges or difficulties when designing user interfaces for mobile applications. The information must be clearly delivered to the user and also have an aesthetic appearance and good discoverability. One widely used method for conveying information is directing user attention to a component that is related to his or her task. We propose a recommender system by considering user efficiency in a user attention model. It can give suggestions for designers to improve the appearance of the most efficient component. This recommender system is aimed to help designers in the iteration process of usability engineering, especially to direct user attention to the most efficient component. This system analyzes actual user attention and then refines the user interface based on the energy of each component compared with the baseline energy. Our proposed model successfully increased the efficiency of a mobile learning application from 83.65% to 85.58% and improved discoverability of the most efficient component, thus reducing the task completion time.
{"title":"User Efficiency Model in Usability Engineering for User Interface Design Refinement of Mobile Application","authors":"Gladina Desideria, Y. Bandung","doi":"10.5614/itbj.ict.res.appl.2020.14.1.2","DOIUrl":"https://doi.org/10.5614/itbj.ict.res.appl.2020.14.1.2","url":null,"abstract":"Designers are often confronted with challenges or difficulties when designing user interfaces for mobile applications. The information must be clearly delivered to the user and also have an aesthetic appearance and good discoverability. One widely used method for conveying information is directing user attention to a component that is related to his or her task. We propose a recommender system by considering user efficiency in a user attention model. It can give suggestions for designers to improve the appearance of the most efficient component. This recommender system is aimed to help designers in the iteration process of usability engineering, especially to direct user attention to the most efficient component. This system analyzes actual user attention and then refines the user interface based on the energy of each component compared with the baseline energy. Our proposed model successfully increased the efficiency of a mobile learning application from 83.65% to 85.58% and improved discoverability of the most efficient component, thus reducing the task completion time.","PeriodicalId":42785,"journal":{"name":"Journal of ICT Research and Applications","volume":"14 1","pages":"16-33"},"PeriodicalIF":0.6,"publicationDate":"2020-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43386198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-07-28DOI: 10.5614/itbj.ict.res.appl.2020.14.1.6
S. Goto, Y. Matsuda, T. Sugi
In this study, a simulated remote monitoring and operation system was developed for an assumed remote area energy plant in a developing country with few skilled operators and unstable electric power supply. It is useful for skilled operators to be able to monitor and operate the energy system from a remote site. Moreover, low-power equipment is required for the Web server in order to reduce the electric power consumption of the remote monitoring system. The system has the function of remote monitoring of data obtained from sensors through a programmable logic controller (PLC), while the monitoring function is realized by a Web application. The PLC can be operated from a remote monitoring site. The simulated remote monitoring and operation system was constructed using an Internet connection and a virtual private network (VPN) connection. The Internet connection was used for open monitoring of acquired data by the public. The VPN was used for secure remote operation of the device on the plant side from a monitoring PC. The effectiveness of the developed system was confirmed though experiments with a simple simulated plant.
{"title":"Development of Simulated Remote Monitoring and Operation System under Unstable Electric Power Supply","authors":"S. Goto, Y. Matsuda, T. Sugi","doi":"10.5614/itbj.ict.res.appl.2020.14.1.6","DOIUrl":"https://doi.org/10.5614/itbj.ict.res.appl.2020.14.1.6","url":null,"abstract":"In this study, a simulated remote monitoring and operation system was developed for an assumed remote area energy plant in a developing country with few skilled operators and unstable electric power supply. It is useful for skilled operators to be able to monitor and operate the energy system from a remote site. Moreover, low-power equipment is required for the Web server in order to reduce the electric power consumption of the remote monitoring system. The system has the function of remote monitoring of data obtained from sensors through a programmable logic controller (PLC), while the monitoring function is realized by a Web application. The PLC can be operated from a remote monitoring site. The simulated remote monitoring and operation system was constructed using an Internet connection and a virtual private network (VPN) connection. The Internet connection was used for open monitoring of acquired data by the public. The VPN was used for secure remote operation of the device on the plant side from a monitoring PC. The effectiveness of the developed system was confirmed though experiments with a simple simulated plant.","PeriodicalId":42785,"journal":{"name":"Journal of ICT Research and Applications","volume":" ","pages":""},"PeriodicalIF":0.6,"publicationDate":"2020-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43630786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-31DOI: 10.5614/itbj.ict.res.appl.2019.13.3.4
Poonam, H. Kumar, Santar Pal Singh
Heterogeneous Mobile Ad-hoc Networks (H-MANET) contain different configuration nodes, each of which communicates over a wireless channel and is capable of movement. Heterogeneous wireless networking has attracted lot of interest from consumers in the previous few years for its applications in mobile and personal communications. One of the main constraints in MANET is the high probability of failure due to energy-exhausted nodes. So if the path selected for communication has low battery life then the path breaks prematurely and the re-discovery phase starts, which costs more overhead in the network. Therefore, there is unequal consumption of node energy, which must be prevented. The energy expenditure of the nodes should be balanced in order to minimize path breakage. This can be done by finding the communication path that is the most energy-efficient among alternative disjoint paths. This approach reduces path breakage and routing overhead caused by nodes with low battery life dying in the communication path, thus increasing the network’s lifetime.
{"title":"An Energy Constraint Approach to Improve Lifetime and Reduce Routing Overhead in Heterogeneous MANET","authors":"Poonam, H. Kumar, Santar Pal Singh","doi":"10.5614/itbj.ict.res.appl.2019.13.3.4","DOIUrl":"https://doi.org/10.5614/itbj.ict.res.appl.2019.13.3.4","url":null,"abstract":"Heterogeneous Mobile Ad-hoc Networks (H-MANET) contain different configuration nodes, each of which communicates over a wireless channel and is capable of movement. Heterogeneous wireless networking has attracted lot of interest from consumers in the previous few years for its applications in mobile and personal communications. One of the main constraints in MANET is the high probability of failure due to energy-exhausted nodes. So if the path selected for communication has low battery life then the path breaks prematurely and the re-discovery phase starts, which costs more overhead in the network. Therefore, there is unequal consumption of node energy, which must be prevented. The energy expenditure of the nodes should be balanced in order to minimize path breakage. This can be done by finding the communication path that is the most energy-efficient among alternative disjoint paths. This approach reduces path breakage and routing overhead caused by nodes with low battery life dying in the communication path, thus increasing the network’s lifetime.","PeriodicalId":42785,"journal":{"name":"Journal of ICT Research and Applications","volume":"13 1","pages":"228-240"},"PeriodicalIF":0.6,"publicationDate":"2019-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70736742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-31DOI: 10.5614/itbj.ict.res.appl.2019.13.3.3
A. Munir, Y. Taryana, M. Yunus, H. Nusantara, M. R. Effendi
This paper presents the development of a two-stage low noise amplifier (LNA) operating at the S-band frequency that is implemented using the non-simultaneous conjugate match (NSCM) technique. The motivation of this work was to solve the issue of the gain of LNAs designed using the most commonly used technique, i.e. simultaneous conjugate match (SCM), which often produce an increase of other parameter values, i.e. noise figure and voltage standing wave ratio (VSWR). Prior to hardware implementation, the circuit simulation software Advanced Design System (ADS) was applied to design the two-stage S-band LNA and to determine the desired trade-off between its parameters. The proposed two-stage S-band LNA was deployed on an Arlon DiClad527 using a bipolar junction transistor (BJT), type BFP420. Meanwhile, to achieve impedances that match the two-stage S-band LNA circuit, microstrip lines were employed at the input port, the interstage, and the output port. Experimental characterization showed that the realized two-stage S-band LNA produced a gain of 22.77 dB and a noise figure of 3.58 dB at a frequency of 3 GHz. These results were 6.1 dB lower than the simulated gain and 0.76 dB higher than the simulated noise figure respectively.
本文介绍了一种工作在s波段的两级低噪声放大器(LNA),该放大器采用非同时共轭匹配(NSCM)技术实现。这项工作的动机是为了解决使用最常用的技术(即同时共轭匹配(SCM))设计的LNAs的增益问题,该技术通常会产生其他参数值的增加,即噪声系数和电压驻波比(VSWR)。在硬件实现之前,应用电路仿真软件Advanced Design System (ADS)来设计两级s波段LNA,并确定其参数之间的期望权衡。所提出的两级s波段LNA采用BFP420型双极结晶体管(BJT)部署在Arlon DiClad527上。同时,为了实现与两级s波段LNA电路相匹配的阻抗,在输入端口、级间端口和输出端口采用微带线。实验表征表明,所实现的两级s波段LNA在3ghz频率下的增益为22.77 dB,噪声系数为3.58 dB。结果比模拟增益低6.1 dB,比模拟噪声系数高0.76 dB。
{"title":"Two-stage S-Band LNA Development Using Non-Simultaneous Conjugate Match Technique","authors":"A. Munir, Y. Taryana, M. Yunus, H. Nusantara, M. R. Effendi","doi":"10.5614/itbj.ict.res.appl.2019.13.3.3","DOIUrl":"https://doi.org/10.5614/itbj.ict.res.appl.2019.13.3.3","url":null,"abstract":"This paper presents the development of a two-stage low noise amplifier (LNA) operating at the S-band frequency that is implemented using the non-simultaneous conjugate match (NSCM) technique. The motivation of this work was to solve the issue of the gain of LNAs designed using the most commonly used technique, i.e. simultaneous conjugate match (SCM), which often produce an increase of other parameter values, i.e. noise figure and voltage standing wave ratio (VSWR). Prior to hardware implementation, the circuit simulation software Advanced Design System (ADS) was applied to design the two-stage S-band LNA and to determine the desired trade-off between its parameters. The proposed two-stage S-band LNA was deployed on an Arlon DiClad527 using a bipolar junction transistor (BJT), type BFP420. Meanwhile, to achieve impedances that match the two-stage S-band LNA circuit, microstrip lines were employed at the input port, the interstage, and the output port. Experimental characterization showed that the realized two-stage S-band LNA produced a gain of 22.77 dB and a noise figure of 3.58 dB at a frequency of 3 GHz. These results were 6.1 dB lower than the simulated gain and 0.76 dB higher than the simulated noise figure respectively.","PeriodicalId":42785,"journal":{"name":"Journal of ICT Research and Applications","volume":"13 1","pages":"213-227"},"PeriodicalIF":0.6,"publicationDate":"2019-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48090165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}