Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,922 Article Results

Iris images encryption based on QR code and chaotic map

10.12928/telkomnika.v18i1.13293
Raniah Ali; Mustansiriyah University Mustafa , Amal Abdulbaqi; Mustansiriyah University Maryoosh , Dena Nadir; Mustansiriyah University George , Waleed Rasheed; Mustansiriyah University Humood
In this paper an Iris image is encrypted based on QR (quick response) code and chaotic map. The main idea of the proposed system is generating a QR code depending on the input text and then extract the features from QR code by using convolution, these features are used for key generation. After that the permuted iris image is encrypted by using generated key, after that the resulting image will be encrypts using 2D logistic map. The randomness of generated key is tested using the measures of NIST, and quality of images that encrypted in this method are tested by using security analysis tests such as PSNR, UACI, NPCR, histogram, correlation and entropy. The security analysis shows that the proposed system is secure for iris image encryption.
Volume: 18
Issue: 1
Page: 289-300
Publish at: 2020-02-01

A reliable next generation cyber security architecture for industrial internet of things environment

10.11591/ijece.v10i1.pp387-395
C. Vijayakumaran , B. Muthusenthil , B. Manickavasagam
Architectural changes are happening in the modern industries due to the adaption and the deployment of ‘Internet of Things (IoT)’ for monitoring and controlling various devices remotely from the external world. The most predominant place where the IoT technology makes the most sense is the industrial automation processes in smart industries (Industry 4.0). In this paper, a reliable ‘Next Generation Cyber Security Architecture (NCSA)’ is presented for Industrial IoT (IIoT) environment that detects and thwarts cybersecurity threats and vulnerabilities. It helps to automate the processes of exchanging real-time critical information between devices without any human intervention. It proposes an analytical framework that can be used to protect entities and network traffics involved in the IIoT wireless communication. It incorporates an automated cyber-defense authentication mechanism that detects and prevents security attacks when a network session has been established. The defense mechanism accomplishes the required level of security protection in the network by generating an identity token which is cryptographically encrypted and verified by a virtual gateway system. The proposed NCSA improves security in the IIoT environment and reduces operational management cost.
Volume: 10
Issue: 1
Page: 387-395
Publish at: 2020-02-01

Voltage collapse point evaluation considering the load dependence in a power system stability problem

10.11591/ijece.v10i1.pp61-71
Zaid Garcia Sanchez , Jose Antonio González , Gustavo Crespo , Hernan Hernandez Herrera , Jorge Iván Silva
Voltage Stability has emerged in recent decades as one of the most common phenomena, occurrence in Electrical Power Systems. Prior researches focused on the development of algorithm indices to solve the stability problem and in the determination of factors with most influence in voltage collapse to solve the stability problem. This paper evaluates the influence that the load dependence has with the voltage on the phenomenon of the voltage stability and especially on the characteristics the collapse point or instability point. Load modeling used is detailed and comparisons of the results obtained are made with those described in the bibliography and those obtained with commercial software. The results of the load margin are also compared when a constant load or a voltage-dependent load is considered as well as the values obtained at the maximum load point and the point of voltage instability.
Volume: 10
Issue: 1
Page: 61-71
Publish at: 2020-02-01

MIMO channels: optimizing throughput and reducing outage by increasing multiplexing gain

10.12928/telkomnika.v18i1.8720
Oboyerulu; Covenant University Agboje , Nsikan; Covenant University Nkordeh , Uzairue Stanley; Covenant University Idiake , Ololade; Covenant University Oladoyin , Kennedy; Covenant University Okokpujie , Ibinabo; Covenant University Bob-Manuel
The two main aims of deploying multiple input multiple out (MIMO) are to achieve spatial diversity (improves channel reliability) and spatial multiplexing (increase data throughput). Achieving both in a given system is impossible for now, and a trade-off has to be reached as they may be conflicting objectives. The basic concept of multiplexing: divide (multiplex) transmit a data stream several branches and transmit via several (independent) channels. In this paper, we focused mainly on achieving spatial multiplexing by modeling the channel using the diagonal Bell Labs space time scheme (D-BLAST) and the vertical Bell Labs space time architecture (V-BLAST) Matlab simulations results were a lso given to further compare the advantages of spatial multiplexing.
Volume: 18
Issue: 1
Page: 419-426
Publish at: 2020-02-01

Notice of Retraction: The characteristics of TB6600 motor driver in producing optimal movement for the Nema23 stepper motor on CNC machine

10.12928/telkomnika.v18i1.12781
M.; Universitas Negeri Yogyakarta Khairudin , R.; Universitas Negeri Yogyakarta Asnawi , A.; Universiti Pendidikan Sultan Idris Shah
This article has been retracted by the publisher. -----------------------------------------------------------------------This article has been retracted at the request of the Authors. The editors and authors have jointly made the decision to retract the paper. Reasonable effort should be made to remove references to this paper.-----------------------------------------------------------------------This study describes the use of the TB6600 motor driver for the stepper motor on CNC machine. Based on the analysis of the performance of the TB6600 motor driver, in order to produce an optimal stepper motor of Nema23 on CNC machine, three stepper motors are needed as the CNC engine drives for the X, Y and Z axeo be connected to the TB6600 motor driver. The motor is then controlled by Raspberry Pi via Mach3 Interface Board of Breakout Board. The softness of motion and safe working temperature for the stepper motor of Nema23 on CNC machine are obtained by varying the control of the micro-step switches and controlling current switches. The results show that 32 steps of micro-step control produce smoother resonance and movement than smaller micro-steps. In addition, the current control of 1 A generates the best motor driver output with a lower temperature for all three stepper motors.
Volume: 18
Issue: 1
Page: 343-350
Publish at: 2020-02-01

Improvement in energy conversion for unmanned aerial vehicle charging pad

10.11591/ijeecs.v17.i2.pp767-773
M. R. AL-Obaidi , M. A. Mustafa , W.Z.W. Hassan , N. Azis , A. H. Sabry , Mohd Zainal Abidin Ab-Kadir
An efficient charging station is a necessity for Unmanned Aerial Vehicle (UAV) systems. However, if that implementation adds more complexity and onboard weight, then that exercise becomes a burden rather than a benefit since UAV's engineers aim to improve efficiency by reducing the energy consumed by the software and hardware of the complete aeronautical system. This article recommends a fully automatic contact charging station for UAVs, which can charge UAVs and thus resolve flight endurance restrictions of the UAV. The ground station consists of square copper plates that are positively and negatively polarized successively in a chessboard with particular sizes to guarantee electric contact at the landing. The design methodology used with the loading station takes into account the differences in UAV orientation once the platform has landed. In addition, this innovation uses independent charging after touchdown. Thus, this technology relaxes common flight times and help to enhance general mission times. This paper presents a unique charging platform in a “chessboard” configuration, which is devised as an interconnecting interface to facilitate the charging process and overcome inaccuracies with the landing. The solution devised in this research requires few components and presents two power source options (solar & mains power). Additionally, this work presents, to the best of our knowledge, a uniquely innovative recharging landing platform, which incidentally requires no additional software or changes to the UAV’s onboard software settings.
Volume: 17
Issue: 2
Page: 767-773
Publish at: 2020-02-01

Application and evaluation of the neural network in gearbox

10.12928/telkomnika.v18i1.13760
Dheyaa Shaheed; Wasit University Al-Azzawi
We developed old designed of a Back-Propagation neural network (BPNN), which it was designed by other researchers, and we made modification in their structure. The 1st velocity ratio was discriminated by lowest speed, and highest twist. The 6th velocity ratio was discriminated by highest speed, and lowest twist. The aim of this paper is to design neural structure get best performance to control an electrical automotive transportation six-speed gearbox of the vehicle. We focus on the evaluation of the BPNN to select the suitable number of layers and neurons. Experimentally, the structure of the proposed BPNN are constructed from four layers: eight input nodes in the first layer that received data in binary number, 45 neurons in 1st hidden-layer, 25 neurons in 2nd hidden-layer, and 6 neurons in the fourth layer. The MSE and number of Epochs are the main factors used for the evaluation of the proposed structure, and compared with the other structures which was designed by other researchers. Experimentally, we discovered that the best value of Epoch and MSE was chosen when the BPNN consisted of two hidden-layers, 45, and 25 neurons in the 1st and 2nd hidden-layer respectively. The implementation was applied using MATLAB software.
Volume: 18
Issue: 1
Page: 19-29
Publish at: 2020-02-01

Design of carbon nanotube field effect transistor (CNTFET) small signal model

10.11591/ijece.v10i1.pp180-187
Soheli Farhana
The progress of Carbon Nanotube Field Effect Transistor (CNTFET) devices has facilitated the trimness of mobile phones, computers and all other electronic devices. CNTFET devices contribute to model these electronics instruments that require designing the devices. This research consists of the design and verification of the CNTFET device's small signal model. Scattering parameters (S-parameters) is extracted from the CNTFET model to construct equivalent small model circuit. Current sources, capacitors and resistors are involved to evaluate this equivalent circuit. S-parameters and small signal models are elaborated to analyze using a technique to form the small signal equivalent circuit model. In this design modeling process, at first intrinsic device's Y-parameters are determined. After that series of impedances are calculated. At last, Y-parameters model are transformed to add parasitic capacitances. The analysis result shows the acquiring high frequency performances are obtained from this equivalent circuit.
Volume: 10
Issue: 1
Page: 180-187
Publish at: 2020-02-01

Augmented reality using features accelerated segment test for property catalogue

10.12928/telkomnika.v18i1.13039
Rudy; Mercu Buana University Setyadi , Indra; Mercu Buana University Ranggadara
Promotional media used in the marketing of housing using catalogs that display 2D images of houses from one side of the house make potential customers unable to imagine the design of all parts of the house. Augmented Reality can be used as an interactive marketing media so that it can be used to display homes in 3D so that they appear more real from all sides so that prospective customers can consider the type of house to be chosen. Development of this application using the Multimedia Development Life Cycle. Application development uses the FAST algorithm as detection of home catalog markers to define how well images can be detected and tracked. The FAST algorithm will calculate every pixel on the target image in determining the corner when scanning the home catalog then it will produce a 3D object home to see the real shape design of the house.
Volume: 18
Issue: 1
Page: 140-147
Publish at: 2020-02-01

Accurate characterizations of material using microwave T-resonator for solid sensing applications

10.12928/telkomnika.v18i1.14880
Rammah A.; Universiti Teknikal Malaysia Melaka (UTeM) Alahnomi , Z.; Universiti Teknikal Malaysia Melaka (UTeM) Zakaria , Zulkalnain Mohd; Universiti Teknikal Malaysia Melaka (UTeM) Yussof , Tole; Universitas Ahmad Dahlan Sutikno , H.; Universiti Teknikal Malaysia Melaka (UTeM) Sariera , Amyrul Azuan; Bayan Lepas Free Industrial Zone Mohd Bahar
The topic of microwave sensors in enclosures is one of the most active areas in material characterization research today due to its wide applications in various industries. Surprisingly, a microwave sensor technology has been comprehensively investigated and there is an industry demand for an accurate instrument of material characterization such as food industry, quality control, chemical composition analysis and bio-sensing. These accurate instruments have the ability to understand the properties of materials composition based on chemical, physical, magnetic, and electric characteristics. Therefore, a design of the T-resonator has been introduced and investigated for an accurate measurement of material properties characterizations. This sensor is designed and fabricated on a 0.787 mm-thickness Roger 5880 substrate for the first resonant frequency to resonate at 2.4 GHz under unloaded conditions. Various standard dielectric of the sample under test (SUT) are tested to validate the sensitivity which making it a promising low-cost, compact in size, ease of fabrication and small SUT preparation for applications requiring novel sensing techniques in quality and control industries.
Volume: 18
Issue: 1
Page: 99-105
Publish at: 2020-02-01

Light follower systems for visually impaired using visible light communication

10.12928/telkomnika.v19i1.16509
Arsyad Ramadhan; Institut Teknologi Nasional Bandung Darlis , Lucia; Institut Teknologi Nasional Bandung Jambola , Tedi; Institut Teknologi Nasional Bandung Hadyansyah
Visual impairment is the condition of someone who has a disorder or an obstacle in their vision. In this research, the implementation of light follower systems for visually impaired using visible light is proposed. This system can enable visually impaired people to determine orientation and support mobility, especially in an indoor situation, using visible light. The prototype of the visually impaired pathway was made as visible light communication (VLC) transmitter consisting of a 12 V power supply, light emitting diode (LED), MPEG-1 Layer-3 (MP3), and band pass filter (BPF) filter circuit. The VLC receiver is made a prototype of a blind stick consisting of a photodiode, amplifier, buzzer, timer, and 9 V battery. The measurement of this system uses acrylic and color filters with system accuracy taking into account the angle and conditions when the fluorescent lights are turned on and off. This result showed the system could transmit audio signals at a frequency of 3000 Hz. Furthermore, the comparison results showed that the quality of measurements without using a filter is better than using a filter. The output voltage value without using a filter with an angle of 700 degree is 7.19 Vp-p, meanwhile using a filter with an angle of 700 degree is 6.48 Vp-p.
Volume: 19
Issue: 1
Page: 9-18
Publish at: 2020-02-01

The measurement of maturity level of information technology service based on COBIT 5 framework

10.12928/telkomnika.v18i1.10582
Lanto Ningrayati; Universitas Negeri Gorontalo Amali , Muhammad Rifai; Universitas Negeri Gorontalo Katili , Sitti; Universitas Negeri Gorontalo Suhada , Lillyan; Universitas Negeri Gorontalo Hadjaratie
Institutions are currently progressing on IT development and maximization in order to advance for good IT governance. Lack of comprehensive requirements analysis of IT utilization may lead to hindrances within IT development from achieving effective outcomes. This quantitative study employs control objective for information & related technology (COBIT 5) business framework to assess and identify the maturity level of IT service, primarily within the domain of delivery, service, and support (DSS). Data were obtained through questionnaire, observation, and documentation. The result reveals that the average maturity level of IT service is in level 3 (established); by which the study recommends for enhancements and upgrades in IT performance and service within the scope of compliance and IT service application and support.
Volume: 18
Issue: 1
Page: 133-139
Publish at: 2020-02-01

A compact size microstrip five poles hairpin band-pass filter using three-layers structure for Ku-band satellites application

10.12928/telkomnika.v18i1.13199
Qazwan; University Malaysia Pahang Abdullah , Nor Shahida; Universiti Tun Hussein Onn Malaysia Mohd Shah , Nabil; Universiti Teknikal Malaysia Melaka Farah , Waheb A.; University Malaysia Pahang Jabbar , Noorsaliza; Universiti Tun Hussein Onn Malaysia Abdullah , Adeeb; Universiti Tun Hussein Onn Malaysia Salh , Jameel A. A.; Universiti Tun Hussein Onn Malaysia Mukred
This paper presents a reduced size microstrip five poles hairpin band-pass filter using three-layers structure for Ku-band satellites application. The three-layers structure shows a substantially reduced filter size and enlarged bandwidth. The filter has been designed based on five-pole resonators at 12.475 GHz and bandwidth of 550 MHz. This filter is designed on Rogers RO3003 substrate having relative permittivity (εr) of 3. The proposed band-pass filter has been designed with the help of Computer Simulation Technology (CST) software. Comparison analyses between the simulated insertion loss and reflection coefficient of RO3003 and FR4 substrates have been carried out in order to show the efficiency of the proposed filter design. Based on the obtained results, the proposed filter design achieves significant filter size reduction compared to other band-pass filters.
Volume: 18
Issue: 1
Page: 80-89
Publish at: 2020-02-01

Technology readiness and usability of office automation system in suburban areas

10.12928/telkomnika.v18i2.13355
Dwi; STMIK Sumedang Yuniarto , A’ang; UIN Syarif Hidayatullah Jakarta Subiyakto , Aedah; Asia E University Malaysia Abd. Rahman
Readiness and usability issues are important attributes of an information system (IS) success. Currently, IS studies that have been assessing the issues in suburban areas are still limited. The purpose of this study was to measure the above-mentioned phenomena by combining the readiness and usability models. The proposed model consisted out 10 constructs with 25 indicators. The four constructs were from the readiness model and the six ones were the usability model. The 89 samples were collected using an online survey based on purposive random sampling. Partial least squares structural equation modeling (PLS-SEM) method with SmartPLS 3.2.8 was used for analyzing the data. The findings may have contributed to the IS research field, in terms of the readiness and usability issues on the IS use in a suburban area in Indonesia.
Volume: 18
Issue: 2
Page: 676-684
Publish at: 2020-02-01

A high frequency reflected current signals-based fault type identification method

10.11591/ijeecs.v17.i2.pp551-563
Shwe Myint , Warit Wichakool
The main objective of this paper is to identify fault type and faulted phase focus on the time delay values of reflected phase and modal current signals. The proposed method identifies fault type with the help of amplitude maxima of detail wavelet coefficient of residual current. The time delay values of phase and modal current reflected signals are used to detect faulty phase instead of using threshold values. Using time delay as a fault type identification parameter is achieved to save the overall protection system operating time because time delay is also the main feature of traveling wave fault location method. Moreover, to ensure the applied wavelet filter, the proposed algorithm is tested with the detail information of the three mother wavelets, such as db4, db6 and db8 and chosen the highest classification accuracy. Various disturbance events were tested with changing different possible fault types, faulted-feeders, fault resistances, fault locations and fault inception times on a loop distribution system. The robustness of the proposed faulted phase selection algorithm is performed through MATLAB Simulation.
Volume: 17
Issue: 2
Page: 551-563
Publish at: 2020-02-01
Show 1193 of 1995

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration