Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,734 Article Results

An artificial intelligent approach for the optimization of organic rankine cycle power generation systems

10.11591/ijeecs.v14.i1.pp340-345
JianDing Tan , ChinWai Lim , SiawPaw Koh , SiehKiong Tiong , YingYing Koay
The study on Organic Rankine Cycle (ORC) power generation system has gained significant popularity among researchers over the past decade, mainly due to the financial and environmental benefits that the system provides. A good maximum power point tracking (MPPT) mechanism can push the efficiency of an ORC to a higher rate. In this research, a Self-Adjusted Peak Search algorithm (SAPS) is proposed as the MPPT scheme of an ORC system. The SAPS has the ability to perform a relatively detailed search when the convergence reaches the near-optima peak without jeopardizing the speed of the overall convergence process. The SAPS is tested in a simulation to track for a moving maximum power pint (MPP) of an ORC system. Experiment results show that the SAPS outperformed several other well-established optimization algorithm in tracking the moving MPP, especially in term of the solution accuracies. It can thus be concluded that the proposed SAPS performs well as a mean of an MPPT scheme in an ORC system
Volume: 14
Issue: 1
Page: 340-345
Publish at: 2019-04-01

Security risk analysis of bring your own device system in manufacturing company at Tangerang

10.12928/telkomnika.v17i2.10165
Astari; Bina Nusantara University Retnowardhani , Raziv Herman; Bina Nusantara University Diputra , Yaya Sudarya; Universitas Mercu Buana Triana
Nowadays information system has become popular used for help effectiveness and efficiency operation on a company. Bring Your Own Device (BYOD) system is a growing trend in corporate environment, where employees could access the system from anywhere. BYOD system is system information development using some technology like a Virtual Private Networks (VPN) or using some application to make the client on outside network office can access to inside networks with remote system. The remote system has strength to help employees working anywhere and anytime, that could make some issue for a security thing. The security issue that can be happen is unauthorized access and lost some important of company information. XYZ company as a manufacturing company in Tangerang, Indonesia has been used BYOD system in their company. They want to improve the security of the system with do risk analysis, with the aim to protect the internal data. The risk analysis use Cybersecurity Framework NIST will assist organizations to understand the risk of BYOD system. The analysist results obtained by the use of cybersecurity analysis on BYOD system in XYZ company are found some improvement need to develop in terms of security system recommended. According to the stages of respond with the analysis using Cybersecurity NIST framework and ISO/IEC 27002:2013.
Volume: 17
Issue: 2
Page: 753-762
Publish at: 2019-04-01

Nonlinearity compensation of low-frequency loudspeaker response using internal model controller

10.12928/telkomnika.v17i2.11761
Erni; Brawijaya University Yudaningtyas , Achsanul; State Polytechnic of Malang Khabib , Waru; Brawijaya University Djuriatno , Dionysius J. D. H.; Brawijaya University Santjojo , Adharul; Brawijaya University Muttaqin , Ponco; Brawijaya University Siwindarto , Zakiyah; State Polytechnic of Malang Amalia
This paper presents the nonlinearity compensation of low-frequency loudspeaker response. The loudspeaker is dedicated to measuring the response of Electret Condenser Microphone which operated in the arterial pulse region. The nonlinearity of loudspeaker has several problems which cause the nonlinearity behaviour consists of the back electromagnetic field, spring, mass of cone and inductance. Nonlinearity compensation is done using the Internal Model Controller with voltage feedback linearization. Several signal tests consist of step, impulse and sine wave signal are examined on different frequencies to validate the effectiveness of the design. The result showed that the Internal Mode Controller can achieve the high-speed response with a small error value.
Volume: 17
Issue: 2
Page: 946-955
Publish at: 2019-04-01

Effect of SVC installation on loss and voltage in power system congestion management

10.11591/ijeecs.v14.i1.pp428-435
Nur Zahirah Mohd Ali , Ismail Musirin , Hasmaini Mohamad
In this paper, a new hybrid optimization technique is proposed namely Adaptive Embedded Clonal Evolutionary Programming (AECEP). This idea comes from the combination part of the clone in an Artificial Immune System (AIS) and then combined with Evolutionary Programming (EP). This technique was implemented to determine the optimal sizing of Flexible AC Transmission Systems (FACTS) devices. This study focused on the ability of Static Var Compensator (SVC) is used for the optimal operation of the power system as well as in reducing congestion in power system. In order to determine the location of SVC, the previous study has been done using pre-developed voltage stability index, Fast Voltage Stability Index (FVSI). Congested lines or buses will be identified based on the highest FVSI value for the purpose of SVC placement. The optimizations were conducted for the SVC sizing under single contingency, where SVC was modeled in steady state analysis. The objective function of this study is to minimize the power loss and improve the voltage profile along with the reduction of congestion with the SVC installation in the system. Validation on the IEEE 30 Bus RTS and IEEE 118 Bus RTS revealed that the proposed technique managed to reduce congestion in power system.
Volume: 14
Issue: 1
Page: 428-435
Publish at: 2019-04-01

A computer vision based image processing system for depression detection among students for counseling

10.11591/ijeecs.v14.i1.pp503-512
Sandhya Parameswaran Namboodiri , Venkataraman D
Psychological problems in college students like depression, pessimism, eccentricity, anxiety etc. are caused principally due to the neglect of continuous monitoring of students’ psychological well-being. Identification of depression at college level is desirable so that it can be controlled by giving better counseling at the starting stage itself. The disturbed mental state of a student suffering from depression would be clearly evident in the student’s facial expressions.Identification of depression in large group of college students becomes a tedious task for an individual. But advances in the Image-Processing field have led to the development of effective systems, which prove capable of detecting emotions from facial images, in a much simpler way. Thus, we need an automated system that captures facial images of students and analyze them, for effective detection of depression. In the proposed system, an attempt is being made to make use of the Image processing techniques, to study the frontal face features of college students and predict depression. This automated system will be trained with facial features of positive and negative facial emotions. To predict depression, a video of the student is captured, from which the face of the student is extracted. Then using Gabor filters, the facial features are extracted. Classification of these facial features is done using SVM classifier. The level of depression is identified by calculating the amount of negative emotions present in the entire video. Based on the level of depression, notification is send to the class advisor, department counselor or university counselor, indicating the student’s disturbed mental state. The present system works with an accuracy of 64.38%. The paper concludes with the description of an extended architecture for depression detection as future work.
Volume: 14
Issue: 1
Page: 503-512
Publish at: 2019-04-01

Indonesian license plate recognition based on area feature extraction

10.12928/telkomnika.v17i2.9017
Fitri; University of Trunojoyo Madura Damayanti , Sri; University of Trunojoyo Madura Herawati , Imamah; University of Trunojoyo Madura Imamah , Fifin Ayu; University of Trunojoyo Madura M , Aeri; University of Trunojoyo Madura Rachmad
The main principle of license plate recognition is to recognize the characters in the license plate which indicates the identity of the vehicle. This research will provide a system which can be implemented to the automatic payment in highway. Indonesian license plate consists of two parts, every of which has certain characters. These characters may become problem in the recognition process. Another problem is on the type of the license plate since Indonesia applies different color for every type of vehicle. In this research, different approaches are employed in the recognition of license plate; that is using character area as the feature value, also known as feature area, and K-Nearest Neighbor (KNN) as classification method. In addition, another method that has been used in our previous research is also employed to detect the character of license plate. The result shows very significant accuracy of 99.44%. In the process of recognition, scenario 1 gives the best accuracy at the K-1 value; that is 68.57% on the license plate and 92.72% on the characters of license plate. In the scenario 2 was obtained the license plate accuracy of 52% and license plate character accuracy of 89.36% with K-5. The system ran in a relatively short computational time.
Volume: 17
Issue: 2
Page: 620-627
Publish at: 2019-04-01

Detection of immovable objects on visually impaired people walking aids

10.12928/telkomnika.v17i2.9933
Abdurrasyid; Sekolah Tinggi Teknik PLN Abdurrasyid , Indrianto; Sekolah Tinggi Teknik PLN Indrianto , Rakhmat; Sekolah Tinggi Teknik PLN Arianto
One consequence of a visually impaired (blind) person is a lack of ability in the activities related to the orientation and mobility. Blind person uses a stick as a tool to know the objects that surround him/her.The objective of this research is to develop a tool for blind person which is able to recognize what object in front of him/her when he/she is walking. An attached camera will obtain an image of an object which is then processed using template matching method to identify and trace the image of the object. After getting the image of the object, furthermore calculate and compare it with the data training. The output is produced in the form of sound that in accordance with the object. The result of this research is that the best slope and distance for the template matching method to properly detect silent objects is 90 degrees and 2 meters.
Volume: 17
Issue: 2
Page: 580-585
Publish at: 2019-04-01

Sequential order vs random order in operators of variable neighborhood descent method

10.12928/telkomnika.v17i2.11789
Darmawan; Universitas Negeri Malang Satyananda , Sapti; Universitas Negeri Malang Wahyuningsih
Many optimization problems require heuristic methods to solve the problem. Variable Neighborhood Search (VNS) is a metaheuristic form that systematically changes its “neighborhood” in search of solutions. One method in VNS is Variable Neighborhood Descent (VND), which performs a deterministic neighborhood change. The change of the neighborhood in VND can be done in a random and sequential order. This paper compares sequential and random neighborhood selection methods in solving Capacitated Vehicle Routing Problem (CVRP) problems. There are 6 intra-route neighborhood structures and 4 inter-route structures used. CVRP problems are taken from several dataset providers. The initial solution is formed by Sequential Insertion method. The experimental results show that the random selection of neighborhood operators can provide a more optimal route length (in 10 of 13 datasets used) than that of sequential selection (only better in 3 dataset). However, the random selection takes more iterations to reach convergent state than the sequential one. For sequential selection, determination of the neighborhood structure’s order affects the speed to the convergent state. Hence, a random selection in VND method is more preferable than sequential selection.
Volume: 17
Issue: 2
Page: 801-808
Publish at: 2019-04-01

Enabling social WEB for IoT inducing ontologies from social tagging

10.11591/ijict.v8i1.pp19-24
Mohammed Alruqimi , Noura Aknin
Semantic domain ontologies are increasingly seen as the key for enabling interoperability across heterogeneous systems and sensor-based applications. The ontologies deployed in these systems and applications are developed by restricted groups of domain experts and not by semantic web experts. Lately, folksonomies are increasingly exploited in developing ontologies. The “collective intelligence”, which emerge from collaborative tagging can be seen as an alternative for the current effort at semantic web ontologies. However, the uncontrolled nature of social tagging systems leads to many kinds of noisy annotations, such as misspellings, imprecision and ambiguity. Thus, the construction of formal ontologies from social tagging data remains a real challenge. Most of researches have focused on how to discover relatedness between tags rather than producing ontologies, much less domain ontologies. This paper proposed an algorithm that utilises tags in social tagging systems to automatically generate up-to-date specific-domain ontologies. The evaluation of the algorithm, using a dataset extracted from BibSonomy, demonstrated that the algorithm could effectively learn a domain terminology, and identify more meaningful semantic information for the domain terminology. Furthermore, the proposed algorithm introduced a simple and effective method for disambiguating tags.Semantic domain ontologies are increasingly seen as the key for enabling interoperability across heterogeneous systems and sensor-based applications. The ontologies deployed in these systems and applications are developed by restricted groups of domain experts and not by semantic web experts. Lately, folksonomies are increasingly exploited in developing ontologies. The “collective intelligence”, which emerge from collaborative tagging can be seen as an alternative for the current effort at semantic web ontologies. However, the uncontrolled nature of social tagging systems leads to many kinds of noisy annotations, such as misspellings, imprecision and ambiguity. Thus, the construction of formal ontologies from social tagging data remains a real challenge. Most of researches have focused on how to discover relatedness between tags rather than producing ontologies, much less domain ontologies. This paper proposed an algorithm that utilises tags in social tagging systems to automatically generate up-to-date specific-domain ontologies. The evaluation of the algorithm, using a dataset extracted from BibSonomy, demonstrated that the algorithm could effectively learn a domain terminology, and identify more meaningful semantic information for the domain terminology. Furthermore, the proposed algorithm introduced a simple and effective method for disambiguating tags.
Volume: 8
Issue: 1
Page: 19-24
Publish at: 2019-04-01

Facial expression recognition of 3D image using facial action coding system (FACS)

10.12928/telkomnika.v17i2.9304
Hardianto; Universitas Muhammadiyah Malang Wibowo , Fachrunnisa; Universitas Muhammadiyah Malang Firdausi , Wildan; Universitas Muhammadiyah Malang Suharso , Wahyu Andhyka; Universitas Muhammadiyah Malang Kusuma , Dani; University of Derby Harmanto
Facial expression or mimic is one of the results of muscle motion on the face. In a large Indonesian dictionary, the expression is a disclosure or process of declaring, i.e. showing or expressing intentions, ideas of feelings and so on. Facial expression is affected by the cranial nerve VII or Nervus Facialis. In research conducted Paul Ekman got a standardization of expression in the format of a movement called the Facial Action Coding System (FACS). In his research, Paul Ekman said six basic expressions of happiness, sadness, shock, fear, anger, and disgust. In muscle anatomy, that every moving muscle must be contraction, and in the event of contraction, the muscle will expand or swell. Muscles are divided into three parts of origo and insersio as the tip of muscle and belli as the midpoint of the muscle, so any movement occurs then the muscle part belli will expand or swell. Data retrieval technique that is by recording data in 3D, any contraction occurs then the belli part of the muscle will swell and this data will be processed and compared. From this data processing will be obtained the maximum strength of contraction that will be used as a reference for the magnitude of expression made by the model. In the detection of expression is ecluidience distance by comparing the initial data with movement data. The result of this research is a detection of expression and the amount of expression that occurs. A conclusion of this research, we can reconstruction of facial expression detection using FACS, for the example the happiness expression using AU 6 and AU 12 and in this research AU 6 and AU 12 in area 1 and area 4, and in this area it so higher than the other.
Volume: 17
Issue: 2
Page: 628-636
Publish at: 2019-04-01

Application of LFAC {16 2/3Hz} for electrical power transmission system: a comparative simulation study

10.12928/telkomnika.v17i2.10353
Salam Waley; University of Technology Baghdad Shneen , Mahdi Ali Abdul; University of Technology Baghdad Hussein , Jaafar Ali; University of Technology Baghdad Kadhum , Salah Mahdi; Universiti Teknologi Malaysia Ali
Transmission of electrical power for long distance is one of the major challenges for electrical engineers over the years. The first and foremost target it is to ensure the transport of electric power with minimal losses over the distance. This paper proposes to employ the low frequency alternating current (LFAC) with (16 2/3Hz) instead of the traditional frequency (50Hz) for electrical power transmission based on a simulation study. Two transmission systems have been constructed using MATLAB/Simulink software namely: 50Hz transmission systems and (16 2/3Hz) transmission systems. In addition, three different distances of transport lines have been used to compare the efficiency of the two systems namely: short (50km), medium (150) and long (300km). The result demonstrated that the use of LFAC with (16 2/3Hz) is better than the traditional frequency (50Hz) in term of energy saving.
Volume: 17
Issue: 2
Page: 1055-1064
Publish at: 2019-04-01

2FYSH: two-factor authentication you should have for password replacement

10.12928/telkomnika.v17i2.9187
Sunderi; Multimedia Nusantara University Pranata , Hargyo Tri; Multimedia Nusantara University Nugroho
Password has been the most used authentication system these days. However, strong passwords are hard to remember and unique to every account. Unfortunately, even with the strongest passwords, password authentication system can still be breached by some kind of attacks. 2FYSH is two tokens-based authentication protocol designed to replace the password authentication entirely. The two tokens are a mobile phone and an NFC card. By utilizing mobile phones as one of the tokens, 2FYSH is offering third layer of security for users that lock their phone with some kind of security. 2FYSH is secure since it uses public and private key along with challenge-response protocol. 2FYSH protects the user from usual password attacks such as man-in-the-middle attack, phishing, eavesdropping, brute forcing, shoulder surfing, key logging, and verifier leaking. The secure design of 2FYSH has made 90% of the usability test participants to prefer 2FYSH for securing their sensitive information. This fact makes 2FYSH best applied to secure sensitive data needs such as bank accounts and corporate secrets.
Volume: 17
Issue: 2
Page: 693-702
Publish at: 2019-04-01

Compared to wireless deployment in areas with different environmentse

10.11591/ijece.v9i2.pp934-940
Inaam Abbas Hieder
In the mobile phone system, it is highly desirable to estimate the loss of the track not only to improve performance but also to achieve an accurate estimate of financial feasibility; the inaccurate estimate of track loss either leads to performance degradation or increased cost. Various models have been introduced to accurately estimate the path loss. One of these models is the Okomura / Hata model, which is recommended for estimating path loss in cellular systems that use micro cells. This system is suitable for use in a variety of environments. This study examines the comparison of path loss models for statistical analysis derived from experimental data collected in urban and suburban areas at frequencies of 150-1500 MHz’s The results of the measurements were used to develop path loss models in urban and suburban areas. The results showed that Pathloss increases in urban areas respectively.
Volume: 9
Issue: 2
Page: 934-940
Publish at: 2019-04-01

KAFA: A novel interoperability open framework to utilize Indonesian electronic identity card

10.12928/telkomnika.v17i2.11755
Rolly Maulana; Politeknik Pos Indonesia Awangga , Nisa Hanum; Politeknik Pos Indonesia Harani , Muhammad Yusril Helmi; Politeknik Pos Indonesia Setyawan
Indonesian people have electronic citizen card called e-KTP. e-KTP is NFC based technology embedded inside Indonesian citizenship identity card. e-KTP technology has never been used until now since it was launch officially by the government. This research proposes an independent framework for bridging the gap between Indonesia regulation for e-KTP and commercial use in the many commercial or organization sector. The Framework proposes interoperability framework using novel combination component, there are e-KTP reader, Middleware and Web Service. KAFA (e-KTP Middleware and Framework) implementing Internet of Things (IoT) concept to make it as open standard and independent. The framework use federation mode or decentralized data for interoperability, to make sure not breaking the law of privacy. Extended development of AES-CBC cipher algorithm was used to encrypt the data on the transport between middleware and web service.
Volume: 17
Issue: 2
Page: 712-718
Publish at: 2019-04-01

A high efficiency BPSK receiver for short range wireless network

10.12928/telkomnika.v17i2.8616
Mousa; Azarbaijan Shahid Madani University Yousefi , Khalil; Azarbaijan Shahid Madani University Monfaredi
In this paper, a 910MHz high efficiency BPSK receiver is presented with Colpitts oscillator for short range wireless network. In this research, with injection-lock technique and using Colpitts oscillator, the efficiency of receiver has been improved. And also, behavior of an oscillator under injection of another signal has been investigated. Also, variation of output signal amplitude versus injected signal phase variation, the effect of varying the amplitude of injected signal and quality factor of the oscillator has been investigated. The designed receiver has 0.474 mW dc power and -60 dBm sensitivity. Data rate of receiver is 5 Mbps. The FOM of receiver is 94 pJ/bit. This receiver was designed and simulated in 0.18 μm RFCMOS technology. This proposed receiver can be used in short range wireless network for example, Wireless Body array network and wireless sensor network.
Volume: 17
Issue: 2
Page: 995-1005
Publish at: 2019-04-01
Show 1308 of 1983

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration