Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,905 Article Results

Compression and encryption for ECG biomedical signal in healthcare system

10.12928/telkomnika.v17i6.13240
Mustafa Emad; Universiti Teknikal Malaysia Melaka (UTeM) Hameed , Masrullizam Mat; Universiti Teknikal Malaysia Melaka (UTeM) Ibrahim , Nurulfajar Abd; Universiti Teknikal Malaysia Melaka (UTeM), Manap
The ECG data needs large memory storage device due to continuous heart rate logs and vital parameter storage. Thus, efficient compression schemes are applied to it before sending it to the telemedicine center for monitoring and analysis. Proper compression mechanisms can not only improve the storage efficiency but also help in faster porting of data from one device to another due to its compact size. Also, the collected ECG signals are processed through various filtering techniques to remove unnecessary noise and then compressed. In our scheme, we propose use of buffer blocks, which is quite novel in this field. Usage of highly efficient methods for peak detection, noise removal, compression and encryption enable seamless and secure transmission of ECG signal from sensor to the monitor. This work further makes use of AES 256 CBC mode, which is barely used in embedded devices, proves to be very strong and efficient in ciphering of the information. The PRD outcome of proposed work comes as 0.41% and CR as 0.35%, which is quite better than existing schemes. Experimental results prove the efficiency of proposed schemes on five distinct signal records from MIT-BIH arrhythmia datasets.
Volume: 17
Issue: 6
Page: 2826-2833
Publish at: 2019-12-01

Algorithm for assessing forest stand productivity index using leaf area index

10.11591/ijeecs.v16.i3.pp1311-1319
Faid Abdul Manan , Muhammad Buce Saleh , I Nengah Surati Jaya , Uus Saepul Mukarom
This paper describes a development of an algorithm for assessing stand productivity by considering the stand variables. Forest stand productivity is one of the crucial information that required to establish the business plan for unit management at the beginning of forest planning activity. The main study objective is to find out the most significant and accurate variable combination to be used for assessing the forest stand productivity, as well as to develop productivity estimation model based on leaf area index. The study found the best stand variable combination in assessing stand productivity were density of poles (X2), volume of commercial tree having diameter at breast height (dbh) 20-40 cm (X16), basal area of commercial tree of dbh >40 cm (X20) with Kappa Accuracy of 90.56% for classifying into 5 stand productivity classes. It was recognized that the examined algorithm provides excellent accuracy of 100% when the stand productivity was classified into only 3 classes. The best model for assessing the stand productivity index with leaf area index is y = 0.6214x - 0.9928 with R2= 0.71, where y is productivity index and x is leaf area index.
Volume: 16
Issue: 3
Page: 1311-1319
Publish at: 2019-12-01

An adaptive clustering and classification algorithm for Twitter data streaming in Apache Spark

10.12928/telkomnika.v17i6.11711
Raed A.; Noerthern Technical University Hasan , Royida A. Ibrahem; University of Diyala Alhayali , Nashwan Dheyaa; College of Engineering Zaki , Ahmed Hussien; AL Salam University Ali
On-going big data from social networks sites alike Twitter or Facebook has been an entrancing hotspot for investigation by researchers in current decades as a result of various aspects including up-to-date-ness, accessibility and popularity; however anyway there may be a trade off in accuracy. Moreover, clustering of twitter data has caught the attention of researchers. As such, an algorithm which can cluster data within a lesser computational time, especially for data streaming is needed. The presented adaptive clustering and classification algorithm is used for data streaming in Apache spark to overcome the existing problems is processed in two phases. In the first phase, the input pre-processed twitter data is viably clustered utilizing an Improved Fuzzy C-means clustering and the proposed clustering is additionally improved by an Adaptive Particle swarm optimization (PSO) algorithm. Further the clustered data streaming is assessed utilizing spark engine. In the second phase, the input pre-processed Higgs data is classified utilizing the modified support vector machine (MSVM) classifier with grid search optimization. At long last the optimized information is assessed in spark engine and the assessed esteem is utilized to discover an accomplished confusion matrix. The proposed work is utilizing Twitter dataset and Higgs dataset for the data streaming in Apache Spark. The computational examinations exhibit the superiority ofpresented approach comparing with the existing methods in terms of precision, recall, F-score, convergence, ROC curve and accuracy.
Volume: 17
Issue: 6
Page: 3086-3099
Publish at: 2019-12-01

Baud rate variations effect on virtual channel based on PIC microcontroller

10.12928/telkomnika.v17i6.12828
Sarmad K.; Mustansiriyah University Ibrahim , Hussein M.; Mustansiriyah University Hathal , Riyadh A.; Mustansiriyah University Abdulhussein
Recent year in the world the real applications, usually needed only a few key features of Universal Asynchronous Receiver Transmitter (UART). It is a type of serial communication protocol, which improves the problem of parallel communication and develops effectively in several services. This paper presents a transceiver system based on PIC microcontroller. It also presents software designs to transmit and receive data through the virtual channel. The system is designed to study the effects of baud rate variations between transmitter and receiver for noise and noiseless AWGN channel. The system has been simulated by Proteus simulator version 8.1, and then tested successfully at baud rates (2400, 4800, 9600, and 19200) bps. Simulation results show that the error rate has zero values at the desired baud rate value, and also, at the adjacent values. Thus, the zero level of error rate is increased by increasing baud rate values, which fixed by the transmitter and vice versa.
Volume: 17
Issue: 6
Page: 2755-2763
Publish at: 2019-12-01

Hybridisation of RF(Xgb) to improve the tree-based algorithms in learning style prediction

10.11591/ijai.v8.i4.pp422-428
Haziqah Shamsudin , Maziani Sabudin , Umi Kalsom Yusof
This paper presents hybridization of Random Forest (RF) and Extreme Gradient Boosting (Xgb), named RF(Xgb) to improve the tree-based algorithms in learning style prediction. Learning style of specific users in an online learning system is determined based on their interaction and behavior towards the system. The most common online learning theory used in determining the learning style is the Felder-Silverman’s Learning Style Model (FSLSM). Many researchers have proposed machine learning algorithms to establish learning style by using the log file attributes. This helps in determining the learning style automatically. However, current researches still perform poorly, where the range of accuracy is between 58%-89%. Hence, RF(Xgb) is proposed to help in improving the learning style prediction. This hybrid algorithm was further enhanced by optimizing its parameters. From the experiments, RF(Xgb) was proven to be more effective, with accuracy of 96% compared to J48 and LSID-ANN algorithm from previous literature.
Volume: 8
Issue: 4
Page: 422-428
Publish at: 2019-12-01

Remote monitoring of an object using a wireless sensor network based on NODEMCU ESP8266

10.11591/ijeecs.v16.i3.pp1154-1162
Hicham Ouldzira , Ahmed Mouhsen , Hajar Lagraini , Mostafa Chhiba , Abdelmoumen Tabyaoui , Said Amrane
In recent years, wireless sensors networks (WSNs) have been imposed as an effective means of interconnection with simultaneous communication and information processing. They allow operating with sensors at low cost and low power consumption in various application areas such as ecosystem monitoring, detection and monitoring of objects and smart cities, etc.This paper describes the development of a system to detect the presence of an object and monitor it. This prototype is based on four NodeMcu modules (a static access point that provides the WIFI network, a server, a client and a mobile access point attached to the remote surveillance object) programmed under Arduino IDE and communicating between them via the HTTP protocol. The remote monitoring of the object for a linear disposition of the nodes used is based on the existence of the mobile access point in the HTTP client field.
Volume: 16
Issue: 3
Page: 1154-1162
Publish at: 2019-12-01

Development of four quadrant operation of DC to DC converter using single phase matrix converter

10.11591/ijeecs.v16.i3.pp1249-1256
Rahimi Baharom , Abdul Muin Awang
Single-Phase Matrix Converter (SPMC) is an advanced circuit topology that offer advantages such as the capability to regenerate energy back to the input, sinusoidal input and output current and a manageable input current displacement factor. By considering the opportunity of an advanced SPMC topology, further exploration on DC to DC operation is proposed. The four-quadrant operation of switching algorithm was developed to control the SPMC circuit. The voltage and current profile of each quadrant was investigated to validate the proposed switching control algorithm. As part of four quadrants DC to DC operation, the safe commutation switching algorithm was also developed in order to solve the commutation problem due to the used of an inductive load. The pulse width modulation (PWM) techniques was utilized to synthesize the output of the proposed converter. Results from MATLAB/Simulink are presented to validate the proposed circuit operation.
Volume: 16
Issue: 3
Page: 1249-1256
Publish at: 2019-12-01

Issues limiting the evaluation of post implemented enterprise architecture

10.11591/ijeecs.v16.i3.pp1424-1429
Babak Darvish Rouhani , Fatemeh Nikpay , Rodina Binti Ahmad
Evaluation in enterprise architecture (EA) project is crucial to provide comprehensive information of the developed EA artefacts. It may assist in accurate evaluation of implemented Information Systems (ISs) in order to realize the achievement of EA’s goals and support EA decision makers. This research aims to identify and elaborate the existing issues of EA evaluation models. One of the crucial identified issues is to understand, capture and represent core aspects of EA artefacts. Most existing evaluation models do not provide structured approach which cover comprehensive aspect of EA implementation and some do not provide good practices to be applied. Hence, this research intends to cover the gap by exploring critical issues in EA implementation evaluation and elaborating main shortcomings of the reviewed EA models and methods through a systematic literature review
Volume: 16
Issue: 3
Page: 1424-1429
Publish at: 2019-12-01

Classifying confidential data using SVM for efficient cloud query processing

10.12928/telkomnika.v17i6.13059
Huda Kadhim; University of Information Technology and Communications Tayyeh , Ahmed Sabah Ahmed; University of Information Technology and Communications Al-Jumaili
Nowadays, organizations are widely using a cloud database engine from the cloud service providers. Privacy still is the main concern for these organizations where every organization is strictly looking forward more secure environment for their own data. Several studies have proposed different types of encryption methods to protect the data over the cloud. However, the daily transactions represented by queries for such databases makes encryption is inefficient solution. Therefore, recent studies presented a mechanism for classifying the data prior to migrate into the cloud. This would reduce the need of encryption which enhances the efficiency. Yet, most of the classification methods used in the literature were based on string-based matching approach. Such approach suffers of the exact match of terms where the partial matching would not be considered. This paper aims to take the advantage of N-gram representation along with Support Vector Machine classification. A real-time data will used in the experiment. After conducting the classification, the Advanced Encryption Standard algorithm will be used to encrypt the confidential data. Results showed that the proposed method outperformed the baseline encryption method. This emphasizes the usefulness of using the machine learning techniques for the process of classifying the data based on confidentiality.
Volume: 17
Issue: 6
Page: 3155-3160
Publish at: 2019-12-01

Internet of things based industrial environment monitoring and control: A design approach

10.11591/ijece.v9i6.pp4657-4667
Alaa Adulhady Jaber , Firas Khalil Ibrahim Al-Mousawi , Hayder Sabeeh Jasem
In this research an internet of things (IoT) system is designed for the purpose of industrial environment monitoring and control. The system is mainly composed of control and sensor units. Control unit has the responsibility of managing the received data form the sensor unit and then executing the developed control algorithm based on the measured parameters.  NodeMCU development kit is used as the core of the control unit. The senor unit contains gas and temperature sensors utilized for measuring the temperature and concentration of toxic gases in the monitored space. A buzzer has also been embedded in the sensor unit for alerting the occupants acoustically in the danger situations. If the monitored temperature gets higher or lower than the set levels, the air conditioning system will be automatically operated. Similarly, the fan (ventilation) system will be operated if the level of toxic gases becomes high. A mobile application, based on Blynk platform, is then developed to enable the wireless monitoring and control of the environment by the in charge people. In addition to the automatic and wireless control the manual control capability is considered in the developed IoT system.
Volume: 9
Issue: 6
Page: 4657-4667
Publish at: 2019-12-01

Review on fixed-frequency beam steering for leaky wave antenna

10.12928/telkomnika.v17i6.13291
J. S.; Universiti Teknikal Malaysia Melaka (UTeM) Kasim , M. S.; Universiti Teknikal Malaysia Melaka (UTeM) M. Isa , Z.; Universiti Teknikal Malaysia Melaka (UTeM) Zakaria , M. I.; United Arab Emirates University Hussein , Mowafak; Universiti Teknikal Malaysia Melaka (UTeM) K. Mohsen
This paper aims to survey the efforts of researchers in response to the novel and effective technology of control radiation pattern at a fixed frequency for leaky wave antenna (LWA), map the research landscape from the literature onto coherent taxonomy and determine the basic properties of this potential field. In addition, this paper investigates the motivation behind using beam steering in LWA and the open challenges that impede the utility of this antenna design. This paper offers valuable recommendations to improve beam steering in LWA. The review revealed the development and improvement of several techniques of beam scanning LWA. However, several areas or aspects require further attention. All the articles, regardless of their research focus, attempt to address the challenges that impede the full utility of beam scanning and offer recommendations to mitigate their drawbacks. This paper contributes to this area of research by providing a detailed review of the available options and problems to allow other researchers and participants to further develop beam scanning. The new directions for this research are also described.
Volume: 17
Issue: 6
Page: 2895-2902
Publish at: 2019-12-01

Performance analysis of direction of arrival algorithms for Smart Antenna

10.11591/ijece.v9i6.pp4873-4881
Btissam Boustani , Abdennaceur Baghdad , Aicha Sahel , Abdelmajid Badri
This paper presents the performance analysis of the direction of arrival estimation algorithms such as Estimation of Signal Parameters via Rotational Invariance Technique (ESPRIT), Multiple Signal Classification (MUSIC), Weighted Subspace Fitting (WSF), The Minimum Variance Distortionless Response (MVDR or capon) and beamspace. These algorithms are necessary to overcome the problem of detecting the arrival angles of the received signals in wireless communication. Therefore, these algorithms are evaluated and compared according to several constraints required in smart antenna system parameters, as the number of array elements, number of samples (snapshots), and number of the received signals. The main purpose of this study is to obtain the best estimation of the direction of arrival, which can be perfectly implemented in a smart antenna system. In this context, the ROOT-Weighted Subspace Fitting algorithm provides the most accurate detection of arrival angles in each of the proposed scenarios.
Volume: 9
Issue: 6
Page: 4873-4881
Publish at: 2019-12-01

Modified CiteScore metric for reducing the effect of self-citations

10.12928/telkomnika.v17i6.12292
Hilary I.; Covenant University Okagbue , Sheila A.; Covenant University Bishop , Pelumi E.; Covenant University Oguntunde , Patience I.; Covenant University Adamu , Abiodun A.; Covenant University Opanuga , Elvir M.; Kazan Federal University Akhmetshin
Elsevier B.V. launched a scholarly metric called CiteScore (CS) on December 8, 2016. Up till then, the journal impact factor (JIF) owned by Clarivate Analytics (Thomson Reuters) was the only trusted metric for journal evaluation. As noted by Teixeira da Silva & Memon (2017), CS offers some observed advantages over JIF. The potentials of CiteScore as a viable metric are still emerging. The paper briefly introduces a variant of the CiteScore that can be used in quantifying the impact of researchers and their institutions. The ultimate aim is to reduce the numerical effect of self-citations (SC) in academic publishing. The reduction is designed to discourage SC but not diminishing it. The reasons for the adopted methodology are discussed extensively. The proposed modified CiteScore metric is simple, transparent and constructed to ensure integrity in academic publication. The result showed that the proposed modified CiteScore is a better option than the traditional CiteScore and hence, can be applied in impact determination, the ranking of authors and their institutions, and evaluation of scientists for a grant award. The approach used in this paper is entirely new in two ways; first, a metric similar to journal ranking is proposed for ranking authors and their institutions and secondly, disproportionate scores are awarded to different sources of citations to reduce perceived dishonesty in academic publications. In conclusion, this research is one of very few to report the effect of SC on CiteScore. Hitherto, the effect of SC has always been on the journal impact factor (IF).
Volume: 17
Issue: 6
Page: 3044-3049
Publish at: 2019-12-01

Design and realization of motion detector system for house security

10.12928/telkomnika.v17i6.13142
Zainab G.; Al-Esraa University College Faisal , Maysam Sameer; Al-Esraa University College Hussein , Amany Mohammad; Al-Esraa University College Abood
In this paper, the design and realization of motion detector system for house security based GSM network is presents. The development of microcontroller carried out intruder detection that supports tracking techniques to provide vital security with control and alert operation inside and outside the home. The pivot of security on the integration the motion detector and cameras into web applications has become more interested. The smart surveillance Pi camera obtain the input from the motion detector and controller which is send the video to the web server allowing the homeowner to access this video by use web applications. An intrusion alert send to the owner by mean of message via mobile and buzzers alarms located at suitable distance. This system is typify proficient video camera for remote sensing and tracking with live video for succeeding play again to offers efficient and easy implementation with omnipresent surveillance solution
Volume: 17
Issue: 6
Page: 3211-3217
Publish at: 2019-12-01

Estimation of fines amount in syariah criminal offences using adaptive neuro-fuzzy inference system (ANFIS) enhanced with analytic hierarchy process (AHP)

10.11591/ijece.v9i6.pp5537-5544
Ahmad Fitri Mazlam , Wan Nural Jawahir Hj Wan Yussof , Rabiei Mamat
All syariah criminal cases, especially in khalwat offence have their case-fact, and the judges typically look forward to all the facts which were tabulated by the prosecutors. A variety of criteria is considered by the judge to determine the fines amount that should be imposed on an accused who pleads guilty. In Terengganu, there were ten (10) judges, and the judgments were made by the individual decision upon the trial to decide the case. Each judge has a stake, principles and distinctive criteria in determining fines amount on an accused who pleads guilty and convicted. This research paper presents an Adaptive Neuro-fuzzy Inference System (ANFIS) technique combining with Analytic Hierarchy Process (AHP) for estimating fines amount in Syariah (khalwat) criminal. Datasets were collected under the supervision of registrar and syarie judge in the Department of Syariah Judiciary State Of Terengganu, Malaysia. The results showed that ANFIS+AHP could estimate fines efficiently than the traditional method with a very minimal error.
Volume: 9
Issue: 6
Page: 5537-5544
Publish at: 2019-12-01
Show 1216 of 1994

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration