Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,922 Article Results

Fuzzy transform for high-resolution satellite images compression

10.12928/telkomnika.v18i2.14903
Donna; National Institute of Aeronautics and Space Monica , Ayom; National Institute of Aeronautics and Space Widipaminto
Many compression methods have been developed until now, especially for very high-resolution satellites images, which, due to the massive information contained in them, need compression for a more efficient storage and transmission. This paper modifies Perfilieva's Fuzzy transform using pseudo-exponential function to compress very high-resolution satellite images. We found that very high-resolution satellite images can be compressed by F-transform with pseudo-exponential function as the membership function. The compressed images have good quality as shown by the PSNR values ranging around 59-66 dB. However, the process is quite time-consuming with average 187.1954 seconds needed to compress one image. These compressed images qualities are better than the standard compression methods such as CCSDS and Wavelet method, but still inferior regarding time consumption.
Volume: 18
Issue: 2
Page: 1130-1136
Publish at: 2020-04-01

A combined spectrum sensing method based DCT for cognitive radio system

10.11591/ijece.v10i2.pp1935-1942
Muntasser S. Falih , Hikmat N. Abdullah
In this paper a new hybrid blind spectrum sensing method is proposed. The method is designed to enhance the detection performance of Conventional Energy Detector (CED) through combining it with a proposed sensing module based on Discrete Cosine Transform (DCT) coefficient’s relationship as operation mode at low Signal to Noise Ratio (SNR) values. In the proposed sensing module a certain factor called Average Ratio (AR) represent the ratio of energy in DCT coefficients is utilized to identify the presence of the Primary User (PU) signal. The simulation results show that the proposed method improves PU detection especially at low SNR values.
Volume: 10
Issue: 2
Page: 1935-1942
Publish at: 2020-04-01

Robust audio watermarking based on transform domain and SVD with compressive sampling framework

10.12928/telkomnika.v18i2.14773
Ledya; Telkom University Novamizanti , Gelar; Telkom University Budiman , Elsa; Telkom University Nur Fitri Astuti
The growth of the internet and digital data has resulted forgery, modification and sharing of digital data without property rights. Audio watermarking is one of a solution to protect the copyright of an audio from copyright infringement. This paper proposes an audio watermarking method which is robust against attacks and high capacity. First, a synchronization bit is added to the audio host. After the audio host is decomposed by Lifting Wavelet Transform (LWT), then choose a subband from the output of LWT to be transformed by discrete cosine transform (DCT). Next, the matrix of the signal from DCT is selected for the singular value decomposition (SVD) process, so that is obtained U, S and V matrix. S matrix is embedded with the watermark. Before the embedding process, the watermark image is compressed by Compressive Sampling. The results show that the proposed watermarking system is highly robust against a kind attack of LPF, resampling, and linear speed change which is proven by its BER is zero.
Volume: 18
Issue: 2
Page: 1079-1088
Publish at: 2020-04-01

Abnormal gait detection by means of LSTM

10.11591/ijece.v10i2.pp1495-1506
Cesar G. Pachon-Suescun , Javier O. Pinzon-Arenas , Robinson Jimenez-Moreno
This article presents a system focused on the detection of three types of abnormal walk patterns caused by neurological diseases, specifically Parkinsonian gait, Hemiplegic gait, and Spastic Diplegic gait. A Kinect sensor is used to extract the Skeleton from a person during its walk, to then calculate four types of bases that generate different sequences from the 25 points of articulations that the Skeleton gives. For each type of calculated base, a recurrent neural network (RNN) is trained, specifically a Long short-term memory (LSTM). In addition, there is a graphical user interface that allows the acquisition, training, and testing of trained networks. Of the four trained networks, 98.1% accuracy is obtained with the database that was calculated with the distance of each point provided by the Skeleton to the Hip-Center point.
Volume: 10
Issue: 2
Page: 1495-1506
Publish at: 2020-04-01

User stories collection via interactive chatbot to support requirements gathering

10.12928/telkomnika.v18i2.14866
Ferliana; Universitas Multimedia Nusantara Dwitama , Andre; Universitas Multimedia Nusantara Rusli
Nowadays, software products have become an essential part of human life. To build software, developers must have a good understanding of the requirements of the software. However, software developers tend to jumpstart system construction without having a clear and detailed understanding of the requirements. The user story concept is one of the practices of the requirements elicitation. This paper aims to present the work conducted to develop an Android chatbot application to support the requirements elicitation activity in software engineering, making the work less time-consuming and structured even for users not accustomed to requirements engineering. The chatbot uses Nazief & Adriani stemming algorithm to pre-process the natural language it receives from the users and artificial mark-up language (AIML) as the knowledge base to process the bot’s responses. A preliminary acceptance test based on the technology acceptance model results in an 83.03% score for users’ behavioral intention to use.
Volume: 18
Issue: 2
Page: 890-898
Publish at: 2020-04-01

Augmentation of a SCADA based firewall against foreign hacking devices

10.11591/ijece.v10i2.pp1359-1366
Abhishek Mungekar , Yashraj Solanki , R. Swarnalatha
An Industrial firewall is a system used to supervise and regulate traffic to and from a network for the purpose of securing appliances on a network. It analyzes the data passing through it to an already defined surveillance criteria or protocols, discarding data that does not meet the protocol’s requirements. In effect, it is a filter preventing undesirable network traffic and selectively limiting the type of transmission that occurs between a secured transmission line. In this research paper a SCADA based Firewall is implemented for protection of the data transmission to a PLC, against external hacking devices. This firewall is virtually exposed to several external hackers and the degree of vulnerability is carefully studied, in order to develop an ideal Firewall.
Volume: 10
Issue: 2
Page: 1359-1366
Publish at: 2020-04-01

A robust method for VR-based hand gesture recognition using density-based CNN

10.12928/telkomnika.v18i2.14747
Liliana; Informatics Department Petra Christian University Liliana , Ji-Hun; Keimyung University Chae , Joon-Jae; Keimyung University Lee , Byung-Gook; Dongseo University Lee
Many VR-based medical purposes applications have been developed to help patients with mobility decrease caused by accidents, diseases, or other injuries to do physical treatment efficiently. VR-based applications were considered more effective helper for individual physical treatment because of their low-cost equipment and flexibility in time and space, less assistance of a physical therapist. A challenge in developing a VR-based physical treatment was understanding the body part movement accurately and quickly. We proposed a robust pipeline to understanding hand motion accurately. We retrieved our data from movement sensors such as HTC vive and leap motion. Given a sequence position of palm, we represent our data as binary 2D images of gesture shape. Our dataset consisted of 14 kinds of hand gestures recommended by a physiotherapist. Given 33 3D points that were mapped into binary images as input, we trained our proposed density-based CNN. Our CNN model concerned with our input characteristics, having many 'blank block pixels', 'single-pixel thickness' shape and generated as a binary image. Pyramid kernel size applied on the feature extraction part and classification layer using softmax as loss function, have given 97.7% accuracy.
Volume: 18
Issue: 2
Page: 761-769
Publish at: 2020-04-01

Trust correlation of mobile agent nodes with a regular node in a Adhoc network using decision-making strategy

10.11591/ijece.v10i2.pp1561-1569
Chethan B. K. , M. Siddappa , Jayanna H. S.
A mobile agent offers discrete advantage both in facilitating better transmission as well as controlling the traffic load in Mobile Adhoc Network (MANET). Hence, such forms of network offers maximized dependencies on mobile agents in terms of its trust worthiness. At present, there are various work being carried out towards resisting security breach in MANET; however approaches using mobile agent based mechanism is few to found. Therefore, the proposed system introduces a novel mathematical model where an extensive decision making system has been constructed for identifying the malicious intention of mobile agents in case they go rogues. By adopting multi-tier communication policy and fairness concept, the proposed system offers the capability to resist any form of malicious activity of mobile agent without even presence of any apriori information of adversary. The outcome shows proposed system outshines existing security scheme in MANET.
Volume: 10
Issue: 2
Page: 1561-1569
Publish at: 2020-04-01

Optimal unit commitment of a power plant using particle swarm optimization approach

10.11591/ijece.v10i2.pp1135-1141
Boniface O. Anyaka , J. Felix Manirakiza , Kenneth C. Chike , Prince A. Okoro
Economic load dispatch among generating units is very important for any power plant. In this work, the economic load dispatch was made at Egbin Thermal Power plant supplying a total load of 600MW using six generating units. In carrying out this study, transmission losses were assumed to be included into the load supplied. Also three different combinations in the form of 6, 5 and 4 units commitment were considered. In each case, the total load was optimally dispatched between committed generating units using Particle Swarm Optimization (PSO). Similarly, the generation cost for each generating unit was determined. For case 1, the six generators were committed and the generation cost is 2,100,685.069$/h. For case 2, five generators were committed and the generation cost is 2,520,861.947$/h. For case 3, four generators were committed and the generation cost is 3,150,621.685$/h. From all considered cases, it was found that, the minimum generation cost was achieved when all six generating units were committed and a total of 420,178.878$/h was saved.
Volume: 10
Issue: 2
Page: 1135-1141
Publish at: 2020-04-01

Benchmarking level interactivity of Indonesia government university websites

10.12928/telkomnika.v18i2.14888
Nurdin; Institut Agama Islam Negeri (IAIN) Palu Nurdin , Zana Chobita; STMIK Bina Mulia Palu Aratusa
Website interactivity is increasingly essential for higher education institutions in maintaining their relationship with stakeholders. However, limited is known what the level interactivity of a university website is without comparing with other similar educational institutions. Through the use of website content analysis and benchmarking strategy, we evaluate 41 government university website for benchmarking purposes. Base on thirteen interactive criteria, we successfully benchmarked the government university websites and built a-five levels of websites interactivity with different features. Our study highlights that higher level interactivity of website contains more feature that support a two-way communication between university and consumers, while lower level of websites interactivity merely have basic features for communication. The findings suggest the highest level of websites interactivity, the more features they should have. More importantly, the findings suggest web developer to design more interactive features in developing a higher level of website interactivity.
Volume: 18
Issue: 2
Page: 853-859
Publish at: 2020-04-01

Qualitative assessment of image enhancement algorithms for mammograms based on minimum EDV

10.12928/telkomnika.v18i2.14085
Mazin N.; Northern Technical University Farhan , Mohammed G.; Northern Technical University Ayoub , Hassan M.; Northern Technical University Qassim , Abdulrahman K.; Northern Technical University Eesee
Breast cancer is one of the leading reason of death among women. Nevertheless, medications for this fatal disease are still away of ambitions. Patients (thought to have breast cancer) should go through several advanced medical diagnostic procedures like mammography, biopsy analysis, ultrasound imaging, etc. Mammography is one of the medical imaging techniques used for detecting breast cancer. However, its resulted images may not be clear enough or helpful for physician to diagnose each case correctly. This fact has pushed researchers towards developing effective ways to enhance images throughout using various enhancement algorithms. In this paper, a comparison amongst these applied algorithms was done to evaluate the optimum enhancement technique. A morphology enhancement, which is resulted from combining top-hat operation and bottom-hat operation, was used as a proposed enhancement algorithm. The proposed enhancement algorithm was compared to three other well-known enhancement algorithms, specifically histogram equalization, logarithmic transform, and gamma correction with different gamma values. Twenty-five mammographic images were taken from the mammography image analysis society (MIAS) database samples. The minimum entropy difference value (EDV) was used as metric to evaluate the best enhancement algorithm. Results has approved that the proposed enhancement algorithm gave the best-enhanced images in comparison to the aforementioned algorithms.
Volume: 18
Issue: 2
Page: 928-935
Publish at: 2020-04-01

Influence of annealing temperature on the sensitivity of nickel oxide nanosheet films in humidity sensing applications

10.11591/ijeecs.v18.i1.pp284-292
N. Parimon , M. H. Mamat , A. S. Ismail , I. B. Shameem Banu , M. K. Ahmad , A. B. Suriani , M. Rusop
Nickel oxide (NiO) nanosheet films were successfully grown onto NiO seed-coated glass substrates at different annealing temperatures for humidity sensing applications. NiO seed layers and NiO nanosheet films were prepared using a sol-gel spin coating and sonicated sol-gel immersion techniques, respectively. The properties of NiO nanosheet films at as-deposited, 300 ℃, and 500 ℃-annealed were examined by X-ray diffraction (XRD), field emission scanning electron microscopy (FESEM), ultraviolet-visible (UV-vis) spectroscopy, and humidity sensor measurement system. The XRD patterns demonstrate that the grown NiO films have crystalline cubic structures at temperature of 300 ℃ and 500 ℃. The FESEM images show that the large porous nanosheet network spread over the layers as the annealing temperature increased. The UV-vis spectra revealed that all the nanosheet films have the average transmittance below than 50% in the visible region, with absorption edges ~ 350 nm. The optical band gap energy was evaluated in ranges of 3.39 to 3.61 eV. From the obtained humidity sensing results, it shows that 500 ℃-annealed film exhibited the best sensitivity of 257, as well as the slowest response time, and the fastest recovery time compared with others.
Volume: 18
Issue: 1
Page: 284-292
Publish at: 2020-04-01

Combined scaled manhattan distance and mean of horner’s rules for keystroke dynamic authentication

10.12928/telkomnika.v18i2.14815
Didih Rizki; Universitas Muhammadiyah Malang Chandranegara , Hardianto; Universitas Muhammadiyah Malang Wibowo , Agus Eko; Universitas Muhammadiyah Malang Minarno
Account security was determined by how well the security techniques applied by the system were used. There had been many security methods that guaranteed the security of their accounts, one of which was Keystroke Dynamic Authentication. Keystroke Dynamic Authentication was an authentication technique that utilized the typing habits of a person as a security measurement tool for the user account. From several research, the average use in the Keystroke Dynamic Authentication classification is not suitable, because a user's typing speed will change over time, maybe faster or slower depending on certain conditions. So, in this research, we proposed a combination of the Scaled Manhattan Distance method and the Mean of Horner's Rules as a classification method between the user and attacker against the Keystroke Dynamic Authentication. The reason for using Mean of Horner’s Rules can adapt to changes in values over time and based on the results can improve the accuracy of the previous method.
Volume: 18
Issue: 2
Page: 770-775
Publish at: 2020-04-01

Parallelizable cipher of color image based on two-dimensional chaotic system

10.11591/ijeecs.v18.i1.pp101-111
Sawsen Abdulhadi Mahmood , Khalid Ali Hussein , Yaseen Naser Jurn , Ekhlas Abbas Albahrani
This paper aims to present a parallel implementation based color image encryption using non -linear chaotic system. The adopted chaotic system was suggested and approved in our previous work [1] which generates key streams with chaotic behavior. In this paper, pixel level permutation algorithm based on chaotic map generation is investigated and analyzed. The encryption–decryption schemes are achieved in parallel and composed of three main phases: chaotic keys generation, pixel-level permutation and bit-level diffusion phase. Both permutation and diffusion processes are achieved according to the chaotic keys. The parallel implementation of the proposed image encryption system is realized and inspired with parallel computing library offered by Matlab 2018, which equips highly performance than the pipeline ones and would be helpful to utilize in image encryption/decryption for real time application. Security and statistical analysis in addition to the main differential attacks analysis are specified to evaluate the performance of the proposed image encryption algorithm with parallel implementation. From the experimental results, the output image of the encryption task shows a higher randomness of the encrypted image which can be effectively resistant to attacker. Furthermore, the run time of encryption process is faster than other research works.
Volume: 18
Issue: 1
Page: 101-111
Publish at: 2020-04-01

Outage and throughput performance of cognitive radio based power domain based multiple access

10.12928/telkomnika.v18i2.12731
Dinh-Thuan; Industrial University of Ho Chi Minh City (IUH) Do , Chi-Bao; Industrial University of Ho Chi Minh City (IUH) Le
This paper considers power domain based multiple access (PDMA) in cognitive radio network to serve numerous users who intend to multiple access to core network. In particular, we investigate the effect of signal combination scheme equipped at PDMA end-users as existence of direct link and relay link. This system model using relay scheme provides performance improvement on the outage probability of two PDMA end-users. We first propose a simple scheme of fixed power allocation to PDMA users who exhibit performance gap and fairness. Inspired by PDMA strategy, we then find signal to noise ratio (SNR) to detect separated signal for each user. In addition, the exact expressions of outage probability are derived in assumption that receiver can cancel out the interference completely with successive interference cancellation (SIC). By exploiting theoretical and simulation results, both considered combination schemes (Maximal Ratio Combining (MRC) and Selection Combining (SC) can achieve improved performance of two PDMA users significantly.
Volume: 18
Issue: 2
Page: 579-586
Publish at: 2020-04-01
Show 1159 of 1995

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration