This paper proposes an improved control strategy of a robotic arm joint using hybrid controller consist of H∞ robust controller and iterative learning controller. The main advantage of this controller is the simple structure that made it possible to be implemented on a small embedded system for frugal innovation in industrial robotic arm development. Although it has a simple structure, it is a robust H∞ controller that has robust stability and robust performance. The iterative learning controller makes the trajectory tracking even better. To test the effectiveness of the proposed method, computer simulations using Matlab and hardware experiments were conducted. Variation of load was applied to both of the processes to present the uncertainties. The superiority of the proposed controller over the proportional integral derivative (PID) controller that usually being used in a low-cost robotic arm development is confirmed that it has better trajectory tracking. The error tracking along the slope of sinusoidal trajectory input was suppressed to zero. The biggest error along the trajectory that happened on every peak of the sinusoidal input, or when the direction is changed has been improved from 15 degrees to 4 degrees. This can be conceived that the proposed controller can be applied to control a low-cost robotic arm joint position which is applicable for small industries or educational purpose.
Square transposition: an approach to the transposition process in block cipherjournalBEEI
The transposition process is needed in cryptography to create a diffusion effect on data encryption standard (DES) and advanced encryption standard (AES) algorithms as standard information security algorithms by the National Institute of Standards and Technology. The problem with DES and AES algorithms is that their transposition index values form patterns and do not form random values. This condition will certainly make it easier for a cryptanalyst to look for a relationship between ciphertexts because some processes are predictable. This research designs a transposition algorithm called square transposition. Each process uses square 8 × 8 as a place to insert and retrieve 64-bits. The determination of the pairing of the input scheme and the retrieval scheme that have unequal flow is an important factor in producing a good transposition. The square transposition can generate random and non-pattern indices so that transposition can be done better than DES and AES.
Hyper-parameter optimization of convolutional neural network based on particl...journalBEEI
The document proposes using a particle swarm optimization (PSO) algorithm to optimize the hyperparameters of a convolutional neural network (CNN) for image classification. The PSO algorithm is used to find optimal values for CNN hyperparameters like the number and size of convolutional filters. In experiments on the MNIST handwritten digit dataset, the optimized CNN achieved a testing error rate of 0.87%, which is competitive with state-of-the-art models. The proposed approach finds optimized CNN architectures automatically without requiring manual design or encoding strategies during training.
Supervised machine learning based liver disease prediction approach with LASS...journalBEEI
In this contemporary era, the uses of machine learning techniques are increasing rapidly in the field of medical science for detecting various diseases such as liver disease (LD). Around the globe, a large number of people die because of this deadly disease. By diagnosing the disease in a primary stage, early treatment can be helpful to cure the patient. In this research paper, a method is proposed to diagnose the LD using supervised machine learning classification algorithms, namely logistic regression, decision tree, random forest, AdaBoost, KNN, linear discriminant analysis, gradient boosting and support vector machine (SVM). We also deployed a least absolute shrinkage and selection operator (LASSO) feature selection technique on our taken dataset to suggest the most highly correlated attributes of LD. The predictions with 10 fold cross-validation (CV) made by the algorithms are tested in terms of accuracy, sensitivity, precision and f1-score values to forecast the disease. It is observed that the decision tree algorithm has the best performance score where accuracy, precision, sensitivity and f1-score values are 94.295%, 92%, 99% and 96% respectively with the inclusion of LASSO. Furthermore, a comparison with recent studies is shown to prove the significance of the proposed system.
A secure and energy saving protocol for wireless sensor networksjournalBEEI
The research domain for wireless sensor networks (WSN) has been extensively conducted due to innovative technologies and research directions that have come up addressing the usability of WSN under various schemes. This domain permits dependable tracking of a diversity of environments for both military and civil applications. The key management mechanism is a primary protocol for keeping the privacy and confidentiality of the data transmitted among different sensor nodes in WSNs. Since node's size is small; they are intrinsically limited by inadequate resources such as battery life-time and memory capacity. The proposed secure and energy saving protocol (SESP) for wireless sensor networks) has a significant impact on the overall network life-time and energy dissipation. To encrypt sent messsages, the SESP uses the public-key cryptography’s concept. It depends on sensor nodes' identities (IDs) to prevent the messages repeated; making security goals- authentication, confidentiality, integrity, availability, and freshness to be achieved. Finally, simulation results show that the proposed approach produced better energy consumption and network life-time compared to LEACH protocol; sensors are dead after 900 rounds in the proposed SESP protocol. While, in the low-energy adaptive clustering hierarchy (LEACH) scheme, the sensors are dead after 750 rounds.
Plant leaf identification system using convolutional neural networkjournalBEEI
This paper proposes a leaf identification system using convolutional neural network (CNN). This proposed system can identify five types of local Malaysia leaf which were acacia, papaya, cherry, mango and rambutan. By using CNN from deep learning, the network is trained from the database that acquired from leaf images captured by mobile phone for image classification. ResNet-50 was the architecture has been used for neural networks image classification and training the network for leaf identification. The recognition of photographs leaves requested several numbers of steps, starting with image pre-processing, feature extraction, plant identification, matching and testing, and finally extracting the results achieved in MATLAB. Testing sets of the system consists of 3 types of images which were white background, and noise added and random background images. Finally, interfaces for the leaf identification system have developed as the end software product using MATLAB app designer. As a result, the accuracy achieved for each training sets on five leaf classes are recorded above 98%, thus recognition process was successfully implemented.
Customized moodle-based learning management system for socially disadvantaged...journalBEEI
This study aims to develop Moodle-based LMS with customized learning content and modified user interface to facilitate pedagogical processes during covid-19 pandemic and investigate how teachers of socially disadvantaged schools perceived usability and technology acceptance. Co-design process was conducted with two activities: 1) need assessment phase using an online survey and interview session with the teachers and 2) the development phase of the LMS. The system was evaluated by 30 teachers from socially disadvantaged schools for relevance to their distance learning activities. We employed computer software usability questionnaire (CSUQ) to measure perceived usability and the technology acceptance model (TAM) with insertion of 3 original variables (i.e., perceived usefulness, perceived ease of use, and intention to use) and 5 external variables (i.e., attitude toward the system, perceived interaction, self-efficacy, user interface design, and course design). The average CSUQ rating exceeded 5.0 of 7 point-scale, indicated that teachers agreed that the information quality, interaction quality, and user interface quality were clear and easy to understand. TAM results concluded that the LMS design was judged to be usable, interactive, and well-developed. Teachers reported an effective user interface that allows effective teaching operations and lead to the system adoption in immediate time.
Understanding the role of individual learner in adaptive and personalized e-l...journalBEEI
Dynamic learning environment has emerged as a powerful platform in a modern e-learning system. The learning situation that constantly changing has forced the learning platform to adapt and personalize its learning resources for students. Evidence suggested that adaptation and personalization of e-learning systems (APLS) can be achieved by utilizing learner modeling, domain modeling, and instructional modeling. In the literature of APLS, questions have been raised about the role of individual characteristics that are relevant for adaptation. With several options, a new problem has been raised where the attributes of students in APLS often overlap and are not related between studies. Therefore, this study proposed a list of learner model attributes in dynamic learning to support adaptation and personalization. The study was conducted by exploring concepts from the literature selected based on the best criteria. Then, we described the results of important concepts in student modeling and provided definitions and examples of data values that researchers have used. Besides, we also discussed the implementation of the selected learner model in providing adaptation in dynamic learning.
Prototype mobile contactless transaction system in traditional markets to sup...journalBEEI
1) Researchers developed a prototype contactless transaction system using QR codes and digital payments to support physical distancing during the COVID-19 pandemic in traditional markets.
2) The system allows sellers and buyers in traditional markets to conduct fast, secure transactions via smartphones without direct cash exchange. Buyers scan sellers' QR codes to view product details and make e-wallet payments.
3) Testing showed the system's functions worked properly and users found it easy to use and useful for supporting contactless transactions and digital transformation of traditional markets. However, further development is needed to increase trust in digital payments for users unfamiliar with the technology.
Square transposition: an approach to the transposition process in block cipherjournalBEEI
The transposition process is needed in cryptography to create a diffusion effect on data encryption standard (DES) and advanced encryption standard (AES) algorithms as standard information security algorithms by the National Institute of Standards and Technology. The problem with DES and AES algorithms is that their transposition index values form patterns and do not form random values. This condition will certainly make it easier for a cryptanalyst to look for a relationship between ciphertexts because some processes are predictable. This research designs a transposition algorithm called square transposition. Each process uses square 8 × 8 as a place to insert and retrieve 64-bits. The determination of the pairing of the input scheme and the retrieval scheme that have unequal flow is an important factor in producing a good transposition. The square transposition can generate random and non-pattern indices so that transposition can be done better than DES and AES.
Hyper-parameter optimization of convolutional neural network based on particl...journalBEEI
The document proposes using a particle swarm optimization (PSO) algorithm to optimize the hyperparameters of a convolutional neural network (CNN) for image classification. The PSO algorithm is used to find optimal values for CNN hyperparameters like the number and size of convolutional filters. In experiments on the MNIST handwritten digit dataset, the optimized CNN achieved a testing error rate of 0.87%, which is competitive with state-of-the-art models. The proposed approach finds optimized CNN architectures automatically without requiring manual design or encoding strategies during training.
Supervised machine learning based liver disease prediction approach with LASS...journalBEEI
In this contemporary era, the uses of machine learning techniques are increasing rapidly in the field of medical science for detecting various diseases such as liver disease (LD). Around the globe, a large number of people die because of this deadly disease. By diagnosing the disease in a primary stage, early treatment can be helpful to cure the patient. In this research paper, a method is proposed to diagnose the LD using supervised machine learning classification algorithms, namely logistic regression, decision tree, random forest, AdaBoost, KNN, linear discriminant analysis, gradient boosting and support vector machine (SVM). We also deployed a least absolute shrinkage and selection operator (LASSO) feature selection technique on our taken dataset to suggest the most highly correlated attributes of LD. The predictions with 10 fold cross-validation (CV) made by the algorithms are tested in terms of accuracy, sensitivity, precision and f1-score values to forecast the disease. It is observed that the decision tree algorithm has the best performance score where accuracy, precision, sensitivity and f1-score values are 94.295%, 92%, 99% and 96% respectively with the inclusion of LASSO. Furthermore, a comparison with recent studies is shown to prove the significance of the proposed system.
A secure and energy saving protocol for wireless sensor networksjournalBEEI
The research domain for wireless sensor networks (WSN) has been extensively conducted due to innovative technologies and research directions that have come up addressing the usability of WSN under various schemes. This domain permits dependable tracking of a diversity of environments for both military and civil applications. The key management mechanism is a primary protocol for keeping the privacy and confidentiality of the data transmitted among different sensor nodes in WSNs. Since node's size is small; they are intrinsically limited by inadequate resources such as battery life-time and memory capacity. The proposed secure and energy saving protocol (SESP) for wireless sensor networks) has a significant impact on the overall network life-time and energy dissipation. To encrypt sent messsages, the SESP uses the public-key cryptography’s concept. It depends on sensor nodes' identities (IDs) to prevent the messages repeated; making security goals- authentication, confidentiality, integrity, availability, and freshness to be achieved. Finally, simulation results show that the proposed approach produced better energy consumption and network life-time compared to LEACH protocol; sensors are dead after 900 rounds in the proposed SESP protocol. While, in the low-energy adaptive clustering hierarchy (LEACH) scheme, the sensors are dead after 750 rounds.
Plant leaf identification system using convolutional neural networkjournalBEEI
This paper proposes a leaf identification system using convolutional neural network (CNN). This proposed system can identify five types of local Malaysia leaf which were acacia, papaya, cherry, mango and rambutan. By using CNN from deep learning, the network is trained from the database that acquired from leaf images captured by mobile phone for image classification. ResNet-50 was the architecture has been used for neural networks image classification and training the network for leaf identification. The recognition of photographs leaves requested several numbers of steps, starting with image pre-processing, feature extraction, plant identification, matching and testing, and finally extracting the results achieved in MATLAB. Testing sets of the system consists of 3 types of images which were white background, and noise added and random background images. Finally, interfaces for the leaf identification system have developed as the end software product using MATLAB app designer. As a result, the accuracy achieved for each training sets on five leaf classes are recorded above 98%, thus recognition process was successfully implemented.
Customized moodle-based learning management system for socially disadvantaged...journalBEEI
This study aims to develop Moodle-based LMS with customized learning content and modified user interface to facilitate pedagogical processes during covid-19 pandemic and investigate how teachers of socially disadvantaged schools perceived usability and technology acceptance. Co-design process was conducted with two activities: 1) need assessment phase using an online survey and interview session with the teachers and 2) the development phase of the LMS. The system was evaluated by 30 teachers from socially disadvantaged schools for relevance to their distance learning activities. We employed computer software usability questionnaire (CSUQ) to measure perceived usability and the technology acceptance model (TAM) with insertion of 3 original variables (i.e., perceived usefulness, perceived ease of use, and intention to use) and 5 external variables (i.e., attitude toward the system, perceived interaction, self-efficacy, user interface design, and course design). The average CSUQ rating exceeded 5.0 of 7 point-scale, indicated that teachers agreed that the information quality, interaction quality, and user interface quality were clear and easy to understand. TAM results concluded that the LMS design was judged to be usable, interactive, and well-developed. Teachers reported an effective user interface that allows effective teaching operations and lead to the system adoption in immediate time.
Understanding the role of individual learner in adaptive and personalized e-l...journalBEEI
Dynamic learning environment has emerged as a powerful platform in a modern e-learning system. The learning situation that constantly changing has forced the learning platform to adapt and personalize its learning resources for students. Evidence suggested that adaptation and personalization of e-learning systems (APLS) can be achieved by utilizing learner modeling, domain modeling, and instructional modeling. In the literature of APLS, questions have been raised about the role of individual characteristics that are relevant for adaptation. With several options, a new problem has been raised where the attributes of students in APLS often overlap and are not related between studies. Therefore, this study proposed a list of learner model attributes in dynamic learning to support adaptation and personalization. The study was conducted by exploring concepts from the literature selected based on the best criteria. Then, we described the results of important concepts in student modeling and provided definitions and examples of data values that researchers have used. Besides, we also discussed the implementation of the selected learner model in providing adaptation in dynamic learning.
Prototype mobile contactless transaction system in traditional markets to sup...journalBEEI
1) Researchers developed a prototype contactless transaction system using QR codes and digital payments to support physical distancing during the COVID-19 pandemic in traditional markets.
2) The system allows sellers and buyers in traditional markets to conduct fast, secure transactions via smartphones without direct cash exchange. Buyers scan sellers' QR codes to view product details and make e-wallet payments.
3) Testing showed the system's functions worked properly and users found it easy to use and useful for supporting contactless transactions and digital transformation of traditional markets. However, further development is needed to increase trust in digital payments for users unfamiliar with the technology.
Wireless HART stack using multiprocessor technique with laxity algorithmjournalBEEI
The use of a real-time operating system is required for the demarcation of industrial wireless sensor network (IWSN) stacks (RTOS). In the industrial world, a vast number of sensors are utilised to gather various types of data. The data gathered by the sensors cannot be prioritised ahead of time. Because all of the information is equally essential. As a result, a protocol stack is employed to guarantee that data is acquired and processed fairly. In IWSN, the protocol stack is implemented using RTOS. The data collected from IWSN sensor nodes is processed using non-preemptive scheduling and the protocol stack, and then sent in parallel to the IWSN's central controller. The real-time operating system (RTOS) is a process that occurs between hardware and software. Packets must be sent at a certain time. It's possible that some packets may collide during transmission. We're going to undertake this project to get around this collision. As a prototype, this project is divided into two parts. The first uses RTOS and the LPC2148 as a master node, while the second serves as a standard data collection node to which sensors are attached. Any controller may be used in the second part, depending on the situation. Wireless HART allows two nodes to communicate with each other.
Implementation of double-layer loaded on octagon microstrip yagi antennajournalBEEI
This document describes the implementation of a double-layer structure on an octagon microstrip yagi antenna (OMYA) to improve its performance at 5.8 GHz. The double-layer consists of two double positive (DPS) substrates placed above the OMYA. Simulation and experimental results show that the double-layer configuration increases the gain of the OMYA by 2.5 dB compared to without the double-layer. The measured bandwidth of the OMYA with double-layer is 14.6%, indicating the double-layer can increase both the gain and bandwidth of the OMYA.
The calculation of the field of an antenna located near the human headjournalBEEI
In this work, a numerical calculation was carried out in one of the universal programs for automatic electro-dynamic design. The calculation is aimed at obtaining numerical values for specific absorbed power (SAR). It is the SAR value that can be used to determine the effect of the antenna of a wireless device on biological objects; the dipole parameters will be selected for GSM1800. Investigation of the influence of distance to a cell phone on radiation shows that absorbed in the head of a person the effect of electromagnetic radiation on the brain decreases by three times this is a very important result the SAR value has decreased by almost three times it is acceptable results.
Exact secure outage probability performance of uplinkdownlink multiple access...journalBEEI
In this paper, we study uplink-downlink non-orthogonal multiple access (NOMA) systems by considering the secure performance at the physical layer. In the considered system model, the base station acts a relay to allow two users at the left side communicate with two users at the right side. By considering imperfect channel state information (CSI), the secure performance need be studied since an eavesdropper wants to overhear signals processed at the downlink. To provide secure performance metric, we derive exact expressions of secrecy outage probability (SOP) and and evaluating the impacts of main parameters on SOP metric. The important finding is that we can achieve the higher secrecy performance at high signal to noise ratio (SNR). Moreover, the numerical results demonstrate that the SOP tends to a constant at high SNR. Finally, our results show that the power allocation factors, target rates are main factors affecting to the secrecy performance of considered uplink-downlink NOMA systems.
Design of a dual-band antenna for energy harvesting applicationjournalBEEI
This report presents an investigation on how to improve the current dual-band antenna to enhance the better result of the antenna parameters for energy harvesting application. Besides that, to develop a new design and validate the antenna frequencies that will operate at 2.4 GHz and 5.4 GHz. At 5.4 GHz, more data can be transmitted compare to 2.4 GHz. However, 2.4 GHz has long distance of radiation, so it can be used when far away from the antenna module compare to 5 GHz that has short distance in radiation. The development of this project includes the scope of designing and testing of antenna using computer simulation technology (CST) 2018 software and vector network analyzer (VNA) equipment. In the process of designing, fundamental parameters of antenna are being measured and validated, in purpose to identify the better antenna performance.
Transforming data-centric eXtensible markup language into relational database...journalBEEI
eXtensible markup language (XML) appeared internationally as the format for data representation over the web. Yet, most organizations are still utilising relational databases as their database solutions. As such, it is crucial to provide seamless integration via effective transformation between these database infrastructures. In this paper, we propose XML-REG to bridge these two technologies based on node-based and path-based approaches. The node-based approach is good to annotate each positional node uniquely, while the path-based approach provides summarised path information to join the nodes. On top of that, a new range labelling is also proposed to annotate nodes uniquely by ensuring the structural relationships are maintained between nodes. If a new node is to be added to the document, re-labelling is not required as the new label will be assigned to the node via the new proposed labelling scheme. Experimental evaluations indicated that the performance of XML-REG exceeded XMap, XRecursive, XAncestor and Mini-XML concerning storing time, query retrieval time and scalability. This research produces a core framework for XML to relational databases (RDB) mapping, which could be adopted in various industries.
Key performance requirement of future next wireless networks (6G)journalBEEI
The document provides an overview of the key performance indicators (KPIs) for 6G wireless networks compared to 5G networks. Some of the major KPIs discussed for 6G include: achieving data rates of up to 1 Tbps and individual user data rates up to 100 Gbps; reducing latency below 10 milliseconds; supporting up to 10 million connected devices per square kilometer; improving spectral efficiency by up to 100 times through technologies like terahertz communications and smart surfaces; and achieving an energy efficiency of 1 pico-joule per bit transmitted through techniques like wireless power transmission and energy harvesting. The document outlines how 6G aims to integrate terrestrial, aerial and maritime communications into a single network to provide ubiquitous connectivity with higher
Noise resistance territorial intensity-based optical flow using inverse confi...journalBEEI
This paper presents the use of the inverse confidential technique on bilateral function with the territorial intensity-based optical flow to prove the effectiveness in noise resistance environment. In general, the image’s motion vector is coded by the technique called optical flow where the sequences of the image are used to determine the motion vector. But, the accuracy rate of the motion vector is reduced when the source of image sequences is interfered by noises. This work proved that the inverse confidential technique on bilateral function can increase the percentage of accuracy in the motion vector determination by the territorial intensity-based optical flow under the noisy environment. We performed the testing with several kinds of non-Gaussian noises at several patterns of standard image sequences by analyzing the result of the motion vector in a form of the error vector magnitude (EVM) and compared it with several noise resistance techniques in territorial intensity-based optical flow method.
Modeling climate phenomenon with software grids analysis and display system i...journalBEEI
This study aims to model climate change based on rainfall, air temperature, pressure, humidity and wind with grADS software and create a global warming module. This research uses 3D model, define, design, and develop. The results of the modeling of the five climate elements consist of the annual average temperature in Indonesia in 2009-2015 which is between 29oC to 30.1oC, the horizontal distribution of the annual average pressure in Indonesia in 2009-2018 is between 800 mBar to 1000 mBar, the horizontal distribution the average annual humidity in Indonesia in 2009 and 2011 ranged between 27-57, in 2012-2015, 2017 and 2018 it ranged between 30-60, during the East Monsoon, the wind circulation moved from northern Indonesia to the southern region Indonesia. During the west monsoon, the wind circulation moves from the southern part of Indonesia to the northern part of Indonesia. The global warming module for SMA/MA produced is feasible to use, this is in accordance with the value given by the validate of 69 which is in the appropriate category and the response of teachers and students through a 91% questionnaire.
An approach of re-organizing input dataset to enhance the quality of emotion ...journalBEEI
The purpose of this paper is to propose an approach of re-organizing input data to recognize emotion based on short signal segments and increase the quality of emotional recognition using physiological signals. MIT's long physiological signal set was divided into two new datasets, with shorter and overlapped segments. Three different classification methods (support vector machine, random forest, and multilayer perceptron) were implemented to identify eight emotional states based on statistical features of each segment in these two datasets. By re-organizing the input dataset, the quality of recognition results was enhanced. The random forest shows the best classification result among three implemented classification methods, with an accuracy of 97.72% for eight emotional states, on the overlapped dataset. This approach shows that, by re-organizing the input dataset, the high accuracy of recognition results can be achieved without the use of EEG and ECG signals.
Parking detection system using background subtraction and HSV color segmentationjournalBEEI
Manual system vehicle parking makes finding vacant parking lots difficult, so it has to check directly to the vacant space. If many people do parking, then the time needed for it is very much or requires many people to handle it. This research develops a real-time parking system to detect parking. The system is designed using the HSV color segmentation method in determining the background image. In addition, the detection process uses the background subtraction method. Applying these two methods requires image preprocessing using several methods such as grayscaling, blurring (low-pass filter). In addition, it is followed by a thresholding and filtering process to get the best image in the detection process. In the process, there is a determination of the ROI to determine the focus area of the object identified as empty parking. The parking detection process produces the best average accuracy of 95.76%. The minimum threshold value of 255 pixels is 0.4. This value is the best value from 33 test data in several criteria, such as the time of capture, composition and color of the vehicle, the shape of the shadow of the object’s environment, and the intensity of light. This parking detection system can be implemented in real-time to determine the position of an empty place.
Quality of service performances of video and voice transmission in universal ...journalBEEI
The universal mobile telecommunications system (UMTS) has distinct benefits in that it supports a wide range of quality of service (QoS) criteria that users require in order to fulfill their requirements. The transmission of video and audio in real-time applications places a high demand on the cellular network, therefore QoS is a major problem in these applications. The ability to provide QoS in the UMTS backbone network necessitates an active QoS mechanism in order to maintain the necessary level of convenience on UMTS networks. For UMTS networks, investigation models for end-to-end QoS, total transmitted and received data, packet loss, and throughput providing techniques are run and assessed and the simulation results are examined. According to the results, appropriate QoS adaption allows for specific voice and video transmission. Finally, by analyzing existing QoS parameters, the QoS performance of 4G/UMTS networks may be improved.
A multi-task learning based hybrid prediction algorithm for privacy preservin...journalBEEI
There is ever increasing need to use computer vision devices to capture videos as part of many real-world applications. However, invading privacy of people is the cause of concern. There is need for protecting privacy of people while videos are used purposefully based on objective functions. One such use case is human activity recognition without disclosing human identity. In this paper, we proposed a multi-task learning based hybrid prediction algorithm (MTL-HPA) towards realising privacy preserving human activity recognition framework (PPHARF). It serves the purpose by recognizing human activities from videos while preserving identity of humans present in the multimedia object. Face of any person in the video is anonymized to preserve privacy while the actions of the person are exposed to get them extracted. Without losing utility of human activity recognition, anonymization is achieved. Humans and face detection methods file to reveal identity of the persons in video. We experimentally confirm with joint-annotated human motion data base (JHMDB) and daily action localization in YouTube (DALY) datasets that the framework recognises human activities and ensures non-disclosure of privacy information. Our approach is better than many traditional anonymization techniques such as noise adding, blurring, and masking.
Assessing mangrove deforestation using pixel-based image: a machine learning ...journalBEEI
1. The document assesses mangrove deforestation using machine learning algorithms applied to pixel-based images. It examines random forest (RF), support vector machine (SVM), decision tree (DT), and object-based nearest neighbors algorithms to classify mangrove forests in seven provinces in Thailand's Gulf of Thailand.
2. SVM with a radial basis function resulted in an overall accuracy of 96.83%. RF performed better than other algorithms when orthophotography was not available.
3. The study aims to provide features of tree cover loss, above-ground carbon dioxide emissions, and above-ground biomass loss for 2001-2019 using the machine learning algorithms.
Micro hydropower plant potential study based on Landsat 8 operational land im...journalBEEI
Remote sensing technology has been widely applied in various fields, including oil, gas, and mineral exploration, spatial planning, and environmental monitoring. This paper describes the application of remote sensing technology for the potential study of a renewable micro hydropower plant (MHP) using Landsat 8 satellite data. The Sukaati Watershed, West Java, Indonesia, was selected as the case study area. Landsat 8 satellite data, acquired on August 21, 2020, was applied to extract information on land use, geology, and potential landslides. Drainage patterns, watershed boundaries, and head height were obtained from topographic map data. Drainage patterns, watershed boundaries, and land use are used to calculate flow rates. Geological map and landslide are the basis of layout of MHP components, such as water intake, dam, waterway, settling tank, penstock, and powerhouse. A field survey to acquire actual flow rate and head height was conducted to validate the results of the remote sensing data interpretation. Two potential sites of MHP were selected with a hydropower design of 129 kW and 5.18 MW. This study showed that remote sensing technology is beneficial for studying the potential of MHP because fieldwork can be done more quickly and efficiently.
E-commerce online review for detecting influencing factors users perceptionjournalBEEI
To date, online shopping using e-commerce services becomes a trend. The emergence of e-commerce truly helps people to shop more effectively and efficiently. However, there are still some problems encountered in e-commerce, especially from the user perspective. This research aims to explore user review data, particularly on factors that influence user perception of e-commerce applications, classify, and identify potential solutions to finding problems in e-commerce applications. Data is grabbed using web scraping techniques and classified using proper machine learning, i.e., support vector machine (SVM). Text associations and fishbone analysis are performed based on the classified user review data. The results of this study show that the user satisfaction problem can be captured. Furthermore, various services that should be provided as a potential solution to experienced customers' problems or application users' perception problems can be generated. A detailed discussion of these findings is available in this article.
Frequency based edge-texture feature using Otsu’s based enhanced local ternar...journalBEEI
Sharing information through images is a trend nowadays. Advancements in the technology and user-friendly image editing tool make easy to edit the image and spread fake news through different social networking platforms. Forged image has been generated through an advanced image editing tool, so it is very challenging for image forensics to detect the micro discrepancy which distorted the micro pattern. This paper proposes an image forensic detection technique, which implies multi-level discrete wavelet transform to implement digital image filtering. Canny edge detection technique is implemented to detect the edge of the image to implement Otsu’s based enhanced local ternary pattern (OELTP), which can detect forgery-related artifact. DWT is implemented over Cb and Cr components of the image and using edge texture to improve the Otsu global threshold, which is used to extract features using ELTP technique. Support vector machine (SVM) is used for classification to find the image is forged or not. The performance of the work evaluated on three different open available data sets CASIA v1, CASIA v2, and Columbia. Our proposed work gives better results with some of the previous states of the work in terms of detection accuracy.
Development of 3D convolutional neural network to recognize human activities ...journalBEEI
This document describes the development of a 3D convolutional neural network (CNN) model to recognize human activities using moderate computation capabilities. The model is trained on the KTH dataset, which contains activities like walking, running, jogging, handwaving, handclapping, and boxing. The proposed model uses 3D CNN layers and max pooling layers to extract both spatial and temporal features from video frames. Testing achieved an accuracy of 93.33% for activity recognition. The number of model parameters and operations are also calculated to show the model can perform human activity recognition with reasonable computational requirements suitable for devices with moderate capabilities.
On detecting and identifying faulty internet of things devices and outagesjournalBEEI
This document proposes two methods to detect and identify faulty IoT devices by monitoring network traffic. The first method uses traffic deviation as an indicator by comparing actual traffic to an expected normal traffic profile. The second method uses entropy of traffic flows as an indicator to detect outages of IoT devices that do not generate large amounts of normal traffic. Both methods utilize a compact data structure called Bitcount to efficiently capture IP traffic. The methods were evaluated and found to effectively detect malfunctioned or defective IoT devices through monitoring changes in traffic patterns.
Twin support vector machine using kernel function for colorectal cancer detec...journalBEEI
Nowadays, machine learning technology is needed in the medical field. therefore, this research is useful for solving problems in the medical field by using machine learning. Many cases of colorectal cancer are diagnosed late. When colorectal cancer is detected, the cancer is usually well developed. Machine learning is an approach that is part of artificial intelligence and can detect colorectal cancer early. This study discusses colorectal cancer detection using twin support vector machine (SVM) method and kernel function i.e. linear kernels, polynomial kernels, RBF kernels, and gaussian kernels. By comparing the accuracy and running time, then we will know which method is better in classifying the colorectal cancer dataset that we get from Al-Islam Hospital, Bandung, Indonesia. The results showed that polynomial kernels has better accuracy and running time. It can be seen with a maximum accuracy of twin SVM using polynomial kernels 86% and 0.502 seconds running time.
Wireless HART stack using multiprocessor technique with laxity algorithmjournalBEEI
The use of a real-time operating system is required for the demarcation of industrial wireless sensor network (IWSN) stacks (RTOS). In the industrial world, a vast number of sensors are utilised to gather various types of data. The data gathered by the sensors cannot be prioritised ahead of time. Because all of the information is equally essential. As a result, a protocol stack is employed to guarantee that data is acquired and processed fairly. In IWSN, the protocol stack is implemented using RTOS. The data collected from IWSN sensor nodes is processed using non-preemptive scheduling and the protocol stack, and then sent in parallel to the IWSN's central controller. The real-time operating system (RTOS) is a process that occurs between hardware and software. Packets must be sent at a certain time. It's possible that some packets may collide during transmission. We're going to undertake this project to get around this collision. As a prototype, this project is divided into two parts. The first uses RTOS and the LPC2148 as a master node, while the second serves as a standard data collection node to which sensors are attached. Any controller may be used in the second part, depending on the situation. Wireless HART allows two nodes to communicate with each other.
Implementation of double-layer loaded on octagon microstrip yagi antennajournalBEEI
This document describes the implementation of a double-layer structure on an octagon microstrip yagi antenna (OMYA) to improve its performance at 5.8 GHz. The double-layer consists of two double positive (DPS) substrates placed above the OMYA. Simulation and experimental results show that the double-layer configuration increases the gain of the OMYA by 2.5 dB compared to without the double-layer. The measured bandwidth of the OMYA with double-layer is 14.6%, indicating the double-layer can increase both the gain and bandwidth of the OMYA.
The calculation of the field of an antenna located near the human headjournalBEEI
In this work, a numerical calculation was carried out in one of the universal programs for automatic electro-dynamic design. The calculation is aimed at obtaining numerical values for specific absorbed power (SAR). It is the SAR value that can be used to determine the effect of the antenna of a wireless device on biological objects; the dipole parameters will be selected for GSM1800. Investigation of the influence of distance to a cell phone on radiation shows that absorbed in the head of a person the effect of electromagnetic radiation on the brain decreases by three times this is a very important result the SAR value has decreased by almost three times it is acceptable results.
Exact secure outage probability performance of uplinkdownlink multiple access...journalBEEI
In this paper, we study uplink-downlink non-orthogonal multiple access (NOMA) systems by considering the secure performance at the physical layer. In the considered system model, the base station acts a relay to allow two users at the left side communicate with two users at the right side. By considering imperfect channel state information (CSI), the secure performance need be studied since an eavesdropper wants to overhear signals processed at the downlink. To provide secure performance metric, we derive exact expressions of secrecy outage probability (SOP) and and evaluating the impacts of main parameters on SOP metric. The important finding is that we can achieve the higher secrecy performance at high signal to noise ratio (SNR). Moreover, the numerical results demonstrate that the SOP tends to a constant at high SNR. Finally, our results show that the power allocation factors, target rates are main factors affecting to the secrecy performance of considered uplink-downlink NOMA systems.
Design of a dual-band antenna for energy harvesting applicationjournalBEEI
This report presents an investigation on how to improve the current dual-band antenna to enhance the better result of the antenna parameters for energy harvesting application. Besides that, to develop a new design and validate the antenna frequencies that will operate at 2.4 GHz and 5.4 GHz. At 5.4 GHz, more data can be transmitted compare to 2.4 GHz. However, 2.4 GHz has long distance of radiation, so it can be used when far away from the antenna module compare to 5 GHz that has short distance in radiation. The development of this project includes the scope of designing and testing of antenna using computer simulation technology (CST) 2018 software and vector network analyzer (VNA) equipment. In the process of designing, fundamental parameters of antenna are being measured and validated, in purpose to identify the better antenna performance.
Transforming data-centric eXtensible markup language into relational database...journalBEEI
eXtensible markup language (XML) appeared internationally as the format for data representation over the web. Yet, most organizations are still utilising relational databases as their database solutions. As such, it is crucial to provide seamless integration via effective transformation between these database infrastructures. In this paper, we propose XML-REG to bridge these two technologies based on node-based and path-based approaches. The node-based approach is good to annotate each positional node uniquely, while the path-based approach provides summarised path information to join the nodes. On top of that, a new range labelling is also proposed to annotate nodes uniquely by ensuring the structural relationships are maintained between nodes. If a new node is to be added to the document, re-labelling is not required as the new label will be assigned to the node via the new proposed labelling scheme. Experimental evaluations indicated that the performance of XML-REG exceeded XMap, XRecursive, XAncestor and Mini-XML concerning storing time, query retrieval time and scalability. This research produces a core framework for XML to relational databases (RDB) mapping, which could be adopted in various industries.
Key performance requirement of future next wireless networks (6G)journalBEEI
The document provides an overview of the key performance indicators (KPIs) for 6G wireless networks compared to 5G networks. Some of the major KPIs discussed for 6G include: achieving data rates of up to 1 Tbps and individual user data rates up to 100 Gbps; reducing latency below 10 milliseconds; supporting up to 10 million connected devices per square kilometer; improving spectral efficiency by up to 100 times through technologies like terahertz communications and smart surfaces; and achieving an energy efficiency of 1 pico-joule per bit transmitted through techniques like wireless power transmission and energy harvesting. The document outlines how 6G aims to integrate terrestrial, aerial and maritime communications into a single network to provide ubiquitous connectivity with higher
Noise resistance territorial intensity-based optical flow using inverse confi...journalBEEI
This paper presents the use of the inverse confidential technique on bilateral function with the territorial intensity-based optical flow to prove the effectiveness in noise resistance environment. In general, the image’s motion vector is coded by the technique called optical flow where the sequences of the image are used to determine the motion vector. But, the accuracy rate of the motion vector is reduced when the source of image sequences is interfered by noises. This work proved that the inverse confidential technique on bilateral function can increase the percentage of accuracy in the motion vector determination by the territorial intensity-based optical flow under the noisy environment. We performed the testing with several kinds of non-Gaussian noises at several patterns of standard image sequences by analyzing the result of the motion vector in a form of the error vector magnitude (EVM) and compared it with several noise resistance techniques in territorial intensity-based optical flow method.
Modeling climate phenomenon with software grids analysis and display system i...journalBEEI
This study aims to model climate change based on rainfall, air temperature, pressure, humidity and wind with grADS software and create a global warming module. This research uses 3D model, define, design, and develop. The results of the modeling of the five climate elements consist of the annual average temperature in Indonesia in 2009-2015 which is between 29oC to 30.1oC, the horizontal distribution of the annual average pressure in Indonesia in 2009-2018 is between 800 mBar to 1000 mBar, the horizontal distribution the average annual humidity in Indonesia in 2009 and 2011 ranged between 27-57, in 2012-2015, 2017 and 2018 it ranged between 30-60, during the East Monsoon, the wind circulation moved from northern Indonesia to the southern region Indonesia. During the west monsoon, the wind circulation moves from the southern part of Indonesia to the northern part of Indonesia. The global warming module for SMA/MA produced is feasible to use, this is in accordance with the value given by the validate of 69 which is in the appropriate category and the response of teachers and students through a 91% questionnaire.
An approach of re-organizing input dataset to enhance the quality of emotion ...journalBEEI
The purpose of this paper is to propose an approach of re-organizing input data to recognize emotion based on short signal segments and increase the quality of emotional recognition using physiological signals. MIT's long physiological signal set was divided into two new datasets, with shorter and overlapped segments. Three different classification methods (support vector machine, random forest, and multilayer perceptron) were implemented to identify eight emotional states based on statistical features of each segment in these two datasets. By re-organizing the input dataset, the quality of recognition results was enhanced. The random forest shows the best classification result among three implemented classification methods, with an accuracy of 97.72% for eight emotional states, on the overlapped dataset. This approach shows that, by re-organizing the input dataset, the high accuracy of recognition results can be achieved without the use of EEG and ECG signals.
Parking detection system using background subtraction and HSV color segmentationjournalBEEI
Manual system vehicle parking makes finding vacant parking lots difficult, so it has to check directly to the vacant space. If many people do parking, then the time needed for it is very much or requires many people to handle it. This research develops a real-time parking system to detect parking. The system is designed using the HSV color segmentation method in determining the background image. In addition, the detection process uses the background subtraction method. Applying these two methods requires image preprocessing using several methods such as grayscaling, blurring (low-pass filter). In addition, it is followed by a thresholding and filtering process to get the best image in the detection process. In the process, there is a determination of the ROI to determine the focus area of the object identified as empty parking. The parking detection process produces the best average accuracy of 95.76%. The minimum threshold value of 255 pixels is 0.4. This value is the best value from 33 test data in several criteria, such as the time of capture, composition and color of the vehicle, the shape of the shadow of the object’s environment, and the intensity of light. This parking detection system can be implemented in real-time to determine the position of an empty place.
Quality of service performances of video and voice transmission in universal ...journalBEEI
The universal mobile telecommunications system (UMTS) has distinct benefits in that it supports a wide range of quality of service (QoS) criteria that users require in order to fulfill their requirements. The transmission of video and audio in real-time applications places a high demand on the cellular network, therefore QoS is a major problem in these applications. The ability to provide QoS in the UMTS backbone network necessitates an active QoS mechanism in order to maintain the necessary level of convenience on UMTS networks. For UMTS networks, investigation models for end-to-end QoS, total transmitted and received data, packet loss, and throughput providing techniques are run and assessed and the simulation results are examined. According to the results, appropriate QoS adaption allows for specific voice and video transmission. Finally, by analyzing existing QoS parameters, the QoS performance of 4G/UMTS networks may be improved.
A multi-task learning based hybrid prediction algorithm for privacy preservin...journalBEEI
There is ever increasing need to use computer vision devices to capture videos as part of many real-world applications. However, invading privacy of people is the cause of concern. There is need for protecting privacy of people while videos are used purposefully based on objective functions. One such use case is human activity recognition without disclosing human identity. In this paper, we proposed a multi-task learning based hybrid prediction algorithm (MTL-HPA) towards realising privacy preserving human activity recognition framework (PPHARF). It serves the purpose by recognizing human activities from videos while preserving identity of humans present in the multimedia object. Face of any person in the video is anonymized to preserve privacy while the actions of the person are exposed to get them extracted. Without losing utility of human activity recognition, anonymization is achieved. Humans and face detection methods file to reveal identity of the persons in video. We experimentally confirm with joint-annotated human motion data base (JHMDB) and daily action localization in YouTube (DALY) datasets that the framework recognises human activities and ensures non-disclosure of privacy information. Our approach is better than many traditional anonymization techniques such as noise adding, blurring, and masking.
Assessing mangrove deforestation using pixel-based image: a machine learning ...journalBEEI
1. The document assesses mangrove deforestation using machine learning algorithms applied to pixel-based images. It examines random forest (RF), support vector machine (SVM), decision tree (DT), and object-based nearest neighbors algorithms to classify mangrove forests in seven provinces in Thailand's Gulf of Thailand.
2. SVM with a radial basis function resulted in an overall accuracy of 96.83%. RF performed better than other algorithms when orthophotography was not available.
3. The study aims to provide features of tree cover loss, above-ground carbon dioxide emissions, and above-ground biomass loss for 2001-2019 using the machine learning algorithms.
Micro hydropower plant potential study based on Landsat 8 operational land im...journalBEEI
Remote sensing technology has been widely applied in various fields, including oil, gas, and mineral exploration, spatial planning, and environmental monitoring. This paper describes the application of remote sensing technology for the potential study of a renewable micro hydropower plant (MHP) using Landsat 8 satellite data. The Sukaati Watershed, West Java, Indonesia, was selected as the case study area. Landsat 8 satellite data, acquired on August 21, 2020, was applied to extract information on land use, geology, and potential landslides. Drainage patterns, watershed boundaries, and head height were obtained from topographic map data. Drainage patterns, watershed boundaries, and land use are used to calculate flow rates. Geological map and landslide are the basis of layout of MHP components, such as water intake, dam, waterway, settling tank, penstock, and powerhouse. A field survey to acquire actual flow rate and head height was conducted to validate the results of the remote sensing data interpretation. Two potential sites of MHP were selected with a hydropower design of 129 kW and 5.18 MW. This study showed that remote sensing technology is beneficial for studying the potential of MHP because fieldwork can be done more quickly and efficiently.
E-commerce online review for detecting influencing factors users perceptionjournalBEEI
To date, online shopping using e-commerce services becomes a trend. The emergence of e-commerce truly helps people to shop more effectively and efficiently. However, there are still some problems encountered in e-commerce, especially from the user perspective. This research aims to explore user review data, particularly on factors that influence user perception of e-commerce applications, classify, and identify potential solutions to finding problems in e-commerce applications. Data is grabbed using web scraping techniques and classified using proper machine learning, i.e., support vector machine (SVM). Text associations and fishbone analysis are performed based on the classified user review data. The results of this study show that the user satisfaction problem can be captured. Furthermore, various services that should be provided as a potential solution to experienced customers' problems or application users' perception problems can be generated. A detailed discussion of these findings is available in this article.
Frequency based edge-texture feature using Otsu’s based enhanced local ternar...journalBEEI
Sharing information through images is a trend nowadays. Advancements in the technology and user-friendly image editing tool make easy to edit the image and spread fake news through different social networking platforms. Forged image has been generated through an advanced image editing tool, so it is very challenging for image forensics to detect the micro discrepancy which distorted the micro pattern. This paper proposes an image forensic detection technique, which implies multi-level discrete wavelet transform to implement digital image filtering. Canny edge detection technique is implemented to detect the edge of the image to implement Otsu’s based enhanced local ternary pattern (OELTP), which can detect forgery-related artifact. DWT is implemented over Cb and Cr components of the image and using edge texture to improve the Otsu global threshold, which is used to extract features using ELTP technique. Support vector machine (SVM) is used for classification to find the image is forged or not. The performance of the work evaluated on three different open available data sets CASIA v1, CASIA v2, and Columbia. Our proposed work gives better results with some of the previous states of the work in terms of detection accuracy.
Development of 3D convolutional neural network to recognize human activities ...journalBEEI
This document describes the development of a 3D convolutional neural network (CNN) model to recognize human activities using moderate computation capabilities. The model is trained on the KTH dataset, which contains activities like walking, running, jogging, handwaving, handclapping, and boxing. The proposed model uses 3D CNN layers and max pooling layers to extract both spatial and temporal features from video frames. Testing achieved an accuracy of 93.33% for activity recognition. The number of model parameters and operations are also calculated to show the model can perform human activity recognition with reasonable computational requirements suitable for devices with moderate capabilities.
On detecting and identifying faulty internet of things devices and outagesjournalBEEI
This document proposes two methods to detect and identify faulty IoT devices by monitoring network traffic. The first method uses traffic deviation as an indicator by comparing actual traffic to an expected normal traffic profile. The second method uses entropy of traffic flows as an indicator to detect outages of IoT devices that do not generate large amounts of normal traffic. Both methods utilize a compact data structure called Bitcount to efficiently capture IP traffic. The methods were evaluated and found to effectively detect malfunctioned or defective IoT devices through monitoring changes in traffic patterns.
Twin support vector machine using kernel function for colorectal cancer detec...journalBEEI
Nowadays, machine learning technology is needed in the medical field. therefore, this research is useful for solving problems in the medical field by using machine learning. Many cases of colorectal cancer are diagnosed late. When colorectal cancer is detected, the cancer is usually well developed. Machine learning is an approach that is part of artificial intelligence and can detect colorectal cancer early. This study discusses colorectal cancer detection using twin support vector machine (SVM) method and kernel function i.e. linear kernels, polynomial kernels, RBF kernels, and gaussian kernels. By comparing the accuracy and running time, then we will know which method is better in classifying the colorectal cancer dataset that we get from Al-Islam Hospital, Bandung, Indonesia. The results showed that polynomial kernels has better accuracy and running time. It can be seen with a maximum accuracy of twin SVM using polynomial kernels 86% and 0.502 seconds running time.
Open Channel Flow: fluid flow with a free surfaceIndrajeet sahu
Open Channel Flow: This topic focuses on fluid flow with a free surface, such as in rivers, canals, and drainage ditches. Key concepts include the classification of flow types (steady vs. unsteady, uniform vs. non-uniform), hydraulic radius, flow resistance, Manning's equation, critical flow conditions, and energy and momentum principles. It also covers flow measurement techniques, gradually varied flow analysis, and the design of open channels. Understanding these principles is vital for effective water resource management and engineering applications.
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...PriyankaKilaniya
Energy efficiency has been important since the latter part of the last century. The main object of this survey is to determine the energy efficiency knowledge among consumers. Two separate districts in Bangladesh are selected to conduct the survey on households and showrooms about the energy and seller also. The survey uses the data to find some regression equations from which it is easy to predict energy efficiency knowledge. The data is analyzed and calculated based on five important criteria. The initial target was to find some factors that help predict a person's energy efficiency knowledge. From the survey, it is found that the energy efficiency awareness among the people of our country is very low. Relationships between household energy use behaviors are estimated using a unique dataset of about 40 households and 20 showrooms in Bangladesh's Chapainawabganj and Bagerhat districts. Knowledge of energy consumption and energy efficiency technology options is found to be associated with household use of energy conservation practices. Household characteristics also influence household energy use behavior. Younger household cohorts are more likely to adopt energy-efficient technologies and energy conservation practices and place primary importance on energy saving for environmental reasons. Education also influences attitudes toward energy conservation in Bangladesh. Low-education households indicate they primarily save electricity for the environment while high-education households indicate they are motivated by environmental concerns.
Impartiality as per ISO /IEC 17025:2017 StandardMuhammadJazib15
This document provides basic guidelines for imparitallity requirement of ISO 17025. It defines in detial how it is met and wiudhwdih jdhsjdhwudjwkdbjwkdddddddddddkkkkkkkkkkkkkkkkkkkkkkkwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwioiiiiiiiiiiiii uwwwwwwwwwwwwwwwwhe wiqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqq gbbbbbbbbbbbbb owdjjjjjjjjjjjjjjjjjjjj widhi owqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqq uwdhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhwqiiiiiiiiiiiiiiiiiiiiiiiiiiiiw0pooooojjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjj whhhhhhhhhhh wheeeeeeee wihieiiiiii wihe
e qqqqqqqqqqeuwiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiqw dddddddddd cccccccccccccccv s w c r
cdf cb bicbsad ishd d qwkbdwiur e wetwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwww w
dddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddfffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffw
uuuuhhhhhhhhhhhhhhhhhhhhhhhhe qiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiii iqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqq eeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee qqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccc ccccccccccccccccccccccccccccccccccc bbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbu uuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuum
m
m mmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmm m i
g i dijsd sjdnsjd ndjajsdnnsa adjdnawddddddddddddd uw
This study Examines the Effectiveness of Talent Procurement through the Imple...DharmaBanothu
In the world with high technology and fast
forward mindset recruiters are walking/showing interest
towards E-Recruitment. Present most of the HRs of
many companies are choosing E-Recruitment as the best
choice for recruitment. E-Recruitment is being done
through many online platforms like Linkedin, Naukri,
Instagram , Facebook etc. Now with high technology E-
Recruitment has gone through next level by using
Artificial Intelligence too.
Key Words : Talent Management, Talent Acquisition , E-
Recruitment , Artificial Intelligence Introduction
Effectiveness of Talent Acquisition through E-
Recruitment in this topic we will discuss about 4important
and interlinked topics which are
Applications of artificial Intelligence in Mechanical Engineering.pdfAtif Razi
Historically, mechanical engineering has relied heavily on human expertise and empirical methods to solve complex problems. With the introduction of computer-aided design (CAD) and finite element analysis (FEA), the field took its first steps towards digitization. These tools allowed engineers to simulate and analyze mechanical systems with greater accuracy and efficiency. However, the sheer volume of data generated by modern engineering systems and the increasing complexity of these systems have necessitated more advanced analytical tools, paving the way for AI.
AI offers the capability to process vast amounts of data, identify patterns, and make predictions with a level of speed and accuracy unattainable by traditional methods. This has profound implications for mechanical engineering, enabling more efficient design processes, predictive maintenance strategies, and optimized manufacturing operations. AI-driven tools can learn from historical data, adapt to new information, and continuously improve their performance, making them invaluable in tackling the multifaceted challenges of modern mechanical engineering.
Accident detection system project report.pdfKamal Acharya
The Rapid growth of technology and infrastructure has made our lives easier. The
advent of technology has also increased the traffic hazards and the road accidents take place
frequently which causes huge loss of life and property because of the poor emergency facilities.
Many lives could have been saved if emergency service could get accident information and
reach in time. Our project will provide an optimum solution to this draw back. A piezo electric
sensor can be used as a crash or rollover detector of the vehicle during and after a crash. With
signals from a piezo electric sensor, a severe accident can be recognized. According to this
project when a vehicle meets with an accident immediately piezo electric sensor will detect the
signal or if a car rolls over. Then with the help of GSM module and GPS module, the location
will be sent to the emergency contact. Then after conforming the location necessary action will
be taken. If the person meets with a small accident or if there is no serious threat to anyone’s
life, then the alert message can be terminated by the driver by a switch provided in order to
avoid wasting the valuable time of the medical rescue team.
Determination of Equivalent Circuit parameters and performance characteristic...pvpriya2
Includes the testing of induction motor to draw the circle diagram of induction motor with step wise procedure and calculation for the same. Also explains the working and application of Induction generator
Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...Transcat
Join us for this solutions-based webinar on the tools and techniques for commissioning and maintaining PV Systems. In this session, we'll review the process of building and maintaining a solar array, starting with installation and commissioning, then reviewing operations and maintenance of the system. This course will review insulation resistance testing, I-V curve testing, earth-bond continuity, ground resistance testing, performance tests, visual inspections, ground and arc fault testing procedures, and power quality analysis.
Fluke Solar Application Specialist Will White is presenting on this engaging topic:
Will has worked in the renewable energy industry since 2005, first as an installer for a small east coast solar integrator before adding sales, design, and project management to his skillset. In 2022, Will joined Fluke as a solar application specialist, where he supports their renewable energy testing equipment like IV-curve tracers, electrical meters, and thermal imaging cameras. Experienced in wind power, solar thermal, energy storage, and all scales of PV, Will has primarily focused on residential and small commercial systems. He is passionate about implementing high-quality, code-compliant installation techniques.
A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...DharmaBanothu
The Network on Chip (NoC) has emerged as an effective
solution for intercommunication infrastructure within System on
Chip (SoC) designs, overcoming the limitations of traditional
methods that face significant bottlenecks. However, the complexity
of NoC design presents numerous challenges related to
performance metrics such as scalability, latency, power
consumption, and signal integrity. This project addresses the
issues within the router's memory unit and proposes an enhanced
memory structure. To achieve efficient data transfer, FIFO buffers
are implemented in distributed RAM and virtual channels for
FPGA-based NoC. The project introduces advanced FIFO-based
memory units within the NoC router, assessing their performance
in a Bi-directional NoC (Bi-NoC) configuration. The primary
objective is to reduce the router's workload while enhancing the
FIFO internal structure. To further improve data transfer speed,
a Bi-NoC with a self-configurable intercommunication channel is
suggested. Simulation and synthesis results demonstrate
guaranteed throughput, predictable latency, and equitable
network access, showing significant improvement over previous
designs
Blood finder application project report (1).pdfKamal Acharya
Blood Finder is an emergency time app where a user can search for the blood banks as
well as the registered blood donors around Mumbai. This application also provide an
opportunity for the user of this application to become a registered donor for this user have
to enroll for the donor request from the application itself. If the admin wish to make user
a registered donor, with some of the formalities with the organization it can be done.
Specialization of this application is that the user will not have to register on sign-in for
searching the blood banks and blood donors it can be just done by installing the
application to the mobile.
The purpose of making this application is to save the user’s time for searching blood of
needed blood group during the time of the emergency.
This is an android application developed in Java and XML with the connectivity of
SQLite database. This application will provide most of basic functionality required for an
emergency time application. All the details of Blood banks and Blood donors are stored
in the database i.e. SQLite.
This application allowed the user to get all the information regarding blood banks and
blood donors such as Name, Number, Address, Blood Group, rather than searching it on
the different websites and wasting the precious time. This application is effective and
user friendly.
Robotic arm joint position control using iterative learning and mixed sensitivity H∞ robust controller
1. Bulletin of Electrical Engineering and Informatics
Vol. 10, No. 4, August 2021, pp.1864~1873
ISSN: 2302-9285, DOI: 10.11591/eei.v10ie.3059 1864
Journal homepage: http://beei.org
Robotic arm joint position control using iterative learning and
mixed sensitivity H∞ robust controller
Petrus Sutyasadi, Martinus Bagus Wicaksono
Mechatronics Department, Politeknik Mekatronika Sanata Dharma, Indonesia
Article Info ABSTRACT
Article history:
Received Dec 30, 2020
Revised Mar 6, 2021
Accepted Jun 20, 2021
This paper proposes an improved control strategy of a robotic arm joint using
hybrid controller consist of H∞ robust controller and iterative learning
controller. The main advantage of this controller is the simple structure that
made it possible to be implemented on a small embedded system for frugal
innovation in industrial robotic arm development. Although it has a simple
structure, it is a robust H∞ controller that has robust stability and robust
performance. The iterative learning controller makes the trajectory tracking
even better. To test the effectiveness of the proposed method, computer
simulations using Matlab and hardware experiments were conducted.
Variation of load was applied to both of the processes to present the
uncertainties. The superiority of the proposed controller over the proportional
integral derivative (PID) controller that usually being used in a low-cost
robotic arm development is confirmed that it has better trajectory tracking.
The error tracking along the slope of sinusoidal trajectory input was
suppressed to zero. The biggest error along the trajectory that happened on
every peak of the sinusoidal input, or when the direction is changed has been
improved from 15 degrees to 4 degrees. This can be conceived that the
proposed controller can be applied to control a low-cost robotic arm joint
position which is applicable for small industries or educational purpose.
Keywords:
H∞ robust controller
Iterative learning controller
Robotic arm
SCARA robot
This is an open access article under the CC BY-SA license.
Corresponding Author:
Petrus Sutyasadi
Mechatronics Department
Politeknik Mekatronika Sanata Dharma
Paingan, Maguwoharjo, Depok, Sleman 55283, Indonesia
Email: peter@pmsd.ac.id
1. INTRODUCTION
In this era of industry 4.0, maximum efficiency with no downtime production line become the
dream of every company [1]. Robot is one good candidate to make it happen. In manufacturing, human labor
was said to be less practical than industrial robot [2]. As long as the robots are maintained properly, they can
do their job tirelessly, precisely, and consistently. That is why many industries adopt industrial robots in their
line of production. The robot market has grown significantly around 15 percent from 2014 to 2017 and
predicted it will be more for the next decades [3]. Despite its great contribution to productivity, the cost of a
robot system is very expensive. Small to medium industries will not easily employ robots in their production
systems. Their problem will be solved if the cost of an industrial robot is not so expensive. If small to
medium industries have opportunities to use robots in their production, they will need human resources to
operate and maintain the robot. Therefore, low-cost industrial robots for universities or vocational school is
also important. Because the schools produce skilled human resources that support the use of the robots in
2. Bulletin of Electr Eng & Inf ISSN: 2302-9285
Robotic arm joint position control using iterative learning and mixed sensitivity H∞ … (Petrus Sutyasadi)
1865
industries. Universities or vocational schools need more low-cost industrial robotic arms in their educational
process. It saves more budget if the robot can be provided locally.
There are many published studies about designing and developing low-cost robotic arms. Besides
the price that is lower than the commercial one, low-cost robot components are easily found in the market
[4]. Due to the constraints from the component availability in the market, a low-cost robot can have a
different architecture from time to time [4] and have less performance than the commercial one [5]. The
overall performance can be optimized using a better control algorithm. However, since the embedded system
being used is also a small and a low-cost controller, the control algorithm should be a low order controller
that has a simple structure. A considerable amount of literature has been published on the issue of a simple
controller for a small robotic arm.
Some researchers have developed low-cost robotic arm controller using a simple controller such as
proportional integral (PI) controller [6], PID [7]-[9], fuzzy logic [10], [11], hybrid PID, and fuzzy [12], [13],
optimal controller [14], neural network [15] and model-based controller [16]. A few researchers also tried to
use robust control to control robotic arm joints such as sliding mode controller [17]-[20] and hybrid PID-
sliding mode controller [21]. However, all of those researches were done on simulation or implemented on a
very small robotic arm using small radio control (RC) servo motors. Nothing was done on a real size robotic
arm that considerably applicable in small to medium industries. Secondly, mostly their experiment were done
with a step command and were not investigated with a specific trajectory for example sinusoidal trajectory.
Thirdly, none of them showed robustness among load variation which is commonly happened on a robotic
arm that handles many different tasks.
This paper proposes a hybrid controller to control robotic arm joints using reduced order mixed-
sensitivity H∞ combined with iterative learning controller. To guarantee good trajectory tracking, iterative
learning controller (ILC) was implemented. ILC needs a condition that the system should be a stable closed-
loop system before implementing the ILC. Therefore, to guarantee the stability of the system before
implementing the ILC, a reduced-order mixed-sensitivity H∞ robust controller was implemented. Due to the
use of a small embedded system such as an 8-bit microcontroller, the controller algorithm was designed to be
simple enough to run on the system. A traditional synthesis of an H∞ controller usually generates high order
of controller [22]. In this paper, a reduced-order of H∞ controller combined with iterative learning controller
is proposed.
2. RESEARCH METHOD
2.1. Mechanical design
Mechanical design and the prototype of selective compliance assembly robot arm (SCARA) are
shown in Figure 1. The SCARA robot has 4 degrees of freedom with 3 rotational joints and 1 prismatic joint.
DC motor on the base or 1st actuator is PG45 dc motor, the 2nd actuator uses PG28 dc motor, the 3rd and the
4th actuator use GA125 dc motor, and lastly, the gripper uses RC servo motor. The Denavit Hartenberg of
the SCARA robot is shown in Table 1.
(a) (b)
Figure 1. These figures are, (a) SCARA robot design, (b) SCARA prototype
3. ISSN: 2302-9285
Bulletin of Electr Eng & Inf, Vol. 10, No. 4, August 2021: 1864 – 1873
1866
Table 1. Denavit Hartenberg table of 4DOF SCARA robot [23]
i 𝛼𝑖−1 𝑎𝑖−1 𝑑𝑖 𝜃𝑖
1 0 0 0 𝜃1
2 0 𝑎1 0 𝜃2
3 0 𝑎2 𝑑3 0
4 0 0 0 𝜃4
The forward kinematic (1)-(3) as well as the inverse kinematic of the SCARA robot, is presented as [23]:
𝑥𝑝𝑜𝑠 = 𝑎1𝑐1 + 𝑎2𝑐12 (1)
𝑦𝑝𝑜𝑠 = 𝑎1𝑠1 + 𝑎2𝑠12 (2)
𝑧𝑝𝑜𝑠 = 𝑑3 (3)
𝜃1 = tan−1(𝑦/𝑥) − tan−1(𝑘2/𝑘1) (4)
𝜃2 = ± cos−1
(
𝑥2+𝑦2−𝑎1
2−𝑎2
2
2𝑎1𝑎2
) (5)
𝑑3 = 𝑧 (6)
𝜃4 = ∅ − 𝜃1 − 𝜃2 (7)
2.2. Electronic design
The electronics of the robot consist of microcontrollers using Arduino Uno, dc motor drivers using
VNH2SP chip, and power supply 12 V 10 A. The block diagram of the electronic is shown in Figure 2. Each
Arduino Uno controls two dc motors. The Unos will receive commands from the Arduino Mega through
serial communication. The trajectory command is generated in Arduino Mega. The Arduino Mega also gives
commands to the RC servo motor to open or close the gripper.
Figure 2. Electronic diagram of the SCARA robot
2.3. Controller design
The controller consists of a mixed-sensitivity H∞ robust controller and iterative learning controller.
All the algorithm was written, compiled, and uploaded into an Arduino board.
4. Bulletin of Electr Eng & Inf ISSN: 2302-9285
Robotic arm joint position control using iterative learning and mixed sensitivity H∞ … (Petrus Sutyasadi)
1867
2.3.1. Mixed-sensitivity H∞ robust controller synthesis
Mixed sensitivity H∞ shapes the sensitivity function and the complementary sensitivity function of
a closed-loop system to get a controller with good performance and robustness. Figure 3 shows a single input
single output (SISO) close loop system with multiplicative uncertainty. G(s) is the nominal system, Δ(s) is
the system perturbation, K(s) is the controller, r(s) is the reference input, e(s) is the tracking error, n(s) is the
external disturbance, and y(s) is the output of the system. The controller was designed for 30% of motor
viscous friction and 30% of load inertia uncertainties.
Figure 3. SISO system with multiplicative uncertainties [22]
The perturbed system is expressed by.
𝐺
̃(𝑠) = 𝐺𝑛(𝑠)(1 + 𝛥(𝑠)) (8)
The multiplicative system perturbation is:
𝛥(𝑠) = (
𝐺
̃(𝑠)
𝐺𝑛(𝑠)
− 1) (9)
The mixed-sensitivity H∞ robust controller was synthesized using the Matlab command “Mixsyn”.
Mixsyn computes a controller that minimizes the H∞ norm of the weighted closed-loop transfer function.
‖𝑊
𝑠(𝑠)𝑆(𝑠)‖∞ (10)
‖𝑊𝑡(𝑠)𝑇(𝑠)‖∞ (11)
A known stable function Ws(s) upper bound the multiplicative perturbation to attenuate external
disturbance. Figure 4 shows the function Ws(s) upper-bounds the perturbations.
𝛥(𝑠)∞ ≤ 𝑊𝑡(𝑠)∞ (12)
Figure 4. A stable function Ws(s) upper-bounds the perturbations
10
-3
10
-2
10
-1
10
0
10
1
10
2
10
3
-400
-350
-300
-250
-200
-150
-100
-50
0
Singular Values
Frequency (rad/s)
Singular
Values
(dB)
5. ISSN: 2302-9285
Bulletin of Electr Eng & Inf, Vol. 10, No. 4, August 2021: 1864 – 1873
1868
Using Skogestad’s method [24], the sensitivity weights (Ws(s)) was designed is being as:
𝑊
𝑠(𝑠) =
0.5𝑠+1
𝑠+0.001
(13)
Figure 5 shows that |Ws S|<1 and |Wt T|<1 because the singular values of the inverse of the weight
functions are larger than the sensitivity and the complementary sensitivity singular values. Matlab control
synthesis generate a 3rd order of controller:
𝐾𝑐 =
1.132𝑒08𝑠2+1.38𝑒07𝑠+4.202𝑒05
𝑠3+1.181𝑒04𝑠2+8498𝑠+321
(14)
By using Matlab controller order reducer, a 2nd order of controller was generated from (14):
𝐾𝑐 =
1.132𝑒08𝑠+9.499𝑒06
𝑠2+1.181𝑒04𝑠2+8056
(15)
Figure 6 shows by simulation that the proposed controller can control the plant satisfactorily even in
the presence of uncertainties from 30% variation of motor viscous friction and 30% variation of load inertia.
Figure 5. The singular plot of Ws, Wt, S, and T
Figure 6. Simulation of mixed sensitivy 𝐻∞ robust controller system response
10
-5
10
0
10
5
-200
-150
-100
-50
0
50
Magnitude
(dB)
Bode Diagram
Frequency (rad/s)
S(s)
T(s)
1/Ws(s)
1/Wt(s)
6. Bulletin of Electr Eng & Inf ISSN: 2302-9285
Robotic arm joint position control using iterative learning and mixed sensitivity H∞ … (Petrus Sutyasadi)
1869
2.3.2. Iterative learning control
By learning the error from the previous trajectory track, iterative learning control (ILC) improves
the trajectory tracking of the control system. In using the ILC, several conditions must meet these criteria:
- The trajectory should be a repetitive task.
- The repetitive track should have the same starting and ending position.
- The system should be a stable system before implementing the ILC.
- The tracking performance is improved from one repetition to the next repetition.
- The system should be stable before the ILC is implemented. This is done by the mixed sensitivy 𝐻∞
robust controller.
ILC adjusts the manipulated control to follow the trajectory command [25]. The equation of the ILC
is determined from.
𝑢𝑗 = 𝑢𝑗−1 + 𝑘𝑑𝑒̇𝑗−1(𝑡) + 𝑘𝑝𝑒𝑗−1(𝑡) (16)
The variables are:
uj: ILC control signal
ej: error signal
j: iteration number
kp: proportional gain of ILC
kd: derivative gain of ILC
It is a PD type ILC. The structure was chosen because besides simple, according to Xukun [26], this
structure is already better than a D type or improved D type ILC. The overall hybrid controller output is the
output of mixed sensitivy 𝐻∞ robust controller plus the output of ILC. The block diagram of the mixed
sensitivy 𝐻∞ robust controller-ILC controller is shown in Figure 7. The step-by-step of the overall strategy is
shown in Figure 8.
Figure 7. Block diagram of hybrid mixed sensitivy 𝐻∞ robust controller-ILC
By manual tuning, the ILC constants were KPILC=0.015 and KDILC=0.01. Thus, the equation of the ILC
becomes.
𝑢𝑗 = 𝑢𝑗−1 + 0.01𝑒̇𝑗−1(𝑡) + 0.015𝑒𝑗−1(𝑡) (17)
7. ISSN: 2302-9285
Bulletin of Electr Eng & Inf, Vol. 10, No. 4, August 2021: 1864 – 1873
1870
Figure 8. Flowchart of the hybrid controller synthesis steps
3. RESULTS AND DISCUSSION
A sinusoidal trajectory was prepared to test the algorithm. The frequency of the signal is 0.5 Hz and
has the span of trajectory command from 0 to 200 degrees. The mixed sensitivy 𝐻∞ robust controller
response for the sinusoidal input trajectory is shown in Figure 9. The output response was recorded using the
attached rotary encoder on each motor. The trajectory was tracked properly. However, it has significant
errors along the trajectory. This error along trajectory command is common due to the high inertia of the
system. But this can not be accepted for a robotic arm. The error along the slopes should be very small or
zero.
Figure 9. Mixed sensitivity 𝐻∞ robust controller response for a sinusoidal input trajectory
The tracking performance was improved by adding iterative learning controller. The hybrid
controller performance is shown in Figure 10. After several iterations, the system able to improve its tracking
performance. Without ILC, the tracking performance showed in Figure 9 was so poor. In Figure 10, the
tracking performance to reach the peak of the setpoint which is positive 200 degrees had around 20 degrees
of error. On the second attempt, the output had a better trajectory tracking error around 2 degrees. However,
on the second repetition, the system response performance swang back to around 10 degrees. From the third
repetition onward, the tracking performance of the system began more stable with the average of error
8. Bulletin of Electr Eng & Inf ISSN: 2302-9285
Robotic arm joint position control using iterative learning and mixed sensitivity H∞ … (Petrus Sutyasadi)
1871
tracking around 4 degrees. The system can follow the trajectory command along the slopes of the sinusoidal
input. However, there is still around 4 degrees of error on the peak of the trajectory due to the fast change of
the direction.
Figure 10. Mixed sensitivity 𝐻∞ robust controller combined with iterative leaning controller response for a
sinusoidal input trajectory
The proposed controller performance was compared to the previous robot joint controller which was
a PID cascade controller. The PID cascade controller was designed to have a position control loop and speed
control loop. Figure 11 shows the performance of the PID cascade loop. The PID cascade loop can adjust its
speed besides its position control. Therefore, for a high-frequency sinusoidal input, it can reduce the response
lag time and improve the error along the slopes of the trajectory. At the peak of the trajectory command, the
PID cascade has a big error around 15 degrees. The cascade controller could be adjusted for higher gain to
reduce the error, but consequently, the response became very sensitive to input disturbance. The PID cascade
output response is not smooth in higher gain.
Figure 11. PID cascade controller or previous robot joint control algorithm response for a sinusoidal input
trajectory
9. ISSN: 2302-9285
Bulletin of Electr Eng & Inf, Vol. 10, No. 4, August 2021: 1864 – 1873
1872
4. CONCLUSION
This study aimed was to design and investigate a hybrid controller of mixed sensitivy 𝐻∞ robust
controller with iterative learning controller for controlling a joint position of a low-cost robotic arm. The
Investigation concluded that the proposed controller was able to track the trajectory better than the previous
robot control algorithm which was a PID cascade controller. The relevance of the work is supported by the
current findings that the proposed controller has no errors in tracking the sinusoidal trajectory command,
except on the fast-changing of the direction, it has around 4 degrees of lagging response. This was due to the
fast-changing of the direction of the trajectory command. However, this is still better than the PID cascade
controller that has around 15 degrees of similar lagging response and always has error along with the
trajectory command. The advancement reaches around 73,33% from 15 to 4 degrees in reaching the positive
or negative peak of the setpoint. These findings enhance our understanding that the mixed sensitivy 𝐻∞
Robust controller can guarantee stability over the uncertainties for example the load variation and the
iterative learning controller will fix the limitation of the tracking performance of the robust controller over
time along with the repetition. The tracking performance of the mixed sensitivy 𝐻∞ robust controller will not
be the best tracking because the controller works as an optimal controller that provides the optimal
performance in the range of uncertainties [27]. Therefore, its tracking performance was designed to be
improved by the ILC.
ACKNOWLEDGEMENTS
The authors would like to acknowledge the research funding support from the Ministry of Research,
Technology, and Higher Education of the Republic of Indonesia (Kemen-RISTEKDIKTI).
REFERENCES
[1] A. Weber, “Robotics in the Age of Industry 4.0,” Assembly, vol 63, no. 5, pp. 64-70, May 15. 2020.
[2] WEF, “The Future of Jobs. Employment, Skills and Workforce Strategy for the Fourth Industrial Revolution,”
Global Challenge Insight Report, Davos, Switzerland, 2016.
[3] IFR. World Robotics. Industrial Robots 2014; Frankfurt, M., Ed.; International Federation for Robotics: New York,
NY, USA, 2015.
[4] M. Ceccarelli, “Low-Cost Robots for Research and Teaching Activities,” IEEE Robotics & Automation Magazine,
2001, doi: 10.1109/mra.2003.1233556.
[5] P. Sutyasadi and M. Parnichkun, ‘‘Gait Tracking Control of Quadruped Robot Using Differential Evolution Based
Structure Specified Mixed Sensitivity Robust Control,” Journal of Control Science and Engineering, vol. 2016,
doi: 10.1155/2016/8760215.
[6] Y. V. Hote, "PI controller design for one joint robotic arm," 2016 14th International Conference on Control,
Automation, Robotics and Vision (ICARCV), 2016, pp. 1-6, doi: 10.1109/ICARCV.2016.7838714.
[7] S. C. Suhaimin, N. L. Azmi, M. M. Rahman, and H. M. Yusof, "Analysis of Point-to-Point Robotic Arm Control
using PID controller," 2019 7th International Conference on Mechatronics Engineering (ICOM), 2019, pp. 1-6,
doi: 10.1109/ICOM47790.2019.8952036.
[8] M. U. Almerich, ‘‘PID Control for Robotic Arm,’’ Final degree project, Universitat Politècnica de València, 2020.
[9] D. Zhang and B. Wei, "Design of a joint control system for serial mechanical arms based on PID and MRAC
control," 2016 Asia-Pacific Conference on Intelligent Robot Systems (ACIRS), 2016, pp. 91-96, doi:
10.1109/ACIRS.2016.7556194.
[10] R. N. Lea, J. Hoblit, and Y. Jani, "Fuzzy logic based robotic arm control," [Proceedings 1993] Second IEEE
International Conference on Fuzzy Systems, 1993, pp. 128-133 vol.1, doi: 10.1109/FUZZY.1993.327451.
[11] S. Tomas, K. Michal, and K. Alena, "Fuzzy control of robotic arm implemented in PLC," 2013 IEEE 9th
International Conference on Computational Cybernetics (ICCC), 2013, pp. 45-49, doi:
10.1109/ICCCyb.2013.6617628.
[12] G. M. Khoury, M. A. Saad, H. Y. Kanaan, and C. Asmar, “Fuzzy PID Control of a Five DOF Robot Arm,” Journal
of Intelligent and Robotic Systems, vol. 40, no. 3, pp. 299-320, 2004, doi: 10.1023/B:JINT.0000038947.97195.22.
[13] H. A. Malki, D. Misir, D. Feigenspan, and G. Chen, "Fuzzy PID control of a flexible-joint robot arm with
uncertainties from time-varying loads," in IEEE Transactions on Control Systems Technology, vol. 5, no. 3, pp.
371-378, May 1997, doi: 10.1109/87.572133.
[14] D. P. Nam, N. H. Quang, T. P. Nam, and T. T. H. Yen, ‘‘Adaptive dynamic programming based optimal control for
a robot manipulator,’’ International Journal of Power Electronics and Drive System (IJPEDS), vol. 11, no. 3, pp.
1123-1131, September 2020, doi: 10.11591/ijpeds.v11.i3.
[15] W. S. Pambudi, E. Alfianto, A. Rachman, and D. P. Hapsari, ‘‘Simulation design of trajectory planning robot
manipulator,’’ Bulletin of Electrical Engineering and Informatics (BEEI), vol. 8, no. 1, pp. 196-205, March 2019,
doi: 10.11591/eei.v8i1.1179.
[16] K. S. Gaeid, A. F. Nashee, I. A. Ahmed, and M. H. Dekheel, ‘‘Robot control and kinematic analysis with 6DoF
manipulator using direct kinematic method,’’ Bulletin of Electrical Engineering and Informatics (BEEI), vol. 10,
no. 1, pp. 70-78, February 2021, doi: 10.11591/eei.v10i1.2482.
10. Bulletin of Electr Eng & Inf ISSN: 2302-9285
Robotic arm joint position control using iterative learning and mixed sensitivity H∞ … (Petrus Sutyasadi)
1873
[17] T. Soehartanto, I. F. Imran, and L. A. Purwitosari, "Control design for direct-drive robotic ARM using sliding mode
control," 2017 International Conference on Advanced Mechatronics, Intelligent Manufacture, and Industrial
Automation (ICAMIMIA), 2017, pp. 277-282, doi: 10.1109/ICAMIMIA.2017.8387601.
[18] Trong-Thang Nguyen, ‘‘Sliding mode control-based system for the two-link robot arm,’’ International Journal of
Electrical and Computer Engineering (IJECE), vol. 9, no. 4, pp. 2771-2778, August 2019, doi:
10.11591/ijece.v9i4.pp2771-2778.
[19] S. A. Ajwad, R. U. Islam, M. R. Azam, M. I. Ullah, and J. Iqbal, "Sliding mode control of rigid-link
anthropomorphic robotic arm," 2016 2nd International Conference on Robotics and Artificial Intelligence (ICRAI),
2016, pp. 75-80, doi: 10.1109/ICRAI.2016.7791232.
[20] T. L. Nguyen and H. T. Vu, ‘‘Super-twisting sliding mode based nonlinear control for planar dual arm robots,’’
Bulletin of Electrical Engineering and Informatics, vol. 9, no. 5, pp. 1844-1853, October 2020, doi:
10.11591/eei.v9i5.2143.
[21] A. A. Mohammed and A. Eltayeb, "Dynamics and Control of a Two-link Manipulator using PID and Sliding Mode
Control," 2018 International Conference on Computer, Control, Electrical, and Electronics Engineering
(ICCCEEE), 2018, pp. 1-5, doi: 10.1109/ICCCEEE.2018.8515795.
[22] P. Sutyasadi and M. Parnichkun, "Push recovery control of quadruped robot using particle swarm optimization
based structure specified mixed sensitivity H2/H∞ control," Industrial Robot: the international journal of robotics
research and application, vol. 47, no. 3, pp. 423-434, 2020, doi: 10.1108/IR-06-2019-0135.
[23] Adapala Academy & IES GS for Exams, 3.7 Robotics || ESE Mains || Inverse kinematics of SCARA robot, Jan. 31,
2020. Accessed on Apr. 11, 2021. [Video file]. Available: https://www.youtube.com/watch?v=yfhYGrGbDBw.
[24] S. Skogestad and I. Postlethwaite, Multivariable Feedback Control Analysis and Design, New York, NY, USA:
Wiley, 2001, pp. 789-794.
[25] P. Sutyasadi and M. Parnichun, "Trotting control of a quadruped robot using PID-ILC," IECON 2015 - 41st Annual
Conference of the IEEE Industrial Electronics Society, 2015, pp. 004400-004405, doi:
10.1109/IECON.2015.7392784.
[26] G. Xukun, W. Lin, and Z. Zidong, "Trajectory Tracking of Manipulator Based on Iterative Learning Control," 2020
IEEE International Conference on Advances in Electrical Engineering and Computer Applications (AEECA), 2020,
pp. 1009-1015, doi: 10.1109/AEECA49918.2020.9213540.
[27] P. Sutyasadi and M. B. Wicaksono, “Joint Control of a Robotic Arm Using Particle Swarm Optimization Based
H2/H∞ Robust Control on Arduino,” TELKOMNIKA Telecommunication, Computing, Electronics and Control,
vol. 18, no. 2, pp. 1021-1029, 2020, doi: 10.12928/TELKOMNIKA.v18i2.14749
BIOGRAPHIES OF AUTHORS
Petrus Sutyasadi earned his master degree in mechatronics in 2008 and doctoral degree in
mechatronics in 2016 from the Asian Institute of Technology, Thailand. Currently he is a
lecturer at Mechatronics Department of Politeknik Mekatronika Sanata Dharma, Yogyakarta,
Indonesia. His research interest includes robust control, robotic, and frugal innovation in
mechatronic engineering.
Martinus Bagus Wicaksono earned his master degree in Design and Manufacturing
Engineering in 2011 from the Asian Institute of Technology, Thailand. Currently, he is a lecturer
at Mechanical Design Technology of PMSD, Yogyakarta, Indonesia. His research interest
includes rapid prototyping and advanced Manufacturing.