V. R. Panse, G. Rahate, A. Saregar, M. Kaur, A. Dixit
{"title":"Analysis of Sr2Mg (BO3)2Tb3+ Green Emitting Phosphor for Solid State Lighting: Implication for Light Emitting Diode (LED)","authors":"V. R. Panse, G. Rahate, A. Saregar, M. Kaur, A. Dixit","doi":"10.24042/ijecs.v1i1.9334","DOIUrl":"https://doi.org/10.24042/ijecs.v1i1.9334","url":null,"abstract":"With the assist of customized step wise combustion synthesis method Sr2Mg(BO3)2: Tb3+ phosphors were synthesize along with the luminescent proprieties, XRD, chromaticity coordinates with effect of emission intensity with related with the corresponding concentration were studied. The emission spectrum of Sr2Mg(BO3)2 :Tb3+ (x=0.2 to 2 mol %) excited by 353 nm exhibits a strong green emission among peak location at 546 nm is recognized to F-F transitions of Tb3+ 5D4-7F5 ion. This study suggest that Sr2Mg(BO3)2: Tb3+ phosphor be a prominent material as a green constituent for phosphor- transformed W-LEDs for SSL","PeriodicalId":190490,"journal":{"name":"International Journal of Electronics and Communications Systems","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129698136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modeling with generalized linear model on covid-19: Cases in Indonesia","authors":"Subian Saidi, N. Herawati, K. Nisa","doi":"10.24042/ijecs.v1i1.9299","DOIUrl":"https://doi.org/10.24042/ijecs.v1i1.9299","url":null,"abstract":"The ongoing Covid-19 outbreak has made scientists continue to research this Covid-19 case. Most of the research carried out is on the prediction and modeling of Covid-19 data. This study will also discuss Covid-19 data modeling. The model that is widely used is the linear model. However, if the classical assumption of normality is not met, a special method is needed. The method that can overcome this is the generalized linear model (GLM), with the assumption that the data is distributed in an exponential family. The distribution used in this study is the Gaussian, Poisson, and Gamma distribution. Where the three distributions will be compared to get the best model. The variables used in this study were the number of confirmed Covid-19 cases per day and the number of deaths due to Covid-19 per day. This study also aims to see how much influence the confirmation of Covid-19 has on the number of deaths due to Covid-19 per day. By using 3 types of exponential family distribution, the best result is the Gaussian distribution GLM. Selection of the best model using Akaike Information Criterion (AIC).","PeriodicalId":190490,"journal":{"name":"International Journal of Electronics and Communications Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115899627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Machmud, S. Suranto, Hamimi Hamimi, Setyo Harmono
{"title":"Conductor minimum safe distance analysis: Application of a 20 kV medium voltage airline (SUTM) system","authors":"A. Machmud, S. Suranto, Hamimi Hamimi, Setyo Harmono","doi":"10.24042/ijecs.v1i1.9215","DOIUrl":"https://doi.org/10.24042/ijecs.v1i1.9215","url":null,"abstract":"Medium Voltage Air Line Conductor (SUTM) has a voltage of 20 kV. The SUTM network should have the criteria for electricity safety techniques, including minimum safety distances between the trees and the environment and the effectiveness of electricity distribution development. There are ten stages in the installation of the new SUTM 20 kV network. The results of the study concluded that the Conductor used in the planning of the 20 kV SUTM new network construction was AAACS - 150 mm2. The safe distance between the conductors and the conditions contained Billboards are 0.5 meters with a minimum height difference of ± 2.5 meters. Whereas the safe distance between the conductor and the tree is ± 0.5 meters, but the Medium Voltage Network Construction Standard for Electric Power must have a height difference of 2.5 meters. The distance between the conductor and billboards is 0.5 meters, which does not complete the standard instructions.","PeriodicalId":190490,"journal":{"name":"International Journal of Electronics and Communications Systems","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122003657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Data integrity and security of digital signatures on electronic systems using the digital signature algorithm (DSA)","authors":"Asep Saepulrohman, Agus Ismangil","doi":"10.24042/ijecs.v1i1.7923","DOIUrl":"https://doi.org/10.24042/ijecs.v1i1.7923","url":null,"abstract":"The digital signature generation process begins with the creation of a public key and a private key. A public key is generated and published to verify the signature and calculate the hash value of the received document. At present, in the very fast development of information technology, quantum computers have emerged the ability to solve very large and complex amounts of data calculated by qubits, which when compared to quantum computers can work 10 minutes to work on a process that takes 1025 years on a computer. Therefore, the research focuses on how electronic signatures on documents have a reliable security system. The Digital Signature Algorithm (DSA) is a key algorithm used for digital signatures, which uses the Secure Hash Algorithm (SHA-1) to convert messages into message digest and parameters based on the ElGamal signature algorithm. The author also shows an example of digital signature encryption and decryption process by taking any numbers p = 59419 and q = 3301 to prove that the message can be formed and verified its authenticity.","PeriodicalId":190490,"journal":{"name":"International Journal of Electronics and Communications Systems","volume":"331 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133497770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
E. Palupi, R. Umam, R. Junaidi, Y. S. Perkasa, W. S. M. Sanjaya
{"title":"Determining the arm's motion angle using inverse kinematics models and adaptive neuro-fuzzy interface system","authors":"E. Palupi, R. Umam, R. Junaidi, Y. S. Perkasa, W. S. M. Sanjaya","doi":"10.24042/ijecs.v1i1.9238","DOIUrl":"https://doi.org/10.24042/ijecs.v1i1.9238","url":null,"abstract":"Robotics technology is known as a great technology demand to be developed continuesly. One of the important things that need to be considered is the control of the motion of the robot. Movement predictions can be modeled in mathematical equations. Prediction based on learning logic is also very supportive of motion control systems, especially arm motion. In this study, the authors combined the two methods as the main study. The working principle of the arm is to take colored objects detected by the camera. In this study, we made arm four DOFs (Degree of Freedom), but only one DOF is controlled by ANFIS because the other three DOFs only move at two fixed angles. Two methods of determining the arm angle of motion used are inverse kinematics and ANFIS methods. The angle of motion and the position of the red object can be observed in real-time on the monitor with the interface in the MATLAB GUI. The angular output that appears in the MATLAB GUI is sent to Arduino in the form of characters, then, Arduino translates it into servo motion to the coordinates of the object detected by the camera. The results showed that the ANFIS method was more effective than the inverse kinematics model.","PeriodicalId":190490,"journal":{"name":"International Journal of Electronics and Communications Systems","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125063966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}