Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,922 Article Results

A hybrid naïve Bayes based on similarity measure to optimize the mixed-data classification

10.12928/telkomnika.v19i1.18024
Fatima El; University Chouaib Doukkali Barakaz , Omar; University Chouaib Doukkali Boutkhoum , Abdelmajid El; University Chouaib Doukkali Moutaouakkil
In this paper, a hybrid method has been introduced to improve the classification performance of naïve Bayes (NB) for the mixed dataset and multi-class problems. This proposed method relies on a similarity measure which is applied to portions that are not correctly classified by NB. Since the data contains a multi-valued short text with rare words that limit the NB performance, we have employed an adapted selective classifier based on similarities (CSBS) classifier to exceed the NB limitations and included the rare words in the computation. This action has been achieved by transforming the formula from the product of the probabilities of the categorical variable to its sum weighted by numerical variable. The proposed algorithm has been experimented on card payment transaction data that contains the label of transactions: the multi-valued short text and the transaction amount. Based on K-fold cross validation, the evaluation results confirm that the proposed method achieved better results in terms of precision, recall, and F-score compared to NB and CSBS classifiers separately. Besides, the fact of converting a product form to a sum gives more chance to rare words to optimize the text classification, which is another advantage of the proposed method.
Volume: 19
Issue: 1
Page: 155-162
Publish at: 2021-02-01

A deep learning framework to detect Covid-19 disease via chest X-ray and CT scan images

10.11591/ijece.v11i1.pp844-850
Mohammed Y. Kamil
COVID-19 disease has rapidly spread all over the world at the beginning of this year. The hospitals' reports have told that low sensitivity of RT-PCR tests in the infection early stage. At which point, a rapid and accurate diagnostic technique, is needed to detect the Covid-19. CT has been demonstrated to be a successful tool in the diagnosis of disease. A deep learning framework can be developed to aid in evaluating CT exams to provide diagnosis, thus saving time for disease control. In this work, a deep learning model was modified to Covid-19 detection via features extraction from chest X-ray and CT images. Initially, many transfer-learning models have applied and comparison it, then a VGG-19 model was tuned to get the best results that can be adopted in the disease diagnosis. Diagnostic performance was assessed for all models used via the dataset that included 1000 images. The VGG-19 model achieved the highest accuracy of 99%, sensitivity of 97.4%, and specificity of 99.4%. The deep learning and image processing demonstrated high performance in early Covid-19 detection. It shows to be an auxiliary detection way for clinical doctors and thus contribute to the control of the pandemic.
Volume: 11
Issue: 1
Page: 844-850
Publish at: 2021-02-01

Natural language processing and machine learning based cyberbullying detection for Bangla and Romanized Bangla texts

10.12928/telkomnika.v20i1.18630
Md. Tofael; Department of Information and Communication Technology, Comilla University, Comilla, Bangladesh Ahmed , Maqsudur; Department of Information and Communication Technology, Comilla University, Comilla, Bangladesh Rahman , Shafayet; Department of Computer Science & Engineering, Port City International University, Chattogram, Bangladesh Nur , Abu Zafor Muhammad Touhidul; Department of Electrical and Electronics Engineering, University of Rajshahi, Rajshahi, Bangladesh Islam , Dipankar; Department of Information and Communication Engineering, University of Rajshahi, Bangladesh. Das
The popularity of social media has been increasing tremendously in recent times and thus cyberbullying towards people has also increased at an alarming rate. Many cyberbullying texts can be found in the comment sections of many well-known Bangladeshi social media personalities YouTube videos. It has the potential to cause severe emotional and psychological distress. Therefore, texts containing cyberbullying should be detected at the earliest stage and prevented from being displayed. In this study, we use natural language processing (NLP) techniques and various machine learning classifiers and presented model for cyberbullying detection in Bangla and Romanized Bangla texts obtained from YouTube video comments. We developed our own datasets using YouTube application programming interface (API) version 3.0. We collected 5000 Bangla comments, as well as 7000 Romanized Bangla comments from videos of different well-known social media personals. These two datasets, as well as a third dataset of 12000 texts which was the combination of the first two datasets were used to train the classifiers. These datasets were used to train machine learning classifiers after being preprocessed using NLP techniques. With an accuracy score of 76%, support vector machine (SVM) outperformed the other classifiers for the first dataset. The highest accuracy scores for the second and third datasets were 84% and 80%, respectively, which were both achieved by multinomial naive Bayes.
Volume: 20
Issue: 1
Page: 89-97
Publish at: 2021-02-01

Pulse-width modulation direct torque control induction motor drive with Kalman filter

10.12928/telkomnika.v19i1.16247
Hau Huu; Ton Duc Thang University Vo , Dung Quang; Ton Duc Thang University Nguyen , Quang Thanh; Ton Duc Thang University Nguyen , Chau Si Thien; Ton Duc Thang University Dong , Thinh Cong; Ton Duc Thang University Tran , Pavel; VSB-Technical University of Ostrava Brandstetter
The paper deals with application of Kalman filter in induction motor drive using pulse-width modulation direct torque control (PWM-DTC). In the first part, the conventional PWM-DTC drive is described and Kalman filter is utilized to filter components of stator current vector those are assumed to be disturbed by white noise. The second part contains simulation results that are obtained in different cases of load torque, process and measurement noise covariances. The integral time absolute error (ITAE) performance index, undershoot, ripple of important quantities are used to compare the conventional drive structure and proposed drive structure with Kalman filter. The simulation results confirm the expected dynamic response of the proposed structure.
Volume: 19
Issue: 1
Page: 277-284
Publish at: 2021-02-01

Robust watermarking scheme based LWT and SVD using artificial bee colony optimization

10.11591/ijeecs.v21.i2.pp1218-1229
Adnan Mohsin Abdulazeez , Diyar Qader Zeebaree , Dilan M. Hajy , Dilovan Asaad Zebari
This paper presents a watermarking scheme for grayscale images, in which lifting wavelet transform and singular value decomposition are exploited based on multi-objective artificial bee colony optimization to produce a robust watermarking method. Furthermore, for increasing security encryption of the watermark is done prior to the embedding operation. In the proposed scheme, the actual image is altered to four sub-band over three levels of lifting wavelet transform then the singular value of the watermark image is embedded to the singular value of LH sub-band of the transformed original image. In the embedding operation, multiple scaling factors are utilized on behalf of the single scaling element to get the maximum probable robustness without changing watermark lucidity. Multi-objective artificial bee colony optimization is utilized for the determination of the optimal values for multiple scaling components, which are examined against various types of attacks. For making the proposed scheme more secure, the watermark is encrypted chaotically by logistic chaotic encryption before embedding it to the host (original) image. The experimental results show excellent imperceptibility and good resiliency against a wide range of image processing attacks.
Volume: 21
Issue: 2
Page: 1218-1229
Publish at: 2021-02-01

Optimizing location and size of capacitors for power loss reduction in radial distribution networks

10.12928/telkomnika.v19i1.16491
Thuan Thanh; Industrial University of Ho Chi Minh City Nguyen , Phan Nguyen; The University of Theatre and Cinema Ho Chi Minh City Vinh , Hung Duc; Vietnam National University Ho Chi Minh City Nguyen , Ly Huu; Ton Duc Thng University Pham , Thang Trung Nguyen
Power radial distribution systems are increasingly more and more important in transmitting the electric energy from power plants to customers. However, total loss in lines are very high. This issue can be solved by allocating capacitor banks. Determining the suitable allocation and optimal sizing of capacitor banks needs an efficient approach. In this study, the diffusion and update techniques-based algorithm (DUTA) is proposed for such reason. The efficiency of DUTA is inspected on two distribution systems consisting of 15-bus and 33-bus systems with different study cases. The solutions attained by DUTA are competed with recently published methods. As a consequence, the method is more effective than the other methods in terms of the quality of solution.
Volume: 19
Issue: 1
Page: 293-300
Publish at: 2021-02-01

A compact FPGA-based montgomery modular multiplier

10.11591/ijeecs.v21.i2.pp735-743
Ahmed A. H. Abd-elkader , Mostafa Rashdan , El-Sayed A. M. Hasaneen , Hesham F. A. Hamed
This paper presents the FPGA-based implementation of compact montgomery modular multiplier (MMM). MMM serves as a building block commonly required in security protocols relying on public key encryption.  The proposed design is intended for hardware applications of lightweight cryptographic modules that is utilized for the system on chip (SoC) and internet of things (IoT) devices. The proposed design is a modification in the structure of MMM without any multiplication or subtraction processes. The main target of the new modification is enhancing the performance and reducing the area of the MMM hardware module. The operands and internal variables of the proposed hardware circuit is optimized to be bounded to the smallest efficient size to minimize the area and the critical path delay.   The proposed design was coded in VHDL, implemented in the Virtex-6 FPGA, and its performance was analyzed utilizing XILINX ISE tools. Our design occupies the smallest area comparing with other implementations on the same FPGA type. The proposed design saves in a range between 60.0 and 99.0% of the resources compared with other relevant designs.
Volume: 21
Issue: 2
Page: 735-743
Publish at: 2021-02-01

Different valuable tools for Arabic sentiment analysis: a comparative evaluation

10.11591/ijece.v11i1.pp753-762
Youssra Zahidi , Yacine El Younoussi , Yassine Al-Amrani
Arabic Natural language processing (ANLP) is a subfield of artificial intelligence (AI) that tries to build various applications in the Arabic language like Arabic sentiment analysis (ASA) that is the operation of classifying the feelings and emotions expressed for defining the attitude of the writer (neutral, negative or positive). In order to work on ASA, researchers can use various tools in their research projects without explaining the cause behind this use, or they choose a set of libraries according to their knowledge about a specific programming language. Because of their libraries' abundance in the ANLP field, especially in ASA, we are relying on JAVA and Python programming languages in our research work. This paper relies on making an in-depth comparative evaluation of different valuable Python and Java libraries to deduce the most useful ones in Arabic sentiment analysis (ASA). According to a large variety of great and influential works in the domain of ASA, we deduce that the NLTK, Gensim and TextBlob libraries are the most useful for Python ASA task. In connection with Java ASA libraries, we conclude that Weka and CoreNLP tools are the most used, and they have great results in this research domain.
Volume: 11
Issue: 1
Page: 753-762
Publish at: 2021-02-01

An iterative algorithm for color space optimization on image segmentation

10.12928/telkomnika.v19i1.15122
Mourad; University of Sousse Moussa
This paper proposes, a novel hybrid color component (HCC) issued from amounts number of color space with iterative manner, in fact traditional images obtained by RGB sensor weren’t the effective way in image processing applications, for this purpose we have propose a supervised algorithm to substitute RGB level by hybrid and suitable color space at the aim to make well representation of the handled amounts of data, this step is extremely important because the obtained results it will be injected in many future studies like tracking, classification, steganography and cryptography. The second part of this paper consists to segment image coded in hybrid color space already selected, the used algorithm is inspired from kernel function where statistical distribution was used to model background and Bayes rule to make decision of the membership of each pixel, in this research topics we have extended this algorithm in the aim to improve compactness of these distribution. Cauchy background modeling and subtraction is used, and shows the high accuracy of automatic player detection.
Volume: 19
Issue: 1
Page: 199-205
Publish at: 2021-02-01

Sentiments analysis of customer satisfaction in public services using K-nearest neighbors algorithm and natural language processing approach

10.12928/telkomnika.v19i1.17417
Elik Hari; Universitas AMIKOM Yogyakarta Muktafin , Pramono; Universitas AMIKOM Yogyakarta Pramono , Kusrini; Universitas AMIKOM Yogyakarta Kusrini
Customer satisfaction is very important for public service providers, customer satisfaction can be delivered with a survey application or writing criticism that can be used to evaluate and improve service. Unfortunately, there are only a few customers who are willing to give an assessment. The survey application cannot represent the overall feeling of the customer, so it is necessary to analyze the content of the conversation between the customer and the service personnel to determine the level of customer satisfaction. In small amounts, it can be done manually, but in large quantities it is more effective to use the system. A solution is needed in the form of a system that converts voice conversations into text and analyzes customer satisfaction to obtain information for evaluation and improvement of services. This research uses K-nearest neighbors (KNN) and term frequency-inverse document frequency (TF-IDF) algorithm with natural language processing (NLP) approach to classify conversations into 2 classes, "satisfied" and " dissatisfied ". The results of this study received 74.00% accuracy, 76.00% precision and 73.08% recall. In conversations with the label "satisfied" shows customers satisfied with the service and fulfillment of customer desires, while in conversations with the label "not satisfied" customers are less satisfied with the waiting time.
Volume: 19
Issue: 1
Page: 146-154
Publish at: 2021-02-01

A hybrid method of genetic algorithm and support vector machine for intrusion detection

10.11591/ijece.v11i1.pp900-908
Mushtaq Talb Tally , Haleh Amintoosi
With the development of web applications nowadays, intrusions represent a crucial aspect in terms of violating the security policies. Intrusions can be defined as a specific change in the normal behavior of the network operations that intended to violate the security policies of a particular network and affect its performance. Recently, several researchers have examined the capabilities of machine learning techniques in terms of detecting intrusions. One of the important issues behind using the machine learning techniques lies on employing proper set of features. Since the literature has shown diversity of feature types, there is a vital demand to apply a feature selection approach in order to identify the most appropriate features for intrusion detection. This study aims to propose a hybrid method of Genetic Algorithm and Support Vector Machine. GA has been as a feature selection in order to select the best features, while SVM has been used as a classification method to categorize the behavior into normal and intrusion based on the selected features from GA. A benchmark dataset of intrusions (NSS-KDD) has been in the experiment. In addition, the proposed method has been compared with the traditional SVM. Results showed that GA has significantly improved the SVM classification by achieving 0.927 of f-measure.
Volume: 11
Issue: 1
Page: 900-908
Publish at: 2021-02-01

Duobinary modulation/predistortion techniques effects on high bit rate radio over fiber systems

10.11591/ijeecs.v21.i2.pp978-986
Mahmoud M. A. Eid , Ashraf S. Seliem , Ahmed Nabih Zaki Rashed , Abd El-Naser A. Mohammed , Mohamed Yassin Ali , Shaimaa S. Abaza
The work has presented duobinary modulation and predistortion techniques for the radio over fiber system enhancement for achieving security level. Duobinary modulation technique has more compact modulated spectral linewidth with standard non return to zero modulation code. Different NRZ/RZ rectangle shape employed that are namely exponential rectangle shape (ERS), and Gaussian rectangle shape (GRS) for different transmission bit rates. Switching bias voltage, and switching RF voltage based LiNbO3 modulator are changed to measure the performance parameters of the radio over fiber (RoF) system. Predistortion technique improves the linearity of transmitter amplifiers and it is considered as a power efficiency technique. The optimum values of the Q-factor, data error rate (BER), electrical power, signal gain, noise figure, and light signal/noise ratio are achieved with 8 Volt for both switching biases/switching RF signal at 100 GHz. Signal quality/BER and electrical power after the receiver enhancement ratio by using this technique at different RF signal frequencies. 
Volume: 21
Issue: 2
Page: 978-986
Publish at: 2021-02-01

OFDM PAPR reduction for image transmission using improved tone reservation

10.11591/ijece.v11i1.pp416-423
Zainab Noori Ghanim , Buthaina M. Omran
High peak to average power ration (PAPR) in orthogonal frequency division multiplexing (OFDM) is an important problem, which increase the cost and complexity of high power amplifiers. One of the techniques used to reduce the PAPR in OFDM system is the tone reservation method (TR). In our work we propose a modified tone reservation method to decrease the PAPR with low complexity compared with the conventional TR method by process the high and low amplitudes at the same time. An image of size 128×128 is used as a source of data that transmitted using OFDM system. The proposed method decrease the PAPR by 2dB compared with conventional method with keeping the performance unchanged. The performance of the proposed method is tested with several numbers of subcarriers; we found that the PAPR is reduced as the number of subcarriers decreased.
Volume: 11
Issue: 1
Page: 416-423
Publish at: 2021-02-01

WEIDJ: Development of a new algorithm for semi-structured web data extraction

10.12928/telkomnika.v19i1.16205
Ily Amalina; Universiti Malaysia Terengganu Ahmad Sabri , Mustafa; Universiti Malaysia Terengganu Man
In the era of industrial digitalization, people are increasingly investing in solutions that allow their process for data collection, data analysis and performance improvement. In this paper, advancing web scale knowledge extraction and alignment by integrating few sources by exploring different methods of aggregation and attention is considered in order focusing on image information. The main aim of data extraction with regards to semi-structured data is to retrieve beneficial information from the web. The data from web also known as deep web is retrievable but it requires request through form submission because it cannot be performed by any search engines. As the HTML documents start to grow larger, it has been found that the process of data extraction has been plagued with lengthy processing time. In this research work, we propose an improved model namely wrapper extraction of image using document object model (DOM) and JavaScript object notation data (JSON) (WEIDJ) in response to the promising results of mining in a higher volume of image from a various type of format. To observe the efficiency of WEIDJ, we compare the performance of data extraction by different level of page extraction with VIBS, MDR, DEPTA and VIDE. It has yielded the best results in Precision with 100, Recall with 97.93103 and F-measure with 98.9547.
Volume: 19
Issue: 1
Page: 317-326
Publish at: 2021-02-01

Similarity-preserving hash for content-based audio retrieval using unsupervised deep neural networks

10.11591/ijece.v11i1.pp879-891
Petcharat Panyapanuwat , Suwatchai Kamonsantiroj , Luepol Pipanmaekaporn
Due to its efficiency in storage and search speed, binary hashing has become an attractive approach for a large audio database search. However, most existing hashing-based methods focus on data-independent scheme where random linear projections or some arithmetic expression are used to construct hash functions. Hence, the binary codes do not preserve the similarity and may degrade the search performance. In this paper, an unsupervised similarity-preserving hashing method for content-based audio retrieval is proposed. Different from data-independent hashing methods, we develop a deep network to learn compact binary codes from multiple hierarchical layers of nonlinear and linear transformations such that the similarity between samples is preserved. The independence and balance properties are included and optimized in the objective function to improve the codes. Experimental results on the Extended Ballroom dataset with 8 genres of 3,000 musical excerpts show that our proposed method significantly outperforms state-of-the-art data-independent method in both effectiveness and efficiency.
Volume: 11
Issue: 1
Page: 879-891
Publish at: 2021-02-01
Show 1019 of 1995

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration