Differential evolution (DE) is a population-based optimization algorithm widely used to solve a variety of continuous optimization problems. The self-adaptive DE algorithm improves the DE by encoding individual parameters to produce and propagate better solutions. This paper proposes a self-adaptive differential evolution algorithm with dynamic fitness-ranking mutation and pheromone strategy (SDE-FMP). The algorithm introduces the dynamical mutation operation using the fitness rank of the individuals to divide the population into three groups and then select groups and their vectors with adaptive probabilities to create a mutant vector. Mutation and crossover operations use the encoded scaling factor and the crossover rate values in a target vector to generate the corresponding trial vector. The values are changed according to the pheromone when the trial vector is inferior in the selection, whereas the pheromone is increased when the trial vector is superior. In addition, the algorithm also employs the resetting operation to unlearn and relearn the dominant pheromone values in the progressing search. The proposed SDE-FMP algorithm using the suitable resetting periods is compared with the well-known adaptive DE algorithms on several test problems. The results show that SDE-FMP can give high-precision solutions and outperforms the compared methods.
差分进化(DE)是一种基于群体的优化算法,广泛用于解决各种连续优化问题。自适应差分进化算法通过对个体参数进行编码来改进差分进化算法,从而产生并传播更好的解。本文提出了一种自适应微分进化算法,该算法具有动态适应度排名突变和信息素策略(SDE-FMP)。该算法引入了动态突变操作,利用个体的适应度等级将种群分为三组,然后以自适应概率选择组及其向量,创建突变向量。突变和交叉操作使用目标向量中的编码缩放因子和交叉率值来生成相应的试验向量。当试验向量在选择中处于劣势时,这些值会根据信息素发生变化,而当试验向量处于优势时,信息素则会增加。此外,该算法还采用了重置操作,以在搜索过程中解除和重新学习占优势的信息素值。在几个测试问题上,将使用合适重置期的 SDE-FMP 算法与著名的自适应 DE 算法进行了比较。结果表明,SDE-FMP 可以给出高精度的解决方案,其性能优于所比较的方法。
{"title":"Self-adaptive differential evolution algorithm with dynamic fitness-ranking mutation and pheromone strategy","authors":"Pirapong Singsathid, J. Wetweerapong, P. Puphasuk","doi":"10.11591/eei.v13i1.6590","DOIUrl":"https://doi.org/10.11591/eei.v13i1.6590","url":null,"abstract":"Differential evolution (DE) is a population-based optimization algorithm widely used to solve a variety of continuous optimization problems. The self-adaptive DE algorithm improves the DE by encoding individual parameters to produce and propagate better solutions. This paper proposes a self-adaptive differential evolution algorithm with dynamic fitness-ranking mutation and pheromone strategy (SDE-FMP). The algorithm introduces the dynamical mutation operation using the fitness rank of the individuals to divide the population into three groups and then select groups and their vectors with adaptive probabilities to create a mutant vector. Mutation and crossover operations use the encoded scaling factor and the crossover rate values in a target vector to generate the corresponding trial vector. The values are changed according to the pheromone when the trial vector is inferior in the selection, whereas the pheromone is increased when the trial vector is superior. In addition, the algorithm also employs the resetting operation to unlearn and relearn the dominant pheromone values in the progressing search. The proposed SDE-FMP algorithm using the suitable resetting periods is compared with the well-known adaptive DE algorithms on several test problems. The results show that SDE-FMP can give high-precision solutions and outperforms the compared methods.","PeriodicalId":502860,"journal":{"name":"Bulletin of Electrical Engineering and Informatics","volume":"58 9","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139687677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mahdi S. Almhanna, Tariq A. Murshedi, F. S. Al-Turaihi, Rafah M. Almuttairi
Networks consist of numerous resources; it is crucial not to overlook fault tolerance and consider it during planning. This is because errors during implementation can result in wasted time and effort, thereby squandering these resources. One solution to address this issue effectively is to implement the task on multiple resources to minimize the occurrence of failed tasks. However, employing an unspecified or fixed number of resources can lead to the depletion of network resources and the overall failure of the network. Replication plays a pivotal role in enhancing data availability in distributed systems. By storing data in multiple locations, users can still access it even if some copies are unavailable due to site failure. Many replication-based algorithms utilize a predetermined number of iterations per function, which may consume excessive network resources, even if the ongoing task does not require such abundant resources. This paper proposes task replication as a viable mechanism for an efficient and fault-tolerant scheduling system. We introduce an algorithm that dynamically selects the optimal and minimal number of replicas based on the network's failure history. This approach aims to minimize the failure rate during task execution.
{"title":"Customizing the minimum number of replicas for achieving fault tolerance in a cloud/grid environment","authors":"Mahdi S. Almhanna, Tariq A. Murshedi, F. S. Al-Turaihi, Rafah M. Almuttairi","doi":"10.11591/eei.v13i1.5413","DOIUrl":"https://doi.org/10.11591/eei.v13i1.5413","url":null,"abstract":"Networks consist of numerous resources; it is crucial not to overlook fault tolerance and consider it during planning. This is because errors during implementation can result in wasted time and effort, thereby squandering these resources. One solution to address this issue effectively is to implement the task on multiple resources to minimize the occurrence of failed tasks. However, employing an unspecified or fixed number of resources can lead to the depletion of network resources and the overall failure of the network. Replication plays a pivotal role in enhancing data availability in distributed systems. By storing data in multiple locations, users can still access it even if some copies are unavailable due to site failure. Many replication-based algorithms utilize a predetermined number of iterations per function, which may consume excessive network resources, even if the ongoing task does not require such abundant resources. This paper proposes task replication as a viable mechanism for an efficient and fault-tolerant scheduling system. We introduce an algorithm that dynamically selects the optimal and minimal number of replicas based on the network's failure history. This approach aims to minimize the failure rate during task execution.","PeriodicalId":502860,"journal":{"name":"Bulletin of Electrical Engineering and Informatics","volume":"52 27","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139683884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Traditional methods for tracking the paths of driverless vehicles use plant models to determine the corresponding control laws. Due to the intricate interactions between the road and the tires, time-varying characteristics, and unidentified disturbances. It is challenging to create an accurate vehicle model. As a result, data-driven controllers, which are independent of a predetermined plant model are becoming more and more well-liked. This work implements adaptive cruise control (ACC) by employing a control approach called extremum seeking technique (EST), which is a model-free control (MFC), to control a vehicle braking and longitudinal acceleration. The main aim here is to create an ego vehicle that travels at a specific speed with maintaining a secure space with respect to a guide vehicle. A car including an ACC technique called ego car, exploits radar to determine relative velocity and relative space relating to the guiding car. The ACC technique is considered to keep maintain a relatively secure space or a preferred cruising velocity concerning the guiding vehicle. The developed model succeeded to determine the relative velocity and relative space according for the ego car to another guiding car with acceleration not more than ±2 m/s2 and spacing error less than 6 m.
{"title":"Controlling a vehicle braking and longitudinal acceleration using a seeking control approach","authors":"S. A. Salman, A. Shallal, Ahmad H. Sabry","doi":"10.11591/eei.v13i1.5639","DOIUrl":"https://doi.org/10.11591/eei.v13i1.5639","url":null,"abstract":"Traditional methods for tracking the paths of driverless vehicles use plant models to determine the corresponding control laws. Due to the intricate interactions between the road and the tires, time-varying characteristics, and unidentified disturbances. It is challenging to create an accurate vehicle model. As a result, data-driven controllers, which are independent of a predetermined plant model are becoming more and more well-liked. This work implements adaptive cruise control (ACC) by employing a control approach called extremum seeking technique (EST), which is a model-free control (MFC), to control a vehicle braking and longitudinal acceleration. The main aim here is to create an ego vehicle that travels at a specific speed with maintaining a secure space with respect to a guide vehicle. A car including an ACC technique called ego car, exploits radar to determine relative velocity and relative space relating to the guiding car. The ACC technique is considered to keep maintain a relatively secure space or a preferred cruising velocity concerning the guiding vehicle. The developed model succeeded to determine the relative velocity and relative space according for the ego car to another guiding car with acceleration not more than ±2 m/s2 and spacing error less than 6 m.","PeriodicalId":502860,"journal":{"name":"Bulletin of Electrical Engineering and Informatics","volume":"46 7","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139683899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mahmood A. Al-Shareeda, Abeer Abdullah Alsadhan, Hamzah H. Qasim, S. Manickam
Security networks as one of the biggest issue for network managers with the exponential growth of devices connected to the internet. Keeping a big and diverse network running smoothly and securely is no easy feat. With this in mind, emerging technologies like software defined networking (SDN) and internet of things (IoT) hold considerable promise for information service innovation in the cloud and big data era. Therefore, this paper describes the model of SDN and the architecture of IoT. Then this review does not only review the research studies in SDN-IoT but also provides an explanation of the SDN-IoT solution in terms of architecture, main consideration, model, and the implementation of SDN controllers for IoT. Finally, this review discusses the challenges and future directions. This paper can be used as a starting point for thinking about how to improve SDN-IoT security and privacy.
随着连接到互联网的设备呈指数级增长,网络安全成为网络管理员面临的最大问题之一。要保持一个庞大而多样化的网络平稳安全地运行并非易事。有鉴于此,软件定义网络(SDN)和物联网(IoT)等新兴技术为云和大数据时代的信息服务创新带来了巨大希望。因此,本文介绍了 SDN 的模型和物联网的架构。然后,本综述不仅回顾了 SDN-IoT 方面的研究,还从架构、主要考虑因素、模型和物联网 SDN 控制器的实现等方面对 SDN-IoT 解决方案进行了说明。最后,本综述讨论了面临的挑战和未来发展方向。本文可作为思考如何提高 SDN-IoT 安全性和隐私性的起点。
{"title":"Software defined networking for internet of things: review, techniques, challenges, and future directions","authors":"Mahmood A. Al-Shareeda, Abeer Abdullah Alsadhan, Hamzah H. Qasim, S. Manickam","doi":"10.11591/eei.v13i1.6386","DOIUrl":"https://doi.org/10.11591/eei.v13i1.6386","url":null,"abstract":"Security networks as one of the biggest issue for network managers with the exponential growth of devices connected to the internet. Keeping a big and diverse network running smoothly and securely is no easy feat. With this in mind, emerging technologies like software defined networking (SDN) and internet of things (IoT) hold considerable promise for information service innovation in the cloud and big data era. Therefore, this paper describes the model of SDN and the architecture of IoT. Then this review does not only review the research studies in SDN-IoT but also provides an explanation of the SDN-IoT solution in terms of architecture, main consideration, model, and the implementation of SDN controllers for IoT. Finally, this review discusses the challenges and future directions. This paper can be used as a starting point for thinking about how to improve SDN-IoT security and privacy.","PeriodicalId":502860,"journal":{"name":"Bulletin of Electrical Engineering and Informatics","volume":"33 8","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139685416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The design of a secure, intelligent laboratory that incorporates internet of things (IoT) devices and applications is a complex process. One of the main goals is to create a process monitoring system that can collect and analyze data from connected devices such as temperature and pressure sensors, smart locks, and access control systems. This system must operate in real time to ensure that equipment is within reference values. This reduces the risk of contamination and increases reliability. In addition, computer network security is paramount and it is imperative that certain measures such as encryption, multi-factor authentication, and intrusion detection systems are implemented. These measures help to ensure the safety and security of critical information and protect against potential risks. Physical security is also essential to protect scientific equipment and data. This paper provides a comprehensive overview of the critical factors involved in designing a secure, intelligent laboratory. It discusses the benefits of the integration of IoT devices and applications, and the security challenges that must be addressed. The paper also provides recommendations for designing and implementing a secure smart lab.
{"title":"Securing laboratories through internet of things networks: an ocomprehensive approach for ensuring safety and efficiency","authors":"Tamali Abderrahmane, N. Amardjia, Tamali Mohammed","doi":"10.11591/eei.v13i1.6728","DOIUrl":"https://doi.org/10.11591/eei.v13i1.6728","url":null,"abstract":"The design of a secure, intelligent laboratory that incorporates internet of things (IoT) devices and applications is a complex process. One of the main goals is to create a process monitoring system that can collect and analyze data from connected devices such as temperature and pressure sensors, smart locks, and access control systems. This system must operate in real time to ensure that equipment is within reference values. This reduces the risk of contamination and increases reliability. In addition, computer network security is paramount and it is imperative that certain measures such as encryption, multi-factor authentication, and intrusion detection systems are implemented. These measures help to ensure the safety and security of critical information and protect against potential risks. Physical security is also essential to protect scientific equipment and data. This paper provides a comprehensive overview of the critical factors involved in designing a secure, intelligent laboratory. It discusses the benefits of the integration of IoT devices and applications, and the security challenges that must be addressed. The paper also provides recommendations for designing and implementing a secure smart lab.","PeriodicalId":502860,"journal":{"name":"Bulletin of Electrical Engineering and Informatics","volume":"33 18","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139686433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Fifth-generation (5G) wireless technology is the most up-to-date iteration of mobile data networks. This research analyzes the effectiveness of next-generation mobile networks in tandem with mobile communication technologies. Various difficulties encountered at each stage are discussed. With the advent of 5G networks, users may connect to the internet at lightning speeds from almost any location. 5G is one of a kind because of its new characteristics, which allow it to link people and enable them to operate gadgets, machines, and things. 5G mobile technology’s varying speed and capabilities will allow for new user experiences and link new businesses. Companies must know where they can best put 5G to use. This research paper examines and analyzes various topics in great detail, demonstrating how mmWave, massive multiple-input and multiple-output (massive MIMO), microcells, mobile edge computing (MEC), beamforming, diverse antenna technologies, and so on can all work together to improve cellular networks. The primary goals of this article are to demonstrate some of the most recent technical developments and to analyze potential future research directions for the 5G mobile system.
{"title":"New developments and trends in 5G technologies: applications and concepts","authors":"S. Tyokighir, J. Mom, K. Ukhurebor, G. Igwue","doi":"10.11591/eei.v13i1.6032","DOIUrl":"https://doi.org/10.11591/eei.v13i1.6032","url":null,"abstract":"Fifth-generation (5G) wireless technology is the most up-to-date iteration of mobile data networks. This research analyzes the effectiveness of next-generation mobile networks in tandem with mobile communication technologies. Various difficulties encountered at each stage are discussed. With the advent of 5G networks, users may connect to the internet at lightning speeds from almost any location. 5G is one of a kind because of its new characteristics, which allow it to link people and enable them to operate gadgets, machines, and things. 5G mobile technology’s varying speed and capabilities will allow for new user experiences and link new businesses. Companies must know where they can best put 5G to use. This research paper examines and analyzes various topics in great detail, demonstrating how mmWave, massive multiple-input and multiple-output (massive MIMO), microcells, mobile edge computing (MEC), beamforming, diverse antenna technologies, and so on can all work together to improve cellular networks. The primary goals of this article are to demonstrate some of the most recent technical developments and to analyze potential future research directions for the 5G mobile system.","PeriodicalId":502860,"journal":{"name":"Bulletin of Electrical Engineering and Informatics","volume":"4 3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139687741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This study aimed to analyze the opinions and emotions of Malaysians towards the COVID-19 vaccination program, as expressed on Twitter. By collecting data from the Twitter network and utilizing the machine learning life cycle technique. The results show that Malaysians have a mostly neutral viewpoint of the COVID-19 vaccination, with an accuracy score of 93%, an F1-score of 94%, a recall measurement of 94%, and a precision measure of 93%. These findings emphasize the significance of understanding public sentiment and perception towards crucial issues such as the COVID-19 vaccine and can be utilized to support healthcare professionals, policymakers, and the public in making informed decisions regarding the COVID-19 vaccination program.
{"title":"Malaysian views on COVID-19 vaccination program: a sentiment analysis study using Twitter","authors":"Mohamed Imran Mohamed Ariff, Nurul Erina Shuhada Zubir, Azilawati Azizan Azilawati Azizan, Samsiah Ahmad, Noreen Izza Arshad Noreen Izza Arshad","doi":"10.11591/eei.v13i1.6097","DOIUrl":"https://doi.org/10.11591/eei.v13i1.6097","url":null,"abstract":"This study aimed to analyze the opinions and emotions of Malaysians towards the COVID-19 vaccination program, as expressed on Twitter. By collecting data from the Twitter network and utilizing the machine learning life cycle technique. The results show that Malaysians have a mostly neutral viewpoint of the COVID-19 vaccination, with an accuracy score of 93%, an F1-score of 94%, a recall measurement of 94%, and a precision measure of 93%. These findings emphasize the significance of understanding public sentiment and perception towards crucial issues such as the COVID-19 vaccine and can be utilized to support healthcare professionals, policymakers, and the public in making informed decisions regarding the COVID-19 vaccination program.","PeriodicalId":502860,"journal":{"name":"Bulletin of Electrical Engineering and Informatics","volume":"55 22","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139687862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Recently, multimodal biometric systems have garnered a lot of interest for the identification of human identity. The accessibility of the database is one of the contributing elements that impact biometric recognition systems. In their studies, the majority of researchers concentrate on unimodal databases. There was a need to compile a fresh, realistic multimodal biometric database, nonetheless, because there were so few comparable multimodal biometric databases that were publically accessible. This study introduces the MULBv1 multimodal biometric database, which contains homologous biometric traits. The MULBv1 database includes 20 images of each person's face in various poses, facial emotions, and accessories, 20 images of their right hand from various angles, and 20 images of their right iris from various lighting positions. The database contains real multimodal data from 174 people, and all biometrics were accurately collected using the micro camera of the iPhone 14 Pro Max. A face recognition technique is also suggested as a case study using the gathered facial features. In the case study, the deep convolutional neural network (CNN) was used, and the findings were positive. Through several trials, the accuracy was (97.41%).
最近,多模态生物识别系统在人类身份识别方面引起了广泛关注。数据库的可访问性是影响生物识别系统的因素之一。在研究中,大多数研究人员都专注于单模态数据库。然而,由于可公开访问的可比多模态生物识别数据库太少,因此有必要编制一个全新的、现实的多模态生物识别数据库。本研究介绍了包含同源生物特征的 MULBv1 多模态生物识别数据库。MULBv1 数据库包括每个人不同姿势、面部情绪和配饰的 20 张面部图像,不同角度的 20 张右手图像,以及不同光照位置的 20 张右手虹膜图像。该数据库包含来自 174 人的真实多模态数据,所有生物识别数据均使用 iPhone 14 Pro Max 的微型摄像头准确采集。作为案例研究,我们还利用收集到的面部特征提出了一种人脸识别技术。在案例研究中,使用了深度卷积神经网络(CNN),结果是积极的。经过多次试验,准确率达到 97.41%。
{"title":"A multimodal biometric database and case study for face recognition based deep learning","authors":"O. N. Kadhim, Mohammed Hasan Abdulameer","doi":"10.11591/eei.v13i1.6605","DOIUrl":"https://doi.org/10.11591/eei.v13i1.6605","url":null,"abstract":"Recently, multimodal biometric systems have garnered a lot of interest for the identification of human identity. The accessibility of the database is one of the contributing elements that impact biometric recognition systems. In their studies, the majority of researchers concentrate on unimodal databases. There was a need to compile a fresh, realistic multimodal biometric database, nonetheless, because there were so few comparable multimodal biometric databases that were publically accessible. This study introduces the MULBv1 multimodal biometric database, which contains homologous biometric traits. The MULBv1 database includes 20 images of each person's face in various poses, facial emotions, and accessories, 20 images of their right hand from various angles, and 20 images of their right iris from various lighting positions. The database contains real multimodal data from 174 people, and all biometrics were accurately collected using the micro camera of the iPhone 14 Pro Max. A face recognition technique is also suggested as a case study using the gathered facial features. In the case study, the deep convolutional neural network (CNN) was used, and the findings were positive. Through several trials, the accuracy was (97.41%).","PeriodicalId":502860,"journal":{"name":"Bulletin of Electrical Engineering and Informatics","volume":"17 10","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139684721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The use of CaO:Tb3+ with light green emission on for improvement of both luminescent output and chromatic fidelity of the white light emitted from a light-emitting diode (LED). The CaO:Tb3+ is combined with the yellow-emitting phosphor of YAG:Ce3+ to provide sufficient colored spectral proportion for the white light generation, enhancing the color performance. The phosphor combination is utilized for the three most applied LED structures: conformal, in-cup, and remote phosphor structures. The changes in optical properties of these three LEDs are monitored with adjustments in the proportion of CaO:Tb3+. The higher proportion of the green phosphor results in higher scattering efficiency in all structures, offering better color coordination and stronger luminous flux. The color quality scale is somehow reduced when CaO:Tb3+ concentration is more than a certain level. Therefore, depending on the phosphor configuration of the white light-emitting diode (WLED), the concentration of CaO:Tb3+ should be modified to achieve a good color rendition with improved color consistency and luminous properties.
使用淡绿色发光的 CaO:Tb3+ 可提高发光二极管(LED)发出的白光的发光输出和色度保真度。CaO:Tb3+ 与 YAG:Ce3+ 黄色发光荧光粉相结合,为白光的产生提供了足够的彩色光谱比例,从而提高了色彩性能。这种荧光粉组合适用于三种最常用的 LED 结构:共形、杯内和远程荧光粉结构。通过调整 CaO:Tb3+ 的比例来监测这三种 LED 的光学特性变化。绿色荧光粉的比例越高,所有结构的散射效率就越高,色彩协调性就越好,光通量就越大。当 CaO:Tb3+ 的浓度超过一定水平时,色质比例会有所降低。因此,应根据白光发光二极管(WLED)的荧光粉配置,调整 CaO:Tb3+ 的浓度,以获得良好的色彩表现,改善色彩一致性和发光性能。
{"title":"CaO:Tb3+ green-emitting phosphor for white light-emitted diode-phosphor applications: the improvement of light output intensity","authors":"Ha Thanh Tung, Dieu An Nguyen Thi","doi":"10.11591/eei.v13i1.4753","DOIUrl":"https://doi.org/10.11591/eei.v13i1.4753","url":null,"abstract":"The use of CaO:Tb3+ with light green emission on for improvement of both luminescent output and chromatic fidelity of the white light emitted from a light-emitting diode (LED). The CaO:Tb3+ is combined with the yellow-emitting phosphor of YAG:Ce3+ to provide sufficient colored spectral proportion for the white light generation, enhancing the color performance. The phosphor combination is utilized for the three most applied LED structures: conformal, in-cup, and remote phosphor structures. The changes in optical properties of these three LEDs are monitored with adjustments in the proportion of CaO:Tb3+. The higher proportion of the green phosphor results in higher scattering efficiency in all structures, offering better color coordination and stronger luminous flux. The color quality scale is somehow reduced when CaO:Tb3+ concentration is more than a certain level. Therefore, depending on the phosphor configuration of the white light-emitting diode (WLED), the concentration of CaO:Tb3+ should be modified to achieve a good color rendition with improved color consistency and luminous properties.","PeriodicalId":502860,"journal":{"name":"Bulletin of Electrical Engineering and Informatics","volume":"33 6","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139685417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Tamana Baba, Muhammad Hazeeq Husni, N. Saidin, N. Hasbullah
The compound semiconductor gallium nitride offers enormous potential for facilitating economic expansion in the silicon-based semiconductor industry, which is currently seeing decreasing performance returns compared to investment costs. Its high electron mobility and electric field strength at the material level have already demonstrated enormous potential for photonics and high-frequency communications applications. However, its application in devices used in the radiation-prone environment is hindered by degradation and failure caused by the radiation. In this paper, the effect of proton radiation on the electrical properties of InGaN light emitting diodes (LEDs) for the fluence range of 1×1014 cm-2 to 3×1014 cm-2 is performed. On comparing the results before and after radiation, it is found that radiation mainly affected the reverse IV characteristics of the device with little or no effect on forward IV or CV characteristics. Apart from the electric properties, the optical properties of the LEDs show improvement after radiation as the light intensity increases post-irradiation.
化合物半导体氮化镓为促进硅基半导体行业的经济扩张提供了巨大的潜力,目前硅基半导体行业的性能回报率与投资成本相比正在不断下降。氮化镓在材料层面的高电子迁移率和电场强度已经证明了其在光电子学和高频通信应用方面的巨大潜力。然而,在易受辐射环境中使用的设备中,辐射造成的降解和故障阻碍了它的应用。本文研究了在 1×1014 cm-2 至 3×1014 cm-2 的通量范围内,质子辐射对 InGaN 发光二极管(LED)电性能的影响。通过比较辐照前后的结果发现,辐照主要影响了器件的反向 IV 特性,而对正向 IV 或 CV 特性几乎没有影响。除电学特性外,随着辐照后光强的增加,LED 的光学特性在辐照后也有所改善。
{"title":"Effect of proton radiation on gallium nitride light emitting diodes","authors":"Tamana Baba, Muhammad Hazeeq Husni, N. Saidin, N. Hasbullah","doi":"10.11591/eei.v13i1.6205","DOIUrl":"https://doi.org/10.11591/eei.v13i1.6205","url":null,"abstract":"The compound semiconductor gallium nitride offers enormous potential for facilitating economic expansion in the silicon-based semiconductor industry, which is currently seeing decreasing performance returns compared to investment costs. Its high electron mobility and electric field strength at the material level have already demonstrated enormous potential for photonics and high-frequency communications applications. However, its application in devices used in the radiation-prone environment is hindered by degradation and failure caused by the radiation. In this paper, the effect of proton radiation on the electrical properties of InGaN light emitting diodes (LEDs) for the fluence range of 1×1014 cm-2 to 3×1014 cm-2 is performed. On comparing the results before and after radiation, it is found that radiation mainly affected the reverse IV characteristics of the device with little or no effect on forward IV or CV characteristics. Apart from the electric properties, the optical properties of the LEDs show improvement after radiation as the light intensity increases post-irradiation.","PeriodicalId":502860,"journal":{"name":"Bulletin of Electrical Engineering and Informatics","volume":"49 18","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139686056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}