Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,922 Article Results

Secured e-payment system based on automated authentication data and iterated salted hash algorithm

10.12928/telkomnika.v18i1.15623
Ali Al; University of Kufa Farawn , Hasanein D.; University of Kufa Rjeib , Nabeel Salih; University of Kufa Ali , Basheer; University of Kufa Al-Sadawi
Electronic payment has been considered as one of the most significant and convenient applications of modern electronic services e-University compared to traditional methods that impose time-consuming, human resources, and inefficiency. Different automatic identification technologies have been widely used, such as radio frequency identification (RFID). Extensive research and several applications are focusing on taking the maximum advantage of RFID technology. Data and information security had considered a crucial role when information concerning e-commerce, e-banking, or e-payments, especially due to it required real data to establish accessed illegally. Hence, data originality and security fall a very significant and critical issue in data communication services in recent years. Applications such as e-banking or e-commerce regularly contain sensitive and personal information that should be managed and controlled by authorized persons. Thus, keeping a secure password is important to prevent unauthorized users from illegal access. The password hashing is one of the safety methods and means of preventing attacks. In this article, focuses on proposing an RFID based electronic payment and also provide multi-level security privileges for an academic domain by using RFID technology besides the programmable logic circuit as well the system used VB.Net C# environment also desktop and web-based application for system working purposes. The proposed system aims to manage student payments in a secure manner and provides the capabilities of getting a bus ticket, copying books, buying food, paying registration fees, and other services. The results have shown the system is secured by using the confirmation code in addition to password encryption.
Volume: 18
Issue: 1
Page: 538-544
Publish at: 2020-02-01

Battery charging and discharging control of a hybrid energy system using microcontroller

10.11591/ijeecs.v17.i2.pp575-582
Triyanto Pangaribowo , Wahyu Mulyo Utomo , Afarulrazi Abu Bakar , Deni Shidqi Khaerudini
This study aims to control charging and discharging the battery for hybrid energy systems. The control system works by selecting the right energy source to supply voltage to the load. And also this control system can regulate charging and discharging the battery automatically. The voltage source consists of two energy, namely from the battery and DC source. The control system that has been designed has the ability to choose the right DC source when the battery capacity is less than 80%. This system also has a good ability to choose a battery source when the battery reaches 100% capacity and the DC source has a voltage drop of more than 20%. This control system is equipped with excessive electric current protection so that the security level is high.
Volume: 17
Issue: 2
Page: 575-582
Publish at: 2020-02-01

An overview of multi-filters for eliminating impulse noise for digital images

10.12928/telkomnika.v18i1.12888
Achmad; Universiti Malaysia Perlis Abdurrazzaq , Ahmad Kadri; Universiti Malaysia Perlis Junoh , Wan Zuki Azman; Universiti Malaysia Perlis Wan Muhamad , Zainab; Universiti Malaysia Perlis Yahya , Ismail; Universiti Putra Malaysia Mohd
An image through the digitization process is referred to as a digital image. The quality of the digital image may be degenerating due to interferences on the acquisition, transmission, extraction, etc. This attracted the attention of many researchers to study the causes of damage to the information in the image. In addition to finding cause of image damage, the researchers also looking for ways to overcome this problem. There are many filtering techniques that have been introduced to deal the damage to the information in the image. In addition to eliminating noise from the image, filtering techniques also aims to maintain the originality of the features in the image. Among the many research papers on image filtering there is a lack of review papers which are an important to facilitate researchers in understanding the differences in each filtering technique. Additionally, it helps researchers determine the direction of research conducted based on the results of previous research. Therefore, this paper presents a review of several filtering techniques that have been developed so far.
Volume: 18
Issue: 1
Page: 385-393
Publish at: 2020-02-01

Continuous speech segmentation using local adaptive thresholding technique in the blocking block area method

10.12928/telkomnika.v18i1.13958
Roihan Auliya; Universitas Diponegoro Ulfattah , Sukmawati Nur; Diponegoro University Endah , Retno; Universitas Diponegoro Kusumaningrum , Satriyo; Universitas Diponegoro Adhy
Continuous speech is a form of natural human speech that is continuous without a clear boundary between words. In continuous speech recognition, a segmentation process is needed to cut the sentence at the boundary of each word. Segmentation becomes an important step because a speech can be recognized from the word segments produced by this process. The segmentation process in this study was carried out using local adaptive thresholding technique in the blocking block area method. This study aims to conduct performance comparisons for five local adaptive thresholding methods (Niblack, Sauvola, Bradley, Guanglei Xiong and Bernsen) in continuous speech segmentation to obtain the best method and optimum parameter values. Based on the results of the study, Niblack method is concluded as the best method for continuous speech segmentation in Indonesian language with the accuracy value of 95%, and the optimum parameter values for such method are window = 75 and k = 0.2.
Volume: 18
Issue: 1
Page: 407-418
Publish at: 2020-02-01

Performance evaluation of random forest with feature selection methods in prediction of diabetes

10.11591/ijece.v10i1.pp353-359
Raghavendra S , Santosh Kumar J
Data mining is nothing but the process of viewing data in different angle and compiling it into appropriate information. Recent improvements in the area of data mining and machine learning have empowered the research in biomedical field to improve the condition of general health care. Since the wrong classification may lead to poor prediction, there is a need to perform the better classification which further improves the prediction rate of the medical datasets. When medical data mining is applied on the medical datasets the important and difficult challenges are the classification and prediction. In this proposed work we evaluate the PIMA Indian Diabtes data set of UCI repository using machine learning algorithm like Random Forest along with feature selection methods such as forward selection and backward elimination based on entropy evaluation method using percentage split as test option. The experiment was conducted using R studio platform and we achieved classification accuracy of 84.1%. From results we can say that Random Forest predicts diabetes better than other techniques with less number of attributes so that one can avoid least important test for identifying diabetes.
Volume: 10
Issue: 1
Page: 353-359
Publish at: 2020-02-01

Analysis and implementation of the impact of change: application to heterogeneity algorithms in enterprise architecture

10.11591/ijece.v10i1.pp377-386
Jihane Lakhrouit , Karim Baïna
Measurements play an important role in many scientific fields in general and intheanalysisofenterprisearchitectureinparticular.In software engineering, the measures are used to control the quality of the software product and better manage development projects to control the cost of production.In this article we proposed firstly models and measures to evaluate and analyze the complexity of the enterprise architecture and especially the heterogeneity of components and relationships, and secondely we developed a model to automatically detect the change of measures and their impact on enterprise architecture.
Volume: 10
Issue: 1
Page: 377-386
Publish at: 2020-02-01

UWB THz plasmonic microstrip antenna based on graphene

10.12928/telkomnika.v18i1.13153
Hussein A.; AL-Mustansiriyah University Abdulnabi , Mushreq Abdulhussain; AL-Mustansiriyah University Shuriji , Sadiq; AL-Mustansiriyah University Ahmed
This paper proposes design and investigate of graphene based plasmonic microstrip antenna for terahertz high speed communication and application systems (0.1-20) THz. The proposed antenna structure composed of graphene-based rectangular patch and transmission line mounted on a grounded silicone dioxide substrate. SPP (Surface Plasmon Polariton) waves that appear in graphene at THz band is analyzed. The proposed antenna simulation was done by using numerical method CST program. The simulation results show the scattering parameter S11 less than -10 dB at frequency band (0.1-20) THz. Also, the presented antenna system has a good gain along the frequency band.
Volume: 18
Issue: 1
Page: 30-36
Publish at: 2020-02-01

The application of (Y,Gd)BO3:Tb3+ and CaGa2S4:Mn2+ phosphors to remote white light-emitting diodes

10.12928/telkomnika.v18i1.13713
Thuc Minh; Nha Trang University Bui , Nguyen Thi Phuong; Posts and Telecommunications Institute of Technology Loan , Phan Xuan; HCMC University of Food Industry Le , Nguyen Doan Quoc; Ton Duc Thang University Anh , Anh Tuan; Ton Duc Thang University Le , Le Van; Vietnam Academy of Science and Technology Tho
The remote phosphor structure is superior to the conformal phosphor and the in-cup phosphor in terms of lighting efficiency; however, managing the color quality of the remote phosphor structure has been a nuisance to the manufacturers. To address this problem, many researches were conducted and the results suggested that using dual-layer phosphor structure and triple-layer phosphor structure could improve the color quality in remote phosphor structures. The purpose of this article is to study which one between the two configurations mentioned above allows multi-chip white LEDs (WLEDs) to reach highest indexes in color rendering index (CRI), color quality scale (CQS), luminous flux (LF), and color uniformity. The color temperature of the WLEDs used for the experiments in this article is 8500 K. The result of this research shows that the triple-layer phosphor configuration has higher CRI, CQS, and LE and also able to reduce color deviation resulting in better color uniformity. This conclusion can be verified by analyzing the scattering features of the phosphor layers using the Mie-theory. Being verifiable increases the reliability of the research result and makes it a valuable reference for producing better quality WLEDs.
Volume: 18
Issue: 1
Page: 351-357
Publish at: 2020-02-01

Implementation of graphical user interface to observe and examine the frequency and rotor angle stability of a power system due to small disturbances

10.11591/ijeecs.v17.i2.pp606-614
Nur Ashida Salim , Mohamad Salehan Ab. Samah , Hasmaini Mohamad , Zuhaila Mat Yasin , Nur Fadilah Ab Aziz
The aim of this research is to anticipate the stability status of a power system when the system is exposed to a change in frequency and rotor angle due to small disturbances. The proposed study was implemented on the IEEE Reliability Test System 1979 (IEEE RTS-79) which contains 24 buses, 38 transmission lines and 32 generators. Steady state stability limit of a system refers to the maximum amount of power that is permissible through the system without loss of its steady state stability. This research proposes the development of a Graphical User Interface (GUI) to observe the frequency and rotor angle stability due to the effect of small disturbances using the One Machine Infinite Bus (OMIB) technique. This proposed technique could ease the power system utility especially the power system operation to observe and examine the system frequency and rotor angle stability due to small disturbances. The findings from this research has proven that the proposed technique to observe the frequency and rotor angle stability due to small disturbances has successfully been developed using a GUI.
Volume: 17
Issue: 2
Page: 606-614
Publish at: 2020-02-01

A review on serverless architectures - function as a service (FaaS) in cloud computing

10.12928/telkomnika.v18i1.12169
Arokia Paul; CHRIST (Deemed to be University) Rajan
Emergence of cloud computing as the inevitable IT computing paradigm, the perception of the compute reference model and building of services has evolved into new dimensions. Serverless computing is an execution model in which the cloud service provider dynamically manages the allocation of compute resources of the server. The consumer is billed for the actual volume of resources consumed by them, instead paying for the pre-purchased units of compute capacity. This model evolved as a way to achieve optimum cost, minimum configuration overheads, and increases the application's ability to scale in the cloud. The prospective of the serverless compute model is well conceived by the major cloud service providers and reflected in the adoption of serverless computing paradigm. This review paper presents a comprehensive study on serverless computing architecture and also extends an experimentation of the working principle of serverless computing reference model adapted by AWS Lambda. The various research avenues in serverless computing are identified and presented.
Volume: 18
Issue: 1
Page: 530-537
Publish at: 2020-02-01

Study on outage performance gap of two destinations on CR-NOMA network

10.12928/telkomnika.v18i1.13271
Hong-Nhu; Saigon University Nguyen , Chi-Bao; Industrial University of Ho Chi Minh City Le , Nhat-Tien; Saigon University Nguyen , Dinh-Thuan; Industrial University of Ho Chi Minh City Do
Non-orthogonal multiple access (NOMA) and cognitive radio (CR) are promising for solving the severe spectral scarcity problem encountered by the next generation of wireless communication systems. This study aims to improve spectral efficiency at two secondary destinations by investigating a CR-NOMA network under situation of the perfect successive interference cancellation (SIC). We also derive the exact outage probability for secondary users. Furthermore, an approximate computation method is applied to indicate more insights. It is confirmed that the performance achieved together with performance gap among two users can be obtained due to different power allocation factors assigned to users.
Volume: 18
Issue: 1
Page: 191-198
Publish at: 2020-02-01

Minimize MIMO OFDM interference and noise ratio using polynomial-time algorithm

10.11591/ijece.v10i1.pp900-907
Muhamed K. Husein
In the distributed transmit antenna MIMO OFDM system, each transmitting antenna has different frequency offset between each transmitting antenna and receiver due to the use of independent crystal oscillator. This paper proposes Polynomial-time algorithm for correcting the frequency offset in a received signal by maximizing the conditional average signal. The algorithm focus on reducing to interference and noise ratio of each subcarrier on the receiving antenna by frequency offset. The simulation result shows the performance of the proposed algorithm is slightly improved compared with the existing frequency offset correction algorithm, and the complexity is reduced by 50% or more.
Volume: 10
Issue: 1
Page: 900-907
Publish at: 2020-02-01

Design of a Matlab toolbox and GUI for minimal realizations

10.11591/ijeecs.v17.i2.pp929-940
Karim Cherifi , Kamel Hariche
Minimal realization for linear systems has been studied extensively in the literature. Techniques proposed differ in terms of the configuration of the state space form, the time efficiency of the algorithm and the reduction of memory storage. The minimal realization toolbox presented in this paper offers the possibility to test different methods and choose the most suitable form depending on the application. The given system can be represented by a transfer function or by raw (frequency or time domain) data. A graphical user interface (GUI) was implemented in order to ease the use of this toolbox and allow to rapidly test the methods and display the results.
Volume: 17
Issue: 2
Page: 929-940
Publish at: 2020-02-01

Salsa20 based lightweight security scheme for smart meter communication in smart grid

10.12928/telkomnika.v18i1.14798
S. M. Salim; The National University of Malaysia Reza , Md Murshedul; Bangladesh University of Professionals Arifeen , Sieh Kiong; Universiti Tenaga Nasional Tiong , Md; The National University of Malaysia Akhteruzzaman , Nowshad; Universiti Tenaga Nasional Amin , Mohammad; Universiti Tenaga Nasional Shakeri , Afida; The National University of Malaysia Ayob , Aini; The National University of Malaysia Hussain
The traditional power gird is altering dramatically to a smart power grid with the escalating development of information and communication technology (ICT). Among thousands of electronic devices connected to the grid through communication network, smart meter (SM) is the core networking device. The consolidation of ICT to the electronic devices centered on SM open loophole for the adversaries to launch cyber-attack. Therefore, for protecting the network from the adversaries it is required to design lightweight security mechanism for SM, as conventional cryptography schemes poses extensive computational cost, processing delay and overhead which is not suitable to be used in SM. In this paper, we have proposed a security mechanism consolidating elliptic curve cryptography (ECC) and Salsa20 stream cipher algorithm to ensure security of the network as well as addressing the problem of energy efficiency and lightweight security solution. We have numerically analyzed the performance of our proposed scheme in case of energy efficiency and processing time which reveals that the suggested mechanism is suitable to be used in SM as it consumes less power and requires less processing time to encrypt or decrypt.
Volume: 18
Issue: 1
Page: 228-233
Publish at: 2020-02-01

A comparative study of three validities computation methods for multimodel approach

10.11591/ijece.v10i1.pp881-890
Samia Talmoudi Ben Aoun , Abdennacer Ben Messaoud , Moufida Lahmari Ksouri
The multimodel approach offers a very satisfactory results in modelling, diagnose and control of complex systems. In the modelling case, this approach passes by three steps: the determination of the model’s library, the validities computation and the establishment of the final model. In this context, this paper focuses on the elaboration of a comparative study between three recent methods of validities computation. Thus, it highlight the method that offers the best performances in term of precision. To achieve this goal, we apply, these three methods on two simulation examples in order to compare their performances.
Volume: 10
Issue: 1
Page: 881-890
Publish at: 2020-02-01
Show 1188 of 1995

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration