Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,905 Article Results

Integrated smart door system in apartment room based on internet

10.12928/telkomnika.v17i6.12322
Muchammad; Institut Teknologi Sepuluh Nopember Husni , Henning Titi; Institut Teknologi Sepuluh Nopember Ciptaningtyas , Ridho Rahman; Institut Teknologi Sepuluh Nopember Hariadi , Irzal Ahmad; Institut Teknologi Sepuluh Nopember Sabilla , Siska; Institut Teknologi Sepuluh Nopember Arifiani
Internet of Things (IoT) is technology which provides communication between machines without human intervention. There are many applications that implement IoT technology e.g. smart power, smart home, transportation management, and smart city. This paper proposes the usage of IoT to develop electronic key that can help to improve the security in apartment. Electronic key uses Android smart phone to access and control the door. Electronic key uses Raspberry pii, motor DC, webcam, microswitch, and Arduino GSM. Raspberry is used to get command from server and instruct the Arduino GSM to open or close the door and webcam is used to take picture from the environment for documentation. This research uses three steps to verify the user who want to open or close the door i.e. using username and password, bluetooth, and QR code scanner.
Volume: 17
Issue: 6
Page: 2747-2754
Publish at: 2019-12-01

Predicting fatalities among shark attacks: comparison of classifiers

10.11591/ijai.v8.i4.pp360-366
Lim Mei Shi , Aida Mustapha , Yana Mazwin Mohmad Hassim
This paper presents the comparisons of different classifiers on predicting Shark attack fatalities. In this study, we are comparing two classifiers which are Support vector machines (SVMs) and Bayes Point Machines (BPMs) on Shark attacks dataset. The comparison of the classifiers were based on the accuracy, recall, precision and F1-score as the performance measurement. The results obtained from this study showed that BPMs predicted the fatality of shack attack victim experiment with higher accuracy and precision than the SVMs because BPMs have “average” identifier which can minimize the probabilistic error measure. From this experiment, it is concluded that BPMs are more suitable in predicting fatality of shark attack victim as BPMs is an improvement of SVMs.
Volume: 8
Issue: 4
Page: 360-366
Publish at: 2019-12-01

Continuous kannada speech segmentation and speech recognition based on threshold using MFCC And VQ

10.11591/ijece.v9i6.pp4684-4695
Vanajakshi Puttaswamy Gowda , Mathivanan Murugavelu , Senthil Kumaran Thangamuthu
Continuous speech segmentation and its  recognition is playing important role in natural language processing. Continuous context based Kannada speech segmentation depends  on context, grammer and semantics rules present in the kannada language. The significant feature extraction of kannada speech signal  for recognition system is quite exciting for researchers. In this paper proposed method  is  divided into two parts. First part of the method is continuous kannada speech signal segmentation with respect to the context based is carried out  by computing  average short term energy and its spectral centroid coefficients of  the speech signal present in the specified window. The segmented outputs are completely  meaningful  segmentation  for different scenarios with less segmentation error. The second part of the method is speech recognition by extracting less number Mel frequency cepstral coefficients with less  number of codebooks  using vector quantization .In this recognition is completely based on threshold value.This threshold setting is a challenging task however the simple method is used to achieve better recognition rate.The experimental results shows more efficient  and effective segmentation    with high recognition rate for any continuous context based kannada speech signal with different accents for male and female than the existing methods and also used minimal feature dimensions for training data.
Volume: 9
Issue: 6
Page: 4684-4695
Publish at: 2019-12-01

Modified RSA-based algorithm: a double secure approach

10.12928/telkomnika.v17i6.13201
Israa; Baghdad College of Economic Sciences University Al_Barazanchi , Shihab A.; Directorate of Education Shawkat , Moayed H.; University of Imam Jaafar Alsadiq Hameed , Khalid Saeed; University of Samarra Lateef Al-badri
Security algorithms like RSA are becoming increasingly important for communications to provide companies, organizations, and users around the world, secure applications who rely heavily on them in their daily work. Security algorithms use different acquaintances among companies which might belong to various countries or even cities. Such data should essentially be encrypted to make sure that there is security in transportation. Thus, the current research paper leads to the novel system of security for the safe transfer of data. This paper examines the general principles of encryption and focuses on the development of RSA and the complexity of the encryption key so that it becomes more secure in the applications used. In this project, we will work on the RSA algorithm by adding some complexity to the 3keys (3k). This addition will increase the security and complexity of the algorithm's speed while maintaining encryption and decryption time. The paper also presents an approach by means of public key encryption to enhance cryptographic security. Moreover, double security is provided by the algorithm of RSA. This novel RSA algorithm was investigated in MATLAB. Numerical results for the various parameters such as Mean Square Error (MSE), correlation and Bit Error Ratio (BER) were implemented for the encryption of the message. The experimental results demonstrated that the proposed algorithm for 3 keys has small error rate in the retrieval of the encoded text.
Volume: 17
Issue: 6
Page: 2818-2825
Publish at: 2019-12-01

The effectiveness of the leadership transformation programme among off-campus students

10.11591/ijere.v8i4.20309
Rohana Hamzah , Nurul Ain Fatehah Baharuddin , Wan Jumani Fauzi , Muhamad Afzamiman Aripin
The social issues involving off-campus students are quite serious as these students are more susceptible to negative influences such as friends and the surrounding environment. Results from the preliminary study showed that there were four major problems which are relationship with the Creator, self-management, social relationship with housemates, as well as housekeeping management and upkeep. Therefore, an intervention programme named Transformation Leadership Programme for Off-Campus Students was designed. The study aimed to examine the effectiveness of the leadership transformation programme among off-campus student. The effectiveness of the intervention programme reported in this study is based only on pre- and post-tests from quantitative data collected from 30 respondents. The results show that there is no significant difference for the variable, ‘respondents’ belief in the Creator’ although the mean value increased in the post-test. Apart from that, the findings also show significant improvements in the other three variables assessed, (i.e., relationship with the Creator, self-management, social relationship with their housemates and housekeeping management and upkeep). Data also show that there was also positive impact on off-campus students’ academic achievement due to the decrease in the number of respondents with CGPA below 2.5. Therefore, this means the programme is successful in helping off-campus students to understand and make a connection between the value of belief in the Creator (spiritual intelligence) with the exercise of social responsibility as a leader to oneself, others and housekeeping management and upkeep.
Volume: 8
Issue: 4
Page: 726-734
Publish at: 2019-12-01

A web/mobile decision support system to improve medical diagnosis using a combination of K-Mean and fuzzy logic

10.12928/telkomnika.v17i6.12715
Zainab T.; University of Baghdad Al-Ars , Abbass; University of Information Technology and Communications Baghdad Al-Bakry
This research provides a system that integrates the work of data mining and expert system for different tasks in the process of medical diagnosis, and provides detailed steps to the process of reaching a diagnosis based on the described symptoms and mapping them with existing diagnosis available on the web or on a cloud of medical knowledge based, aggregate these data in a fuzzy manner and produce a satisfactory diagnosis of the persisting problem. The mobile phone interface would make the system user-friendly and provides mobility and accessibility to the user, while posting updates and reading in details the steps that led to the decision or diagnosis that is reached by the K-mean and the fuzzy logic inference engine. The achieved results indicate a promising diagnosis performance of the system as it achieved 90% accuracy and 92.9% F-Score.
Volume: 17
Issue: 6
Page: 3145-3154
Publish at: 2019-12-01

Application of triple-layer remote phosphor configuration results in the color quality and luminous efficiency enhancement of WLEDs

10.12928/telkomnika.v17i6.13335
Thuc Minh; Nha Trang University Bui , Phan Xuan; National Key Laboratory of Digital Control and System Engineering Le , Dinh Hoang; Ton Duc Thang University Bach , Nguyen Doan; Ton Duc Thang University Quoc Anh
This study proposed the triple-layer remote phosphor (TRP) structure to enhance the color quality and the emitted luminous flux of white LEDs (WLEDs). The TRP structure consists of three different phosphor layers that are arranged as follows: the yellow YAG:Ce3+ phosphor at the bottom, the red phosphor layer CaMgSi2O6:Eu2+,Mn2+ at the top and the green Ba2Li2Si2O7:Sn2+,Mn2+ phosphor between these two ones. The aim to use the red CaMgSi2O6:Eu2+,Mn2+ phosphor is to control the red light component so that the color rendering index (CRI) could be increased. While the green Ba2Li2Si2O7:Sn2+,Mn2+ phosphor is applied to manage the green light component, leading to the rise in luminous efficacy (LE) of WLEDs. Moreover, when the concentrations of these two phosphors are raised, that of the yellow phosphor YAG:Ce3+ has to be decreased to remain the average correlated color temperatures (ACTTs) in a range from 6000 K to 8500 K. Furthermore, not only the CRI and LE but the color quality scale (CQS) is also analyzed by controlling the two green and red phosphor concentrations. The researched results show that the higher the concentration of CaMgSi2O6:Eu2+,Mn2+, the more enhancements in the CRI will be made. In contrast, when the Ba2Li2Si2O7:Sn2+,Mn2+ concentration increases, the CRI significantly decreases. Meanwhile, CQS is likely to considerably rise in a concentration range from 10% to 14% of CaMgSi2O6:Eu2+,Mn2+, regardless of the presence of Ba2Li2Si2O7:Sn2+,Mn2+ concentration. Especially, in parallel with the improvement of CRI and CQS, the LE could be also increased by more than 40% due to the decline in back-scattering lights and the green lights supplement. From these details, the results of this study are valuable references for manufacturers to achieve the goals of enhancing color quality and luminous efficiency of WLEDs.
Volume: 17
Issue: 6
Page: 2885-2894
Publish at: 2019-12-01

Enhancement algorithm for reverse loop technique on planar reverse loop antenna

10.12928/telkomnika.v17i6.12087
Mohamad Harris; Universiti Teknologi Malaysia Misran , Sharul Kamal; Universiti Teknologi Malaysia Abdul Rahim , Maizatul Alice Meor; Universiti Teknikal Malaysia Melaka Said , Mohd Azlishah; Universiti Teknikal Malaysia Melaka Othman
Finding a trade-off balance between wireless transfer efficiency (WTE) and distance is a key issue in wireless energy transfer (WET). This paper presents a method of reducing the radical alteration in WTE versus distance, by using a reverse loop technique on planar reverse loop antenna (PRLA). The design focuses on 13.56 MHz Near Field Communication (NFC). The first stage uses mathematical modelling, based on an analytical approach, to determine the size of the reverse loop using Matlab. The proposed model predicts the size of the reverse loop to stabilize the WTE at a closer distance. Next, full-wave electromagnetic simulations are applied, using the computer simulation technology (CST) MICROWAVE STUDIO®, to determine the WTE effect with distance changes with mismatch condition. Planar loop antennas (PLAs) are fabricated on glass-reinforced epoxy laminated sheets (FR4). A validation of the simulation result in a real test scenario, using these PLAs and PRLA, confirms a stability enhancement in WTE at closer distance using the reverse loop technique, compared to conventional designs.
Volume: 17
Issue: 6
Page: 2713-2721
Publish at: 2019-12-01

Hybrid decode-amplify and forward protocol of FD EH relaying network: outage probability analysis

10.12928/telkomnika.v17i6.12973
Van-Duc; Nguyen Tat Thanh University Phan , Duy-Hung; Ton Duc Thang University Ha , Minh; Ton Duc Thang University Tran , Tran Thanh; Ho Chi Minh City Trang , Thanh-Long; Ho Chi Minh City University Nguyen
Nowadays, many research papers focus on the WPCN problem and how to improve its efficiency. In this research, we propose and investigate Hybrid Decode-Amplify and Forward Protocol (HDAF) of the Full-Duplex (FD) Energy Harvesting (EH) Relaying Network with the Time Switching (TS) protocol. In the beginning stage, we present the HDAF mode, which can be work like a Decode-and-Amplify (DF) or Amplify-and-Forward (AF) modes based on the best of its performance in the FD EH relaying network. Furthermore, the closed-form expression of the outage probability (OT) is analyzed and derived in connection with the primary system parameters. Besides, the comparison of the system performance in the AF, DF, and HDAF is proposed and investigated. Finally, all the results are convinced by the Monte Carlo simulation for all cases.
Volume: 17
Issue: 6
Page: 2764-2771
Publish at: 2019-12-01

A new design algorithm for hybrid active power filter

10.11591/ijece.v9i6.pp4507-4515
Chau Minh Thuyen
The correct determination of the parameters of Hybrid Active Power Filter (HAPF) plays a decisive role in its performance. Therefore, this paper proposes a new design algorithm for HAPF based on the Social Spider Algorithm (SSA). This algorithm has the advantage that it is possible to determine the parameters of both the power circuit part and the control circuit part of HAPF. The achieved results are multi-purpose, such as: minimum total harmonic distortion of the supply current and source voltage, the maximum reactive power compensation into the system and satisfy many constraints such as: system stability, resonance conditions of the branches and the limits of the parameters. Compared to traditional design method using the Particle Swarm Optimization algorithm, the proposed algorithm shows the advantages of smaller total harmonic distortion of supply current and source voltage, and higher reactive power compensation into the grid while still meeting the constraints.
Volume: 9
Issue: 6
Page: 4507-4515
Publish at: 2019-12-01

KawalPilpres2019: a highly secured real count voting escort architecture

10.12928/telkomnika.v17i6.13241
Onno W.; IBI Darmajaya Purbo , Gildas; XecureIT.id Deograt , Rolof; XecureIT.id Satriyanto , Abraham; XecureIT.id Ferdinand , Pamadi; XecureIT.id Gesang , Rendra; XecureIT.id Kesuma , Kalpin Erlangga; XecureIT.id Silaen
This paper reports on the highly secured information security architecture used by the KawalPilpres 2019 to escort Voting Commission (KPU) data entry. For the first time, a voting escort implements ISO 27001 compliance information security. As of 15 May 2019, 9550 volunteers reported 482,602 voting data of 336,445 voting booths, both in the country and overseas, through the micro-apps KawalPilpres2019. PeSanKita is used as a secure communication channel and to run micro-apps KawalPilpres2019. Double Ratchet Algorithm secures the channel. Different from other voting escort initiatives, KawalPilpres2019 uses (1) primarily C1 Plano photo, (2) no upload limit per voting booth, (3) no web upload, rather via PeSanKita Secured Platform. Behind the scenes, the verification process is done twice before displaying data to the publicly accessible monitoring web. The result is a robust voting escort system, difficult to hack and guarantee data integrity. Guaranteed security, availability, and data integrity are the main requirements for future eVoting systems.
Volume: 17
Issue: 6
Page: 2834-2841
Publish at: 2019-12-01

Hybridisation of RF(Xgb) to improve the tree-based algorithms in learning style prediction

10.11591/ijai.v8.i4.pp422-428
Haziqah Shamsudin , Maziani Sabudin , Umi Kalsom Yusof
This paper presents hybridization of Random Forest (RF) and Extreme Gradient Boosting (Xgb), named RF(Xgb) to improve the tree-based algorithms in learning style prediction. Learning style of specific users in an online learning system is determined based on their interaction and behavior towards the system. The most common online learning theory used in determining the learning style is the Felder-Silverman’s Learning Style Model (FSLSM). Many researchers have proposed machine learning algorithms to establish learning style by using the log file attributes. This helps in determining the learning style automatically. However, current researches still perform poorly, where the range of accuracy is between 58%-89%. Hence, RF(Xgb) is proposed to help in improving the learning style prediction. This hybrid algorithm was further enhanced by optimizing its parameters. From the experiments, RF(Xgb) was proven to be more effective, with accuracy of 96% compared to J48 and LSID-ANN algorithm from previous literature.
Volume: 8
Issue: 4
Page: 422-428
Publish at: 2019-12-01

Supervised data mining approach for predicting student performance

10.11591/ijeecs.v16.i3.pp1584-1592
Wan Fairos Wan Yaacob , Syerina Azlin Md Nasir , Wan Faizah Wan Yaacob , Norafefah Mohd Sobri
Data mining approach has been successfully implemented in higher education and emerge as an interesting area in educational data mining research. The approach is intended for identification and extraction of new and potentially valuable knowledge from the data. Predictive model developed using supervised data mining approach can derive conclusion on students' academic success. The ability to predict student’s performance can be beneficial for innovation in modern educational systems. The main objective of this paper is to develop predictive models using classification algorithm to predict student’s performance at selected university in Malaysia. The prediction model developed can be used to identify the most important attributes in the data. Several predictive modelling techniques of K-Nearest Neighbor, Naïve Bayes, Decision Tree and Logistic Regression Model models were used to predict student’s performance whether excellent or non-excellent.  Based on accuracy measure, precision, recall and ROC curve, results show that the Naïve Bayes outperform other classification algorithm.  The Naïve Bayes reveals that the most significant factors contributing to prediction of excellent students is when the student scores A+ and A in Multivariate Analysis; A+, A and A- in SAS Programming and A, A- and B+ in ITS 472.
Volume: 16
Issue: 3
Page: 1584-1592
Publish at: 2019-12-01

Effect of errors on miss distance of missile trackers in active decoy environment

10.11591/ijece.v9i6.pp4696-4702
Edury Vijaya lakshmi , N. N. Sastry , B. Prabhakar Rao
Lock on missiles are a major threat to vital installations. Soft kill solutions against lock on incoming missiles such as deployment of active decoys can be very effective to war of threat. The weaknesses in onboard missile tracking radars can be gainfully used to increase the miss distance between target and the missile. The effect of geometrical positioning errors of two horn monopulse missile mounted radars has been analyzed in this paper. As so gain differences between the two horns can cause variations in the miss distance. This aspect has also been studied. The variation of miss distance with jammer power to signal ratio (J/S) is also presented. It can be seen that the miss distance is always midway between the target and the decoy. Random angular positioning errors of the missile radar have been analyzed and it is found that the miss distance increases with increase of angular errors.
Volume: 9
Issue: 6
Page: 4696-4702
Publish at: 2019-12-01

Cognitive radio for TVWS usage

10.12928/telkomnika.v17i6.13111
Diego; Universidad Distrital Francisco José de Caldas Pineda , Cesar; Universidad Distrital Francisco José de Caldas Hernandez
Spectrum scarcity is an emerging issue in wireless communication systems due to the increasing demand of broadband services like mobile communications, wireless internet access, IoT applications, among others. The migration of analog TV to digital systems (a.k.a. digital TV switchover) has led to the release of a significant spectrum share that can be used to support said additional services. Likewise, TV white spaces emerge as spectral opportunities that can also be explored. Hence, cognitive radio (CR) presents itself as a feasible approach to efficiently use resources and exploit gaps within the spectrum. The goal of this paper is to unveil the state of the art revolving around the usage of TV white spaces, including some of the most important methods developed to exploit such spaces, upcoming opportunities, challenges for future research projects, and suggestions to improve current models.
Volume: 17
Issue: 6
Page: 2735-2746
Publish at: 2019-12-01
Show 1214 of 1994

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration