Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,734 Article Results

Healthcare receivers’ acceptance of telecardiology in Malaysia

10.12928/telkomnika.v17i3.12212
Kee Jiar; Universiti Teknologi Malaysia Yeo , Rania Hussien Ahmed; Universiti Teknologi Malaysia Al-Ashwal , Lina; Universitas Ahmad Dahlan Handayani , Shih Hui; Universiti Teknologi Malaysia Lee
This quantitative study investigates acceptance towards implementation of telecardiology in Malaysia. The purpose of this study is to explore and understand the potential factors that could be the key elements in cultivating positive behaviour towards telecardiology adoption in Malaysia. Data was gathered by using survey method from 149 patients and publics who use internet service in their daily lives. The questionnaire was developed by integrating Technology Readiness Index (TRI), Technology Acceptance Model (TAM) and Theory of Planned Behaviour (TPB) which consists of 42 items. Descriptive statistics, factor analysis and one-way ANOVA were conducted to analyse the data. The analysis reveals that Malaysians generally hold a positive perception towards implementation of telecardiology with some reservations. Besides that, gender and income of the respondents were found to influence the variables in telecardiology readiness, hence suggesting these two variables be taken into considerations in the adoption of telecardiology. It is our hope that the result of this study provides some useful information for the policy makers and implementers to develop effective implementation strategies that could reduce users’ resistance and adoption barriers in telecardiology adoption.
Volume: 17
Issue: 3
Page: 1128-1135
Publish at: 2019-06-01

Reliability optimization of electrical distribution systems considering expenditures on maintenance and customer interruptions

10.11591/ijeecs.v14.i3.pp1057-1064
K B Kela , Bhavik N Suthar , L D Arya
In this paper, a methodology is proposed which shows enhancement of reliability by optimizing total reliability cost of electrical distribution systems. The total reliability cost consists of cost incurred by utility and customers both. An objective function in terms of failure rates and repair times i.e. primary reliability indices has been formulated which  depicts both these costs . Hence, optimization of the objective function will give a balance between these costs with optimized values of primary reliability indices. This optimization has been done considering the constraints of achieving customer and energy based reliability indices below threshold/target values. The methodology has been applied on Roy Billinton Test System- Bus 2 (RBTS-2).  The problem has been solved by applying Flower Pollination (FP) algorithm. A comparison has been made with the results obtained by Differential evolution (DE) algorithm also for  the system considered.
Volume: 14
Issue: 3
Page: 1057-1064
Publish at: 2019-06-01

Markerless motion capture for 3D human model animation using depth camera

10.12928/telkomnika.v17i3.8939
Maulahikmah; Swiss German University Galinium , Jason; Swiss German University Yapri , James; Swiss German University Purnama
3D animation is created using keyframe based system in 3D animation software such as Blender and Maya. Due to the long time interval and the need of high expertise in 3D animation, motion capture devices were used as an alternative and Microsoft Kinect v2 sensor is one of them. This research analyses the capabilities of the Kinect sensor in producing 3D human model animations using motion capture and keyframe based animation system in reference to a live motion performance. The quality, time interval and cost of both animation results were compared. The experimental result shows that motion capture system with Kinect sensor consumed less time (only 2.6%) and cost (30%) in the long run (10 minutes of animation) compare to keyframe-based system, but it produced lower quality animation. This was due to the lack of body detection accuracy when there is obstruction. Moreover, the sensor’s constant assumption that the performer’s body faces forward made it unreliable to be used for a wide variety of movements. Furthermore, standard test defined in this research covers most body parts’ movements to evaluate other motion capture system.
Volume: 17
Issue: 3
Page: 1300-1309
Publish at: 2019-06-01

Fuzzy sequential model for strategic planning of small and medium scale industries

10.12928/telkomnika.v17i3.12239
Imam; Universitas Brawijaya Santoso , Puspa Ayu Indah; Universitas Brawijaya Prameswari , Aulia Bayu; Universitas Brawijaya Yushila , Muhammad; Universitas Brawijaya Arwani
The use of strategic planning can be an alternative solution to improve industrial performance. In small and medium scale industries especially in apple chips industries, strategic planning helps to know the current industry situation and the steps that must be taken to overcome the existing problems. This study aimed to develop an improvement strategies using Fuzzy Sequential Modeling (FSM) model. FSM model was consisted a SWOT analysis, Root Cause Analysis (RCA), Bolden’s Taxonomy and fuzzy AHP. Based on SWOT analysis, the external factors of threats was the similar business competition and low purchasing power. RCA described the issues that needed to be fixed using Bolden’s Taxonomy as the reference for determining the action plans and produce four OIA (Open Improvement Area) there are old technology machines and equipment, difficulty of enterprise development, ineffective marketing media and low market share. The strategic planning was determined using Fuzzy AHP based on OIA and ABC enterprise needs to improve the low market share and ineffective marketing strategy.
Volume: 17
Issue: 3
Page: 1310-1316
Publish at: 2019-06-01

Architectural design of IoT-cloud computing integration platform

10.12928/telkomnika.v17i3.11786
Adhitya; Brawijaya University Bhawiyuga , Dany Primanita; Brawijaya University Kartikasari , Kasyful; Brawijaya University Amron , Ocki Bagus; Brawijaya University Pratama , Moch. Wildan; Brawijaya University Habibi
An integration between the Internet of Things (IoT) and cloud computing can potentially leverage the utilization of both sides. As the IoT based system is mostly composed by the interconnection of pervasive and constrained devices, it can take a benefit of virtually unlimited resources of cloud entity i.e storage and computation services to store and process its sensed data. On the other hand, the cloud computing system may get benefit from IoT by broadening its reach to real world environment applications. In order to incarnate this idea, a cloud software platform is needed to provide an integration layer between the IoT and cloud computing taking into account the heterogenity of network communication protocols as well as the security and data management issues. In this study, an architectural design of IoT-cloud platform for IoT and cloud computing integration is presented. The proposed software platform can be decomposed into five main components namely cloud-to-device interface, authentication, data management, and cloud-to-user interface component. In general, the cloud-to-device interface acts as a data transmission endpoint between the whole cloud platform system and its IoT devices counterpart. Before a session of data transmission established, the communication interface contact the authentication component to make sure that the corresponding IoT device is legitimate before it allowed for sending the sensor data to cloud environment. Notice that a valid IoT device can be registered to the cloud system through web console component. The received sensor data are then collected in data storage component. Any stored data can be further analyzed by data processing component. User or any developed applications can then retrieve collected data, either raw or processed data, through API data access and web console.
Volume: 17
Issue: 3
Page: 1399-1408
Publish at: 2019-06-01

Filter technique of medical image on multiple morphological gradient (MMG) method

10.12928/telkomnika.v17i3.9722
Jufriadif; Universitas Putra Indonesia YPTK Padang Na'am , Johan; Universitas Gunadarma Harlan , Rosda; College School of Technology Syelly , Agung; Universitas Putra Indonesia YPTK Padang Ramadhanu
Filter technique is supportive for reducing image noise. This paper presents a study on filtering medical images, i.e., CT-Scan, Chest X-ray and Panoramic X-ray collected from two of the most prominent public hospitals in Padang City, Indonesia. The aim of this study preserved to facilitate in diagnosing objects in x-ray medical images. This study used filter technique, i.e. Blur, Emboss, Gaussian, Laplacian, Roberts, Sharpen, or Sobel techniques as pre-processing step. The filter process performed before edge detection and edge clarification. MMG method used in this study to clarify the edge detection. Thus, this research showed the hesitation decline (confidence increase) of the diagnosis of objects contained in medical images.
Volume: 17
Issue: 3
Page: 1317-1323
Publish at: 2019-06-01

“Magic Boosed” an elementary school geometry textbook with marker-based augmented reality

10.12928/telkomnika.v17i3.11559
Reza; Politeknik Negeri Pertanian Samarinda Andrea , Siti; STMIK Widya Cipta Dharma Lailiyah , Fahrul; Universitas Mulawarman Agus , Ramadiani; Universitas Mulawarman Ramadiani
Recently media that is used on mathematic study is just board and printed book. Usually teacher uses, modelling tool to visualize study objects like geometry, but students must be in alternatively to fulfill that demand requires application which can deliver 3-dimension geometry to emphasize students understanding of volume and surface area. This research will implement based tracking marker method on textbook and develop geometry study application based on augmented reality, it is called “Magic Boosed”. The existence of AR combination technology, then geometry which will be taught by teacher to elementary school student will be more interesting and make students are easier to learn shape and geometry formulas, this is evident from data analysis test on student learning improvement using kolmogorov-smirnov testing.
Volume: 17
Issue: 3
Page: 1242-1249
Publish at: 2019-06-01

Recognize printed Arabic letter using new geometrical features

10.11591/ijeecs.v14.i3.pp1518-1524
Haidar Mohamad , Seham Hashim , Anwar Al-Saleh
The task of recognizing the shape of Arabic letters using modified algorithms discussed in this paper. The difficulty of recognizing these letters is summarized in the shape of the Arabic letter within a word from a large set of letters has a similar shape. Moreover, the shape of the letter is different depending on its position begin, middle, end within a word. Therefore, it is necessary to introduce new geometric features to categorize each letter. The suggested algorithm with 19 features is used in this paper. These features, like define points for each letter, divide a letter to blocks, edge detection and other features are shown in the suggested algorithm. The introduced geometric features give a high accuracy to recognize printed Arabic letter within a word or text. Minimum distance criteria used to estimate the error of the recognition process between the database and the tested Arabic letter. This method is good to explain the behaviour of the designed algorithm code to distinguish the geometric properties and the accuracy reaches 99.8% for the proposed method. The letter size changes geometry details when the font size is changed. The studied font is Times New Roman with size 30, 36, and 39. 
Volume: 14
Issue: 3
Page: 1518-1524
Publish at: 2019-06-01

Hiding data in images using steganography techniques with compression algorithms

10.12928/telkomnika.v17i3.12230
Osama F.; Minia University AbdelWahab , Aziza I.; Minia University Hussein , Hesham F. A.; Minia University Hamed , Hamdy M.; Minia University Kelash , Ashraf A. M.; Minia University Khalaf , Hanafy M.; Minia University Ali
Steganography is the science and art of secret communication between two sides that attempt to hide the content of the message. It is the science of embedding information into the cover image without causing a loss in the cover image after embedding.Steganography is the art and technology of writing hidden messages in such a manner that no person, apart from the sender and supposed recipient, suspects the lifestyles of the message. It is gaining huge attention these days as it does now not attract attention to its information's existence. In this paper, a comparison of two different techniques is given. The first technique used Least Significant Bit (LSB) with no encryption and no compression. In the second technique, the secret message is encrypted first then LSB technique is applied. Moreover, Discrete Cosine Transform (DCT) is used to transform the image into the frequency domain. The LSB algorithm is implemented in spatial domain in which the payload bits are inserted into the least significant bits of cover image to develop the stego-image while DCT algorithm is implemented in frequency domain in which the stego-image is transformed from spatial domain to the frequency domain and the payload bits are inserted into the frequency components of the cover image.The performance of these two techniques is evaluated on the basis of the parameters MSE and PSNR.
Volume: 17
Issue: 3
Page: 1168-1175
Publish at: 2019-06-01

Vehicle detection using background subtraction and clustering algorithms

10.12928/telkomnika.v17i3.10144
Puguh Budi; Universitas Lambung Mangkurat Prakoso , Yuslena; Universitas Lambung Mangkurat Sari
Traffic congestion has raised worldwide as a result of growing motorization, urbanization, and population. In fact, congestion reduces the efficiency of transportation infrastructure usage and increases travel time, air pollutions as well as fuel consumption. Then, Intelligent Transportation System (ITS) comes as a solution of this problem by implementing information technology and communications networks. One classical option of Intelligent Transportation Systems is video camera technology. Particularly, the video system has been applied to collect traffic data including vehicle detection and analysis. However, this application still has limitation when it has to deal with a complex traffic and environmental condition. Thus, the research proposes OTSU, FCM and K-means methods and their comparison in video image processing. OTSU is a classical algorithm used in image segmentation, which is able to cluster pixels into foreground and background. However, only FCM (Fuzzy C-Means) and K-means algorithms have been successfully applied to cluster pixels without supervision. Therefore, these methods seem to be more potential to generate the MSE values for defining a clearer threshold for background subtraction on a moving object with varying environmental conditions. Comparison of these methods is assessed from MSE and PSNR values. The best MSE result is demonstrated from K-means and a good PSNR is obtained from FCM. Thus, the application of the clustering algorithms in detection of moving objects in various condition is more promising.
Volume: 17
Issue: 3
Page: 1393-1398
Publish at: 2019-06-01

Design and optimization of a new compact 2.4 GHz-bandpass filter using DGS technique and U-shaped resonators for WLAN applications

10.12928/telkomnika.v17i3.10913
A.; Sidi Mohamed Ben Abdellah University Belmajdoub , A.; German Research Foundation (DFG) Boutejdar , A. El; Moulay Ismail University Alami , S. D.; Sidi Mohamed Ben Abdellah University Bennani , M.; Sidi Mohamed Ben Abdellah University Jorio
The objective of this work is the study, the design and the optimization of an innovative structure of a network of coupled copper metal lines deposited on the upper surface of a R04003 type substrate of height 0.813 with a ground deformed by slots (DGS). This structure is designed in an optimal configuration for use in the design of narrowband bandpass filter for wireless communication systems (WLAN), the aim of use the defected ground structure is to remove the unwanted harmonics in the rejection band, the simulation results obtained from this structure using CST software show a very high selectivity of the designed filter, a very low level of losses (less than-0.45 dB) with a size overall size of 43.5x34.3 mm.
Volume: 17
Issue: 3
Page: 1081-1089
Publish at: 2019-06-01

K-Nearest neighbor algorithm on implicit feedback to determine SOP

10.12928/telkomnika.v17i3.12436
Muhammad Yusril Helmi; Politeknik Pos Indonesia Setyawan , Rolly Maulana; Politeknik Pos Indonesia Awangga , Nadia Ayu; Politeknik Pos Indonesia Lestari
The availability of a lot of existing Standard Operating Procedures (SOP) document information, users often need time to find SOPs that fit their preference. Therefore, this requires a recommendation system based on user content consumption by personalized usage logs to support the establishment of SOP documents managed according to user preferences. The k-nearest neighbor (KNN) algorithm is used to identify the most relevant SOP document for the user by utilizing implicit feedback based on extraction data by monitoring the document search behavior. From the research results obtained 5 classifications as parameters, with a final value of 3:2 ratio that shows the best distance value with the majority of labels according to the concept of calculation KNN algorithm that sees from the nearest neighbor in the dataset. This shows the precision of applying the KNN algorithm in determining SOP documents according to user preferences based on implicit feedback resulting in 80% presentation for SOPs corresponding to profiles and 20% for SOPs that do not fit the user profile. To establish SOP documents to show more accurate results, it should be used in a broad SOP management system and utilize implicit feedback with parameters not only in search logs and more on performance evaluation evaluations.
Volume: 17
Issue: 3
Page: 1425-1431
Publish at: 2019-06-01

High impedance fault detection in distribution system

10.11591/ijaas.v8.i2.pp95-102
Kavaskar Sekar , Nalin Kant Mohanty
High impedance faults (HIFs) present a huge complexity of identification in an electric power distribution network (EPDN) due to their characteristics. Further, the growth of non-linear load adds complexity in HIF detection. One primary challenge of power system engineers is to reliably detect and discriminate HIFs from normal distribution system load and other switching transient disturbances. In this study, a novel HIF detection method is proposed based on the simulation of an accurate model of an actual EPDN study with real data. The proposed method uses current signal alone and does not require voltage signal. Wavelet transform (WT) is used for signal decomposition to extract statistical features and classification of HIF into Non-HIF (NHIF) by Neural Networks (NNs). The simulation study of the proposed method provides good, consistent and powerful protection for HIF.
Volume: 8
Issue: 2
Page: 95-102
Publish at: 2019-06-01

A modified WBANs MAC superframe using priority-criticality index table for managing pilgrims’ emergency traffic in Hajj

10.11591/ijeecs.v14.i3.pp1499-1507
Shah Murtaza Rashid Al Masud , Asmidar Abu Bakar , Salman Yussof
During Hajj, pilgrims suffer from various emergencies that should be managed in a real-time manner thus require deploying emerging technology. Based on our research it is found that the emergency medical circumstances among the pilgrims are due to the criticality level of certain physiological conditions those are by some means rely on five major types of the physiological data rate. Five major data types include heart rate, respiratory rate, body temperature, high or low blood pressure and blood sugar respectively which are obligatory to be transmitted real-time and ahead of other non-critical traffic as delay in its transmission may jeopardise human life. Hence, by the criticality constraints of pilgrims’ physiological data, we primarily perform a traffic classification through literature review. By using classified critical traffic, we define the different priority levels to be used by WBANs hub or coordinator. Therefore, in this research, we apply an analytical method to develop the priority-criticality index table in such a way that there will be no queuing delay in the system. Since our research mainly focuses on to manage the emergency, therefore, for simplicity of critical data transmission, we modified the existing medium access control (MAC) superframe that obtains only one exclusive access period (EAP) slot. The modified MAC superframe structure is to perform efficiently even when more than one emergency traffic from different sensors aggregate to the WBANs coordinator for further transmission to the healthcare stations.
Volume: 14
Issue: 3
Page: 1499-1507
Publish at: 2019-06-01

Off-Line character recognition using an integrated DBSCAN-ANN scheme

10.11591/ijeecs.v14.i3.pp1443-1451
Dhurgham Ali Mohammed , Alaa Abdul Hussein Mezher , Hayder Sabeeh Hadi
Handwriting character recognition involves a high degree of variability and imprecision. For that, the main factor to judge the recognition accuracy is the technique that is used to extract the features. This paper developed a novel method for handwritten Arabic characters by combining the Density-Based Clustering method with statistical and morphological features. The first stage in recognition of handwritten character image has been done by binarization the image then applies noise removal techniques. The Density-Based Algorithm used to categorize and find any shape of clusters based on pixel information positions. This technique divided the image into characters. Each character will be decomposing into four regions from the centroid followed by feature extraction. These features include vertical and horizontal projections, upper and lower profile, rectangularity and orientation. The results of the present process will transfer to the Neural Network (NN) stage which generates a high level of correctness and accuracy by training. The testing results compared with two of state-of-art researches. The total accuracy of this proposed work observes a better recognition of characters.
Volume: 14
Issue: 3
Page: 1443-1451
Publish at: 2019-06-01
Show 1287 of 1983

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration