Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,905 Article Results

The influence of hardware impairment on the system performance of two-way relaying network

10.11591/ijece.v9i5.pp3623-3632
Le Anh Vu , Minh Tran , Van-Duc Phan , Hoang-Nam Nguyen , Thanh-Long Nguyen
In this research, the system performance of the half-duplex two-way relay network under hardware impairment condition is presented and investigated. In this system model, the time switching protocol and amplify-and-forward (AF)-based are considered. First, of all, the analytical expressions of the outage probability, and achievable throughput with the exact closed form and asymptotic form were proposed and derived. Furthermore, the research results are derived and convinced by Monte-Carlo calculation. The numerical results demonstrated and convinced the analytical and the simulation results are agreed for all possible system parameters.
Volume: 9
Issue: 5
Page: 3623-3632
Publish at: 2019-10-01

A low cost electromagnetic sensor for detecting holes in metallic sheet

10.12928/telkomnika.v17i5.12684
Galang P. N.; Universitas Mercu Buana Hakim , Ahmad; Universitas Mercu Buana Firdausi , Mudrik; Universitas Mercu Buana Alaydrus
Unwanted hole in metal sheet that use for vehicle body or structure is proved dangerous situation. To prevent disaster this hole needs to be found before its installation, or other wise it will be time and money consuming once its found when already finished installation. Therefore, an inspection using sensor for metal sheet is recommended to prevent this problem. In this paper, we proposed a new sensor using radio wave propagation to detect holes in metal sheet. We propose to use RSSI methods to detect hole based on electromagnetic wave propagation signal strength. Using this method we success to detect 8mm hole diameter in metal sheet with 1mm thickness. Using this method, we transmit electromagnetic wave energy at about 20 dBm, and we receive with average -27.53 dBm for iron sheet and -23.13 dBm for aluminum sheet.
Volume: 17
Issue: 5
Page: 2481-2485
Publish at: 2019-10-01

Short-term optimal hydro-thermal scheduling using clustered adaptive teaching learning based optimization

10.11591/ijece.v9i5.pp3359-3365
Surender Reddy Salkuti
In this paper, Clustered Adaptive Teaching Learning Based Optimization (CATLBO) algorithm is proposed for determining the optimal hourly schedule of power generation in a hydro-thermal power system. In the proposed approach, a multi-reservoir cascaded hydro-electric system with a non-linear relationship between water discharge rate, net head and power generation is considered. Constraints such as power balance, water balance, reservoir volume limits and operation limits of hydro and thermal plants are considered. The feasibility and effectiveness of the proposed algorithm is demonstrated through a test system, and the results are compared with existing conventional and evolutionary algorithms. Simulation results reveals that the proposed CATLBO algorithm appears to be the best in terms of convergence speed and optimal cost compared with other techniques.
Volume: 9
Issue: 5
Page: 3359-3365
Publish at: 2019-10-01

A new configuration of patch antenna array for rectenna array applications

10.12928/telkomnika.v17i5.11476
A.; Hassan 1st University Taybi , A.; Hassan 1st University Tajmouati , J.; Hassan 1st University Zbitou , L. El; Hassan 1st University Abdellaoui , M.; Microwave Group ESEO Angers Latrach , A.; Hassan 1st University Errkik
The performance and advantages of microstrip patch antennas made them a field of interest for wireless power transmission applications, especially for rectenna systems where the choice of the antenna is a crucial step.  In this paper, a 5.8 GHz circularly polarized patch antenna has been designed and fabricated, then mounted by using 4 elements to achieve an antenna array to enhance the captured power to be converted by the rectifier circuit. The antenna array is well matched at 5.8 GHz in terms of reflection coefficient and has a directivity of 11dB and a gain of 6 dB. Results have been confirmed by fabrication.
Volume: 17
Issue: 5
Page: 2186-2193
Publish at: 2019-10-01

Full-duplex user-centric communication using non-orthogonal multiple access

10.12928/telkomnika.v17i5.12803
Sock Theng; Universiti Teknologi Malaysia Ooi , Razali; Universiti Teknologi Malaysia Ngah , Marwan Hadri; Universiti Teknologi Malaysia Azmi
This paper proposes an improved user-centric Non-Orthogonal Multiple Access (NOMA) communication in two-base station networks with in-band full duplex (IBFD) user. We derive the achievable rates of the proposed user-centric NOMA systems. For benchmarking purposes, we also derive the achievable rate for the user-centric system deploying conventional NOMA schemes, Orthogonal Multiple Access (OMA) schemes and point-point communication systems. We then analyze and simulate the performance of the proposed and all the benchmarked systems. We found that our proposed user-centric NOMA approach has a 64% improvement in the total achievable rate when compared to the benchmarked approach under similar power constraint.
Volume: 17
Issue: 5
Page: 2169-2178
Publish at: 2019-10-01

Efficient mobilenet architecture as image recognition on mobile and embedded devices

10.11591/ijeecs.v16.i1.pp389-394
Barlian Khasoggi , Ermatita Ermatita , Samsuryadi Samsuryadi
The introduction of a modern image recognition that has millions of parameters and requires a lot of training data as well as high computing power that is hungry for energy consumption so it becomes inefficient in everyday use. Machine Learning has changed the computing paradigm, from complex calculations that require high computational power to environmentally friendly technologies that can efficiently meet daily needs. To get the best training model, many studies use large numbers of datasets. However, the complexity of large datasets requires large devices and requires high computing power. Therefore large computational resources do not have high flexibility towards the tendency of human interaction which prioritizes the efficiency and effectiveness of computer vision. This study uses the Convolutional Neural Networks (CNN) method with MobileNet architecture for image recognition on mobile devices and embedded devices with limited resources with ARM-based CPUs and works with a moderate amount of training data (thousands of labeled images). As a result, the MobileNet v1 architecture on the ms8pro device can classify the caltech101 dataset with an accuracy rate 92.4% and 2.1 Watt power draw. With the level of accuracy and efficiency of the resources used, it is expected that MobileNet's architecture can change the machine learning paradigm so that it has a high degree of flexibility towards the tendency of human interaction that prioritizes the efficiency and effectiveness of computer vision.
Volume: 16
Issue: 1
Page: 389-394
Publish at: 2019-10-01

Finding optimal reactive power dispatch solutions by using a novel improved stochastic fractal search optimization algorithm

10.12928/telkomnika.v17i5.10767
Hai Van; Ho Chi Minh City University of Food Industry Tran , Thanh Van; Technical University of Ostrava Pham , Ly Huu; Ton Duc Thang University Pham , Nghia Trong; Ho Chi Minh City University of Technology Le , Thang Trung; Ton Duc Thang University Nguyen
In this paper, a novel improved Stochastic Fractal Search optimization algorithm (ISFSOA) is proposed for finding effective solutions of a complex optimal reactive power dispatch (ORPD) problem with consideration of all constraints in transmission power network. Three different objectives consisting of total power loss (TPL), total voltage deviation (TVD) and voltage stabilization enhancement index are independently optimized by running the proposed ISFSOA and standard Stochastic Fractal Search optimization algorithm (SFSOA). The potential search of the proposed ISFSOA can be highly improved since diffusion process of SFSOA is modified. Compared to SFSOA, the proposed method can explore large search zones and exploit local search zones effectively based on the comparison of solution quality. One standard IEEE 30-bus system with three study cases is employed for testing the proposed method and compared to other so far applied methods. For each study case, the proposed method together with SFSOA are run fifty run and three main results consisting of the best, mean and standard deviation fitness function are compared. The indication is that the proposed method can find more promising solutions for the three cases and its search ability is always more stable than those of SFSOA. The comparison with other methods also give the same evaluation that the proposed method can be superior to almost all compared methods. As a result, it can conclude that the proposed modification is really appropriate for SFSOA in dealing with ORPD problem and the method can be used for other engineering optimization problems.
Volume: 17
Issue: 5
Page: 2517-2526
Publish at: 2019-10-01

Algorithm of optimal technology selection of broadband access network

10.12928/telkomnika.v17i5.12140
S.; Tashkent University of Information Technologies Sadchikova , M.; Tashkent University of Information Technologies Abdujapparova , D.; Tashkent University of Information Technologies Normatova
High speed applications require the access network upgrading based on new optical technologies in “last mile”. At the planning stage of network modernization, special algorithms and techniques allow optimize and automate the designing process of network upgrade based on copper cables. However, these techniques are completely inapplicable if optical technologies are used to the access network modernization. Designed algorithm simplifies the throughput calculation of current access nodes and planning of new access nodes depending on subscriber’s requirementstto the broadband services. Developed program based on proposed algorithm allows to determinate access nodes optimal deployment as well as the required equipment characteristics.
Volume: 17
Issue: 5
Page: 2244-2249
Publish at: 2019-10-01

Optical fiber tip sensor for glucose-adulterated honey detection

10.12928/telkomnika.v17i5.12813
Nazirah Mohd; Universiti Teknologi Malaysia Razali , Aimi Najwa; Universiti Teknologi Malaysia Mazlan , Mohammad Farizuddin; Universiti Teknologi Malaysia Salebi , Habibah; Universiti Teknologi Malaysia Mohamed , Sumiaty; Universiti Teknologi Malaysia Ambran
Honey, a natural sweet substance and also a high-value foodstuff has been a target for adulteration. This paper reports the early stage development of optical fiber tip sensor using a standard single mode fiber for adulterated honey detection. The development of simple, sensitive and low-cost sensor for direct detection of adulterated honey is a considerable interest in this context. A pure stingless bee honey was mixed with glucose adulterant at different volume ratios for the adulteration process. By changing this chemical composition, the refractive index of the adulterated honey varied and Fresnel reflection occured at the interface between the fiber tip and the adulterated honey solution also changed. The average sensitivity achieved by this sensor is 0.29 dBm/% with linear regression value up 0.97. This shows that, the sensor has a potential in adulterated honey detection.
Volume: 17
Issue: 5
Page: 2445-2450
Publish at: 2019-10-01

Comparing machine learning and ensemble learning in the field of football

10.11591/ijece.v9i5.pp4321-4325
Shuaib Khan , Kirubanand V. B
Football has been one of the most popular and loved sports since its birth on November 6th, 1869. The main reason for this is because it is highly unpredictable in nature. Predicting football matches results seems like the perfect problem for machine learning models. But there are various caveats such as picking the right features from an enormous number of available features.  There have been many models which have been applied to various football-related datasets. This paper aims to compare Support Vector Machines a machine learning model and XGBoost an Ensemble learning model and how Ensemble Learning can greatly improve the accuracy of the predictions.
Volume: 9
Issue: 5
Page: 4321-4325
Publish at: 2019-10-01

Advanced optimal by PSO-PI for DC motor

10.11591/ijeecs.v16.i1.pp165-175
Salam Waley Jeaeb , Abbas Zghair Salman , Qusay A. Jawad , Haider Shareef
Interest in the drive system which used in many applications is increasing day by day. So, many researchers have focused on the analyses, design and control of these systems. In this study, Optimal for Dc motor in drive system control strategy has been proposed for PSO-PI and fuzzy logic controller (FLC) based Dc motor in drive system. In order to test dynamic performance of PSO-PI based drive System, simulation study was carried out by MATLAB/Simulink. The results obtained from the PSO-PI based drive system are not only superior in the rise time, settling time and overshoot but can prevent from voltage and has improved power quality. 
Volume: 16
Issue: 1
Page: 165-175
Publish at: 2019-10-01

Practical understanding of the operating principle of digital communication systems

10.11591/ijeecs.v16.i1.pp299-310
Gebrehiwet Gebrekrstos Lema , Teklehaymanot Baweke Reda , Dawit Hailu , Tole Sutikno
There are many students and researcher who doesn’t really understand the practical operating principle of digital communication system. Hence in this paper, the digital communication system is studied and simulated. In the system kit development text and audio inputs are taken and encrypted with different encryption techniques including additive cipher, multiplicative cipher and affine ciphers. The encrypted data is converted in to an 8-bit binary, channel encoded with distinct channel coding styles like linear block encoder, cyclic encoder and convolutional encoder, line coded and band pass modulated by different digital modulation techniques. Finally, the developed software is tested with equivalent inputs of the current national TV broadcasting and the results found are correct according to the theoretical analysis of the discussion.
Volume: 16
Issue: 1
Page: 299-310
Publish at: 2019-10-01

Implementation of AES using biometric

10.11591/ijece.v9i5.pp4266-4276
Srividya R. , Ramesh B.
Mobile Adhoc network is the most advanced emerging technology in the field of wireless communication. MANETs mainly have the capacity of self-forming, self-healing, enabling peer to peer communication between the nodes, without relying on any centralized network architecture. MANETs are made applicable mainly to military applications, rescue operations and home networking. Practically, MANET could be attacked by several ways using multiple methods. Research on MANET emphasizes on data security issues, as the Adhoc network does not befit security mechanism associated with static networks. This paper focuses mainly on data security techniques incorporated in MANET. Also this paper proposes an implementation of Advanced Encryption Standard using biometric key for MANETs. AES implementation includes, the design of most robust Substitution-Box implementation which defines a nonlinear behavior and mitigates malicious attacks, with an extended security definition. The key for AES is generated using most reliable, robust and precise biometric processing. In this paper, the input message is encrypted by AES powered by secured nonlinear S-box using finger print biometric feature and is decrypted using the reverse process.
Volume: 9
Issue: 5
Page: 4266-4276
Publish at: 2019-10-01

Effective segmentation of sclera, iris and pupil in noisy eye images

10.12928/telkomnika.v17i5.12551
Mrunal; K.L. University Pathak , N.; K.L. University Srinivasu , Vinayak; S.P. Pune University Bairagi
In today’s sensitive environment, for personal authentication, iris recognition is the most attentive technique among the various biometric technologies. One of the key steps in the iris recognition system is the accurate iris segmentation from its surrounding noises including pupil and sclera of a captured eye-image. In our proposed method, initially input image is preprocessed by using bilateral filtering. After the preprocessing of images contour based features such as, brightness, color and texture features are extracted. Then entropy is measured based on the extracted contour based features to effectively distinguishing the data in the images. Finally, the convolution neural network (CNN) is used for the effective sclera, iris and pupil parts segmentations based on the entropy measure. The proposed results are analyzed to demonstrate the better performance of the proposed segmentation method than the existing methods. 
Volume: 17
Issue: 5
Page: 2346-2354
Publish at: 2019-10-01

An improved security and message capacity using AES and Huffman coding on image steganography

10.12928/telkomnika.v17i5.9570
Christy Atika; Dian Nuswantoro University Sari , Giovani; Dian Nuswantoro University Ardiansyah , De Rosal Ignatius Moses; Dian Nuswantoro University Setiadi , Eko Hari; Dian Nuswantoro University Rachmawanto
Information security is very important and has been widely implemented. Cryptography and steganography are two common methods that can be implemented to secure and conceal the information. In this research, the proposed AES algorithm for cryptography and DWT for steganography. However, in case of implementing DWT as steganography, there is a weakness which is a lower capacity. Based on DWT’s problem, proposed Huffman Coding to reduce the total of the message’s bit and increase the capacity. In the implementation, a message will be processed by using AES and compressed by using Huffman Coding then conceal in a cover using DWT. After doing several experiments using a 128x128 pixel message image and a 512x512 pixel of the cover image, achieved the average of MSE is 1.5676 and the average of PSNR result is above 40db which is 46.1878.
Volume: 17
Issue: 5
Page: 2400-2409
Publish at: 2019-10-01
Show 1239 of 1994

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration