Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,734 Article Results

K-Nearest neighbor algorithm on implicit feedback to determine SOP

10.12928/telkomnika.v17i3.12436
Muhammad Yusril Helmi; Politeknik Pos Indonesia Setyawan , Rolly Maulana; Politeknik Pos Indonesia Awangga , Nadia Ayu; Politeknik Pos Indonesia Lestari
The availability of a lot of existing Standard Operating Procedures (SOP) document information, users often need time to find SOPs that fit their preference. Therefore, this requires a recommendation system based on user content consumption by personalized usage logs to support the establishment of SOP documents managed according to user preferences. The k-nearest neighbor (KNN) algorithm is used to identify the most relevant SOP document for the user by utilizing implicit feedback based on extraction data by monitoring the document search behavior. From the research results obtained 5 classifications as parameters, with a final value of 3:2 ratio that shows the best distance value with the majority of labels according to the concept of calculation KNN algorithm that sees from the nearest neighbor in the dataset. This shows the precision of applying the KNN algorithm in determining SOP documents according to user preferences based on implicit feedback resulting in 80% presentation for SOPs corresponding to profiles and 20% for SOPs that do not fit the user profile. To establish SOP documents to show more accurate results, it should be used in a broad SOP management system and utilize implicit feedback with parameters not only in search logs and more on performance evaluation evaluations.
Volume: 17
Issue: 3
Page: 1425-1431
Publish at: 2019-06-01

A modified WBANs MAC superframe using priority-criticality index table for managing pilgrims’ emergency traffic in Hajj

10.11591/ijeecs.v14.i3.pp1499-1507
Shah Murtaza Rashid Al Masud , Asmidar Abu Bakar , Salman Yussof
During Hajj, pilgrims suffer from various emergencies that should be managed in a real-time manner thus require deploying emerging technology. Based on our research it is found that the emergency medical circumstances among the pilgrims are due to the criticality level of certain physiological conditions those are by some means rely on five major types of the physiological data rate. Five major data types include heart rate, respiratory rate, body temperature, high or low blood pressure and blood sugar respectively which are obligatory to be transmitted real-time and ahead of other non-critical traffic as delay in its transmission may jeopardise human life. Hence, by the criticality constraints of pilgrims’ physiological data, we primarily perform a traffic classification through literature review. By using classified critical traffic, we define the different priority levels to be used by WBANs hub or coordinator. Therefore, in this research, we apply an analytical method to develop the priority-criticality index table in such a way that there will be no queuing delay in the system. Since our research mainly focuses on to manage the emergency, therefore, for simplicity of critical data transmission, we modified the existing medium access control (MAC) superframe that obtains only one exclusive access period (EAP) slot. The modified MAC superframe structure is to perform efficiently even when more than one emergency traffic from different sensors aggregate to the WBANs coordinator for further transmission to the healthcare stations.
Volume: 14
Issue: 3
Page: 1499-1507
Publish at: 2019-06-01

Off-Line character recognition using an integrated DBSCAN-ANN scheme

10.11591/ijeecs.v14.i3.pp1443-1451
Dhurgham Ali Mohammed , Alaa Abdul Hussein Mezher , Hayder Sabeeh Hadi
Handwriting character recognition involves a high degree of variability and imprecision. For that, the main factor to judge the recognition accuracy is the technique that is used to extract the features. This paper developed a novel method for handwritten Arabic characters by combining the Density-Based Clustering method with statistical and morphological features. The first stage in recognition of handwritten character image has been done by binarization the image then applies noise removal techniques. The Density-Based Algorithm used to categorize and find any shape of clusters based on pixel information positions. This technique divided the image into characters. Each character will be decomposing into four regions from the centroid followed by feature extraction. These features include vertical and horizontal projections, upper and lower profile, rectangularity and orientation. The results of the present process will transfer to the Neural Network (NN) stage which generates a high level of correctness and accuracy by training. The testing results compared with two of state-of-art researches. The total accuracy of this proposed work observes a better recognition of characters.
Volume: 14
Issue: 3
Page: 1443-1451
Publish at: 2019-06-01

A new configuration of a printed diplexer designed for DCS and ISM bands

10.12928/telkomnika.v17i3.9991
H.; FSTT Setti , J.; Hassan 1st University Settat Morocco Zbitou , A. El; FSTT Hamichi , A.; INPT, Microwave Group Tribak
This work presents a new study on the design of a microstrip diplexer configuration optimized and validated for ISM and DCS frequency bands. The achieved structure is based on microstrip technology, the goal was to design two printed bandpass filters one for ISM band and the other one for DCS frequency band.The two microstrip filters are associated by using a T-junction which permits to validate a diplexer in the frequency bands DCS-Band receiver [1.74–2 GHz] and ISM-Band transmitter [2.3–2.55 GHz]. The whole size of the final circuit is 130x50 mm2. After the validation of the proposed diplexer into simulation we have fabricated and tested it by using VNA which permits to have a good agremment between simulation and measurements.
Volume: 17
Issue: 3
Page: 1090-1095
Publish at: 2019-06-01

KANSA: high interoperability e-KTP decentralised database network using distributed hash table

10.12928/telkomnika.v17i3.11758
Rolly Maulana; Politeknik Pos Indonesia Awangga , Nisa Hanum; Politeknik Pos Indonesia Harani , Muhammad Yusril Helmi; Politeknik Pos Indonesia Setyawan
e-KTP is an Indonesian Identity Card based on Near Field Communicator technology. This technology was embedded in every e-KTP card for every Indonesian citizen. Until this research, e-KTP technology never to be utilized by any stack-holder neither government agencies nor nongovernment organization or company. e-KTP Technology inside the card never been used and go with conventional with manual copy it with photocopy machine or take a photograph with it. This research was proposing an open standard to utilized e-KTP Technology. The open standard will bring e-KTP technology used as is and used broadly in many government agencies or much commercial company. This research was proposing decentralized network model especially for storing e-KTP data without breaking privacy law. Besides providing high specs of the server, a decentralized model can reduce the cost of server infrastructure. The model was proposing using Distributed Hast Table which was used for peer-to-peer networks. The decentralized model promised high availability and the more secure way to save and access the data. The result of this model can be implemented in many network topology or infrastructure also applicable to implement on Small Medium Enterprise Company.
Volume: 17
Issue: 3
Page: 1360-1366
Publish at: 2019-06-01

A novel index modulation scheme with impedance matching

10.11591/ijeecs.v14.i3.pp1203-1209
Hye Yeong LEE , Soo Young Shin
Index modulation conveys more data given to indices of status of communication transmission item such as antenna and subcarrier. In this proposed system, we gave the index to the conditions of impedance matching or not. In the transmitter, antenna chooses one impedance according to the mapping table as active impedance. The receiver detects impedance index comparing of impedance between received signal and receivers. The proposed system improves not only transmitted information data by using impedance index but also spectral efficiency. In the simulation, Spectral Efficiency (SE) and Bit Error Rate (BER) were analyzed and compared to conventional modulation scheme.
Volume: 14
Issue: 3
Page: 1203-1209
Publish at: 2019-06-01

Power analysis attack against encryption devices: a comprehensive analysis of AES, DES, and BC3

10.12928/telkomnika.v17i3.9384
Septafiansyah Dwi; Politeknik Negeri Lampung Putra , Mario; Institut Teknologi Bandung Yudhiprawira , Sarwono; Institut Teknologi Bandung Sutikno , Yusuf; Institut Teknologi Bandung Kurniawan , Adang Suwandi; Institut Teknologi Bandung Ahmad
Cryptography is a science of creating a secret message and it is constantly developed. The development consists of attacking and defending the cryptography itself. Power analysis is one of many Side-Channel Analysis (SCA) attack techniques. Power analysis is an attacking technique that uses the information of a cryptographic hardware’s power consumption. Power analysis is carried on by utilizing side-channel information to a vulnerability in a cryptographic algorithm. Power analysis also uses a mathematical model to recover the secret key of the cryptographic device. This research uses design research methodology as a research framework started from research clarification to descriptive study. In this research, power analysis attack is implemented to three symmetrical cryptographic algorithms: DES (Data Encryption Standard), AES (Advanced Encryption Standard), and BC3 (Block Cipher 3). The attack has successfully recovered 100% of AES secret key by using 500 traces and 75% DES secret key by using 320 traces. The research concludes that the power analysis attack using Pearson Correlation Coefficient (PCC) method produces more optimal result compared to a difference of means method.
Volume: 17
Issue: 3
Page: 1282-1289
Publish at: 2019-06-01

Real-time monitoring and warning system in urban rivers

10.12928/telkomnika.v17i3.10397
Sabam; Institute Darmajaya Parjuangan , Rionaldi; Institute Darmajaya Ali , Ari; Institute Darmajaya Purnama
Urban rivers water quality is not suitable for use. The volume of river water in the city is fast full when it rains. Both of these problems need to be monitored. The purpose of monitored to give a warning to a community around the rivers. The rivers water quality determined base on the pH sensor, and turbidity sensor detection. The river water level is determined based on the results of ultrasonic sensor readings. The reading of three sensors is sent via GSM (General Service Mobile) communication network in SMS (Short Message Service) form. The reading also sent via internet data communication network to the server and displayed on web page form. This study indicates that all three sensors are able to detect pH, turbidity, and surface level of the river. The Sensors reading delivered via the GSM communication network, it provides real-time river water information. Whereas sensor readings sent via data communication networks provide river water information that is not real-time. Thus, sensor readings of water urban rivers better delivered via GSM on SMS form than via data communication on Web page form.
Volume: 17
Issue: 3
Page: 1521-1525
Publish at: 2019-06-01

Prototype of multifunctional transmitter with Rejection of disturbances

10.12928/telkomnika.v17i3.12204
Holman Montiel; Universidad Distrital Francisco José de Caldas Ariza , Fernando Martínez; Universidad Distrital Francisco José de Caldas Santa , Fredy H.; Universidad Distrital Francisco José de Caldas Martínez S.
The industrial instruments found in the different industrial processes allow supervisory and control actions to be carried out. These elements are usually composed of an electronic circuit, which varies according to the specifications given by the manufacturer. Another factor that influences the design of a circuit for elements of this type is cost, since, at a lower cost, electronic elements are susceptible to fail for reasons such as electric fields, motor interference or environmental conditions. This problem limits the operation of the instrument and reduces its useful life, which causes unnecessary stops of the automated processes increasing the cost of producing a product. Some partial solutions to this problem have been obtained by means of the implementation of additional circuits such as protections or filters, although the number of unexpected stops of the process is reduced, even this type of failures occur. This paper proposes an alternative solution to the problem through a low cost prototype, which has a mechanism for rejection of disturbances that increases the accuracy and precision of an instrument compared to the low-cost instrument technology developed so far.
Volume: 17
Issue: 3
Page: 1468-1473
Publish at: 2019-06-01

AHP and TOPSIS applied in the field of scientific research

10.11591/ijeecs.v14.i3.pp1382-1390
Mohamed El Mohadab , Belaid Bouikhalene , Fahd Ouatik , Said Safi
Scientific research is a major issue for universities because it ensures its innovation and productivity, but to ensure the proper functioning of universities, the decisions-makers need powerful tools to assist them in this process. Multi criteria decision making (MCDM) may present an appropriate asset for this area especially with the analytical hierarchy process (AHP) which presents a theory of measurement through pairwise comparisons and relies on the judgments of experts to derive priority scales.
Volume: 14
Issue: 3
Page: 1382-1390
Publish at: 2019-06-01

A cluster-based feature selection method for image texture classification

10.11591/ijeecs.v14.i3.pp1433-1442
Abbas F. H. Alharan , Hayder K. Fatlawi , Nabeel Salih Ali
Computer vision and pattern recognition applications have been counted serious research trends in engineering technology and scientific research content. These applications such as texture image analysis and its texture feature extraction. Several studies have been done to obtain accurate results in image feature extraction and classifications, but most of the extraction and classification studies have some shortcomings. Thus, it is substantial to amend the accuracy of the classification via minify the dimension of feature sets. In this paper, presents a cluster-based feature selection approach to adopt more discriminative subset texture features based on three different texture image datasets. Multi-step are conducted to implement the proposed approach. These steps involve texture feature extraction via Gray Level Co-occurrence Matrix (GLCM), Local Binary Pattern (LBP) and Gabor filter. The second step is feature selection by using K-means clustering algorithm based on five feature evaluation metrics which are infogain, Gain ratio, oneR, ReliefF, and symmetric. Finally, K-Nearest Neighbor (KNN), Naive Bayes (NB) and Support Vector Machine (SVM) classifiers are used to evaluate the proposed classification performance and accuracy. Research achieved better classification accuracy and performance using KNN and NB classifiers that were 99.9554% for Kelberg dataset and 99.0625% for SVM in Brodatz-1 and Brodatz-2 datasets consecutively. Conduct a comparison to other studies to give a unified view of the quality of the results and identify the future research directions.
Volume: 14
Issue: 3
Page: 1433-1442
Publish at: 2019-06-01

Implementation model architecture software defined network using raspberry Pi: a review paper

10.12928/telkomnika.v17i3.8859
Oki; Telkom University Marzuqi , Agus; Telkom University Virgono , Ridha Muldina; Telkom University Negara
Software defined network (SDN) made with basic concepts that are different from traditional networks in controlling the network, the separation between the control layer and forwarding layer on different devices allows the administrator to adjust the control plan for all devices centralized in one action, while in traditional network, the control and forwarding layers are located in the infrastructure making network administrator must manage devices one by one. Research using single board computers on network technology provides an opportunity to implement SDN architecture. Raspberry Pi has sufficient ability. QoS results meet the ITU-T G.1010 reference which indicates that Raspberry Pi can be used on designed networks.
Volume: 17
Issue: 3
Page: 1136-1141
Publish at: 2019-06-01

Suitability analysis of rice varieties using learning vector quantization and remote sensing images

10.12928/telkomnika.v17i3.12234
Annisa; Universitas Diponegoro Apriliani , Retno; Universitas Diponegoro Kusumaningrum , Sukmawati Nur; Universitas Diponegoro Endah , Yudo; Universitas Diponegoro Prasetyo
Rice (Oryza Sativa) is the main food for Indonesian people, thus maintaining the stability of rice production in Indonesia becomes an important issue for further study. A strategy to overcome the issue is to apply precision agriculture (PA) using remote sensing images as a reference due to its effectiveness. The initial stage of PA is suitability analysis of rice varieties, including INPARA, INPARI, and INPAGO. While the representative features that can be extracted from remote sensing images and related to agriculture field are NDVI, NDWI, NDSI, and BI. Therefore, the aim of this study is to identify the best model for analyzing the most suitable superior rice varieties using Learning Vector Quantization. The results show that the best LVQ model is obtained at learning rate value of 0.001, epsilon value of 0.1, and the features combination of NDWI and BI values (in standard deviation). The architecture generates accuracy value of 56%.
Volume: 17
Issue: 3
Page: 1290-1299
Publish at: 2019-06-01

An open source tool for reliability evaluation of distribution system using Monte Carlo simulation

10.11591/ijeecs.v14.i3.pp1065-1075
Bhargava Chitumodhu , Renuka Loka
As the demand for electricity is shooting exponentially, reliable supply of electrical energy from generation to customer is the challenging task faced by utilities. Though generation and transmission can be maintained at hundred percent reliability, reliability of entire system cannot be assured unless focus is laid on distribution system. Most of the faults are occurring on the distribution system which is directly connected to different customers. Hence, we need to intensify the attention at distribution level. Due to deregulation, private players are evolving in distribution sector which complicates power system data exchange and information integration.   To cope with this scenario, reliability evaluation of distribution system through Monte Carlo Simulation (MCS) with feature of interoperability for Bus 2 of RBTS system has been introduced and analyzed using SOAP web services. Simulation is performed by developing a web application in Java and is deployed on the Glass-fish server using JAX-WS. The intent behind this proposed model is to use the internet as the transactional tool and exposing the functionality of the program for reliability evaluation for utilities to use and providing facility of interoperability through standards refinement and integration into profiles.
Volume: 14
Issue: 3
Page: 1065-1075
Publish at: 2019-06-01

Tunable function of feeding network and SPDT switch for WIMAX application

10.11591/ijeecs.v14.i3.pp1574-1580
N. Edward , N. A. Shairi , Z. Zakaria , Tole Sutikno , I. D. Saiful Bahri
A tunable circuit that functions as a power divider and a single pole double throw (SPDT) switch is proposed in this paper. The power divider design was based on the conventional Wilkinson power divider (WPD). Since WPD design has wideband properties, a modification was made in the design to make it narrowband so that it will only work for WiMAX applications. Two shorted stubs were introduced in the transmission line of the output ports to encounter the mismatch when the function was switched to an SPDT switch. Rogers RO4350 (er = 3.48, h = 0.508mm) was used as a substrate material and copper (thickness = 0.035 mm) related to patch of this proposed design. When the circuit functioned as a power divider, the simulated result showed S11 < -16 dB, S12 > 3.97 dB, and S23 < -14 dB for both operating frequencies of 2.5 GHz and 3.5 GHz. On the other hand, when the circuit functioned as an SPDT switch and port 2 was in the ON state, the simulated result showed S11 < -35 dB, S12 > -1.1, S13 < -16 dB, and S23 < 18 dB for both operating frequencies of 2.5 and 3.5 GHz. The proposed design showed a good performance as a power divider and an SPDT switch, thus, it can be used for multifunctional microwave circuits.
Volume: 14
Issue: 3
Page: 1574-1580
Publish at: 2019-06-01
Show 1288 of 1983

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration